On Mon, 2015-02-02 at 17:49 -0700, Warren Young wrote:> Polio was almost completely eradicated, but it?s starting to come back in the middle east after the CIA used a fake vaccination campaign as a pretext to try to get into bin Laden?s Pakistan compound:The Taliban were created and funded by the USA, using the Pakistani intelligence service, to give the Russian invaders of Afghanistan a bad time. Bin Laden was a frequent guest of honour at USA military bases in the US of A. Inoculation against illnesses is important. As for security, the cess pit is weak security not on Linux, BSDs and others etc. but on M$. It seems to be incredibly easy for one malicious person to launch attacks from machines they control all over the world - and those machines just happen to be running M$. Breaking into M$ machines seems to be t-o-o easy so I suspect it is not password weaknesses that are being exploited ! Encourage good security but don't force it down our throats ! -- Regards, Paul. England, EU. Je suis Charlie.
On 3 February 2015 at 12:09, Always Learning <centos at u64.u22.net> wrote:> As for security, the cess pit is weak security not on Linux, BSDs and > others etc. but on M$. It seems to be incredibly easy for one malicious > person to launch attacks from machines they control all over the world - > and those machines just happen to be running M$. Breaking into M$ > machines seems to be t-o-o easy so I suspect it is not password > weaknesses that are being exploited !This is not correct and a dangerous assumption to make about real and current threats. Your security practice, as you have described it, is poor. If you have been compromised, you may not be aware of it. A compromise of your systems weakens the whole community. Kal Kahlil (Kal) Hodgson GPG: C9A02289 Head of Technology (m) +61 (0) 4 2573 0382 DealMax Pty Ltd Suite 1416 401 Docklands Drive Docklands VIC 3008 Australia "All parts should go together without forcing. You must remember that the parts you are reassembling were disassembled by you. Therefore, if you can't get them together again, there must be a reason. By all means, do not use a hammer." -- IBM maintenance manual, 1925
On 2/2/2015 5:09 PM, Always Learning wrote:> As for security, the cess pit is weak security not on Linux, BSDs and > others etc. but on M$. It seems to be incredibly easy for one malicious > person to launch attacks from machines they control all over the world - > and those machines just happen to be running M$. Breaking into M$ > machines seems to be t-o-o easy so I suspect it is not password > weaknesses that are being exploited !the majority of 'botnet' systems that probe at my servers appear to be poorly configured linux servers at colocs. -- john r pierce 37N 122W somewhere on the middle of the left coast
On Tue, 2015-02-03 at 12:20 +1100, Kahlil Hodgson wrote:> On 3 February 2015 at 12:09, Always Learning <centos at u64.u22.net> wrote: > > As for security, the cess pit is weak security not on Linux, BSDs and > > others etc. but on M$. It seems to be incredibly easy for one malicious > > person to launch attacks from machines they control all over the world - > > and those machines just happen to be running M$. Breaking into M$ > > machines seems to be t-o-o easy so I suspect it is not password > > weaknesses that are being exploited ! > > This is not correct and a dangerous assumption to make about real and > current threats.What is incorrect ? The fact that one person can control many computer systems - home and business - all around the world ? That the same person can launch exactly the same attacks on my mail servers and the same attacks on my web servers from different machines all around the world ? That the machines being used for the attacks just happened to be running M$ ? That every day I witness the attacks on my systems ?> Your security practice, as you have described it, is poor.Rubbish.> If you have been compromised, you may not be aware of it.I really do think I would because of the systems I run. Please do not judge my standards by standards you may be familiar with.> A compromise of your systems weakens the whole community.I'm am sure that is not true. -- Regards, Paul. England, EU. Je suis Charlie.
On Mon, 2015-02-02 at 17:20 -0800, John R Pierce wrote:> the majority of 'botnet' systems that probe at my servers appear to be > poorly configured linux servers at colocs.They appear to be an increasing source. Those and Vietnam are currently popular. So I block the data centres/coloc IP ranges. Blocking of individual IPs is automatic and is for all ports. It usually lasts for about 4 to 6 weeks. Manual blocking is usually of IP ranges and usually permanent but restricted to ports 25 or 80. I want is a quiet life :-) -- Regards, Paul. England, EU. Je suis Charlie.
OK, folks. You're doing a great job of describing the current milieu with a rough description of some best practices. Now how about some specific sources you personally used to learn your craft that we can use likewise? PatrickD