well, since it's "broken" ....doesn't that answer your question ? how did it "break". Has anything been done to work on the cause of the "problem" ?
_____________________________
when someone asks for your username and password, and much *clickely clickely* is happening in the background...
I concurr that making a second root account is extremely unadvisable, and probably retarded. Sudo is your FRIEND.
There is also the classic of manually editing the passwd file, cracker style.
_____________________________
when someone asks for your username and password, and much *clickely...
I work abuse@some.isp so perhaps i can give you some help.
first of all, you need to obtain the complete headers of the email. there are several clues that will help you locate the originating system, but those require experience and practice in tracking mail. Also know that spammers are...
you need to know if it's a connectivity issue, or a server-side config issue.
Try to telnet on port 80 from the windows machines to the apache server. Do you get some kind of response?
_____________________________
when someone asks for your username and password, and much *clickely clickely*...
myself lately i've been a big fan of scanning using 2 antispyware apps ( spybot and adaware) and also doing the random check with the ultimate antispyware powertool : hijackthis!
Funny story : my roomie ( who doesn't have a computer, and that i let use mine on a limited account) actually...
Did the you check the linux documentation project? Unless we get more details, it's not like we can drop you an implementation just like this.
_____________________________
when someone asks for your username and password, and much *clickely clickely* is happening in the background, know...
I've been reading up on the STUN protocol, where they mention 4 "types" of nat responses / cones to UDP responses.
I was just wondering if anyone knew what was the default behavior on the iptables masquerade nat ?
Full cone? Restricted cone? port restricted cone? symetric...
Personally, i use locate . run a cron job to update the database every night and you're pretty much good to go.
_____________________________
when someone asks for your username and password, and much *clickely clickely* is happening in the background, know enough that you should be worried.
This is a setup without username or password, with rw privileges on everything.
Mind you, this setup is for a very ghetto file server for me and my roomies, that shares /shares on the machine but it does the job just right. Everyone accessing this is considered to be user "nobody" with group...
hey, for a similar question : where exactly do the iptables logs reside? I've read the man pages, but it wasn't really clear, and var log didn't have anything resembling it.
Or is this a multiple points question because it implies messing with syslog?
_____________________________
when someone...
First of all, why use a router that you can't even modify anything on it?
Even my ADSL modem has some kind of web interface for changing the ip adress and also setting up the modem as a ghetto router with nat.
_____________________________
when someone asks for your username and password...
I dunno. If it was just to get the image for a work related thing, i don't think it's that bad. It's not like you got a full blown BOFH reading user email for blackmail material here.
And don't forget the golden thing that i have learned in this profession : a lot of people can talk the...
Switch your FTP mode to PASSIVE mode.
Ftp using 2 ports, the NAT will reject the data when ftp is being in active mode. putting it in passive should solve your problem.
_____________________________
when someone asks for your username and password, and much *clickely clickely* is happening...
What about amount of traffic travelling towards you vs size of the network pipe?
_____________________________
when someone asks for your username and password, and much *clickely clickely* is happening in the background, know enough that you should be worried.
I myself was interested in the LPI certification, since it is non-distribution specific. And let's face it, appart from knowing what's the name of the special magic program for configuring things on distribution Z , most of the stuff is mostly the same.
_____________________________
when...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.