On Thursday 04 March 2004 11:22 am, Kent Schumacher wrote:
> Social Engineering?
>
> Pastor Doug Coats wrote:
> > Thanks everyone for your input so far.
> >
> > A special thanks to B_o_B (I think) who has been diligently trying to
> > hack me. :)
> >
> > SMB is on but not open to the public.
> > Finger is on but not open to public
> >
> > It is an email and web server.
> >
> > The only VRFY message in the maillog is a rejection for B_o_B.
> >
> > domain.com/~username returns the same for valid and invalid users.
> >
> > B_o_B has passed along the nmap and the results look like they should - I
> > think.

Look at your people as well as all those hackers on the Internet.

Most security incidents come from within.

-- 
Bob Tanner <tanner at mn-linux.org>          | Phone : (952)943-8700
http://www.mn-linux.org, Minnesota, Linux | Fax   : (952)943-8500
Key fingerprint = AB15 0BDF BCDE 4369 5B42  1973 7CF1 A709 2CC1 B288


_______________________________________________
TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
http://www.mn-linux.org tclug-list at mn-linux.org
https://mailman.real-time.com/mailman/listinfo/tclug-list