[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] exploitable spam machines
- Subject: [ale] exploitable spam machines
- From: jkinney at localnetsolutions.com (James P. Kinney III)
- Date: Mon Sep 22 11:34:35 2003
- In-reply-to: <3F6ED775.7679.E19B983@localhost>
- References: <3F6ED775.7679.E19B983@localhost>
On Mon, 2003-09-22 at 11:05, synco gibraldter wrote:
>
> also notice the open web port with the default apache test page on both of those
> hosts. i'd like to see somebody make a mail filter script that checks if it's one of
> those drones, roots, and shuts it down. bwahahahah
Legal issues aside, maybe turning off sendmail in the rc scripts and
adding a text display when sendmail is turned back on that explains the
problem, and _then_ rebooting the box.
--
James P. Kinney III \Changing the mobile computing world/
CEO & Director of Engineering \ one Linux user /
Local Net Solutions,LLC \ at a time. /
770-493-8244 \.___________________________./
http://www.localnetsolutions.com
GPG ID: 829C6CA7 James P. Kinney III (M.S. Physics)
<jkinney at localnetsolutions.com>
Fingerprint = 3C9E 6366 54FC A3FE BA4D 0659 6190 ADC3 829C 6CA7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part