attacked? hacked? help.....!

jonp jmpenot at comcast.net
Wed Dec 10 05:25:29 UTC 2003


Rodolfo J. Paiz wrote:

> At 23:47 12/8/2003, you wrote:
>
>> Mike Klinke wrote:
>>
>>>
>>> This is normal. What you're seeing is Internet worm scans looking to 
>>> break into vulnerable Windows systems.
>>> Regards,  Mike Klinke
>>
>>
>> Thanks, Mike.
>>
>> Are there similar 'worm scans' for Linux boxes? What should I do to 
>> protect my machine from them if there are? (point me towards a good 
>> website or book explaining this if you can.)
>
> snipped...

> Also, for both Lisa and Mike, it is considered courteous on these 
> lists to keep only whatever is needed for context from previous 
> messages. Note I kept only two lines from each of your messages, 
> whereas in each of your replies you made the rest of the list (likely 
> a couple of thousand people) read through about 100 lines of logs 
> again and again. On the positive side, thank you for writing your 
> replies AT THE BOTTOM of the message, so that your answer is below the 
> previous comment; this is called bottom-posting, keeps the 
> conversation in chronological order, and is a Very Good Thing [tm].
>
> Cheers,
>
>
Rodolfo, not to be picky, but there are some of us so new to Linux, of 
any flavor, that we may not know what information can be minimized to a 
couple of lines of quoted output - I am one of those, at this stage.  I 
believe that your response was excellent; especially in offering your 
additional time to explain something of netiquette for this forum.  I 
hope that others in this venue are as considerate, patient, helpful, and 
understanding toward those of us still learning how best to communicate 
problems, solutions, and knowledge.





More information about the fedora-list mailing list