Corey H wrote:
> how do you guys test all of the potential PNG/JPG potential malware payloads
to check any file for potential malware you can use:
chkrootkit
rkhunter
but you can also try with:
binwalk <- detect/extract binary data in files
string <- to detect strings in the image/audio file
ex
On 14/01/21 11:56, Erik Poupaert wrote:
dpkg -V
The reason why I am carrying out this audit is, however, because I somehow
suspect that the system could be compromised.
as suggested you can use debsums
you can also use
* to detect missing or unexplained files
cruft
Note: the output can be
On 01/05/20 22:00, Rebecca N. Palmer wrote:
On 01/05/2020 20:31, Elmar Stellnberger wrote:
https isn´t any more secure than http as long as you do not have a
verifiably trustworthy server certificate that you can check for. As
we know the certification authority system is totally broken.
Impe
On 01/01/20 10:29, Elmar Stellnberger wrote:
Up to now I did not see any notable effort to support malware reverse
engineering under Linux. The only program I knew was boomerang for
decompiling malware but it seems to be unsupported since long.
probably here you can find some useful:
http
On 15/12/19 19:06, Pegro wrote:
I was just unable to recieve an IP address --- the router does NOT allow me to
use static IP addresses
If I don't mistake, router always allow you to use a static IP
address... if you select the IP address in the authorized range.
First you need to know a va
On 15/08/19 22:57, Rebecca N. Palmer wrote:
I have only seen intelligence visiting my home when I left an offline
computer around with HDD.
If you feel safe answering: what country was this in? Your name and
time zone suggest Germany/Austria/Switzerland, which I wouldn't have
thought of as
On 24/06/19 01:57, Lou Poppler wrote:
I am only guessing, but I think a possible explanation which resolves this
conundrum might be this: The latest release page is saying that the latest
microcode package contains the latest microcode for this Core2 processor, which
is the version last updated
On 23/06/19 22:28, Henrique de Moraes Holschuh wrote:
The README already tells you how to do
it yourself, and people won't read it, why would them find about an
example downloader script?
$ zless /usr/share/doc/intel-microcode/README.Debian.gz
[...]
Custom Linux kernels must be built with init
On 11/06/19 04:19, Henrique de Moraes Holschuh wrote:
On Mon, 10 Jun 2019, Russell Coker wrote:
model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz
Intel upstream decided to not distribute it, for whatever reason. The
Core2 will not get any fixes for MDS either (nor will Nehale
On 10/06/19 20:31, Michael Stone wrote:
On Mon, Jun 10, 2019 at 07:46:47PM +0200, Davide Prina wrote:
On 10/06/19 13:16, Michael Stone wrote:
Your CPU is not supported my Intel, so you either accept the risk or
buy a new one.
you have another choice: disable the SMP & C. and all mitiga
On 10/06/19 13:16, Michael Stone wrote:
On Mon, Jun 10, 2019 at 02:01:25PM +1000, Russell Coker wrote:
I just discovered the spectre-meltdown-checker package
model name : Intel(R) Core(TM)2 Quad CPU Q9505 @ 2.83GHz
Your CPU is not supported my Intel, so you either accept the risk o
On 06/11/2018 16:16, Salvatore Bonaccorso wrote:
We plan to rebase ghostscript via stretch-security to 9.25 plus cherry
picked security fixes which happened after that release.
Packages are at
https://people.debian.org/~carnil/tmp/ghostscript/
I'm using Buster, but I have download
ghosts
On 06/11/2018 02:34, Paul Wise wrote:
On Mon, Nov 5, 2018 at 10:29 PM John Goerzen wrote:
So I recently started running debsecan on one of my boxes. It's a
fairly barebones server install, uses unattended-upgrades and is fully
up-to-date. I expected a clean bill of health, but didn't get tha
On 04/05/2018 04:06, Paul Wise wrote:
On Thu, May 3, 2018 at 4:53 PM, richard lucassen wrote:
There is also an big increase in time before random is initialized:
...
One of the consequences is that openntpd (or a program like
rdate) hangs until the crng is initialized.
What do these two pro
On 18/02/2018 10:44, who.are.you wrote:
On Sat, Feb 17, 2018 at 07:03:00PM +, Holger Levsen wrote:
is this gcc only useful for
rebuilding the kernel or would it "in theory" (and practice) be better
to rebuild everything with it? (of course the latter is probably not really
practical for D
I have try this site:
https://haveibeenpwned.com/
that inform you if your credential have been compromised in data brench
(only for public compromised data).
I have try it with sub...@bugs.debian.org and this account result
compromised!! for: Email addresses, Passwords, Device usage tracking
If I don't mistake the automatic package build system don't require that
the source signature is verified correctly.
In here:
https://buildd.debian.org/status/fetch.php?pkg=gnome-shell&arch=amd64&ver=3.26.2-1&stamp=1509919343&raw=0
I have found this:
Unpack source
-
gpgv: unknown
On 29/11/2017 17:09, Jonathan Hutchins wrote:
When doing an in-release upgrade it's usually not necessary to do
"upgrade" first, then "full-upgrade" (equivalent to dist-upgrade).
that is true, but I prefer to do an "upgrade" first because it is
"safer" (it don't remove other packages) and tha
On 28/11/2017 21:40, P P wrote:
for example https://www.debian.org/security/2016/dsa-3503 for DSA 3503. But the
link doesn't tell which patch to install to fix the bug of DSA 3503.
if you look in the CVE link you find if there is a patch and where is
it, ... for example if you open the first
please learn how to quote, so all can understand what is the question
and what is the answer. Also break your line response to 75 character
On 13/05/2016 23:17, Harris Paltrowitz wrote:
I use Icedove on Jessie, and immediately after I received this email I ran
apt-get update and apt-get upgra
On 25/04/2016 10:58, Paul Wise wrote:
On Fri, Apr 22, 2016 at 6:14 PM, SZÉPE Viktor wrote:
Please consider using http://psky.me/ to keep spam out of the list.
The people running the Debian lists can be contacted here:
https://www.debian.org/MailingLists/#maintenance
I've forwarded your sugg
I'm not a security expert.
I will try to give you some security information.
On 22/02/2016 22:23, Hans wrote:
I found a strange behavior with konqueror.
$ apt-cache show konqueror
[...]
Recommends: [...] kpart-webkit
[...]
$ apt-cache show kpart-webkit
[...]
Depends: [...] libqtwebkit4 (>= 2
On 02/02/2016 22:29, Davide Prina wrote:
On 02/02/2016 17:21, Wolfgang Jeltsch wrote:
• Where is a list of unfixed security issues?
You can know security issues of potentially security issues on packages
you have installed on your system:
1) you can list installed package with open
On 02/02/2016 17:21, Wolfgang Jeltsch wrote:
• Where is a list of unfixed security issues?
You can know security issues of potentially security issues on packages
you have installed on your system:
1) you can list installed package with open security issues
# apt-get install debsecan
$
On 21/01/2016 22:20, Ricardo Palacios wrote:
Unsubscribe
You can unsubscribe from this mailing list:
1) with your browser go to this address:
https://www.debian.org/MailingLists/unsubscribe
2) check the "debian-security" and the "debian-security-announce"
mailing list (note that you must che
Hi Mateusz,
I'm not a security expert. And also I'm not an English expert ;-)
On 27/10/2015 12:29, Mateusz Kozłowski wrote:
Could You tell me which debian desktop environment is the most security
and the best privacy and which You recommned for debian users? (KDE, XFCE,
GNOME etc.)?
I think
On 05/02/2015 18:58, john wrote:
I saw that my updates weren't working, checked into it and found a notice
on http://mirror.anl.gov/ saying they no longer host any public mirrors
I think it is better to use:
http://http.debian.net/
see instruction on http://http.debian.net/ page
Ciao
Davide
On 13/12/2012 20:52, Jordon Bedwell wrote:
On Thu, Dec 13, 2012 at 1:47 PM, Davide Prina wrote:
su -c USER1 "script.sh" ... (downloading the file [with ugo+r] in
/tmp/RANDOMDIR [with ugo+x] only once).
Why does the group and other need access again?
for letting other users rea
On 12/12/2012 23:26, Michael Gilbert wrote:
Ultimately, for anyone even modestly
security-conscious adobe flash should really be avoided at all costs.
+1
I'm not an expert, but I think that packages like this must first ask
the users list on which you want this plugin installed and than execu
but you use top posting... this is bad! ;-)
On 16/12/2011 21:26, Marko Randjelovic wrote:
The same as for hdparm. I reinstalled it and all looks OK.
so try a disk fsck and also a RAM check
I have had problems like these when a RAM was damaged
Ciao
Davide
--
Dizionari: http://linguistico.sou
On 16/12/2011 20:57, frederic ollivier wrote:
You are sure that the original "su" ?
$ type su
/bin/su
$ apt-file -x search /bin/su$
login: /bin/su
so you can check integrity with:
$ debsums -a login
Ciao
Davide
--
Dizionari: http://linguistico.sourceforge.net/wiki
Strumenti per l'ufficio: ht
On 02/01/2011 19:32, Naja Melan wrote:
Then cd to the location of your download and do : md5sum YourDebian.iso.
well preferably one of the other hashing algorithms, since md5
is considered broken
what I have read is that you can "easy" find another DadFile.iso file
with the same YourDebia
a dehqan wrote:
please quote :-)
# chkconfig --level 23 identd off
identd: unknown service
probably you have mistaken inetd with identd
But port 113 auth is open ! So which service has opened port 113 ?
from root
# netstat -putan
to see all the service listening
to see only 113 port:
#
a dehqan wrote:
[11:19:43] Warning: The file '/usr/sbin/unhide-linux26' exists on the
system, but it is not present in the rkhunter.dat file.
$ apt-file search /usr/sbin/unhide-linux26
unhide: /usr/sbin/unhide-linux26
probably you have installed unhide as suggested by rkhunter and you have
i
Rene Engelhard wrote:
Davide Prina wrote:
MySpell is obsolete.
Please build against Hunspell, which is an improved version of MySpell
retaining full backwards compatibility. That also would make the usage
of hunspell-de-* in iceweasel possible.
probably not so full backwards compatibility
Rene Engelhard wrote:
> MySpell is obsolete.
> Please build against Hunspell, which is an improved version of MySpell
> retaining full backwards compatibility. That also would make the usage
> of hunspell-de-* in iceweasel possible.
probably not so full backwards compatibility.
> [ The Problem i
ahi, ahi, ahi ... top quoting! This is bad! ;-)
http://en.wikipedia.org/wiki/Netiquette
Torsten Sadowski wrote:
Unluckily its not that easy. The homepage preference is not altered and points
to the right site.
It seem to be a search service ... probably have you a Firefox extension
of it?
ahi, ahi, ahi ... top posting ... this is bad ;-)
Robert Dobbs wrote:
I cannot do it because of my company's firewall.
you can go to a keyring site and download the key from here
Why is the key not in debian-keyring package?
key is updated each year ... but next update will be in January (
Robert Dobbs wrote:
W: GPG error: http://security.debian.org stable/updates Release: The
following signatures were invalid: BADSIG 010908312D230C5F Debian
have you update that key before?
# gpg --keyserver pgp.mit.edu --recv-keys 010908312D230C5F
# gpg --armor --export 010908312D230C5F | apt
James Miller ha scritto:
"W: GPG error: http://mirrors.kernel.org testing Release: The following
signatures couldn't be verified because the public key is not available:
NO_PUBKEY 010908312D230C5F"
there are two solutions:
1) with root user:
wget http://ftp-master.debian.org/ziyi_key_2006.asc
steve ha scritto:
connection time, so she simply refused. Moreover, in Italy you have to give
an ID (they do a photocopy of it; she couldn't tell me how long they keep
it..) to be able to use a computer in an Internet Café (terrorism you
know...).
yes. All data (only your person identificat
Nejc Novak ha scritto:
So, for now i killed this process, disabled the cronjob and killed web
server - there is now way the attacker is capable of coming back into
server or is there a chance that there is another backdoor installed
somewhere (chkrootkit doesn't find anything).
try also rk
hanasaki wrote:
Below are the errors reported by apt-get update. Is this correct? Could
someone explain please?
Thanks.
=== 16:35 CST 2004-11-26
Failed to fetch
http://ftp.us.debian.org/debian/dists/sarge/main/binary-i386/Packages.gz
MD5Sum mismatch
I think this is an error on ftp.us.debian.o
Snyder, Dave (D.F.) wrote:
Security,
I just purchased Debian Linux for my home PC and waiting for the CD's to
arrive this week. I'm looking forward to installing so I can eventually
divorce myself from Microsoft Windows.
I've had more calls in the last few weeks from friends and relatives
rega
Marcin ha scritto:
Hello,
have you try: "# apt-cache search virus"?
yes, of course.
$ apt-cache search virus
gnome-xbill - Fight the infection.
mailscanner - An email virus scanner and spam tagger.
renattach - Rename attachments on the fly.
sanitizer - The Anomy Mail Sanitizer - an email v
Marcin ha scritto:
Hello,
have you try: "# apt-cache search virus"?
yes, of course.
$ apt-cache search virus
gnome-xbill - Fight the infection.
mailscanner - An email virus scanner and spam tagger.
renattach - Rename attachments on the fly.
sanitizer - The Anomy Mail Sanitizer - an email virus sc
Marcin ha scritto:
Hello,
I am trying to find solution for finding wiruses in my LAN networks.
I am administrator of ISP router (generaly Debian of course), and in
LAN there are litle "storm" of wiruses, trojans, spammers, etc "shits" ...
Is any possible method to find them ?
Any debian tools ?
Marcin ha scritto:
Hello,
I am trying to find solution for finding wiruses in my LAN networks.
I am administrator of ISP router (generaly Debian of course), and in
LAN there are litle "storm" of wiruses, trojans, spammers, etc "shits" ...
Is any possible method to find them ?
Any debian tools ?
I w
48 matches
Mail list logo