On 04/15/2017 04:46 AM, Pete Biggs wrote:
Not wishing to extend this thread further, but ...
There are conspiracy theories out there that the NSA is involved with
bringing systemd to Linux so they can have easy access to *"unknown"*
bugs - aka backdoors - to all Linux installations using system
On Apr 16, 2017, at 6:53 AM, ken wrote:
> Years ago it was revealed that one of the linux developers inserted an
> exploit into the gcc code which, when the login code was compiled, would give
> him access to any system running it, effectively every linux system. This
> exploit was in the linu
>
> There is no doubt that most security agencies have a long list of zero-
>> day exploits in their toolbox - I would hazard to suggest that they
>> wouldn't be doing their job if they didn't! But I seriously doubt they
>> would commission exploitable code in something that is openly
>> auditable.
On 04/16/2017 06:51 AM, Andrew Holway wrote:
There is no doubt that most security agencies have a long list of zero-
day exploits in their toolbox - I would hazard to suggest that they
wouldn't be doing their job if they didn't! But I seriously doubt they
would commission exploitable code in so
On 04/14/2017 10:41 PM, Alice Wonder wrote:
https://www.openca.org/ might fit my needs.
their Centos repo does not exist, it seems?
On 04/14/2017 06:29 PM, Alice Wonder wrote:
Hello list,
I'm contemplating running my own CA to implement the new proposed ISP
for validation of S/MIME certi
Oh I don't know, their github works.
However it seems that it isn't able to deal with more than one ocsp
signing key.
On 04/16/2017 08:40 AM, Robert Moskowitz wrote:
On 04/14/2017 10:41 PM, Alice Wonder wrote:
https://www.openca.org/ might fit my needs.
their Centos repo does not exist,
What about the pki package that comes with Centos?
pki-server and pki-ca?
On 04/16/2017 11:54 AM, Alice Wonder wrote:
Oh I don't know, their github works.
However it seems that it isn't able to deal with more than one ocsp
signing key.
On 04/16/2017 08:40 AM, Robert Moskowitz wrote:
On 0
On Sun, 2017-04-16 at 06:53 -0400, ken wrote:
> On 04/15/2017 04:46 AM, Pete Biggs wrote:
> > Not wishing to extend this thread further, but ...
> >
> > > There are conspiracy theories out there that the NSA is involved with
> > > bringing systemd to Linux so they can have easy access to *"unknown
> Indeed. I think the assertion "OSS is somehow safer because of community
> audit" is a logical fallacy. How would one go about "auditing" in the first
> place?
There are tools to audit source code for problems - OSS is safer
*because* the source is available and can be audited.
> Even if the
On 04/16/2017 03:53 AM, ken wrote:
And, yes, the exploits also include more than a few against linux. Go
to their site and look under vault7. Or search for "linux" or
"redhat"... you'll get hundreds of hits. Here's just one:
https://wikileaks.org/spyfiles4/documents/FinSpy-3.10-User-Manual.d
Hi all,
I am getting Error #14 from grub version 0.97 when trying to boot for the first
time into a newly installed partition with Scientific Linux 6.7 and need help
resolving the error.
The setup:
MacPro with 2 HDs
HD #1: ESP partition has rEFInd installed and running
2nd partitio
On Thu, 2017-04-13 at 10:39 -0400, Robert Moskowitz wrote:
>
> On 04/12/2017 02:08 PM, m.r...@5-cent.us wrote:
> >mark "my web pages proudly built in vi!"
> And mine on medon.htt-consult.com done with Geany.
Gedit works for me - webpages, PHP, init (with Vi) et cetera.
--
Regards,
On 04/16/2017 04:37 PM, Always Learning wrote:
On Thu, 2017-04-13 at 10:39 -0400, Robert Moskowitz wrote:
On 04/12/2017 02:08 PM, m.r...@5-cent.us wrote:
mark "my web pages proudly built in vi!"
And mine on medon.htt-consult.com done with Geany.
Gedit works for me - webpages, PHP, i
On Sun, 2017-04-16 at 18:25 +0100, Pete Biggs wrote:
> Yes. And despite what people think, those agencies don't have super
> powers. They have tools to help them, and lots of resources, but
> nothing out of the ordinary.
Untrue. They are in advance of mainstream developments. Spying has
existed
14 matches
Mail list logo