[768] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Signs of an Intruder

daemon@ATHENA.MIT.EDU (John-David Childs)
Mon Nov 25 17:51:21 1996

Date: Sat, 23 Nov 1996 19:35:48 -0700 (MST)
From: John-David Childs <jdc@ism.net>
To: ids@uow.edu.au
In-Reply-To: <Pine.GSO.3.93.961121133218.8599D-100000@pilt.online.no>
Reply-To: ids@uow.edu.au

On Thu, 21 Nov 1996, Tor Houghton wrote:

> 
> I also believe there is some help in using "security through obscurity",
> whereby you place wrapper logs etc. in a logfile where a whole lot of
> irrelevant logging goes too (for example, the ftp xferlog, or somesuch).
> 
And another thing which we all know but bears repeating since one of
my systems was trashed last night beyond all recognition and I didn't
heed this advice:

        send logging information to a separate (secure) machine

I know who it was, but I have no way to prove it without logfiles.
--

jdc

home help back first fref pref prev next nref lref last post