On Sun, 26 Dec 1999, you wrote:
Personnally I don't worry about it much when I get scanned because there is nothing on my computer to get to, but as I put alot of work into setting this up I watch the logs and still take the time to report people who try. Keep an eye on your log files and watch for repeated attempts. Every now and then I get what I would call a random message but if I see several then I start taking notes and doing whois searches etc. You might also consider running root-tail so you can see it when it happens too.
I do. You should, too. Even if you have nothing important, an attacker can gain access to your computer, then use it as a jumping off point for attacks against someone else. Guess where the trail leads? Your house. I complained to a company that attacked my firewall. It wasn't the company, but some crackers that had compromised an old, insecure Red Hat install. The admin never secured the machine, so it was wide open. Their ISP received several hundred complaints about the attacks.
Considering the rapid transition of the U.S. into an Information Police State, where the Feds can sieze your property if your are suspected of drug- or computer-related crimes and you don't get it back, even if you are never charged with a crime, I would take every precaution to make sure I am the only one using my computer. The concept of "due process" does does not exist anymore when it comes to drugs and computers. I'll research the exact laws and post a URL later - if there is interest. I've read them, they exist.
-- George Toft http://www.georgetoft.com
Ok this is getting a little long here, but just to clear the air I didn't say to ignore security or that I didn't understand the implications of an insecure system. I simply made an offhand comment that I have nothing worth having on my system. I've been using ipchains for months and reading about this whenever I have a spare moment, not to mention the systems I run for a living so I am not new at this. I am just somewhat new to the Linux way of doing it. I've been using SuSE since 5.3 about a year ago, but I've only been using the networking features heavily for the last 4 months since I got my ADSL setup. As for setting up another system just as my firewall: The issue isn't about cost or work it's space and electricity more than anything. When you have an office roughly 10 x 12 ft. with 2 computers both with large monitors a scanner 2 printers a fax machine, a hub, 2 ups systems an ADSL modem, video camera, paper shreader, phones, speakers and the rest of the works all plugged in on one circuit the last thing you want to do is plug in another box just to route packets. I have a perfectly good pentium133 and 2 3com net cards sitting in the other room unused. I simply have nowhere to put the stuff. My hope actually is to get one of the old laptops from work when we upgrade. I have one now running SuSE and it works great and takes up very little space. I thought with the addition of one more net card it would make a perfect space-saving router. As a bonus I wouldn't have to telnet or ssh to it because it will have a built in console. :-) Thanks to George though for the comments. I visited your site some months ago and found it very helpfull. Haven't gone back recently though been to busy with other projects. -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Darren R. Weber drw@linuxfan.com ICQ# 2849193 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -- To unsubscribe send e-mail to suse-linux-e-unsubscribe@suse.com For additional commands send e-mail to suse-linux-e-help@suse.com Also check the FAQ at http://www.suse.com/Support/Doku/FAQ/