Miscellaneous > The Lounge

Spying

(1/3) > >>

Old Meat:
I read some interesting news a few months back about spy ware any body heard of this    
Symantec {Norton's} and McAfee   will not upgrade its anti-virus software for FBI spy ware {magic lantern}
.
Symantec Lease

badkarma:
obtaining an ip address is quite easy and quite harmless in most cases as well, it's quite easy to look up a normal (snail mail) address for someone, and if they leave the door wide open, or leave the key sticking in then you're just asking to get robbed. If you install a infrared motiondetection burglar system the chances of someone coming in without at least you knowing about it are slim to none, this is a perfect analogy to internet security. A computer is as secure as the owner wants it to be (that's why a *lot* of people running windows 9x who have a cable/dsl/other broadband connection get hacked a lot and are acting as virus magnets)

On my linux box there are 2 ports open, the SSH port (which is a secure shell port, quite secure  ;) ) and the X network port (so I can run programs from work at home, not quite as secure as SSH but not that insecure ....)

iancom:
BadKarma... you've probably already patched it but just to make sure, and also to demonstrate that nothing is every really 100% secure:

Have you patched your sshd recently? A friend of mine had the RPM's of openssl and ssh installed (circa RH 6.2) and got seriously hacked a few weeks back. Nasty thing that installed a sniffer and emailed back any passwords it found that went over the wire plaintext (ftp, pop3, etc).

I was running exactly the same firewall setup as him with the exception that I recompile openssl and ssh from source whenever necessary, rather than relying on RPM's! A lucky escape for me I think...

I also prefer to have no ports whatsoever visible to the outside world in general... I lock down access to ssh only to IP addresses I know I'll need access from, ie work etc.

badkarma:
Hmmm ... you probably don't know the version of sshd which has that exploit? Cause I just use the standard sshd which comes with SuSE 7.3 (but seeing that 7.3 is quite recent, it will probably contain the patched version)

My slackbox will probably have the insecure daemon installed however that pc isn't visible to the outside world, so I don't think that is much of a problem....

thanks for the tip anyway  

voidmain:
I believe if you are above v 3.x of ssh you should be good. It's not a bad idea to restrict access to specific IP addresses or ranges.  Keeps the rif raf from trying anything anyway...

Navigation

[0] Message Index

[#] Next page

Go to full version