Sponsored Content
Top Forums UNIX for Dummies Questions & Answers How to find who fingered my username Post 302070690 by Lightworker1 on Thursday 6th of April 2006 04:58:24 PM
Old 04-06-2006
layers upon layers

How to stop someone from snooping around and getting your info through either finger or some sort of port scanning has been the bane of many administrator's existence. Currently, there are informal debates going on everyday in either think tanks and brainstorming meetings of the big software developpers to small groups of techies gathering at a starbucks to students at some college campus pondering what to do about it all. Some of the more popular solutions being pitched to and fro by either:

A Ghosting/Masking your IP address so your system is not find-able. You can either do this by buying some software from a retailer like Best Buy for example, but they're not 100% effective. Or you can direct your bandwidth/ traffick through a third party proxy-- You can get the privoxy filtering freeware for example from www.privoxy.com or http://sourceforge.net/project/showf...group_id=11118 I use it and it's really good. My port scanning attacks did not go away completely but they did reduce severely. The problem with being on a Lan like Roadrunner is that people may find it easier to hack you because you're all on the same network.

B Designing a software or firewall that hacks back the hacker breaking into your computer; but that's actually very illegal right now. There are actually freeware utilities out there that can actually take down the domain of the person hacking you; but remember, those are illegal and it'll get you in trouble with the FCC-- it's kind of like a felony. Some of these freeware utilities have malicious code that override the BIOS and do all manner of nasty things to the offending system, I even found one this one time that suppossedly was able to overclock the hacker computer so as to make the chip burn out. If you feel tempted to look for them you will probably find them but do not downloadthem and do not use them. You're only asking for trouble. Using them could cause unimaginable demage to all manner of networks and computers (like taking down a domain) and the FCC would definitely notice something like this. It's a felony of BIBLICAL proportions. You wanna stay away from those, resist the desire for retaliation. Why do you want to know who fingered you? What if you could trade off 'not knowing who did it' for being 'safe'? You can be safe in the internet and the answer is layering.

C Layering upon layering of security I think is the best wy to go. Not only would you have piece of mind that your system is well camouflaged, youll know that what you are doing is completely legal.
Cisco has some servers and routers that defend themselves from attacks,
and although not all of us can afford a cisco router, thgat would be the best way to go. What I do is I have 3 software firewalls running simultaneously (Sygate, Norton, and Black Ice), plus a small inexpensive router, and a hardware firewall, AND I use privoxy = )

Now, hardware firewalls and small routers can be expensive, but the one I use is pretty cheap. This is the one I have http://www.netgear.com/products/details/FR114P.php
and here's where you can get it http://netgear.pricegrabber.com/sear...artnum=FR114P/

And this one http://www.netgear.com/products/details/DG834G.php
And here's where to buy it http://netgear.pricegrabber.com/sear...partnum=DG834G

I hope this helps Smilie
Robert
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Get username in script

how would i go about getting the username of the person currently logged in, and then using the username in a shell script? i've tried variations of user=whoami , 'whoami' , $whoami , and none of the above work :( lol I'd like to get the username to then mount a network share such that the... (9 Replies)
Discussion started by: willc0de4food
9 Replies

2. UNIX for Dummies Questions & Answers

Find, make and move file based on username

hi there, i'm new to UNIX( just 3month used), i found my new box contained alot of files and directories in /home/box/ i've tried to search script in tis forum and found many of them but, i don't know how to combine them to make a script, although using pipes. my tasks are: 1) to scan user... (5 Replies)
Discussion started by: Helmi
5 Replies

3. Shell Programming and Scripting

Find username of user running the script

Hello All, If I have a simple cgi script and want to find the name of the person accessing the page, is it possible? How do I get the name of this user? Please help. I was trying a vague method but it doesn't seem to work with all browsers and versions ... $val=$ENV{'HTTP_COOKIE'}; $name... (1 Reply)
Discussion started by: garric
1 Replies

4. Shell Programming and Scripting

To find the username in /etc/passwd file

Hi, I need to a shell script to list out only the username in the /etc/passwd file. Regards Siva (7 Replies)
Discussion started by: gsiva
7 Replies

5. UNIX for Dummies Questions & Answers

Easy Script, just to find the given username if is it online or not

hey guys plz help me..with shell script. i must find the given(the user types a username) username if is it login or not.. i know how to do it logically, but i think that i can't in scripting. Thank you all (5 Replies)
Discussion started by: aintour
5 Replies

6. Post Here to Contact Site Administrators and Moderators

username

Is it possible to change my username in this site or is thre a way to delete my account and then create a new one with a diffrent user name (2 Replies)
Discussion started by: floresr
2 Replies

7. UNIX and Linux Applications

grep file to find unique instances of username

hello - A SystemOut.log file has recurring entries that follow this format: Principal: auth9.nick.al.gov:389/USERNAME Over the course of a day thousands of lines similar to this are produced, with each username represented hundreds of times. I need to create a new file that shows... (4 Replies)
Discussion started by: 1075FJ40
4 Replies

8. Post Here to Contact Site Administrators and Moderators

Change username

Hi.. I want to change my username, is there any way by which I can do it? Thanks in advance.. (3 Replies)
Discussion started by: laxmi Sharma
3 Replies

9. UNIX for Beginners Questions & Answers

Why does "ps -[u|U] username" not list processes when username is numeric?

Greetings, The title pretty much says it all. I've snooped everywhere and can't find anything on this. Since our organization went to numeric usernames, using the u|U option for ps returns no processes. Example passwd entry: 320074:DjZAJKXun8HBs:10129:6006:Joe Y:/cadhome/analysis/jy:/bin/bash... (4 Replies)
Discussion started by: crimso
4 Replies
SAFE_FINGER(8)						     Linux Programmer's Manual						    SAFE_FINGER(8)

NAME
safe_finger - finger client wrapper that protects against nasty stuff from finger servers SYNOPSIS
safe_finger [finger_options] DESCRIPTION
The safe_finger command protects against nasty stuff from finger servers. Use this program for automatic reverse finger probes from the tcp_wrapper (tcpd) , not the raw finger command. The safe_finger command makes sure that the finger client is not run with root privileges. It also runs the finger client with a defined PATH environment. safe_finger will also protect you from problems caused by the output of some finger servers. The problem: some programs may react to stuff in the first column. Other programs may get upset by thrash anywhere on a line. File systems may fill up as the finger server keeps sending data. Text editors may bomb out on extremely long lines. The finger server may take forever because it is somehow wedged. safe_finger takes care of all this badness. SEE ALSO
hosts_access(5), hosts_options(5), tcpd(8) AUTHOR
Wietse Venema, Eindhoven University of Technology, The Netherlands. Linux 21th June 1997 SAFE_FINGER(8)
All times are GMT -4. The time now is 09:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy