Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Guys, I believe script_kiddies era is falling down, but I don't believe the crackers era is falling down as well, I just came across this article http://zdnet.com.com/2100-1105-943879.html
Are you prepared to deffend yourself?
It's easy to defend yourself if you take some time and lock down your firewall. You don't have one? Find a geek to help you out. I make good money selling slackware-based firewalls to corporations.
Don't think that just because you've disabled tcp/137-139, turned on rp_filter and turned off ICMP echo replies that you're safe. You need to think like a paranoid jackrabbit about network security, and then realize that being *that* paranoid solves nothing. Coming at it hte other way just doesn't work.
Yeah, that's true, I've blocked everything I could think of, turned off ICMP echo to just find out that somebody was playing jack and hide with me, see my post about promiscous mode on my ppp0 interface, I guess there's no a single solution to all your security needs. But the point of the article is that cracker's "community" is no longer interested in playing with MS Windows different flavors OS's, it is switching to more advanced "techniques" to target *NIX based platforms, I am not saying that *NIX's have never been a target for crackers, I am saying that *NIX's, espacially Linux had gained enough power to acquire network and net market such that malicious users are following the wind. I guess, *NIX vs MS war in network/net market won by *NIX, and now it must carry the burden of MS in the war against crackers - I really don't like call them hackers because they bring bad name for programming enthusiasts.
Will see who wins - obviously MS lost big time in both - MS vs *NIX and MS vs. crackers
Their sites/article doesn't show details like SOHO boxen vs servers and hardened/updated vs out of the box setups and for example. IMNSHO FUD spread by a company that makes its money securing systems doesn't make me run faster.
I do think the Linux community as a whole should put more effort into educating each other getting knowledge of good administration and security practices, I hope you agree security is more than just a firewall...
Many people think that NAT protects them. It doesn't. Having a default DENY policy is pretty damned effective but it's also a pain in the ass unless it's properly set up.
I am totaly agree with you guys, that's why I said there is no a single solution to your security needs. Like again in my case, I have tripwire laying around collecting dust and I didn't bother to install it, now I am puzzled if any files were modified. I just hope my system wasn't a part of a DDoS and my ISP wouldn't call me about it.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.