North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: rr style scanning of non-customers
- From: E.B. Dreger
- Date: Sun Jun 15 01:36:39 2003
RB> Date: Sat, 14 Jun 2003 22:22:50 -0700
RB> From: Randy Bush
RB> > Plenty of *ix idiots running vulnerable systems and "servers",
RB> > too. Follow a Cobalt mailing list and live in fear.
RB> for which there are system-specific sites telling you how to
RB> lock it down, e.g., as david lesher just pointed out,
RB> that fools don't use the resources is another matter. "a fool
Perhaps. That doesn't make the problem any less severe, though.
One even could argue that's worse -- people running vulnerable
systems despite the availability of lockdown information.
RB> and their data are soon parted." -- monty williams
RB> but where is the equivalent for windoze, the very common and very
RB> vulnerable opsys?
Google search for something like
securing windows lockdown
is a reasonable start.
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita
DO NOT send mail to the following addresses :
email@example.com -or- firstname.lastname@example.org -or- email@example.com
Sending mail to spambait addresses is a great way to get blocked.