Skip to main content

Intel

Securing your Linux box (part 2)

posted onJune 27, 2000
by hitbsecnews

Last
month I talked a bit about securing your machine by commenting out and
eliminating various services. This time around, I'm gonna go through a
couple of proggies and rules that you might want to apply to your machine
in order to lock it down a little more. I'm assuming that the machine
you are going to use is a main machine through which other machines on
your internal LAN use to connect to the Internet. For this article, I'm

Setting up mserver

posted onJune 27, 2000
by hitbsecnews

Whussup whussup? Hope you guys are finding my articles useful and stuff.
Anyways this time around, I thought I'd share with you some information
with regards to sharing your dial-up Internet connection with the other
systems within your LAN. This information is for users with Linux... so
if you're on Winblows, go download Wingate or some other crap that doesn't
give you an ounce of security! :)

Alright...
before we get started, here's the list of things you'll need:

Issue #3

posted onJune 27, 2000
by hitbsecnews

Alright! Here we are... back once again to bring you more hack/phreak
loving. We've been really busy lately, with work on the site as well as
updates to the various sections.

One
last thing, all articles written here are the opinions of the writers
themselves and are not to be considered the collective word of Hack
In The Box. All writers/contributors can be contacted via their personal
e-mail addresses (if published).

Members

Testing modems with a DoS attack

posted onJune 27, 2000
by hitbsecnews

I
know you're probably sitting there wondering, what the fuck is L33t on
about now eh? Well first let me start by saying that this info is actually
just a DoS attack that I read about like eons ago, however I also found
that you could use this information "constructively" for testing the quality
of your modem and shit like dat. If I'm not mistaken I read about this
at attrition.org

Hacking Payphones - Telstra Style

posted onJune 27, 2000
by hitbsecnews

OK
well picture this... its around 4am your stumbling out of the dance club
your mobile phone battery is dead and you remember you need to call a
taxi or someone to come and get you ... after walking for an hour around
the city streets you finally find a public that phone that hasnt been
trashed by someone with a sledge hammer, so you dig into your pocket to
find some change and you realise *doh that last drink took all my change*

Installing Linux on a laptop

posted onJune 27, 2000
by hitbsecnews

Installation
of Red Hat 6.1 on my Tecra 8000

Well
as per usual it was about 2am and I was surfing around the net in an attempt
to to find ways to get more speed out of my Tecra 8000 running Windows
98 ( PII 400, 4 gig HDD, 64M SD-RAM, NeoMagic display adapter 20x CD Drive
No external floppy ;o (heh )

Lockdown - Securing your Linux box (Part 1)

posted onJune 27, 2000
by hitbsecnews

Just
a brief primer for anyone who has just installed Linux or has recently
moved to a *NIX environment. Just a few practical pointers to keep in
mind when you're looking to secure your machine from script kiddies or
almost anyone that might do you harm for that matter.

There
are a couple of things that need to be done post installation. These are
in no particular order at all :

Os Review : Red Hat Linux 6.1

posted onJune 27, 2000
by hitbsecnews

About
2 weeks ago, my 3.2GB hard drive died on me, and as a result I lost my
Linux partition as well as most of my apps that I didn't have backed up
on my primary master (a 6.5GB drive) or burnt onto a CD. Anyhow, I had
to go and get myself a new drive, and while I was shopping around, I thought
perhaps I should upgrade to Red Hat 6.1 since I was using 6.0 on the 3.2GB
drive. So this article, is basically a brief look at RH6.1 - what's new,
what's kewl, and what's a little fucked up.