On Thursday 04 March 2004 11:22 am, Kent Schumacher wrote: > Social Engineering? > > Pastor Doug Coats wrote: > > Thanks everyone for your input so far. > > > > A special thanks to B_o_B (I think) who has been diligently trying to > > hack me. :) > > > > SMB is on but not open to the public. > > Finger is on but not open to public > > > > It is an email and web server. > > > > The only VRFY message in the maillog is a rejection for B_o_B. > > > > domain.com/~username returns the same for valid and invalid users. > > > > B_o_B has passed along the nmap and the results look like they should - I > > think. Look at your people as well as all those hackers on the Internet. Most security incidents come from within. -- Bob Tanner <tanner at mn-linux.org> | Phone : (952)943-8700 http://www.mn-linux.org, Minnesota, Linux | Fax : (952)943-8500 Key fingerprint = AB15 0BDF BCDE 4369 5B42 1973 7CF1 A709 2CC1 B288 _______________________________________________ TCLUG Mailing List - Minneapolis/St. Paul, Minnesota http://www.mn-linux.org tclug-list at mn-linux.org https://mailman.real-time.com/mailman/listinfo/tclug-list