[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: how to find trace of attacks



On Wed,31.Dec.08, 15:57:14, Jeff Soules wrote:
 
> If you know where you'll be sshing in from, you can  use iptables to
> deny access to the appropriate port with MAC filtering and possibly IP
> range rules.

This won't work because MACs are used only on the local[1] segment.

[1] local in my case would be between the laptop and my AP

Regards,
Andrei
-- 
If you can't explain it simply, you don't understand it well enough.
(Albert Einstein)

Attachment: signature.asc
Description: Digital signature


Reply to: