[CentOS] I appear to be attacking others

Sun Feb 5 20:22:53 UTC 2006
ryan <ryanag at zoominternet.net>

On Sunday 05 February 2006 10:10 am, Chris Mauritz wrote:
> Where practical, I also agree with this statement.  That really is the
> only way to be sure.  Though you also have to sit down and consider how
> the naughty people compromised your machine in the first place and make
> sure that vulnerability is fixed on the fresh install....or you'll just
> be doing this again in a few days.

In the case that you can not figure it out, here are some very easy to use 
tools to help lock down your system:

Bastille will walk you through the basic steps of locking down your system.

If you aren't real firewall or iptables savvy, firestarter make is easy to set 
up a very secure firewall.

TCP Wrappers can be used in conjunction with firewall rules.

chkrootkit will check for signs of a rootkit.