hack attempt on my server...What do you do about this?

Jeff Ratliff jefrat at earthlink.net
Sun Jul 18 01:12:36 UTC 2004


On Sat, Jul 17, 2004 at 01:26:43PM -0700, Craig White wrote:
> 
> - a good hacker would use another system to attack other systems to hide
> the originating ip address.
> 
> - a good hacker would never make a feeble attempt such as the one you
> descibed
> 
> - a good hacker would more than likely gain access and remove the log
> entries to cover his tracks. The 2 boxes that I have had hacked were
> done well and not easy to spot.
> 
s/hack/crack/g

Hackers don't do this kind of thing (except to themselves), crackers do.





More information about the fedora-list mailing list