On Sun, Jun 01, 2003 at 12:14 +1000, Aníbal Monsalve Salazar wrote:
> A month ago or so, Martin Schulze sent a message about his guidelines
> to help with security in debian.
It was Martin Michlmayr who posted the message:
http://lists.debian.org/debian-devel-announce/2003/debian-devel-announce-2
Welcome to the Abyss... Once your here, you will never leave... There is no
unsubscribing from this group.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Tue 6/3/2003 8:40 PM
To: debian-security@lists.debian.org
Cc:
subscribe [EMAIL PROTECTED]
Phillip Hofmeister said on Tue, Jun 03, 2003 at 10:02:09AM -0400:
> However, for the most part, chrooting is a valid countermeasure/method
> to compartmentalize. It is a shame that no distribution comes with
> packages natively created with/for chrooting.
I believe that OpenBSD does.
Also, Debi
Connecting to one of my machiens seemed slow, so I did a quick top
Sitting at the top of the list was a process called lscan-worm.
That made me nervous though it boggled my mind that anyone running a worm
would actually CALL it that..
A google search produced no hits, but a google groups search
On Mon, 02 Jun 2003 at 03:38:21PM -0500, Adam Majer wrote:
> With something like sendmail or apache, it only needs to see a very
> limited part of the file system, so even braking these will not do
> any real damage.
Don't get too over confident about chrooting Apache. One Apache process
runs as
On Tue, May 27, 2003 at 11:58:21PM -0500, Jayson Vantuyl wrote:
> He appears to modify the kernel image in memory via /dev/kmem (a
> next-generation LKM attack). I've considered removing /dev/kmem (does
> anything use it?) but I don't know about any side effects (and it
> doesn't prevent him mknod
7 matches
Mail list logo