LeVA <[EMAIL PROTECTED]> wrote:
> Is it possible to make some kind of a little virtual server inside a
> debian box?
User Mode Linux, vserver.
VB.
--
X-Pie Software GmbH
Postfach 1540, 88334 Bad Waldsee
Phone +49-7524-996806 Fax +49-7524-996807
mailto:[EMAIL PROTECTED] http://www.x-pie.de
LeVA <[EMAIL PROTECTED]> wrote:
> Is it possible to make some kind of a little virtual server inside a
> debian box?
User Mode Linux, vserver.
VB.
--
X-Pie Software GmbH
Postfach 1540, 88334 Bad Waldsee
Phone +49-7524-996806 Fax +49-7524-996807
mailto:[EMAIL PROTECTED] http://www.x-pie.de
--
You might check out the vserver package. It uses kernel-patch-ctx to
create a virtual server environment that is chroot'd as well as isolated
in its own security context.
--John
LeVA wrote:
Date: Sun, 09 Nov 2003 10:43:52 +0100
From: LeVA <[EMAIL PROTECTED]>
To: Debian-Security
Subject:
You might check out the vserver package. It uses kernel-patch-ctx to
create a virtual server environment that is chroot'd as well as isolated
in its own security context.
--John
LeVA wrote:
Date: Sun, 09 Nov 2003 10:43:52 +0100
From: LeVA <[EMAIL PROTECTED]>
To: Debian-Security <[EMAIL PROTEC
On Sun, Nov 09, 2003 at 12:08:40AM -0600, Hanasaki JiJi wrote:
> Anyone have/working on integration of these?
>
> clam spamc and amavis are installed however, they dont seem to update
> the /etc/exim4/conf.d of the new packaging system.
>
> thank you.
exim4-daemon-heavy has the exiscan-acl patc
Thus the reason for posting to this list. the command was run as root.
Does the following theory seem plausable?
This is a kernel process for nfs over tcp
Ingo Strüwing wrote:
Hanasaki JiJi wrote:
How do i find out what is using those ports?
netstat -natl | grep 799
tcp0
On Sun, Nov 09, 2003 at 12:08:40AM -0600, Hanasaki JiJi wrote:
> Anyone have/working on integration of these?
>
> clam spamc and amavis are installed however, they dont seem to update
> the /etc/exim4/conf.d of the new packaging system.
>
> thank you.
exim4-daemon-heavy has the exiscan-acl patc
Thus the reason for posting to this list. the command was run as root.
Does the following theory seem plausable?
This is a kernel process for nfs over tcp
Ingo Strüwing wrote:
Hanasaki JiJi wrote:
How do i find out what is using those ports?
netstat -natl | grep 799
tcp0 01
On Sunday 09 November 2003 07:08, Hanasaki JiJi wrote:
> Anyone have/working on integration of these?
There is a clamscan.pl somewhere on the net. This works, like Spamassassin,
with procmail. But be aware! When I turn on my desktop system with this setup
in the morning and lots of spam/virus ma
On Sunday 09 November 2003 07:08, Hanasaki JiJi wrote:
> Anyone have/working on integration of these?
There is a clamscan.pl somewhere on the net. This works, like Spamassassin,
with procmail. But be aware! When I turn on my desktop system with this setup
in the morning and lots of spam/virus ma
Hanasaki JiJi wrote:
How do i find out what is using those ports?
netstat -natl | grep 799
tcp0 0192.168.1.200:799
192.168.1.1:2049ESTABLISHED
below returns no output
lsof -i tcp:799
Nothing is using the port but it is in netstat
Did you run the c
Hanasaki JiJi wrote:
How do i find out what is using those ports?
netstat -natl | grep 799
tcp0 0192.168.1.200:799
192.168.1.1:2049ESTABLISHED
below returns no output
lsof -i tcp:799
Nothing is using the port but it is in netstat
Did you run the comman
Hello!
Is it possible to make some kind of a little virtual server inside a
debian box? I want to run a separate sshd (for example on port ),
and when someone connects to it, it reads the passwd file, and the
shadow file from a different directory than /etc (for example
/users/etc). And under
Hello!
Is it possible to make some kind of a little virtual server inside a
debian box? I want to run a separate sshd (for example on port ),
and when someone connects to it, it reads the passwd file, and the
shadow file from a different directory than /etc (for example
/users/etc). And under
Anyone have/working on integration of these?
clam spamc and amavis are installed however, they dont seem to update
the /etc/exim4/conf.d of the new packaging system.
thank you.
15 matches
Mail list logo