Michael Leone on Mon, 4 Mar 2002 23:06:40 -0500 |
On Mon, 2002-03-04 at 22:58, Jon Galt wrote: > Darxus, > > Thanks for all the tips. Comments/questions interspersed below. > > On Mon, 4 Mar 2002 Darxus@chaosreigns.com wrote: > > > * Portscan your box (probably with nmap) and verify that there are no ports > > open that you do not need open. If you do not know why a port is open, > > close it. Removing a port from /etc/services *may* work, but it is the > > *wrong* way. > > With all my machines behind a linksys router, I would think what I need to > port scan is the linksys router on the WAN side, although I'm not sure how > to do this, Post your WAN IP address here, and ask somebody to nmap you? :-) > > A good step to take is to remove all software that you don't need. Any > > program that is on the system is another possible security vulnerability. > > Is this still true with the Linksys router (BEFSR41) in place? One thing > I'm sure I should do is keep the Firmware up to date on the router. Yes. Consider ... suppose someone breaks thru the Linksys, and lands on a machine on your LAN. Now, s/he wants to jump over to your day-to-day machine, where all the goodies are. Why make it easier for them? -- Michael J. Leone Registered Linux user #201348 <mailto:turgon@mike-leone.com> ICQ: 50453890 AIM: MikeLeone PGP Fingerprint: 0AA8 DC47 CB63 AE3F C739 6BF9 9AB4 1EF6 5AA5 BCDF PGP public key: <http://www.mike-leone.com/~turgon/turgon-public-key.gpg> This email scanned for viruses by SOPHOS Sweep for Unix, and found to be virus-free. Attachment:
signature.asc
|
|