On 2009-05-21, Abeel van der Kloothuysen <invalid@xxxxxxxxxxxxxxx> wrote:
> "Erik Funkenbusch" <erik@xxxxxxxxxxxxxxxxxxxxxx> schreef in bericht
> news:23ktlva3alt8.dlg@xxxxxxxxxxxxxxxxxx
>> On Thu, 21 May 2009 12:53:58 +0000, Roy Schestowitz wrote:
>>
>>> -----BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA1
>>>
>>> Coping with the malware deluge
>>>
>>> ,----[ Quote ]
>>>| The struggle between computer security firms and hi-tech criminals has
>>>often
>>>| been likened to an arms race.
>>>|
>>>| Any improvement in the way computers spot malicious software is matched
>>>by a
>>>| change in tactics by the criminals that undermines that better
>>>protection.
>>> `----
>>>
>>> http://news.bbc.co.uk/1/hi/technology/8056486.stm
>>
>> It's no longer just a Microsoft problem. Mac's are starting to become
>> infected with Malware and acting as Spam Zombies, and there is now Linux
>> malware floating around that does the same thing.
>>
>> Yes, the fact that 99% of it is Windows means it's still primarily a
>> Windows problem, but this isn't JUST a windows problem.
>
>
> The cola retards holla and scream when one dares to doubt *nix security!
> http://www.viruslist.com/en/weblog?weblogid=208187702
> http://www.itsecurity.com/features/ubuntu-secure-install-resource/
You can always be a little more paranoid.
Although I wonder what the point of disabling root logins to SSH
is when SSH is not even enabled by default in Ubuntu or root logins in
general.
Given that little bit of misunderstanding, you really gotta wonder
about the rest of their advice.
If you are going to go to the trouble of installing sshd and then
securing it, you can give it a whitelist of allowed users. If you are
going to be more paranoid you might as well do it right and start with
"deny all" rather than "allow all" as that last document seems to imply.
--
Apple: because TRANS.TBL is an mp3 file. It really is! |||
/ | \
|
|