Date: Tue, 5 Jan 1999 13:22:35 -0500 (EST) From: Jt <hometeam@techpower.net> To: Karl Pielorz <kpielorz@tdx.co.uk> Cc: FreeBSD Questions <freebsd@netsys.hn>, Jim Mock <jim@corp.au.triax.com>, Mike Alich <hostmaster@cctinc.net>, "freebsd-questions@FreeBSD.ORG" <freebsd-questions@FreeBSD.ORG> Subject: Re: HACKED & SECURITY Message-ID: <Pine.BSF.4.05.9901051307270.22565-100000@techpower.net> In-Reply-To: <369223D0.F2B9175D@tdx.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
Isn't there a prg that disables packet sniffers ? I don't remember the name of it. maybe someone in the group does.. also there is imap-uw in the ports collection excelent prg. /usr/ports/mail/imap-uw/ On Tue, 5 Jan 1999, Karl Pielorz wrote: > > > FreeBSD Questions wrote: > > > How can I be sure this guy still not in getting our passwds? > > We had a hack with a sniffer so we upgraded to qpopper 2.53, still risks? > > > > Thanks > > If someone hacked your system using a sniffer (presumably to sniff out POP3 > passwords, which may be attached to shell accounts on that system) your not > going to stop them by upgrading your POP3 server... :-( > > I always try to have shell accounts via SSH, and POP3 accounts with different > usernames / passwords to the shell accounts (i.e. me = paranoid) <G> > > -Kp > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9901051307270.22565-100000>