It is not hardcoded. A new configuration directive has been added, and
it is completely up to the administrator to decide to use it.
http://www.isc.org/products/BIND/delegation-only.html
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
just another techie speaking for himself
> -Origi
It is not hardcoded. A new configuration directive has been added, and
it is completely up to the administrator to decide to use it.
http://www.isc.org/products/BIND/delegation-only.html
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
just another techie speaking for himself
> -Origi
I thought we already have a free tool for the same intended purpose. It
was called nmap last time I checked.
BR,
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
just another techie speaking for himself
-Original Message-
From: Matt Foster [mailto:[EMAIL PROTECTED]
Sent: Sunday
I thought we already have a free tool for the same intended purpose. It
was called nmap last time I checked.
BR,
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
just another techie speaking for himself
-Original Message-
From: Matt Foster [mailto:[EMAIL PROTECTED]
Sent: Sunday
-Original Message-
From: Boyan Krosnov
Sent: Thursday, February 20, 2003 9:48 PM
To: 'Odair'
Subject: RE: OpenSSH updates
you are mixing debian stable with openssh stable.
debian stable does not and will never include the latest version of any
software, except probably r
-Original Message-
From: Boyan Krosnov
Sent: Thursday, February 20, 2003 9:48 PM
To: 'Odair'
Subject: RE: OpenSSH updates
you are mixing debian stable with openssh stable.
debian stable does not and will never include the latest version of any software,
except probably r
How about an nmap decoy scan with initial ICMP ping of the scanned host, does
it explain what you saw ?
Did you check all these addresses if they were up at the moment of the .. er ..
attack?
BR,
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
Just another techie speaking for himself
How about an nmap decoy scan with initial ICMP ping of the scanned host, does it
explain what you saw ?
Did you check all these addresses if they were up at the moment of the .. er .. attack?
BR,
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
Just another techie speaking for himself
I also run a public security mirror for myself and everybody interested.
I'm interested to know if there is a push mechanism like it is with the
ftp.d.o's mirrors.
It will be really usefull, cause now I sometimes run it additionally to
the cronjob.
Best regards,
Boyan Krosnov, CCIE
I also run a public security mirror for myself and everybody interested.
I'm interested to know if there is a push mechanism like it is with the
ftp.d.o's mirrors.
It will be really usefull, cause now I sometimes run it additionally to
the cronjob.
Best regards,
Boyan Krosnov, CCIE
> Sep 17 00:21:41 :1489 -> 207.46.197.113:80 SYN **S*
> Sep 17 00:21:42 :1501 -> 207.46.197.113:80 SYN **S*
> Sep 17 00:21:58 :1502 -> 207.46.196.102:80 SYN **S*
> Sep 17 00:21:58 :1503 -> 207.46.196.102:80 SYN **S*
> Sep 17 00:21:58 :1504 -> 207.68.184.62:80 SYN **S*
> Sep 17 0
> Sep 17 00:21:41 :1489 -> 207.46.197.113:80 SYN **S*
> Sep 17 00:21:42 :1501 -> 207.46.197.113:80 SYN **S*
> Sep 17 00:21:58 :1502 -> 207.46.196.102:80 SYN **S*
> Sep 17 00:21:58 :1503 -> 207.46.196.102:80 SYN **S*
> Sep 17 00:21:58 :1504 -> 207.68.184.62:80 SYN **S*
> Sep 17
> But all in all you can always send these posts to /dev/null
> with procmail.
Why not do it on the mailing list server instead on all those inocent
recipients? :)
starting the next OT flame war on debian lists,
Boyan Krosnov, CCIE#8701
http://boyan.ludost.net/
Just another techie speaki
13 matches
Mail list logo