Sponsored Content
Special Forums IP Networking Firewall on Teardrop Attack!!! Post 302454604 by Yenthanh on Sunday 19th of September 2010 05:04:12 AM
Old 09-19-2010
I am not sure about that, but maybe it is not yet capable at this moment.
Anyways, thanks a lot for your time and for sharing your idea.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Bruteforce attack on my pc

since putting my pc online, it keeps getting slower and i dig the logfile to have such a surprise: this is just one of a many and I beleived it's a bruteforce attack how do i block this IP 200.41.81.228 from trying to knock my online pc? my system: FreeBSD testing.net 6.2-STABLE-JE... (6 Replies)
Discussion started by: rdns
6 Replies

2. Cybersecurity

Replay Attack

REPLAY ATTACK. Can some one elobrate on measures to encounter this problem of replay atack on network. (3 Replies)
Discussion started by: Ashvin Gaur
3 Replies

3. Cybersecurity

What I think is a DoS attack

About 3 days ago our Apache logs started filling with the following errors: mod_ssl: SSL handshake failed (server <weberver>:443, client 41.235.234.172) (OpenSSL library error follows) OpenSSL: error:1408A0B7:SSL routines:SSL3_GET_CLIENT_HELLO:no ciphers specified These initially were... (1 Reply)
Discussion started by: ccj4467
1 Replies

4. Cybersecurity

Found attack from

Hi, I have a belkin router installed and a look at the security log has got me worried a little bit. Security log: Fri Jan 29 20:41:46 2010 =>Found attack from 68.147.232.199. Source port is 58591 and destination port is 12426 which use the TCP protocol. Fri Jan 29 20:41:46 2010 ... (1 Reply)
Discussion started by: jld
1 Replies

5. Cybersecurity

Network attack - so what?

In my logs I find entries about attacks on my system. I know IP addresses, I know date and time and I know what they tried to do. So what's the best I can do now? Tell everybody that there are cybercriminals on that network? Write an email to their admin? Anything else? (10 Replies)
Discussion started by: Action
10 Replies

6. Cybersecurity

UUCP attack?

Is this an attack attempt? I got an e-mail from 'uucp Admin' last night and again this morning: What does it mean and what can I do about it? Thanks (4 Replies)
Discussion started by: ctafret
4 Replies

7. Emergency UNIX and Linux Support

DDOS attack please help!

Dear community, my site was recently attacjed by DDOS technique and goes down in a few minutes. My site runs under Debian/Apache2/Mysql. I identified the IPs who attack me and block it through iptable firewall from debian. Something like: iptables -D INPUT -s xxx.xxx.xxx.xxx -j DROP This... (7 Replies)
Discussion started by: Lord Spectre
7 Replies
JABLICATOR(1)						      General Commands Manual						     JABLICATOR(1)

NAME
jablicator - Share package collection choice across machines SYNOPSIS
jablicator [--root <path>] DESCRIPTION
jablicator generates an "apt-get"-able package. The package itself is empty. However it has a dependency for every non-required Debian package that is on the machine. This program will create and populate two directories dists and pool in your working directory. You can then move them to a web accessible location. This utility is designed to reduce software distribution and maintenance costs by reducing redundant system administration. For example, I have spent a lot of time finding and vetting image processing software from Debian's large package collection. With this utility, my image processing colleague down the hall can easily benefit from the fruit of my labor. There are many replication techniques in Debian. This one has the advantage of using the apt and dpkg infrastructure. A disadvantage is the possibility of packages changing out from under you in the Debian distribution (especially in testing or unstable). That means that jabli- cator output can grow stale over time if it is not regenerated. SECURITY
The packages produced by this program contain a lot of information, including a list of the Debian packages installed on the machine and a listing of apt-get sources. Some system administrators consider sharing such information a security risk. FILES
/etc/apt/sources.list OPTIONS
--root <path> Being able to pull in package selections from another install can be helpful, in the cases of a non-functional system, or reading from a hard drive install under Knoppix. In other words, source from a root filesystem that is not mounted at the root. This is a rare situation and most users should not use this option. SEE ALSO
dpkg(8) apt-get(8). AUTHOR
Jeff Breidenbach <jab@debian.org>. THANKS
Tom Parks, Cliff Weinstein, Burkhard Perkens-Golomb. Debian/GNU Linux September 2001 JABLICATOR(1)
All times are GMT -4. The time now is 11:39 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy