SCOUG Logo


Next Meeting: Sat, TBD
Meeting Directions


Be a Member
Join SCOUG

Navigation:


Help with Searching

20 Most Recent Documents
Search Archives
Index by date, title, author, category.


Features:

Mr. Know-It-All
Ink
Download!










SCOUG:

Home

Email Lists

SIGs (Internet, General Interest, Programming, Network, more..)

Online Chats

Business

Past Presentations

Credits

Submissions

Contact SCOUG

Copyright SCOUG



warp expowest
Pictures from Sept. 1999

The views expressed in articles on this site are those of their authors.

warptech
SCOUG was there!


Copyright 1998-2024, Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.

The Southern California OS/2 User Group
USA

SCOUG-HELP Mailing List Archives

Return to [ 19 | May | 2002 ]

<< Previous Message << >> Next Message >>


Date: Sun, 19 May 2002 14:23:29 PST7
From: "J. R. Fox" <jr_fox@pacbell.net >
Reply-To: scoug-help@scoug.com
To: scoug-help@scoug.com
Subject: SCOUG-Help: Re: mysterious attacks

Content Type: text/plain

=====================================================
If you are responding to someone asking for help who
may not be a member of this list, be sure to use the
REPLY TO ALL feature of your email program.
=====================================================

Steven wrote:

> That's true, but it's possible one of Verizon's routers has been
> compromised.

Is it not so that malicious hackers can either fake most any address they like during
their attacks, or co-opt legitimate resources to relay an attack, in such a way that
the
true point of origin is almost impossible to determine ?

My firewall logs have seldom shown that much activity. (It is a hardware firewall,
supposedly more industrial strength than what you get in something like a Linksys
or SMC Barricade, and claims to be able to function in "stealth mode"). There have
been port probes when Pac Bell was performing diagnostics, in response to a service
complaint from me. Every so often there will be a "Netbus Attack Dropped." Much
less often, something like an attempted "Sub 7" attack deflected. Some time ago,
I turned off all the routine reporting of various types of dropped packets, as it was
overflowing the log with bad results. (The firewall would choke until this stuff
was purged.) Not much you can do about that anyway, and it's just normal traffic.

If I saw a persistent pattern, as has Peter, I'd be concerned too.

Jordan

Jordan

=====================================================

To unsubscribe from this list, send an email message
to "steward@scoug.com". In the body of the message,
put the command "unsubscribe scoug-help".

For problems, contact the list owner at
"rollin@scoug.com".

=====================================================


<< Previous Message << >> Next Message >>

Return to [ 19 | May | 2002 ]



The Southern California OS/2 User Group
P.O. Box 26904
Santa Ana, CA 92799-6904, USA

Copyright 2001 the Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.