=== Monthrect is now known as Piper-Off | ||
pmatulis_ | YamakasY: since you filled it up. srsly, it depends what you're up to | 02:42 |
---|---|---|
=== cpaelzer is now known as cpaelzer_afk | ||
=== Lcawte|Away is now known as Lcawte | ||
jvwjgames | Can I rename the files of the network persistence instead of deleting them so that they will regenerate | 07:37 |
=== Lcawte is now known as Lcawte|Away | ||
lordievader | Good morning. | 09:36 |
Rumbles | can anyone suggest how I would sandbox a rails process, so that a user can connect to a machine and have access to a rails console, but no system commands? I've posted in detail here: http://serverfault.com/questions/741073/forcing-a-user-on-remote-connection-in-to-a-rails-console-and-prevent-them-acc | 10:33 |
=== CiPi is now known as cipi | ||
=== Piper-Off is now known as Monthrect | ||
=== Monthrect is now known as Piper-Off | ||
=== cipi is now known as CiPi | ||
=== chmurifr- is now known as chmurifree | ||
=== dasjoe_ is now known as dasjoe | ||
=== _Kai__ is now known as _Kai_ | ||
YamakasY | pmatulis: heh no I didn't puppet did but kernel management with puppet was a pain last periods with Ubuntu, buggy | 14:38 |
=== Lcawte|Away is now known as Lcawte | ||
caliculk | Hello, so I seem to have made a slight mistake, and no longer have access to a dns lookup. I am not sure where the problem lies. I have edited my /etc/network/interfaces file to have a DNS of 8.8.8.8 and restarted the network interfaces with 'sudo /etc/init.d/networking restart' but that doesn't seem to apply the new name servers. | 18:41 |
caliculk | I don't want to restart the system, in case it looses it's cache. My end result is that I need to reinstall bind9 and isc-dhcp-server | 18:42 |
bekks | caliculk: You are afraid of losing which cache? | 18:42 |
Capprentice | caliculk: Umm... /etc/resolv.conf? | 18:42 |
Capprentice | Check whats in there!! | 18:43 |
caliculk | SHouldn't resolv.conf be "updated" when reseting the network interfaces | 18:44 |
bekks | No. | 18:44 |
Capprentice | Dont know! But ifdown eth0 && ifup eth0 does that. | 18:44 |
=== mikal_ is now known as mikal | ||
=== Lcawte is now known as Lcawte|Away | ||
durant | How can you check your network for infected packets | 21:47 |
bekks | durant: What do you mean by "infected packets"? | 21:48 |
durant | I need a way to look for packets | 21:50 |
bekks | Which kind of packets? | 21:50 |
* quantic predicts... | 21:50 | |
bekks | What are you actually trying to achieve? | 21:50 |
durant | tcp | 21:50 |
bekks | durant: What is the actual issue behind that? | 21:51 |
bekks | Which problem are you trying to solve by looking at tcp packets? | 21:51 |
durant | Trying to look for malware on my network | 21:51 |
bekks | Then looking at tcp packages will not help you at all. | 21:51 |
ianorlin | durant: patch stuff first | 21:51 |
durant | Is there a way to check for botnets | 21:52 |
bekks | durant: No easy way. You need to monitor and analyze ALL traffic for doing so. | 21:53 |
teward | and that takes time and additional effort, too. | 21:55 |
quantic | you're talking about a NIDS, and that's a complex beast. | 21:55 |
teward | ^ that | 21:56 |
quantic | Like... that's a MAJOR undertaking even for someone that does it for a living. | 21:56 |
quantic | NIDS solutions are the second most-complicated thing that I deploy in client environments. | 21:57 |
bekks | And even more when just looking for "infected packets". | 21:58 |
quantic | Malware identification is one of the most complex parts of a NIDS, which is already a complex system. | 21:58 |
durant | What is a good firewall you can use on linux | 22:06 |
quantic | durant: Gonna be honest, you're asking questions that could be answered with the most cursory of Google searches. :/ | 22:07 |
bekks | durant: iptables | 22:10 |
=== Lcawte|Away is now known as Lcawte | ||
=== Lcawte is now known as Lcawte|Away | ||
=== bittin is now known as bittin_US |
Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!