Ciao tutti
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
I'm impressed. Even here in Tokyo, where "a cop on ever street corner" is not
just an Orwellian slur, the only people who get that kind of service are the
ones who directly pay their salaries.
Seriously, the only person you can rely on is you. You're the one on the scene,
be it a mugging or a c
In article <[EMAIL PROTECTED]>
[EMAIL PROTECTED] writes:
>> > Is there any way of detecting rootkits on potato?
>>
>> See: http://packages.debian.org/chkrootkit
>>
>> Try apt pin and get chkrootkit from sid.
I could made potato package easily from sid's source. It requires
build-essential and d
also sprach Joe Dollard <[EMAIL PROTECTED]> [2002.03.25.2114 +0100]:
> The version of proftp that is in debian potato (1.2.0pre10 as
> reported by running 'proftpd -v ') is vulnerable to a glob DoS
> attack, as discovered on the 15th March 2001. You can verify this
> bug by
Hi all !
As computer science students, a friend and I have just ended a study on buffer
overflows and the existing protections a Linux system may use against them.
This study deals with the various kinds of overflows (heap, stack) to
understand how they work and how they may be used to execute ma
Ich werde ab 26.03.2002 nicht im Büro sein. Ich kehre zurück am 23.12.2024.
Ich werde Ihre Nachricht überhaupt nicht mehr beantworten.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Ciao tutti
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> Andrew Tait wrote:
>
> > The entries you are seeing are caused by the army of infected MS IIS
server
> > (Codered, Nimda, etc) try to hack into other IIS servers at random. I
see
> > these on every web server I manage that aren't behind a firewall (ie,
> > blocking port 80).
> >
>
> Yes, Andrew..
Ich werde ab 26.03.2002 nicht im Büro sein. Ich kehre zurück am 23.12.2024.
Ich werde Ihre Nachricht überhaupt nicht mehr beantworten.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Mon, Mar 25, 2002 at 04:54:37PM +0100, Beno?t Sibaud wrote:
> I think I found a security problem in PHP3+postgres+apache shipped with
> Potato.
>
> Correct me if I'm wrong, but the following code should support any $var.
> If you uncomment the client_encoding line, I'm able to execute any
> r
I'm impressed. Even here in Tokyo, where "a cop on ever street corner" is not just an
Orwellian slur, the only people who get that kind of service are the ones who directly
pay their salaries.
Seriously, the only person you can rely on is you. You're the one on the scene, be it
a mugging or a
In article <[EMAIL PROTECTED]>
[EMAIL PROTECTED] writes:
>> > Is there any way of detecting rootkits on potato?
>>
>> See: http://packages.debian.org/chkrootkit
>>
>> Try apt pin and get chkrootkit from sid.
I could made potato package easily from sid's source. It requires
build-essential and
also sprach Joe Dollard <[EMAIL PROTECTED]> [2002.03.25.2114 +0100]:
> The version of proftp that is in debian potato (1.2.0pre10 as
> reported by running 'proftpd -v ') is vulnerable to a glob DoS
> attack, as discovered on the 15th March 2001. You can verify this
> bug by
Hi all !
As computer science students, a friend and I have just ended a study on buffer
overflows and the existing protections a Linux system may use against them.
This study deals with the various kinds of overflows (heap, stack) to
understand how they work and how they may be used to execute m
Ich werde ab 26.03.2002 nicht im Büro sein. Ich kehre zurück am 23.12.2024.
Ich werde Ihre Nachricht überhaupt nicht mehr beantworten.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> Andrew Tait wrote:
>
> > The entries you are seeing are caused by the army of infected MS IIS
server
> > (Codered, Nimda, etc) try to hack into other IIS servers at random. I
see
> > these on every web server I manage that aren't behind a firewall (ie,
> > blocking port 80).
> >
>
> Yes, Andrew.
Ich werde ab 26.03.2002 nicht im Büro sein. Ich kehre zurück am 23.12.2024.
Ich werde Ihre Nachricht überhaupt nicht mehr beantworten.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Mon, Mar 25, 2002 at 04:54:37PM +0100, Beno?t Sibaud wrote:
> I think I found a security problem in PHP3+postgres+apache shipped with
> Potato.
>
> Correct me if I'm wrong, but the following code should support any $var.
> If you uncomment the client_encoding line, I'm able to execute any
>
On Tue, 26 Mar 2002 16:15:05 +
Simon Young <[EMAIL PROTECTED]> wrote:
>
> Hi,
>
> [...]
> Is there any way of detecting rootkits on potato?
See: http://packages.debian.org/chkrootkit
Try apt pin and get chkrootkit from sid.
bye,
--
_
Hi Simon,
http://www.chkrootkit.org/ worked fine for me...
Patrick
Simon Young (Tuesday 26 March 2002 17:15):
| Hi,
|
| I have a potato system which, suspiciously, has some lines missing
| from syslog, and possibly from the lastlog too. I know chkrootkit will
| check for this kind of thing, but
Hi,
I have a potato system which, suspiciously, has some lines missing
from syslog, and possibly from the lastlog too. I know chkrootkit will
check for this kind of thing, but it requires a later version of
libc6.
Is there any way of detecting rootkits on potato?
Many thanks in advance,
Simon.
On Tue, 26 Mar 2002 15:49, Michal Novotny wrote:
> It is possible to make virtual web hosting (apache) in chroot jail?
Yes. Just install complete copies of Debian in the chroot jails.
> There is a little problem with about 1500 domains/clients.
> How can I set it up (with perl/php/ssi/ssl/cgi/ft
Hello!
It is possible to make virtual web hosting (apache) in chroot jail?
There is a little problem with about 1500 domains/clients.
How can I set it up (with perl/php/ssi/ssl/cgi/ftp/mysql etc.) ?
I think it have to be all in the chrooted directory, so will it be
apache/perl/mysql/libs for each
On Tue, 26 Mar 2002 16:15:05 +
Simon Young <[EMAIL PROTECTED]> wrote:
>
> Hi,
>
> [...]
> Is there any way of detecting rootkits on potato?
See: http://packages.debian.org/chkrootkit
Try apt pin and get chkrootkit from sid.
bye,
--
_
Hi Simon,
http://www.chkrootkit.org/ worked fine for me...
Patrick
Simon Young (Tuesday 26 March 2002 17:15):
| Hi,
|
| I have a potato system which, suspiciously, has some lines missing
| from syslog, and possibly from the lastlog too. I know chkrootkit will
| check for this kind of thing, but
Hi,
I have a potato system which, suspiciously, has some lines missing
from syslog, and possibly from the lastlog too. I know chkrootkit will
check for this kind of thing, but it requires a later version of
libc6.
Is there any way of detecting rootkits on potato?
Many thanks in advance,
Simon
On Tue, 26 Mar 2002 15:49, Michal Novotny wrote:
> It is possible to make virtual web hosting (apache) in chroot jail?
Yes. Just install complete copies of Debian in the chroot jails.
> There is a little problem with about 1500 domains/clients.
> How can I set it up (with perl/php/ssi/ssl/cgi/f
Hello!
It is possible to make virtual web hosting (apache) in chroot jail?
There is a little problem with about 1500 domains/clients.
How can I set it up (with perl/php/ssi/ssl/cgi/ftp/mysql etc.) ?
I think it have to be all in the chrooted directory, so will it be
apache/perl/mysql/libs for each
Andrew Tait wrote:
The entries you are seeing are caused by the army of infected MS IIS server
(Codered, Nimda, etc) try to hack into other IIS servers at random. I see
these on every web server I manage that aren't behind a firewall (ie,
blocking port 80).
Yes, Andrew...the web server was no
Hello,
> Recently a friend of mine was kind enough to hit refresh 700 times after
> requesting a depth 5 recursive validation from the validator on my web
> server. It's load levels went to above 150, hehe. Took me a couple of
> minutes to log in, and a couple to su to root, and more than 5 minut
Andrew Tait wrote:
> The entries you are seeing are caused by the army of infected MS IIS server
> (Codered, Nimda, etc) try to hack into other IIS servers at random. I see
> these on every web server I manage that aren't behind a firewall (ie,
> blocking port 80).
>
Yes, Andrew...the web serve
Hello,
> Recently a friend of mine was kind enough to hit refresh 700 times after
> requesting a depth 5 recursive validation from the validator on my web
> server. It's load levels went to above 150, hehe. Took me a couple of
> minutes to log in, and a couple to su to root, and more than 5 minu
34 matches
Mail list logo