Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: finger-bombingRob Quinn (rjqphys.ksu.edu)
Thu, 13 Oct 1994 10:02:22 -0500 (CDT)
- Messages sorted by: [ date ][ thread ][ subject ][ author ]
- Next message: treasongnu.ai.mit.edu: "finger-bombing"
- Previous message: Eric Kimminau: "Re: finger-bombing"
- In reply to: Tony Jago: "Re: finger-bombing"
- Next in thread: Supak Lailert \: "Re: finger-bombing"
> What is the best way to keep someone from finger-bombing > your site other than having fingerd cat /unix to stdout? > (other than hosts.deny. We have a person who fingers > a user at our site from different hosts hundreds of times > per hour) Why can't you use hosts.deny? A while back I found that a certain person was using ``xhtalk'' to finger my machine a lot. He had xhtalk in his .xinitrc, so if he logged into multiple machines I'd get double action. I adde this to my hosts.deny file: in.fingerd:.somehost.on.my.campus.edu:twist=/bin/nice -20 /usr/ucb/yes This causes xhtalk to die in a very interesting way, and quickly, so that the ``yes'' immediately stops on your machine, consuming no CPU time locally. xhtalk on the other hand begins to consume 90+% of the CPU. Yeh, I was in a bad mood when I did this. The real best solution is to email the remote admin and ask him to take care of it for you. -- | | | Rob Quinn | | rjqphys.ksu.edu | | QuinnBobKSUVM.BITNET |