[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] eggdrop and monitoring



MS> Date: Thu, 17 Apr 2003 00:56:02 +0200
MS> From: Michael Stauber


MS> c) Run the following commands as root:
MS>
MS> chmod 700 /usr/bin/gcc
MS> chmod 700 /usr/bin/cc
MS>
MS> That will deny the compiler to all users but root. Eggdrop is

MS> e) Search in the /home/sites directory and user directories
MS> for executable files, examine 'em and if it looks fishy then
MS> you might want to chown the file to be owned by root and put
MS> a chmod 600 on it so that nobody can execute 'em anymore. If
MS> it was important to the customer, then they'll sure give you
MS> a call and you can then take it from there.

Better yet, look into mounting /home with the "noexec" option.


Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist@xxxxxxxxx>
To: blacklist@xxxxxxxxx
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <blacklist@xxxxxxxxx>, or you are likely to
be blocked.