>I've often wondered whether it would be worth connecting a >very large serial EEPROM to a serial port interface, and >have it effectively appear as a solid state printer, (to >that you could cheaply log to an unmodifyable device). >Has anybody ever tried this?>John.Dot Matrix or an old printer would come in handy here with a (near-)infinite number of paper feed. :-) A friend of mine has done the same thing, except with web logs. Mostly so he can watch where his children go, however the same could be done about hackers. Only exception is if someone knows about it. If they know about it, most likely they know someone who has physical access. If it was a rootkit that got you, then you are safe. I'm sure the rest should be obvious. In a nutshell... Yes it can be done and is one of the safer methods, but more paranoid (which can be a good thing :-) If you desire to know the method to accomplish this, I would be happy to give them to you. Another method, that just popped to mind, is perhaps having Some form of a network share somewhere to which only write access Is granted. No on could list the files, no one could read the files (except for admin of course!). I'm unsure if it's possible to allow Only additions to files and no deletions... Just a thought. Samba Masters> Would this be possible via samba? --KM
Coreix Systems - Unix - Linux Development & Internetworking Engineers
2003-Apr-17 19:31 UTC
[Samba] RE: Help with virus/hackers
Yes, Just get a PCMCIA Flash card, You can get them to about 2GB now, and a PCI - PCMCIA card, and plug it in, I have some code i wrote about 4 years ago to store access control log's to a building on a PCMCIA card so it could be taken off site and graphed, who when in at what day:date:time && exit_time.... But why, You can use Squid Proxy cache and Webalizer or Awstats to monitor the kid's, And do a HTTP URI Deny and have a "Porn" list, which you can download from particular sites of known porn sites, "if that's what you want to deny"... Or just look at the Webalizer log's http://www.mrunix.net/webalizer/ http://awstats.sourceforge.net/ Not quite sure of the purpose here....? Regards, Craig R. Marshall B.E (Hons), M.Eng.Sc., CCNA Senior Software, IP Telecommunications & Terrestrial Systems Engineer. Coreix Systems Australia mailto:craigrm@coreixsystems.com.au http://www.coreixsystems.com ================================================================================================Disclaimer: No guarantee is made that this email is free of computer viruses or other defects. We suggest that any attachments be scanned using appropriate virus detection software before use. We will accept no liability for any loss or damage, which may result directly or indirectly from opening or using any such attachment. This e-mail is confidential. If you received this in error, please notify the author by replying to this e-mail or advise us by telephone on (+618) 9490 6698. Privacy Policy: Coreix Systems is committed to protecting your privacy. If at any time you choose not to receive information from us, or you wish to amend your personal information, please notify Coreix Systems directly on (+618) 9490 6698, email mailto:privacy@coreixsystems.com.au or by post to: Coreix Systems : PO Box 252, Maddington, Perth - Western Australia, AUSTRALIA 6989. Thank you. ================================================================================================ {-----Original Message----- {From: samba-bounces+lists=coreixsystems.com.au@lists.samba.org {[mailto:samba-bounces+lists=coreixsystems.com.au@lists.samba.org]On {Behalf Of Kenny Mann {Sent: Friday, 18 April 2003 12:34 AM {To: John Bradford; Alan Cox {Cc: joe briggs; samba@lists.samba.org; root@chaos.analogic.com; {linux-kernel@vger.kernel.org {Subject: [Samba] RE: Help with virus/hackers { { {>I've often wondered whether it would be worth connecting a {>very large serial EEPROM to a serial port interface, and {>have it effectively appear as a solid state printer, (to {>that you could cheaply log to an unmodifyable device). {>Has anybody ever tried this? { {>John. { {Dot Matrix or an old printer would come in handy here with {a (near-)infinite number of paper feed. :-) {A friend of mine has done the same thing, except with web logs. {Mostly so he can watch where his children go, however the same {could be done about hackers. Only exception is if someone knows {about it. If they know about it, most likely they know someone {who has physical access. If it was a rootkit that got you, then {you are safe. I'm sure the rest should be obvious. { {In a nutshell... Yes it can be done and is one of the safer {methods, but more paranoid (which can be a good thing :-) { { {If you desire to know the method to accomplish this, I would {be happy to give them to you. { { {Another method, that just popped to mind, is perhaps having {Some form of a network share somewhere to which only write access {Is granted. No on could list the files, no one could read the files {(except for admin of course!). I'm unsure if it's possible to allow {Only additions to files and no deletions... Just a thought. { {Samba Masters> Would this be possible via samba? { {--KM {-- {To unsubscribe from this list go to the following URL and read the {instructions: http://lists.samba.org/mailman/listinfo/samba { {