[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Re[2]: [cobalt-users] Apache Security Alert from my CO-LO facility



You also can run a portscanner like nmap against you own
Server:
nmap 127.0.0.1
It will show you if you have any unusual ports open.
Another good idea is to install the Psionic tools.
Peter


> ML> Date: Mon, 01 Jul 2002 14:33:57 -0500
> ML> From: Mailing Lists
> 
> 
> ML> Mainly get that box updated, pay attention to what is going on in 
> ML> the list, join some security bulletin message lists and 
> you should 
> ML> be okay. I doubt you have been hacked, if you haven't noticed any 
> ML> oddities. But do get patched and upgraded ASAP. If you 
> are concerned 
> ML> that the box is hacked look into the archives for "hacked".
> 
> Installing Tripwire or similar on a system (WHEN KNOWN CLEAN) 
> is a good idea.
> 
> I disagree with the "probably not cracked if you don't notice 
> anything strange" statement.  My experience has been that 
> most people _do not_ know when they've been cracked, at least 
> not for some while...
> 
> 
> Eddy
> --
> Brotsman & Dreger, Inc. - EverQuick Internet Division 
> Bandwidth, consulting, e-commerce, hosting, and network building
> Phone: +1 (785) 865-5885 Lawrence and [inter]national
> Phone: +1 (316) 794-8922 Wichita
> 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
> From: A Trap <blacklist@xxxxxxxxx>
> To: blacklist@xxxxxxxxx
> Subject: Please ignore this portion of my mail signature.
> 
> These last few lines are a trap for address-harvesting 
> spambots. Do NOT send mail to <blacklist@xxxxxxxxx>, or you 
> are likely to be blocked.
> 
> _______________________________________________
> cobalt-users mailing list
> cobalt-users@xxxxxxxxxxxxxxx
> To Subscribe or Unsubscribe, please go to: 
> http://list.cobalt.com/mailman/listinfo/cobalt> -users
> 
>