pbosworth at gmail.com
Tue Feb 23 14:31:56 CST 2010
Place an ids in front of the server and write a rule for the traffic
Sent with Android
On Feb 23, 2010 3:25 PM, "Matt Sprague" <msprague at readytechs.com> wrote:
The user could also be running the command inline somehow or deleting the
file when they log off. Check who was logged onto the server at the time
of the attack to narrow down your search. I like the split the users idea,
though it could be several iterations to narrow down the culprit.
From: Ronald Cotoni [mailto:setient at gmail.com]
Sent: Tuesday, February ...
More information about the NANOG