Rodolfo J. Paiz wrote:
At 23:47 12/8/2003, you wrote:
Mike Klinke wrote:
This is normal. What you're seeing is Internet worm scans looking to
break into vulnerable Windows systems.
Regards, Mike Klinke
Thanks, Mike.
Are there similar 'worm scans' for Linux boxes? What should I do to
protect my machine from them if there are? (point me towards a good
website or book explaining this if you can.)
snipped...
Also, for both Lisa and Mike, it is considered courteous on these
lists to keep only whatever is needed for context from previous
messages. Note I kept only two lines from each of your messages,
whereas in each of your replies you made the rest of the list (likely
a couple of thousand people) read through about 100 lines of logs
again and again. On the positive side, thank you for writing your
replies AT THE BOTTOM of the message, so that your answer is below the
previous comment; this is called bottom-posting, keeps the
conversation in chronological order, and is a Very Good Thing [tm].
Cheers,
Rodolfo, not to be picky, but there are some of us so new to Linux, of
any flavor, that we may not know what information can be minimized to a
couple of lines of quoted output - I am one of those, at this stage. I
believe that your response was excellent; especially in offering your
additional time to explain something of netiquette for this forum. I
hope that others in this venue are as considerate, patient, helpful, and
understanding toward those of us still learning how best to communicate
problems, solutions, and knowledge.