nmap on Redhat?

Wes Bateman plug-discuss@lists.PLUG.phoenix.az.us
Sat, 22 Dec 2001 11:12:24 -0600 (CST)


On Sat, 22 Dec 2001, Craig White wrote:

---snip---

> ---
> If you really don't trust the box, the solution is even simpler - back
> up data - reload. I hope that what you meant to say was, if you are
> suspicious.
> ---

Yeah, good point.  For any host you care about, that really is the
best/only way to go.  You're right, I should have mentioned that too :)  I
was really focussing in on how to see what's listening though :)  You're
abosolutely right though, I'm glad you did bring that up :)

---snip---

> ---
> a network voyeur 'eh?  Sounds rather deprecated.
> 
> Thanks Wes, for the great explanation, I am continually learning and
> there are some really great resources on this list.

Yeah, it is a rather twisted thing :)  That's a big part of my
job...sitting and staring at network traffic all the time, looking for
problems/attacks.  The difference though is that I'm asked to do it
:)  Well, actually to draw that analogy back to voyeurism...being asked to
watch might be just as deviant.  Hmm, I'll just drop it now, LOL ;)

C ya :)

Wes


-- 
Wes Bateman, GCIA
Chief Security Officer
ManISec, Inc. - "Managed Internet Security Services"
http://www.manisec.com
wes@manisec.com