On Fri, Feb 24, 2006 at 11:13:35AM +1100, Geoff Crompton wrote:
> When you say "The server runs a tracker", are you explaining bittorrent,
> or do the security.debian.org servers actually run a tracker at the moment?
I was just explaining bittorrent. Sorry for the confusion.
> How well does bitt
On Thu, Feb 23, 2006 at 04:40:38PM -0500, [EMAIL PROTECTED] wrote:
> Instead of having all users connect and DL their own copies of
> security updates (which requires tremendous bandwidth), would it be
> possible to use multicast to 'broadcast' the updates. The thought is
> that updates could be di
On Tue, Jul 26, 2005 at 04:39:20PM -0400, Edward Faulkner wrote:
> It's attempting to connect to two different hosts:
Never mind that second address... that's my DNS...
signature.asc
Description: Digital signature
On Tue, Jul 26, 2005 at 10:02:52PM +0200, Nejc Novak wrote:
> Can you get any information out of this cron file? I tried creating the
> same exec that this file creats, but obiously i was doing sth wrong :)
The crontab writes out a binary file and executes it. I straced the
binary on a virtual m
On 6/28/05, Rick Moen <[EMAIL PROTECTED]> wrote:
> Mine is called a PalmPilot with Keyring (3DES password store) installed,
> where I'm careful about what I install on it. It strikes me that threat
> models are more easily isolated and dealth with on a PDA than on a
> networked computer, especiall
On 6/28/05, Radu Spineanu <[EMAIL PROTECTED]> wrote:
> Has anyone heard of an implementation, or at least a whitepaper related
> to creating some kind of secure zone where i can keep these keys ?
If you're using strong enough passwords, your keys would still be
pretty safe. An attacker could try
I have been using Linux continuously for 4 years and have never once
been infected with a virus, trojan, or adware. It simply doesn't
happen. However, I have seen unmaintained machines get hacked. Like
any software, you need to stay current to stay safe. Debian has an
excellent security record,
7 matches
Mail list logo