I received a mail with this subject from localhost, and with what I suppose it
is the diff between wtmp and its previous version. What I'd like to know is
how I can rebuild the file to see what's been the change and the logins
deleted?
Also.. what is the daemon that sends this messages?
Thanks
I received a mail with this subject from localhost, and with what I suppose it
is the diff between wtmp and its previous version. What I'd like to know is
how I can rebuild the file to see what's been the change and the logins
deleted?
Also.. what is the daemon that sends this messages?
Thanks
A Saturday 07 December 2002 2:37, David B Harris va escriure:
> On Sat, 7 Dec 2002 01:09:59 +0100
>
> Albert Cervera Areny <[EMAIL PROTECTED]> wrote:
> > So it isn't really that the hole system runs 8% slower. Sorry for my
> > first explanation... Now I think it i
A Saturday 07 December 2002 2:37, David B Harris va escriure:
> On Sat, 7 Dec 2002 01:09:59 +0100
>
> Albert Cervera Areny <[EMAIL PROTECTED]> wrote:
> > So it isn't really that the hole system runs 8% slower. Sorry for my
> > first explanation... Now I think it i
". I would not want it there unless Im convinced it
> truely offers protection from a quantifiable risk. I dont want to see the
> kernel go the way of MS's kernel ,one huge bloated mess.
>
> Lets see some papers/justification for this item, it may not be needed in
> all situation
". I would not want it there unless Im convinced it
> truely offers protection from a quantifiable risk. I dont want to see the
> kernel go the way of MS's kernel ,one huge bloated mess.
>
> Lets see some papers/justification for this item, it may not be needed in
> all situation
I've read in slashdot
(http://bsd.slashdot.org/article.pl?sid=02/12/02/2035207) that openbsd has
included stack-smashing protection using the ProPolice
(http://www.trl.ibm.com/projects/security/ssp/) patch for GCC 3.2
I think it would be a great idea to use this patch with debian too as soon as
I've read in slashdot
(http://bsd.slashdot.org/article.pl?sid=02/12/02/2035207) that openbsd has
included stack-smashing protection using the ProPolice
(http://www.trl.ibm.com/projects/security/ssp/) patch for GCC 3.2
I think it would be a great idea to use this patch with debian too as soon as
Debian testing and unstable use it too..
-- Missatge transmès --
Subject: Re: Squirrel Mail 1.2.7 XSS Exploit
Date: Thu, 19 Sep 2002 16:51:09 -0500 (CDT)
From: "Jason Munro" <[EMAIL PROTECTED]>
To:
DarC KonQuesT said:
> Sorry if you receive two of these.
>
> DarC KonQu
Debian testing and unstable use it too..
-- Missatge transmès --
Subject: Re: Squirrel Mail 1.2.7 XSS Exploit
Date: Thu, 19 Sep 2002 16:51:09 -0500 (CDT)
From: "Jason Munro" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
DarC KonQuesT said:
> Sorry if you receive two of these
I suppose this vulnerability affects also debian. I've already changed the
setuid bit in chfn and chsh though it is supposed to be difficult to exploit.
-- Missatge transmès --
Subject: RAZOR advisory: Linux util-linux chfn local root vulnerability
Date: Mon, 29 Jul 2002 10:51:
11 matches
Mail list logo