[Home] [Groups] - Message: [Prev in Group] [Next in Group]

nu.kanga.list.mud-dev

11591: System Security (was: Re: [MUD-Dev] players who "take away from the game")

[Full Header] [Plain Text]
From: "Eli Stevens {Grey}" <ens017@mizzou.edu>
Newsgroups: nu.kanga.list.mud-dev
Date: Wed, 10 Nov 1999 16:59:18 -0600
References: [1] [2] [3] <-newest
Organization: Kanga.Nu
----- Original Message -----
From: J C Lawrence <claw@cp.net>
Sent: Wednesday, November 10, 1999 2:36 PM
Subject: Re: [MUD-Dev] players who "take away from the game"


> Script kiddies are the bane of SysAdmins (Kanga.Nu is regularly
> attacked especially now that I'm running x86 instead of Alpha).

This got me wondering...  :)

What precautions should be taken when writing a MUD codebase from scratch?
Are most security holes that a MUD box might have at the OS level, or does
having a program like a MUD running open up opportunities that would not
otherwise exist (assuming that the ability to issue OS commands and such is
not a feature)?

Also, I am very curious about Kanga.Nu being "regularly attacked."  Would
you (JCL or others) be able to describe the kind of attacks these usually
are?  How you might prevent them from working, etc.  :)

Silence is wholy ignorant of such things
Eli - mailto:ens017@mizzou.edu
Don't mind banner ads?  Get paid to surf the web:
http://www.alladvantage.com/go.asp?refid=DZU770




_______________________________________________
MUD-Dev maillist  -  MUD-Dev@kanga.nu
http://www.kanga.nu/lists/listinfo/mud-dev