nmap on Redhat?

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Wes Bateman
Date:  
Subject: nmap on Redhat?
On Sat, 22 Dec 2001, Craig White wrote:

---snip---

> ---
> If you really don't trust the box, the solution is even simpler - back
> up data - reload. I hope that what you meant to say was, if you are
> suspicious.
> ---


Yeah, good point. For any host you care about, that really is the
best/only way to go. You're right, I should have mentioned that too :) I
was really focussing in on how to see what's listening though :) You're
abosolutely right though, I'm glad you did bring that up :)

---snip---

> ---
> a network voyeur 'eh? Sounds rather deprecated.
>
> Thanks Wes, for the great explanation, I am continually learning and
> there are some really great resources on this list.


Yeah, it is a rather twisted thing :) That's a big part of my
job...sitting and staring at network traffic all the time, looking for
problems/attacks. The difference though is that I'm asked to do it
:) Well, actually to draw that analogy back to voyeurism...being asked to
watch might be just as deviant. Hmm, I'll just drop it now, LOL ;)

C ya :)

Wes


--
Wes Bateman, GCIA
Chief Security Officer
ManISec, Inc. - "Managed Internet Security Services"
http://www.manisec.com