home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gatech!concert!duke!news.duke.edu!bullnext.mc.duke.edu
- From: low00001@bullnext.mc.duke.edu (Richard Low)
- Newsgroups: comp.sys.novell
- Subject: Re: Hack.exe
- Message-ID: <7168@news.duke.edu>
- Date: 19 Nov 92 18:57:43 GMT
- References: <1992Nov19.120307@is.morgan.com>
- Sender: news@news.duke.edu
- Lines: 24
- Nntp-Posting-Host: homenext.mc.duke.edu
-
- In article <1992Nov19.120307@is.morgan.com> mpiet@is.morgan.com (Mark
- Pietrasanta) writes:
- > I agree! I wrote one of the two NLM's that can be used to break into a
- > Novell Server. There is no plug for this, other than securing your
- > console so the NLM can't be loaded (via direct, RCONSOLE, or XCONSOLE).
- >
- > Want me to talk details? I provided source code to a lot of people on
- > CompuServe a while ago. It's really quite simple.
- >
- > More to follow if requested...
- > --
- > Mark Pietrasanta - mpiet@is.morgan.com
- > * * * * * * * * *
-
- The basic premise behind server security is physically securing the box.
- Getting into a server by loading an NLM is pretty simple, you just have to
- keep prying hands off your server. I mean, anybody can cause damage by
- just pulling the plug!
-
- --
- Richard Low
- Duke University Medical Center
- low00001@bullnext.mc.duke.edu
- NeXT Mail welcome
-