attacked? hacked? help.....!

Lisa Durham lisa at natec.net
Wed Dec 10 00:18:59 UTC 2003


Rodolfo J. Paiz wrote:
> At 23:47 12/8/2003, you wrote:
> 
>> Mike Klinke wrote:
>>
>>>
>>> This is normal. What you're seeing is Internet worm scans looking to 
>>> break into vulnerable Windows systems.
>>> Regards,  Mike Klinke
>>
>>
>> Thanks, Mike.
>>
>> Are there similar 'worm scans' for Linux boxes? What should I do to 
>> protect my machine from them if there are? (point me towards a good 
>> website or book explaining this if you can.)
> 
> 
> Also, for both Lisa and Mike, it is considered courteous on these lists 
> to keep only whatever is needed for context from previous messages. Note 
> I kept only two lines from each of your messages, whereas in each of 
> your replies you made the rest of the list (likely a couple of thousand 
> people) read through about 100 lines of logs again and again. On the 
> positive side, thank you for writing your replies AT THE BOTTOM of the 
> message, so that your answer is below the previous comment; this is 
> called bottom-posting, keeps the conversation in chronological order, 
> and is a Very Good Thing [tm].
> 
> Cheers,
> 
> 

I did try to snip out most of the logs in my reply to Mike. I will 
attempt to snip more next time. I apologize, because I do appreciate the 
help you guys offer on this list and do not want to take your time and 
efforts for granted.

Thank you,

Lisa





More information about the fedora-list mailing list