When talking about avoiding information disclosure, we generally
say we will be able to delay the actual break-in, since crackers can still manage to get into the system if there is a hole. So, prefer saying "we can delay the actual attack" rather than "the system is more secure". Reviewed by: trhodes
This commit is contained in:
parent
368ddbeff6
commit
930f075192
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=24024
1 changed files with 3 additions and 2 deletions
|
@ -1455,8 +1455,9 @@ sh /etc/ipf.rules.script</programlisting>
|
|||
response returned for any of the undesirable stuff, their
|
||||
packets just get dropped and vanish. This way the attacker
|
||||
has no knowledge if his packets have reached your system. The
|
||||
less the attackers can learn about your system the more secure
|
||||
it is. The inbound 'nmap OS fingerprint' attempts rule I log
|
||||
less the attackers can learn about your system, the more
|
||||
time they must invest before actually doing something bad.
|
||||
The inbound 'nmap OS fingerprint' attempts rule I log
|
||||
|
||||
<!-- XXX: what? -->
|
||||
|
||||
|
|
Loading…
Reference in a new issue