Greetings everyone...
I just received notice that one of my systems was used to break into
other computers. "last" showed a user called
LOGIN
that had been in the system. Does anyone know how someone would
get into this and what systems would be corrupted?
Also... is there anywhere out there a beginners guide to installing
Level 2 security, and Kerberos login stuff?
Steve Timm
Received on Fri Apr 02 1999 - 22:03:29 NZST