06-30-2013
What services do you use, what ports do you have open? If you are not using a web server what is the account www-data for? Any service that is running on the server and that can be approached from the Internet by some port number, can be used for a hack and can be vulnerable. If there is a weakness in a service / daemon, than an attacker could potentially acquire the access rights of the user that is used to run that daemon, bypassing any strong password authentication you might have in place..
5 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi friends,
I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru
11 Replies
2. Solaris
hi all,
what i want to do
when user open terminal like tty5 and do his work
i want to see his terminal
how can i do this (1 Reply)
Discussion started by: xxmasrawy
1 Replies
3. IP Networking
hello,
can anyone suggest how to delay the incoming packets ??
or how the packets are prossed inside the kernal and a way to make the packets wait a while??
it wud be vry helpful
regards
sameer (7 Replies)
Discussion started by: sameer kulkarni
7 Replies
4. Red Hat
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies
5. Homework & Coursework Questions
Hi my name is Manju.
->I have configure the two way authentication on my linux server.
->Now I am able to apply two way authenticator on particuler user.
->Now I want to map this linux server to my AD server.
->Kindly tell me how to map AD(Active Directory) with this linux server.
... (2 Replies)
Discussion started by: manjusharma128
2 Replies
LEARN ABOUT DEBIAN
filetea
filetea(8) System Manager's Manual filetea(8)
NAME
filetea - Web based file sharing service daemon
SYNOPSIS
filetea [OPTIONS]
DESCRIPTION
This manual page documents briefly the filetea command.
FileTea is a Web service that provides instant and anonymous file-sharing using only a standard browser as client. Unlike traditional Web
based file-sharing services, FileTea does not store files server-side. Instead, files are just routed on-the-fly from seeder to leecher,
through the server.
filetea is the service daemon that runs on a FileTea server. It handles peer synchronization, file routing and status reporting; and also
acts as web-server for static HTML content when run in standalone mode.
OPTIONS
-h, --help
Display a brief summary of the command-line options and their default values.
-c config, --conf=config
Absolute path for the configuration file to use, default is /etc/filetea/filetea.conf.
-D, --daemonize
Run the service in the background.
-p port, --http-port=port
Port to listen on for plain HTTP service, overriding the value specified in configuration file.
-P port, --https-port=port
Port to listen on for secure HTTP service (https), overriding the value specified in configuration file.
FILES
/etc/filetea/filetea.conf
Filetea config file.
AUTHOR
This manpage has been written by Eduardo Lima Mitev <elima@igalia.com>
2011-10-21 filetea(8)