Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: ramen worm
- To: tlug@example.com
- Subject: Re: ramen worm
- From: Viktor Pavlenko <vp@example.com>
- Date: Thu, 18 Jan 2001 10:45:57 +0900
- Content-Transfer-Encoding: 7bit
- Content-Type: text/plain; charset=us-ascii
- In-Reply-To: <20010118103345.15D4.AKAMINE@example.com>
- References: <20010118103345.15D4.AKAMINE@example.com>
- Reply-To: tlug@example.com
- Resent-From: tlug@example.com
- Resent-Message-ID: <u5mbdD.A.GK.-okZ6@example.com>
- Resent-Sender: tlug-request@example.com
>>>>> On Thu, 18 Jan 2001 10:37:12 +0900, Hector Akamine <akamine@example.com> said: HA> Hi : I read in news.com about the Ramen worm. It supposedly HA> attacks RH linux 6.2 and 7.0 servers. HA> How can I check if a server is vulnerable, and how can I fix HA> it? Any good links? http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2675147%2C00.html > When the Ramen worm gains access, it installs a so-called root kit > that patches the security holes and installs special programs that > replace common system functions and replace the main page on Web > servers with an HTML file claiming: "RameN Crew -- Hackers > looooooooooooove noodles." Make sure your Apache server is running :) HA> Thanks in advance
- References:
- ramen worm
- From: Hector Akamine <akamine@example.com>
Home | Main Index | Thread Index
- Prev by Date: ramen worm
- Next by Date: Re: Wnn problem
- Prev by thread: ramen worm
- Next by thread: RE: ramen worm
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links