You are not logged in.
Pages: 1
Now that the Linux worm has hit the scene, I'd like to know, what steps can be taken to minimize the number of exploitable problems, e.g. buffer overflows, on one's system?
Offline
Keep your system up to date and don't run unnecessary services.
Nothing fancy but I think thats all thats necessary, really.
Offline
Common sense is the most important factor of securing any system. There are many testbeds you can set up and scripts you can write that just try to break your computer in all the ways you can think of. If you are scared of crackers, try to think like a cracker.
Of course, all of that was just a list of regular cliche`, but the topic wasn't really all that specific.
Offline
Ditto.
Maybe you can try Snort, if you're sufficiently paranoid. Haven't used it myself, but I have heard good things about it. There's a package in extra.
Offline
A simple one. Login is a user and then su to do any important things ane exit.
P4 2.8Ghz @ 2.8Ghz SL6WT
Zalman CNPS7000-Cu
865PE Neo-2 LS BIOs 2.4
512mb Mushkin Level II
160GB Maxtor HD
Geforce 4 440MX
Antec 3700 1 exhaust and 1 intake fans
Linux 2.6.x
Linux user 314187
ArchLinux
Offline
Yes, of course common sense helps. Among Arch users it's probably kind of a given though.
Snort looks interesting, I'm checking it out.
Also... Is there anything like libsafe that's still maintained? And what about Bastille, could that be used with Arch?
Offline
Pages: 1