Re: Logauswertung (translation)

2006-06-03 Thread Mark Walter
Hi Andreas, hello [EMAIL PROTECTED], > I'm at a company and would like to set up a Debian router/firewall. yeah, that's what I'am also planning at the moment. A firewall issue won't be my problem but I didn't install debian for seven years as I updated the distribution from the net. Hope the net

nmap -sT and open ports from a friends

2006-02-03 Thread Mark-Walter
Hi, this is the nmap -sT scan from a friend: > nmap -sT internet_address Port State Service 25/tcp filteredsmtp 46/tcp openmpm-snd 80/tcp filtered http 119/tcp open nntp 445/tcp filtered microsoft-ds 1080/tcp filtered socks 600

Re: rkhunter / chkrootkit

2004-11-07 Thread Mark-Walter
Hi Rick, > Why don't you make a copy of one or more of those binaries, then > re-retrieve and install the Woody package of the same release, and > compare md5sums of the resulting binaries? (Note that you should make > very sure it's the same release, or you'll get a different md5sum for > entire

rkhunter / chkrootkit

2004-11-05 Thread Mark-Walter
Hello, it now it was a couple of days ago but I've to concern another time to in this case a compromised woody system. chkrootkit found nothing but rkhunter found quite a lot: /bin/login /bin/su /usr/bin/locate /usr/sbin/useradd /usr/sbin/usermod /usr/sbin/vip All these binaries have been alert

symlink attack

2004-10-30 Thread Mark-Walter
Hello, I'am interested to obtain information how an unsecure usage of the directory /tmp is to be avoided within a project which is called symlink attack. Especially I'am interested if it's a difference to have quota deactivated and a user is filling your hardisk to the limit, or not. -- Best