Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Hey. I know this isn't exactly linux-related, but I'd like to ask something about a possible hack attempt. Recently I checked my apache2 httpd logs and found multiple entries of this strange IP address scanning my webserver for vulnerabilities. While I can't say they found any holes as I regularly update my software, I was curious to see who it was. I did a reverse DNS lookup on the IP in question, but the lookup failed. I've tried multiple reverse-DNS-lookup websites and they were all unable to resolve the IP. I know the IP is valid since it appears in the logs, but why can it not be resolved to a hostname?
There is no requirement that IP addresses be tied to names. This is done for convenience. Computers would work just fine using only IP addresses but we humans would have a hard time remember IPs for everything we want to use so we assign names.
We use DNS to find the names when we don't know them but it requires that someone registered the name and published its association with the IP address. Sometimes you don't want people knowing what your systems are for legitimate purposes. Sometimes you don't want them knowing because you're a hacker and are doing something bad.
There are sites that will approximate the IP address' geographic location. If you see it is coming out of some exotic foreign land (e.g. Russia) you probably just want to blacklist the address so it doesn't do any queries.