| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | rooted |
ML>> are you aware of the slammer worm? MA> W32.SQLExp.Worm is a worm that targets the systems MA> running Microsoft SQL Server 2000, as well as MA> Microsoft Desktop Engine (MSDE) 2000. The worm sends MA> 376 bytes to UDP port 1434, the SQL Server Resolution MA> Service Port. MA> What has this got to do with me operating as root MA> with Linux? it may be possible that something similar may attack your system in a similar manner... if it happens to beat on something that you are running in userspace as root on that port, it is possible that it could get in or open up other venues of access... and being as you are running as root, getting rooted could be more easily accomplished... ML>> what about code red or MA> Web servers utilizing the IIS server on Windows NT and MA> Windows 2000 with the index server or indexing service MA> enabled. MA> What has this got to do with me operating as root with Linux? the point is that they do not arrive via spam... they move via several other methods... ML>> nimda? MA> Nimda Worm MA> Systems running Microsoft Windows 95, 98, ME, NT, and 2000 MA> What has this got to do with me operating as root with Linux? see above... they do not arrive via spam... one of them does have that capability, though... [trim] MA> I welcome input from anyone regarding security but before you MA> put in your two penny worth could you at least do a little MA> research an not waste my time. research on what? i gave examples of critters that move and infect without using SPAM as their avenue of attack... i'm making that point because you specifically are limiting your statements to SPAM and how you dump it in the trash... my point is that SPAM is only one avenue of infection... there are others that are already being exploited and i'm positive there are a whole passel of others just waiting to be discovered... )\/(ark* Origin: (1:3634/12) SEEN-BY: 633/267 270 @PATH: 3634/12 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.