From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from lists.gentoo.org ([140.105.134.102] helo=robin.gentoo.org) by nuthatch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1Fy4on-0006j0-UC for garchives@archives.gentoo.org; Wed, 05 Jul 2006 10:41:18 +0000 Received: from robin.gentoo.org (localhost [127.0.0.1]) by robin.gentoo.org (8.13.7/8.13.6) with SMTP id k65Ab7WO004332; Wed, 5 Jul 2006 10:37:07 GMT Received: from ilievnet.com ([84.21.204.200]) by robin.gentoo.org (8.13.7/8.13.6) with ESMTP id k65AMeAB001060 for ; Wed, 5 Jul 2006 10:22:40 GMT Received: (qmail 25264 invoked from network); 5 Jul 2006 13:22:39 +0300 Received: from unknown (HELO ?10.0.1.11?) (10.0.1.11) by 0 with SMTP; 5 Jul 2006 13:22:39 +0300 Message-ID: <44AB92EE.8040301@ilievnet.com> Date: Wed, 05 Jul 2006 13:22:38 +0300 From: Daniel User-Agent: Thunderbird 1.5.0.4 (X11/20060704) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Protecting my server against an individual References: <49bf44f10607041556w3db1b64et625c088ba8c56541@mail.gmail.com> In-Reply-To: <49bf44f10607041556w3db1b64et625c088ba8c56541@mail.gmail.com> X-Enigmail-Version: 0.94.0.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Archives-Salt: e9c25e82-c229-4f5c-8aac-21299b190ead X-Archives-Hash: 14357a6146687915c776025b58bb612b Grant wrote: > It has come to my attention that a particular person I know may be > intent on attacking my server/website in any way possible. He doesn't > know much about Linux but does know Windows. What kind of things > should I lock down to protect my remote hosted server? I don't have > time to get too crazy with security right now, but what kinds of > simple tricks might this fellow learn by asking around on forums, etc? 1) Use firewall to block access to everything but the services you need to be accessible.(be very careful here so you DO NOT disable YOUR access) 2) Update your packages to their latest stable versions. 3) Check the configuration of your services - they should deny all functionality but the one you intended to provide. 4) Enable activity logging - this would help you find out the way somebody is trying to penetrate you system and give you opportunity to take counter measures. 5) Pray :) -- Best regards Daniel -- gentoo-user@gentoo.org mailing list