Hey,
I have a few questions about how to actually implement some things
laid out in the Securing Debian How-To...
I read in there that it's preferred to set-up separate partitions for
mount points such as /tmp, /var/tmp, & /home. I tried to do this on the
last debian install I did for my fi
On 7/14/05, DI Peter Burgstaller <[EMAIL PROTECTED]> wrote:
> > 1) What are some projects/software for light IDS, specifically file
> > checksome/change control. I plan on doing the MD5 checksum floppy as
> > described in the Secuirng How-To, but then I want an software that
> > does that and e-ma
On 7/15/05, Alec Berryman <[EMAIL PROTECTED]> wrote:
> Let me clarify what I said: the directory which holds the content
> accessible under http://www.example.com/~user/ is physically locate
> under the chroot, and a symlink to that directory is placed in the
> user's home directory. Neither the u
On 7/15/05, Alec Berryman <[EMAIL PROTECTED]> wrote:
> OpenBSD places all of the user's public_html directories under the
> Apache chroot. I've found it no hassle to put a symlink in the user's
> directory, but then again I wasn't doing quotas.
Alec, Thanks for the suggestion. I had thought of t
On 7/14/05, DI Peter Burgstaller <[EMAIL PROTECTED]> wrote:
> I'm using AIDE and am very happy with it.
Thanks I'll look into it.
> > 2) Apache & or cgi-bins I use, where the cause of my closest to being
> > compromised situations. If I set-up Apache, PHP, cgis, etc in a
> > chroot jail, how can
Hello,
I currently have a Woody NAT/Firewall machine that provides internet
to my home LAN. In addition to that it provides Web proxy and Web
serving (mainly for a few pages for my family and friends). It's been
running nicely for several years now. Last year I had 2 cases where I
had near mi
6 matches
Mail list logo