attacked? hacked? help.....!
Lisa Durham
lisa at natec.net
Wed Dec 10 00:18:59 UTC 2003
Rodolfo J. Paiz wrote:
> At 23:47 12/8/2003, you wrote:
>
>> Mike Klinke wrote:
>>
>>>
>>> This is normal. What you're seeing is Internet worm scans looking to
>>> break into vulnerable Windows systems.
>>> Regards, Mike Klinke
>>
>>
>> Thanks, Mike.
>>
>> Are there similar 'worm scans' for Linux boxes? What should I do to
>> protect my machine from them if there are? (point me towards a good
>> website or book explaining this if you can.)
>
>
> Also, for both Lisa and Mike, it is considered courteous on these lists
> to keep only whatever is needed for context from previous messages. Note
> I kept only two lines from each of your messages, whereas in each of
> your replies you made the rest of the list (likely a couple of thousand
> people) read through about 100 lines of logs again and again. On the
> positive side, thank you for writing your replies AT THE BOTTOM of the
> message, so that your answer is below the previous comment; this is
> called bottom-posting, keeps the conversation in chronological order,
> and is a Very Good Thing [tm].
>
> Cheers,
>
>
I did try to snip out most of the logs in my reply to Mike. I will
attempt to snip more next time. I apologize, because I do appreciate the
help you guys offer on this list and do not want to take your time and
efforts for granted.
Thank you,
Lisa
More information about the fedora-list
mailing list