lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200401161022.54519.b29651@charter.net> From: b29651 at charter.net (brenda) Subject: Re: January 15 is Personal Firewall Day,help the cause question on this? maybe i am more disillusioned than i thought but if i patch and update how can i be as vuknerable as on windows? i run a program called killerwall as my firewall it is a script that uses ipchains or iptables .i chose iptables because of my reading and thinking this was safer. i dont understand how rootkits work tho and my reading has not helped my understanding of this very much. i dont do downloads except with acceptable ftp sites .no music/movies stuff.in fact my only downloads have have been with urpmi? can rootkits be used this way? apologizing for my ignorance ahead of time but i am hoping to learn br3n > That's true. I just want to remember about the guy with the rootkit > which I asked about. Running SuSE Linux, patching regularly and thought > he was safe while running an unpatched PHPNuke installation. Ouch. :-)
Powered by blists - more mailing lists