| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Hacked off |
Hello there Marc!
20 Jun 05 at 00:47, Marc Lewis writes to Barry Blackford:
ML> Though I don't run Linux, I see where some folks increase the security of
ML> various critical servers (like DNS, SMTP, etc.) by some moderately complex
ML> process of running them "in jail".
ML> As I understand it, users are set up that own the various processes and
ML> their files and are give fake root directories with the chroot command, or
ML> some variation thereof. An intruder cannot get past the fake root into
ML> the actual system, or so I'm told.
ML> Have you considered something like this?
No, but only because I'm no expert with linux, I have relied on a very good
friend to assist me with all the major configuration, this is the first I
have heard of this process... I'll mention it to him though..
Best Rgds, Bazz
barry{at}glonet.co.nz
---
* Origin: Global NetWork ARGUS IP Mailer & FTP Fidonet New Zealand (3:774/605)SEEN-BY: 633/267 270 @PATH: 774/605 140/1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.