Differences between revisions 1 and 2
Deletions are marked like this. Additions are marked like this.
Line 19: Line 19:


=== Reporting intrusions ===
 * http://www.cybercrime.gov/reporting.htm
 * http://www.fbi.gov/page2/jan06/computer_crime_survey011806.htm
 * http://www.fbi.gov/page2/dec04/infragard121404.htm

I may be an excellent software developer, but I'm a mediocre system administrator. Some of the stuff here may be obvious to the experienced, but I need the reminders and cheat sheets. Also, I want to record some of the lessons I've learned along the way.

TableOfContents


Apache Proxy used as an Open Mail Relay by spammers

I've completely disabled the proxy capabilities in Apache until I can figure out how to properly close this vulnerability. As I research this, here are some links I've found interesting:

Reporting intrusions

iDIAcomputing: SystemAdministration (last edited 2009-07-27 18:25:14 by localhost)