Rick Rosinski wrote: [snip] > The point to all of this is: I want to find out how to stop this from > happening. I have a few ideas of my own, and I have lots of questions. > > Besides setting up a firewall, what other security measures should I consider > implementing? > > What will it take to keep this guy out of my system? What is he capable of > doing besides knowing my command history in my term windows. Would it be > effective if I set up a user for myself (I am always root) to keep him out? > I am not on a LAN, just ppp to inficad, and I don't know if being root is > dangerous or not. You should consider your system completely compromised! At this point, the cracker could very easily have total access to every part of your system. In your case, you MUST do a clean reinstall. Backup your important data then nuke your harddrive and start from scratch. This is *necessary* since your cracker could have put in any number of back-doors or trojans that will circumvent anything you do! That done, you'll need to beef up the security on your box. This is one area where most Linux distributions really fall short... the default install on all general distros are *way* too permiscuous. Unfortunately, the topic of security isn't an easy one. If you RTFM, you'll see that the FMs are very long and very complex. They assume usually that you are a dedicated sysadmin. Very few HOWTOs deal with a "normal" home user. That said, I recommend that you check out www.linuxsecurity.org. They have a number of HOWTOs there that can help. In the meantime, though, I recommend doing at least the following: 1) REINSTALL YOUR SYSTEM FROM SCRATCH (I can't emphasize that enough). If you don't reinstall from scratch, then nothing you do can be considered effective! 2) Setup a packet filter (firewall) that denys *all* incoming packets. You may need to selectively allow a few later for things like ftp-data and the like.. but by default, always deny. 3) Shutdown all non-essential services. Since you are on a dial-up, you likely don't need http, bind, or similar network services running 4) Pick a very good password for Root and preferably change it every now and then. 5) Rarely login as Root. Create any number of normal users and do 99.9% of your work as them 6) Always keep up to date with your distro's update patches (especially security ones). May I also recommend using a distribution like SuSE? SuSE 7.0 and 7.1 have several tools that can help you out. For instance, there is a HardenSuSE script that will go through and "harden" your system by selectively disabling non-essential services, changing permissions, etc. There is also a SuSEFirewall script that makes creation of firewalls and packet filters quite easy. The 7.1 online update utility makes updating security patches quite easy -- Kurt Granroth | http://www.granroth.org KDE Developer/Evangelist | SuSE Labs Open Source Developer granroth@kde.org | granroth@suse.com KDE -- Conquer Your Desktop