lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <26FECD80600B4A334C747907@utd59514.utdallas.edu> Date: Mon, 11 Feb 2008 15:32:12 -0600 From: Paul Schmehl <pauls@...allas.edu> To: full-disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: Brute force attack - need your advice --On Tuesday, February 12, 2008 02:16:02 +0530 Abilash Praveen <contactme@...lashpraveen.com> wrote: > > Hello experts, > > I had been talking to our web hosts the other day and they seem to have a lot > of unusual brute force attack on the servers recently. I'm guessing that it > could be because of my emails to the list? I mean, do you advice on using a > personal email for this type of list? Or should I use something like > @gmail.com? I know they can't easily break in to our servers, but am I just > giving them a chance? > The chances of your little corner of the web being singled out for attack are pretty low. Besides, the level of pure crap flying around on the internet makes it nearly impossible to distinguish a directed attack from the usual garbage. So, you do your best to properly configure and secure everything, keep good logs and sit back and watch the crap fly. -- Paul Schmehl (pauls@...allas.edu) Senior Information Security Analyst The University of Texas at Dallas http://www.utdallas.edu/ir/security/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists