On Wed, 06 Nov 2002 16:50:13 -0500, Owen McCusker wrote: [...] >Has anyone else seen this type of activity from dip.t-dialin.net >or dipsters for short. ;-)? Sure, I see it all day. What they're trying to achieve is determine whether you have an "open" FTP server which allows them to store "warez" and download them again. A simple countermeasure against this is to give files that are uploaded to your "incoming" directory permissions so that anonymous users can't access them anymore. You can even prohibit them from reading the directory's contents so that they don't even see which files are stored inside the directory. -- L I N U X .~. The Choice /V\ of a GNU /( )\ Generation ^^-^^ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Thu Nov 07 2002 - 08:41:30 PST