Hi...
I don't know, whether this has already been filed as a bug report, but
console-apt/capt has a bug. Some packages have circular dependencies -
like locales and libc6, I think. So if you expand dependencies for one of
them, you start cycling through them, and when the indentation of the
packa
I have noticed that a user can run a scrpit which will clone it self.
The result will be that the computor will freeze. And it will not take
such a long time.
The script I've run is as follow:
#!/bin/sh
$0&$0&
Do any one no how to restrict a users amount of running processes. Or
maybe an other w
Hi...
I don't know, whether this has already been filed as a bug report, but
console-apt/capt has a bug. Some packages have circular dependencies -
like locales and libc6, I think. So if you expand dependencies for one of
them, you start cycling through them, and when the indentation of the
pack
I have noticed that a user can run a scrpit which will clone it self.
The result will be that the computor will freeze. And it will not take
such a long time.
The script I've run is as follow:
#!/bin/sh
$0&$0&
Do any one no how to restrict a users amount of running processes. Or
maybe an other
Except that sometimes NICs answer ping requests even while in reboot.
Depends on the NIC.
pgpe0Dku5fIUO.pgp
Description: PGP signature
erbenson> NFS is insecure, deal with it.
Such as use something besides NFS that is secure; the options are thin
and immature, but you may still look around because I have a feeling
there may be a good match, if you're willing to sacrafice admin time
to the task. For instance, I'm curious if CODA
Except that sometimes NICs answer ping requests even while in reboot.
Depends on the NIC.
PGP signature
erbenson> NFS is insecure, deal with it.
Such as use something besides NFS that is secure; the options are thin
and immature, but you may still look around because I have a feeling
there may be a good match, if you're willing to sacrafice admin time
to the task. For instance, I'm curious if CODA
* Colin Phipps
| Not a complete solution though - it's fiddly to make it work with setuid
| apps I imagine.
Make it syslog, and put it in /etc/ld.so.preload, which I believe
should work with SUID libraries as well.
| OTOH it is very convenient for doing comprehensive logging, which I
| admit m
On Fri, Nov 24, 2000 at 08:31:26AM +0100, Tollef Fog Heen wrote:
> * Peter Cordes
>
> | There seems to be a lot of this going on. Is it possible to modify glibc
> | so that it flags dangerous actions with stuff in /tmp?
>
> You don't even have to modify glibc. You can have a small library
> w
* Colin Phipps
| Not a complete solution though - it's fiddly to make it work with setuid
| apps I imagine.
Make it syslog, and put it in /etc/ld.so.preload, which I believe
should work with SUID libraries as well.
| OTOH it is very convenient for doing comprehensive logging, which I
| admit
On Thu, Nov 23, 2000 at 07:40:45PM -0400, Peter Cordes wrote:
> On Thu, Nov 23, 2000 at 05:50:06PM -0500, Daniel Burrows wrote:
> > On Thu, Nov 23, 2000 at 06:35:54PM -0400, Peter Cordes <[EMAIL PROTECTED]>
> > was heard to say:
> > > > ghostscript uses temporary files to do some of its work. Unfo
On Fri, Nov 24, 2000 at 08:31:26AM +0100, Tollef Fog Heen wrote:
> * Peter Cordes
>
> | There seems to be a lot of this going on. Is it possible to modify glibc
> | so that it flags dangerous actions with stuff in /tmp?
>
> You don't even have to modify glibc. You can have a small library
>
On Thu, Nov 23, 2000 at 07:40:45PM -0400, Peter Cordes wrote:
> On Thu, Nov 23, 2000 at 05:50:06PM -0500, Daniel Burrows wrote:
> > On Thu, Nov 23, 2000 at 06:35:54PM -0400, Peter Cordes <[EMAIL PROTECTED]>
>was heard to say:
> > > > ghostscript uses temporary files to do some of its work. Unfort
* Peter Cordes
| There seems to be a lot of this going on. Is it possible to modify glibc
| so that it flags dangerous actions with stuff in /tmp?
You don't even have to modify glibc. You can have a small library
which you preload, and which puts itself in place of the functions you
want to w
15 matches
Mail list logo