Alan James <[EMAIL PROTECTED]> writes:
> On Mon, 28 Jul 2003 09:18:31 -0500, Andrés Roldán <[EMAIL PROTECTED]>
> wrote:
>
>>Is there any way, a tool or something to do that?
>>
>
> You could install apt-listchanges. You'll get an email with the re
Alan James <[EMAIL PROTECTED]> writes:
> On Mon, 28 Jul 2003 09:18:31 -0500, Andrés Roldán <[EMAIL PROTECTED]>
> wrote:
>
>>Is there any way, a tool or something to do that?
>>
>
> You could install apt-listchanges. You'll get an email with the re
Hi all.
I have a Debian Woody up-to-date'd production server (it's daily updated) and
I need a report of the security updates made in the server since a given time
ago
(a month, a couple of months or so).
Is there any way, a tool or something to do that?
Thanks in advance.
--
Andres Roldan
Hi all.
I have a Debian Woody up-to-date'd production server (it's daily updated) and
I need a report of the security updates made in the server since a given time ago
(a month, a couple of months or so).
Is there any way, a tool or something to do that?
Thanks in advance.
--
Andres Roldan <
Hi.
I was reading about certain kind of attacks about TCP sequence and I was
wondering whether iptables is vulnerable to theses attacks. Especifically,
whether iptables is capable to know if a RELATED or ESTABLISHED package is
sent with a sequence number prediction attack and whether iptables is c
Hi.
I was reading about certain kind of attacks about TCP sequence and I was
wondering whether iptables is vulnerable to theses attacks. Especifically,
whether iptables is capable to know if a RELATED or ESTABLISHED package is
sent with a sequence number prediction attack and whether iptables is c
Hi list.
I am the CSO of a company and I am going to install several Debian woody
machines with a kernel patched with grsecurity. Theses servers will be
critical production-ready machines. The question is, what should I have
to be aware of by compiling this kernel and what should I do to ensure
a
It's a trojan virus that tries to find any IIS vulnerable using random IP.
This is itself not a dangerous attack (of course, if you have a IIS around, it
is), indeed it is not intended to be for you.
"Konstantin Filtschew" <[EMAIL PROTECTED]> writes:
> hi,
>
> found this in my /var/log/apache/ac
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I think you must chech your default policies. Besides, you should
check the traffic from within your mail server with a tool such as snort
or tcpdump and try logging your rules with the -j LOG match.
Hanasaki JiJi <[EMAIL PROTECTED]> writes:
> Worki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I think you must chech your default policies. Besides, you should
check the traffic from within your mail server with a tool such as snort
or tcpdump and try logging your rules with the -j LOG match.
Hanasaki JiJi <[EMAIL PROTECTED]> writes:
> Worki
10 matches
Mail list logo