Search:

User: EJeanmaire; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    9
    Views
    499

    [other] Re: Is this enough?

    Ah, good to know.
  2. [ubuntu] Re: SSH Sessions - How do they work in terms of applications?

    Maybe I read over this too quickly but what if you just add the line to /etc/rc.local
  3. Replies
    7
    Views
    655

    [other] Re: Requests to website; stats log

    nasl = NESSUS plugin. Someone is vulnerability scanning your website, most likely with the unsafe/website attack plugins enabled.



    No, its not his password, its NESSUS trying to inject that...
  4. [ubuntu] Re: Is it true that session hijacking works just as easily when Linux users are targe

    sslstrip also can put a cool "lock" favicon on the browser to trick users into thinking that the site is secure. Always check the cert (never accept a cert warning message). Always look for https....
  5. Replies
    13
    Views
    1,084

    [ubuntu] Re: I'm the hacked guy

    :popcorn: More please.
  6. Replies
    9
    Views
    499

    [other] Re: Is this enough?

    You have quite a few ports open/forwarded to this server, you'll have to keep an eye open on the server quite a bit. SSH seems pretty well locked down, but you have quite a few other services you...
  7. Replies
    4
    Views
    822

    [ubuntu] Re: Truecrypt with multiboot ubunti10.10/7

    You can use TrueCrypt to encrypt Windows, and use the TrueCrypt bootloader, and it gives you the option to boot from other harddrives outside of truecrypt/windows. From there you can boot in to...
  8. Replies
    39
    Views
    4,940

    [ubuntu] Re: Snort inline + mysql + base

    Did you log into snort.org and generate an oinkmaster code? Paste that code in the <code> section in the oinkmaster config, athen run oinkmaster under sudo, and you are all set.
  9. Replies
    39
    Views
    4,940

    [ubuntu] Re: Snort inline + mysql + base

    You could also use inundator to generate fake snort alerts.
  10. [SOLVED] Re: Have formatted my entire hardrive Still Rootkits

    I have read this entire thread (sadly) and still don't see how you have come to the conclusion that you were hacked, or socially engineered. What 'symptoms' did you experience to come to this...
  11. Replies
    13
    Views
    1,056

    [ubuntu] Re: 10.04 is hacked

    Nope, nothing wrong with it from a security standpoint. If you don't have a printer, you can remove cupsd (or atleast stop it from running), and avahi-daemon is for shared device discovery on your...
  12. Replies
    4
    Views
    1,117

    [ubuntu] Re: ports 21, 110, 143 open?!?

    You'll probably want to reconfigure your mail service and ftp service to localhost only, or remove them.
  13. Replies
    5
    Views
    1,023

    [ubuntu] Re: Get rid of DDOS, HOW?

    Sounds more like a load issue, what are the server specs, type "top" and see what is using the most system resources. Also show us the output of netstat -antp. Also check the size of your http...
  14. Replies
    132
    Views
    10,332

    [ubuntu] Re: I need an outbound GUI software firewall

    Actually, there are some privacy issues at stake which may require the use of an application firewall (I only know of Little Snitch for Mac OS X, I do not have one on my Ubuntu boxes), many programs...
  15. [ubuntu] Re: Anybody know a Firewall that shows what applications are accessing internet?

    Little Snitch does exactly what you guys are looking for, the only problem is that it is Mac OS X only.
  16. Replies
    13
    Views
    1,356

    [ubuntu] Re: webmin and ubuntu server

    What do you want Webmin to do? Obviously it would help your Linux-experience by manually performing the server administration tasks.
  17. [ubuntu] Re: How to skip authentication system updates?

    Sounds like you want automatic updates without user interference? You can try:


    https://help.ubuntu.com/community/AutomaticSecurityUpdates

    You will still have to configure this after...
  18. [SOLVED] Re: What is this Outbound network connection?

    Someone can correct me if I am wrong, but Avahi does some network "chatting" to offer your shared devices and files and to determine if there are some other networked computers out there that are...
  19. Replies
    4
    Views
    4,669

    [other] Re: Metasploit strange error

    It almost looks like it is giving your verbose mode... did you set anything like that?
  20. Replies
    7
    Views
    4,865

    [SOLVED] Re: How to completely remove gwibber?

    sudo apt-get purge gwibber

    that is what you are looking for, that is the complete removal.
  21. Replies
    18
    Views
    3,206

    Re: SSH remote port forwarding

    You need the -L switch not -R
  22. [ubuntu] Re: Downloading Security Updates Prior to Installation

    You could download the latest software / security sources files from computer A on the internet from the Ubuntu repo, and then load them onto the unpatched computer. Then run package manager and...
  23. Replies
    30
    Views
    2,475

    [other] Re: Any Alternatives to Google?

    I'm afraid to tell you that you will not be escaping Google by any means by using another search engine... if you use Firefox. Firefox sends all websites you visit to be "validated" for phishing...
  24. [ubuntu] Re: I have a virus. Ubuntu 9.04 Now what to do?

    How did you determine that your account sent these?
  25. [ubuntu] Re: I have a virus. Ubuntu 9.04 Now what to do?

    I don't think that you have a virus on your Ubuntu install. There are much more likely scenarios, such as:

    1. You had your account information stolen through social engineering (fake websites...
Results 1 to 25 of 120
Page 1 of 5 1 2 3 4