sglafata Posted April 10, 2003 Report Share Posted April 10, 2003 I was just curious if there are many people out there who use the TrinityOS security "updates" with their Linux Mandrake distribution. I have taken an interest to them and was thinking of applying their recommendations to Mandrake. They sound liek they know what their talking about, but I never hear much about them. Their site is updated as of 2 days ago: http://www.ecst.csuchico.edu/~dranch/LINUX/ Can someone with more security experience check them out and tell me what you think. Thanks. Quote Link to comment Share on other sites More sharing options...
Michel Posted April 10, 2003 Report Share Posted April 10, 2003 I'm not a security expert (certainly not :)), but have interest in security.... To my knowledge it looks all very nice...am certainly going to apply them...or a part of them.Saw some things I wanted to do anyway... Looks good.... Quote Link to comment Share on other sites More sharing options...
Michel Posted April 10, 2003 Report Share Posted April 10, 2003 I've just read a part about internet-security and he has it about IP-chains...nice, now I know what it means, but linux now works with ip-tables....So, it seems some things are a little bit outdated..., but this doesn't mean that it's bad.I think it contains a lot of usefull info..Maybe this is the only outdated part....I think that if you've read all, you know a lot....Very usefull site. He also say to reject in stead of denying/dropping a package. I prefer dropping it, becausethen it seems like you're computer don't exists...because it doesn't respond. Quote Link to comment Share on other sites More sharing options...
Relic2K Posted April 30, 2003 Report Share Posted April 30, 2003 I've just read a part about internet-security and he has it about IP-chains...nice, now I know what it means, but linux now works with ip-tables....So, it seems some things are a little bit outdated..., but this doesn't mean that it's bad.I think it contains a lot of usefull info..Maybe this is the only outdated part....I think that if you've read all, you know a lot....Very usefull site. He also say to reject in stead of denying/dropping a package. I prefer dropping it, becausethen it seems like you're computer don't exists...because it doesn't respond. Yep I agree with Michel on this, and I do security...The less information you give an attacker the better. You can never truely stop a great hacker, but you can sure as hell make his work a lot harder :) I drop everything at my router including ICMP. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.