[NTLUG:Discuss] Social Engineering Attempt
brad angelcyk
bradangelcyk at gmail.com
Fri Feb 4 15:39:12 CST 2005
Robert: This (setting up sudo) should be a guideline for system
administration. The root account should be accessed by as few people
as possible. I used to work at an ISP, and the retention of our tech
support employees was horrible. I wouldn't have trusted any of them
with root access.
Courtney: I'd call the company in Canada and see who they are.
On Fri, 4 Feb 2005 14:48:22 -0600, Robert Citek
<rwcitek at alum.calberkeley.org> wrote:
>
> On Friday, Feb 4, 2005, at 11:52 US/Central, Courtney Grimland wrote:
> > This isn't Linux-related, but maybe someone here can offer me some
> > advice.
> >
> > This morning I got a call on my company's tech support line from a guy
> > pretending to be an employee, asking for the admin password to our
> > mail server for maintenance or some such.
>
> This doesn't answer your question, but is related. One thing you can
> do on linux is setup sudo, so that there is no admin password or if
> there is very few people know what it is. People access root or other
> admin tasks via sudo and their own password, which they probably are
> less likely to give out.
>
> Just a thought.
>
> Regards,
> - Robert
> http://www.cwelug.org/downloads
> Help others get OpenSource software. Distribute FLOSS
> for Windows, Linux, *BSD, and MacOS X with BitTorrent
>
>
> _______________________________________________
> https://ntlug.org/mailman/listinfo/discuss
>
More information about the Discuss
mailing list