[NTLUG:Discuss] Social Engineering Attempt

brad angelcyk bradangelcyk at gmail.com
Fri Feb 4 15:39:12 CST 2005


Robert: This (setting up sudo) should be a guideline for system
administration.   The root account should be accessed by as few people
as possible.  I used to work at an ISP, and the retention of our tech
support employees was horrible.  I wouldn't have trusted any of them
with root access.

Courtney: I'd call the company in Canada and see who they are.


On Fri, 4 Feb 2005 14:48:22 -0600, Robert Citek
<rwcitek at alum.calberkeley.org> wrote:
> 
> On Friday, Feb 4, 2005, at 11:52 US/Central, Courtney Grimland wrote:
> > This isn't Linux-related, but maybe someone here can offer me some
> > advice.
> >
> > This morning I got a call on my company's tech support line from a guy
> > pretending to be an employee, asking for the admin password to our
> > mail server for maintenance or some such.
> 
> This doesn't answer your question, but is related.  One thing you can
> do on linux is setup sudo, so that there is no admin password or if
> there is very few people know what it is.  People access root or other
> admin tasks via sudo and their own password, which they probably are
> less likely to give out.
> 
> Just a thought.
> 
> Regards,
> - Robert
> http://www.cwelug.org/downloads
> Help others get OpenSource software.  Distribute FLOSS
> for Windows, Linux, *BSD, and MacOS X with BitTorrent
> 
> 
> _______________________________________________
> https://ntlug.org/mailman/listinfo/discuss
>




More information about the Discuss mailing list