OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

DB0FHN

[JN59NK Nuernberg]

 Login: GUEST





  
VK3JMA > TECHNI   25.08.03 01:22l 40 Lines 1132 Bytes #999 (0) @ WW
BID : E70207VK3JMA
Read: GUEST OE7FMI
Subj: Re: VK3JMA > RF LAN +
Path: DB0ZKA<DB0GPP<DB0LX<DB0RBS<DB0SWR<DB0FP<DB0CWS<DB0ZDF<DB0GE<LX0PAC<
      LX0HST<HA3PG<VK3AVE<VK6HGR<VK3AYM<VK3DSE
Sent: 030824/0208Z @:VK3DSE.#MEL.VIC.AUS.OC #:56617 [Narre Warren] FBB7.00g25
From: VK3JMA@VK3DSE.#MEL.VIC.AUS.OC
To  : TECHNI@WW


Hi Fellow Humans,


KB2VXA wrote:-
> Speaking of life, there is plenty in RF, without it I would not have read 
> your bull. Notice the dearth of bulls in general over the last few days? 
> Hmmmm, seems that most have been hit by a BLASTER and the rest are SOBIG 
> they got stuck in those narrow little wires.


Sit behind a good firewall with good rules, run a virus scanner that does
email and is memory resident and there should be no problems.

I use a Linux system to dial out on the net (please please santa bring me
ADSL for christmas) and ip MASQ my LAN with a firewall that allows ALL
outgoing packets and DENY's all incoming except for return packets to my
outgoing's.

If they find a way to piggy back worms/trojans/etc onto return  packets
(ack's etc) then I would say we are all doomed!!!!!

Just having a look at my /var/log/messages at any time and I see many many
"attempts" to gain access to my linux system and they are all DENIED.

73

Mark

-------------------------------

73 - Mark, VK3JMA 

email: vk3jma@net2000.com.au

-------------------------------


Read previous mail | Read next mail


 01.10.2024 21:26:03lGo back Go up