Hello, all ;)
I've recently installed on my debian potato the
telnetd 0.17-5. And after I tried to exploit this, with
7350854.c exploit. But, fortunately, nothing was wrong,
telnetd survived ok.
I have a question: is the telnetd 0.17-5 exploitable
and where to get exploit t
Hello, all ;)
I've recently installed on my debian potato the
telnetd 0.17-5. And after I tried to exploit this, with
7350854.c exploit. But, fortunately, nothing was wrong,
telnetd survived ok.
I have a question: is the telnetd 0.17-5 exploitable
and where to get exploit
On Fri, Aug 24, 2001 at 07:56:48AM +0700, A. Didit Mifanto wrote:
> Thanks a lots.
>
> Didit
>
> 8/23/01 00:59:28, [EMAIL PROTECTED] wrote:
>
> >You can think about using the /etc/security/limits.conf resource in
> >debian for give the max memory, max cpu, ... that one process can use.
> >This i
On Fri, Aug 24, 2001 at 07:56:48AM +0700, A. Didit Mifanto wrote:
> Thanks a lots.
>
> Didit
>
> 8/23/01 00:59:28, [EMAIL PROTECTED] wrote:
>
> >You can think about using the /etc/security/limits.conf resource in
> >debian for give the max memory, max cpu, ... that one process can use.
> >This
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Peter" == Peter Cordes <[EMAIL PROTECTED]> writes:
Peter> It is secure when you have put the public key on the remote
Peter> machine already. SSH is only vulnerable to man-in-the-middle when
Peter> you first connect to a host, and accept the h
5 matches
Mail list logo