[Am-info] BBC's GO Digital program

John Poltorak jp@eyup.org
Mon, 6 May 2002 20:25:49 +0100


On Mon, May 06, 2002 at 01:40:07PM -0400, Geoffrey wrote:

> > OK you have provided a single instance of an OS/2 exploit, which doesn't 
> > apply to me anyway. I have no reason to lose any sleep over getting hacked.
> 
> Don't lose sleep.  I provided one example to answer your question.  I'm 
> not going to do all your research.  You asked, so I provided an example. 
>   Don't expect that the single example I provide is the only OS/2 
> exploit that exists.

Well I'm not aware of any.

> > What concerns me is the possible increase in levels of traffic which might 
> > impact on my system thereby slowing it down, if some hacker discovers some 
> > available ports and puts a lot of effort into breaking through. I do not 
> > have any concerns  about actually being hacked.
> 
> A firewall is not going to elliminate the traffic, just stop it from 
> getting beyond the firewall.  Ultimately, you network connectivity is 
> affected regardless of whether you have a firewall or not.

That's incorrect.

Packet filtering discards packets and stops replies going back to the 
originator. If the would be hacker is not aware of any open ports, there 
is no reason for him to look for vulnerabilities on those ports.

> >>>BTW what do you mean by IDS?
> >>>
> >>Intrusion detection system.
> >>
> > 
> > OK, what's an Intrusion detection system?
> 
> A firewall stops folks from getting in.  An IDS screams at you when 
> someone tries to get in, or does get in.
> 
> > 
> > What exactly is considered to be an intrusion?
> 
> Tripwire, PortSentry, Swatch, snort
> 
> > 
> > How can you tell if your ids hasn't worked?
> 
> You're hacked...

But how would you know you were?

> -- 
> Until later: Geoffrey		esoteric@3times25.net

-- 
John