This might be a stupid question, I know, but, why isn't there a patch
for the ptrace exploit, for the Woody kernel-source? There's been one
for some obscure arch I can't remember right now, but not for any of the more
widespread ones (well, not according to the changelogs I read, specifically,
thes
iain d broadfoot wrote:
* nathan ([EMAIL PROTECTED]) wrote:
I would very carefully go over your hardware setup, and the configuration
of the server. I would run the offending scan many times, altering
different things to try and determine some predictable behaviors, and I
would go over the ser
* nathan ([EMAIL PROTECTED]) wrote:
> I would very carefully go over your hardware setup, and the configuration
> of the server. I would run the offending scan many times, altering
> different things to try and determine some predictable behaviors, and I
> would go over the server logs to see if t
Running the below rules on a firewall. 192.168.1.2 is an SMTP server
inside the firewall.
1. there is one smtp server on the internet that has a connection
timeout from the inside smtp server connecting on port 25.
Telnet host 25 also times out. direct connection from the firewall
works just
El jue, 10 de 04 de 2003 a las 21:10, Marcin Owsiany escribió:
> On Thu, Apr 10, 2003 at 02:33:59PM -0300, danilo lujambio wrote:
> > When I scanned with nmap this server , it shuted down and rebooted.
>
> Did it go through runlevel 6, or just simply crashed? If it was the
> latter, then it's prob
On Thu, Mar 27, 2003 at 10:33:01AM -0500, Vassilii Khachaturov wrote:
> if you look at the messages footer, there's a human address (I've put it
> into CC) of the listmaster to contact if you wish to do such things.
> It is quite common that the listmaster doesn't look into the list itself
> for ad
6 matches
Mail list logo