notespam is a Unix filter-style spam-marking script based on data from DNS-based RBL services. It is suitable for being called as a procmail filter, and supports both system-wide and user-specific lists of RBL servers to check (blacklists) and lists of hosts or IP blocks not to mark as spam (whitelists).
Re: Would you take advice from a moron?
> His home page states:
> I've lost my old pgp keys
> (2047/0xDED5B791 and 1024/0xEC001E4D)
> due to a hard drive crash and a lack of
> backups -- new keys (...
> This guy is a system administrator?!?
> Trainer?!? Consultant?!?
Please note that the replacement keys are dated from 1998. ;-)
But if I can't hold someone to past mistakes, how can I judge current performance when I'm measuring the invisible (as good security is)? :-)
Exploits come out for Red Hat first because there are more targets on the net. Exploits used to come out for SunOS 4.x for precisely the same reason, but that didn't mean that Ultrix was more secure. (Point of fact, it probably wasn't, it was just less tested.) And the fact that Red Hat releases security fixes fairly promptly means that it's possible to secure the system in a pretty much up-to-date fashion.
But that only answers half the question: so now I know why people take Slackware to be the target (because I made a mistake which gave them a foothold from which to attack me), but why do they think it's all about Red Hat? On the basis of the article, it seems clear that SuSE, Debian, and Mandrake are all probably more secure than Red Hat. The fact that I've got a whole project just to secure Red Hat seems as much proof as any that it's not especially secure -- but the fact that they've got some security resources certainly means they're trying.
(And I started Bastille not to secure RH for myself, but because there are dozens or hundreds of user-administered Red Hat boxes on the campus of the university where I work. I need a way to secure those machines when I have no direct control over them -- which means I need to secure the OS they're already running.)
At any rate, other than the blurb up top (which I didn't write), I don't even mention Red Hat in the article except in the list of Linux distributions and their security resources. I listed it up top because it seems to have the largest number of users, not because it was the best.