home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!news.mtholyoke.edu!jbotz
- From: jbotz@mtholyoke.edu (Jurgen Botz)
- Subject: Re: BAFFELED ??#@# !! CONFUSED !!#@@!!!!!
- Message-ID: <BxM8xu.4E7@mtholyoke.edu>
- Sender: news@mtholyoke.edu (USENET News System)
- Organization: Mount Holyoke College
- References: <1992Nov10.201503.6288@gw.wmich.edu> <1drec6INNmf3@kitty.ksu.ksu.edu> <1992Nov12.141902.5402@ghost.dsi.unimi.it>
- Date: Thu, 12 Nov 1992 18:34:41 GMT
- Lines: 16
-
- In article <1992Nov12.141902.5402@ghost.dsi.unimi.it> cotrozzi@ghost.dsi.unimi.it (Massimo Cotrozzi) writes:
- >Even if I installed tcp wrapper ?
-
- tcp-wrapper won't be very helpful in the suggested scenario... unless
- the victim has reason to /suspect/ a forgery why would s/he ask the
- sysadmin to check the logs? Of course if the sysadmin regularly checks
- both the sendmail and wrapper logs, s/he might notice something amiss,
- but it still won't help you track down the perp unless s/he happened
- to be nice/foolish enough to execute the forgery on a machine that's
- running authd, and from his/her own account.
-
- --
- Jurgen Botz | Internet: JBotz@mtholyoke.edu
- Academic Systems Consultant | Bitnet: JBotz@mhc.bitnet
- Mount Holyoke College | Voice: (US) 413-538-2375 (daytime)
- South Hadley, MA, USA | Snail Mail: J. Botz, 01075-0629
-