This one time, at band camp, Adam Morley said:
> Hi security and Steve,
>
> I thought so too. Then I upgraded a box with apache (not apache-ssl)
> and apache got ugpraded. . .but I found:
>
> http://lists.debian.org/debian-security/2004/11/msg00095.html
>
> So I know the things he lists as vuln
Hi security and Steve,
I thought so too. Then I upgraded a box with apache (not apache-ssl) and
apache got ugpraded. . .but I found:
http://lists.debian.org/debian-security/2004/11/msg00095.html
So I know the things he lists as vulnerable are indeed in apache-common (dpkg
-x'd the package), b
> Below are the errors reported by apt-get update. Is this correct?
> Could someone explain please?
It's normal that large HTTP downloads are corrupted if some router on
the path to the server has dying RAM chips. The TCP checksum does not
protect against periodic bit errors, and HTTP doesn't c
Note: this went from the "tecnical support"...
I want to know their customers!
It was VERY OT, sorry...
-Original Message-
From: "Supporto Tecnico Protocomm" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Date: Fri, 3 Dec 2004 15:54:30 +0100
Subject: unsubscribe
>
>
--
To UNSUBSCRIBE
Title: Messaggio
5 matches
Mail list logo