Hello,
Am 2018-01-11 um 12:29 schrieb Frank Nord:
> Hello,
>
>
> Am 2018-01-11 um 11:58 schrieb Henrique de Moraes Holschuh:
>> On Thu, 11 Jan 2018, Frank Nord wrote:
>>> I've problems applying this on my mac mini (Intel(R) Core(TM) 2 Duo CPU,
>>> P755
Hello,
Am 2018-01-11 um 11:58 schrieb Henrique de Moraes Holschuh:
> On Thu, 11 Jan 2018, Frank Nord wrote:
>> I've problems applying this on my mac mini (Intel(R) Core(TM) 2 Duo CPU,
>> P7550 @ 2.6 GHz).
>> 3.20170707.1~deb9u1 from stretch. What's the recommende
he recommended
microcode-version for this kernel?
Thanks,
Frank
--
For those of you without hope, we have rooms with color TV,
cable and air conditioning
I always mail them the unsubscribe link privately, usually with a
comment about their actions (very or mildly sarcastic, depending on my
mood).
Also, keep in mind the list they want to unsubscribe from is the
security annouce list (debian-security-announce), not the security list
(debian-security)
Regards,
Frank
BoF at 14:00 in room Madrid !
Short:
Debian doesn't provide a security guide in SCAP format, let's fix that.
Long:
SCAP guides are really nice for users because it's really easy
"audit" (evaluate) one or many systems. Also, SCAP security guides can
contain multiple profiles (Server, Desktop, Vir
BoF at 14:00 in room Madrid !
Short:
Debian doesn't provide a security guide in SCAP format, let's fix that.
Long:
SCAP guides are really nice for users because it's really easy
"audit" (evaluate) one or many systems. Also, SCAP security guides can
contain multiple profiles (Server, Desktop, Vir
:* 0 5950269 -
>
Try as root.
Best
Frank
> Maybe build the server as a VM and take snapshots as you go. Or
> rebuild it on a different machine, with the old server reboot from a
> live CD before each major step and use the tools on the live CD to
> take the snapshots.
>
> --
> Joel Reese
This is a KVM vir
On Thu, Sep 12, 2013 at 09:13:46AM +0900, Joel Rees wrote:
> On Thu, Sep 12, 2013 at 7:48 AM, E Frank Ball III wrote:
> > Last fall there was a debian 64-bit / nginx rootkit going around,
> > now I've been hit with what sounds similar but on 32-bit wheezy.
> >
>
stalled nginx and tried
the nginx-light from debian wheezy but it made no difference.
This machine was built on July 19th. I've uninstalled nginx. I'll hold
off rebuilding for now, maybe somebody here has some ideas?
E Frank Ball fra...@efball.com
--
To UNSUBSCRIBE, email
ed with new features.
--
Frank Ball fra...@efball.com
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121101181149.gb11...@kamajii.efball.com
I am out of the office until 27.06.2011.
Note: This is an automated response to your message "[SECURITY]
[DSA-2210-2] tiff security update" sent on 25/6/11 12:31:46.
This is the only notification you will receive while this person is away.
--
To UNSUBSCRIBE, email to debian-security-requ.
te of texlive right
now, and Norbert is busy as well.
I have added the information to embedded-code-copies, a diff (which also
includes some more TeXLive-related corrections) is attached.
Regards, Frank
--
Dr. Frank Küster
Debian Developer (TeXLive)
VCD Aschaffenburg-Miltenberg, ADFC Miltenber
f a
suggestion [1] in a similar bug report about that pidgin update. I also
CCed that other bug report in hope to get attention that way and to
document publicly that this has ben reported. Please let me know if I
should instead open another bug report.
thanks for your work on Debian, Frank
[1] h
to register on ML etc. with these
addresses on the one hand and setting these messages on the other side.
To avoid such things the first step needs to be done on user side e.g.
forcing them to create folders for lists and setting such rules only
folder wide. But I doubt this will be very su
On Fri, 16 Jan 2009 11:10:09 +1100
"Stephen Vaughan" wrote:
> returning 29/09/2008 ??
>
> When will people learn not to set auto replies
When other people understand, email is not a real time medium.
"Didn't you get my mail I've sent 2 minutes ago!
Hi Alexander,
Am Donnerstag, 4. September 2008 22:12:14 schrieb Alexander Golovin:
> Hi Frank!
>
> I've added "crypt /dev/hda6 none luks" string in /etc/crypttab
> file, what you had written, but unfartunately, I don't have the crypt
> file in /dev/mapper a
c used with linux).
I have used the debian installer to encrypt my partions and as far I
know, cryptsetup always uses luks to encrypt partitions on debian.
I suppose, that your line have to look like this line:
crypt /dev/hda6 none luks
Greetings
Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
emember, that I once wrote a script using
>python-apt to get this information, but the script is lost :~(
Maybe this snippet could help you as well.
awk '/^Package/ {
pkg=$2
}
/^Section.*(contrib|non-free)/ {
printf("%-20s - %-60s\n", $2, pkg)
}' /var/lib/dpkg/status | so
Hi,
is there some publically available list of packages which contain xpdf
code? I think I have found a new one:
, ipe-6.0pre28/debian/copyright
| Ipe uses [...], as well as some code
| from Xpdf by Derek B. Noonburg (www.foolabs.com/xpdf).
`
Regards, Frank
--
Frank Küster
Single
ypt under linux os. You will find
some howto´s here: http://www.tldp.org/HOWTO/HOWTO-INDEX/howtos.html
If you want encrypted drives or containers that work under linux and
windows try a look at treucrypt (www.truecrypt.org)
Bye
Frank
No virus found in this outgoing message.
Checked by AVG Free
Steve Langasek <[EMAIL PROTECTED]> wrote:
> On Wed, Mar 14, 2007 at 11:43:40AM +0100, Frank Küster wrote:
>> Moritz Muehlenhoff <[EMAIL PROTECTED]> wrote:
>
>> > For the upcoming stable distribution (etch) these problems have been
>> > fixed in version 1
s in etch,
but it doesn't seem proper to announce the availability in a DSA if it's
not yet true...
Regards, Frank
--
Dr. Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)
was not fixed in this version, but in
6.3.6-1. Since this is the version in etch, there's no practical
difference, but in case you keep some statistics...
Thanks for your work!
Frank
--
Dr. Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)
(Frank is asking how to revoke an 'apt-get upgrade', I'm pointing him
to debian-user-german.)
Frank Riedel <[EMAIL PROTECTED]>:
> gibt es die Möglichkeit ein apt-get upgrade rückgängig zu machen, also
> den Ursprungszustand vor dem upgrade wieder herzustellen?
>
Hallo,
viel gesucht, nichts gefunden :(
gibt es die Möglichkeit ein apt-get upgrade rückgängig zu machen, also
den Ursprungszustand vor dem upgrade wieder herzustellen?
Was sollte/muss ich vorher beachten, erledigen?
Tipps?
Gruß Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
advance.
--
Frank Van Damme
none
[EMAIL PROTECTED]
__
Yahoo! Mail - PC Magazine Editors' Choice 2005
http://mail.yahoo.com
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
, and was surprised that
aptitude had nothing to upgrade. I had to read the mail again,
scrolling along the list of woody packages, to learn that there is
nothing but woody packages.
Thanks for considering,
Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
pgpdzRSPNxVcZ.pgp
Description: PGP signature
e people, but also some
clever DSA-generation script.
Regards, Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
OSAF spirit anyways.
I'm in Los Angeles, California, US.
Well, you would need to go to Mountain View ;), there you can find the
Mozilla Foundation.
Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
too hurried in the end.
Frank
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFC7hqJaT2V74kAr9URAoEPAJ9njED6owfPx7hx/jPcPdX/kLthiwCgoK2C
9H3W+xiYjG6mxtN7ya6RfPU=
=2Rrj
-END PGP SIGNATURE-
--
To UNSUBSCRIB
which will display you the diff or check out the new version from
the CVS mirror (cvs-mirror.mozilla.org) for example by doing "cvs -j1.11
- -j1.11.44 -r AVIARY_1_0_1_20050124_BRANCH
mozilla/js/src/xpconnect/src/XPCDispObject.cpp". You can get the version
numbers needed by clicking on the vers
Hubert Chan <[EMAIL PROTECTED]> wrote:
> On 2005-03-22 08:20:32 -0500 Frank Küster <[EMAIL PROTECTED]> wrote:
>
>> However, that doesn't invalidate the check.
>> The main point of CAN-2004-0206, as I understand it, is that the
>> upstream/original che
ooking at the available information.
Maybe I am dumb, but then probably other Debian maintainers are, too...
Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote:
> On Tue, Mar 22, 2005 at 02:01:37PM +0100, Frank Küster wrote:
>>
>> Thank you, I found it extremely diff
Hamish Moffatt <[EMAIL PROTECTED]> wrote:
> On Tue, Mar 22, 2005 at 11:57:01AM +0100, Frank Küster wrote:
>> Hamish Moffatt <[EMAIL PROTECTED]> wrote:
>> > I was tempted to revert all the security patches and apply upstream's
>> > versions, but
[restricting Cc to the lists]
Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote:
> On Tue, Mar 22, 2005 at 11:57:01AM +0100, Frank Küster wrote:
>>
>> Me neither. I find these CVE pages on mitre.org annyoing, giving no
>> real information, only meta-info
int.h).
>
> This name is reserved. It is undefined behaviour if you define it.
So what is the recommended way to do this correctly? And why is my
analysis wrong that INT_MAX is defined in limits.h?
Regards, Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
Hamish Moffatt <[EMAIL PROTECTED]> wrote:
> On Fri, Mar 18, 2005 at 09:38:14AM +0100, Hilmar Preusse wrote:
>> As thex extension to CAN-2004-0888 (CAN-2005-0206) came in after the
>> latest tetex-bin upload we can't have the fix in sarge. I'll file a
>> bu
ize >= INT_MAX/sizeof(XRefEntry)) {
| error(-1, "Invalid 'obj' parameters'");
| goto err1;
| }
|
| entries = (XRefEntry *)grealloc(entries, newSize * sizeof(XRefEntry));
| for (i = size; i < newSize; ++i) {
`
Regards, Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
[Seems I messed up the first attempt of this mail]
Frank Küster <[EMAIL PROTECTED]> wrote:
> Micah Anderson <[EMAIL PROTECTED]> wrote:
>
>> 7. Is our xpdf vulnerable to CAN-2005-0206[13]?
>
> This also needs to be checked for pdftex (in tetex-bin) and pdftoh
Frank Küster <[EMAIL PROTECTED]> wrote:
> Micah Anderson <[EMAIL PROTECTED]> wrote:
>
>> 7. Is our xpdf vulnerable to CAN-2005-0206[13]?
>
> This also needs to be checked for pdftex (in tetex-bin) and pdftohtml,
> and perhaps others that include xpdf code.
Can an
Micah Anderson <[EMAIL PROTECTED]> wrote:
> 7. Is our xpdf vulnerable to CAN-2005-0206[13]?
This also needs to be checked for pdftex (in tetex-bin) and pdftohtml,
and perhaps others that include xpdf code.
Regards, Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
U Emacs is affected,
at least it makes GNU Emacs (emacs21) users wonder whether their editor
is affected, too.
Regards, Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
the mentioned
> version.
This has been fixed now, using a patch-CAN-2004-0888 in debian/patches.
Regards, Frank
--
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer
dium
>
> Wenn looking into the code I found out that there were done no changes
> in the libs/xpdf code between 2.0.2-14.1 and 2.0.2-23 as mentioned in:
This is done in debian/patches/patch-src. However, this is only a
partial fix, the complete thing will come soon.
Regards, Frank
--
F
On Mon, Nov 01, 2004 at 11:02:21AM +, Steve Kemp wrote:
> On Fri, Oct 29, 2004 at 10:12:33PM +0200, Frank Lichtenheld wrote:
>
> > Perhaps someone with a little more experience in identifying security
> > problems should take a look, too. I CC'ed debian-security.
>
tags 278777 security
thanks
On Fri, Oct 29, 2004 at 09:46:00PM +0200, Thomas Wana wrote:
> Frank Lichtenheld wrote:
> >
> >But you too, since that was the wrong part ;) The LANG vuln is fixed in
> >the current package (the patch is in debian/patches and gets applied at
> &
Hi Matthias,
Matthias Kestenholz <[EMAIL PROTECTED]> wrote:
> On Thu, 2004-10-28 at 08:31 +0200, Frank Dietrich wrote:
> > can I get into some failures when I change the owner for all
> > /dev/vcsa devices to an other user the root, e.g. vcsa?
> >
> > Background:
Hi there,
can I get into some failures when I change the owner for all /dev/vcsa
devices to an other user the root, e.g. vcsa?
Background: The /usr/lib/mc/cons.saver needs read support for this
device. I will change owner for this file to vcsa and setuid it.
Frank
--
To UNSUBSCRIBE, email to
I'm sorry to say that, but version 1.5.27-3woody3 seems to still have at least
one common bug with the previous "woody2" version: We use it for our sendmail
server. Along with "woody2" *and* "woody3", sendmail is not able to detect the
available SASL-based AUTH mechanisms. So I had to downgrade aga
the freeze and then ask the RMs to hint it through.
Gruesse,
--
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/
signature.asc
Description: Digital signature
arge and prepare a new, rewritten version.
Thanks,
--
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/
arge and prepare a new, rewritten version.
Thanks,
--
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Fri, Sep 05, 2003 at 04:26:55PM +0100, Thomas Horsten wrote:
> Hi Frank,
>
> On Fri, 5 Sep 2003, Frank Lichtenheld wrote:
>
> > char path[256];
> > sprintf( path, "some string/%s", packagename);
> >
> > There are no further checks as I can see.
On Fri, Sep 05, 2003 at 04:26:55PM +0100, Thomas Horsten wrote:
> Hi Frank,
>
> On Fri, 5 Sep 2003, Frank Lichtenheld wrote:
>
> > char path[256];
> > sprintf( path, "some string/%s", packagename);
> >
> > There are no further checks as I can see.
tring/%s", packagename);
There are no further checks as I can see. I'm not very experienced in C
programming and don't know much about the details of exploiting buffer
overflows or the like...
Is such code (away from the fact that it can easily lead to segfaults) a
security problem
tring/%s", packagename);
There are no further checks as I can see. I'm not very experienced in C
programming and don't know much about the details of exploiting buffer
overflows or the like...
Is such code (away from the fact that it can easily lead to segfaults) a
security problem
In article <[EMAIL PROTECTED]>, Tib wrote:
Hi,
>> and snort (IDS).
> Would this interfere with portsentry?
No. Portsentry waits for SYNs to come on ports you configure. Snort
just listens and analyses traffic.
Bye,
Frank
--
Frank Becker <[EMAIL PROTECTED]> | May t
sr/share/doc/kernel-source-2.4.20/changelog.gz
Bye,
Frank
--
Frank Becker <[EMAIL PROTECTED]> | May the source be with GNU...
GnuPG: 0xADC29ECD | F01B 5E9C 1D09 981B 5B40 50D3 C80F 7459 ADC2 9ECD
If privacy is outlawed, only outlaws will have privacy. P. Zimmermann
tely it was changed to be included in the
"http_port" option.
HTH
Frank
tely it was changed to be included in the
"http_port" option.
HTH
Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
binary 00010111
55 = binary 00110111
Since those two do not follow the scheme of [same bit]^N[0]^M and [same
bit]^N[1]^M, you could not use the short form, you would have to block
most of them individually.
HTH
Frank
binary 00010111
55 = binary 00110111
Since those two do not follow the scheme of [same bit]^N[0]^M and [same
bit]^N[1]^M, you could not use the short form, you would have to block
most of them individually.
HTH
Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ning is that if you install a package including a daemon
you are assumed to want the daemon to run. update-rc.d allows you to
modify that assumption.
Frank
--
Home Page: http://thingy.apana.org.au/~fjc/>
Not the Scientology Home Page: http://xenu.apana.org.au/ntshp/>
Here is where i am now - if i dont run iptables it all works - for some
reason closing all the ports and setting the deafult policy to deny dosent
seam to work (if i then after set smtp, pop3 ssh to allow). But setting
the default policy to allow and then useing nmap to detect what ports that
ar
>
>>Here is where i am now - if i dont run iptables it all works - for some
>>reason closing all the ports and setting the deafult policy to deny dosent
>>seam to work (if i then after set smtp, pop3 ssh to allow). But setting
>>the default policy to allow and then useing nmap to detect what port
!).
>
> But I still have a dream to develop this authentication client clone before I
> graduate and give freedom to other Linux users.
>
> Does anybody has an idea where to start?
Is this what you want?
http://opensource.zeroknowledge.com/
--
Frank aka Myth
The unix learning
>
> But I still have a dream to develop this authentication client clone before I
>graduate and give freedom to other Linux users.
>
> Does anybody has an idea where to start?
Is this what you want?
http://opensource.zeroknowledge.com/
--
Frank aka Myth
The unix learning cu
Michel Verdier wrote:
>Is there major differences between Logcheck and logsurfer ?
[EMAIL PROTECTED]:~$ apt-cache show logsurfer
W: Unable to locate package logsurfer
Logcheck is at least packaged for Debian.
Frank
Michel Verdier wrote:
>Is there major differences between Logcheck and logsurfer ?
fjc@wossname:~$ apt-cache show logsurfer
W: Unable to locate package logsurfer
Logcheck is at least packaged for Debian.
Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "uns
lps spot problems and security violations in your logfiles
automatically and will send the results to you in e-mail. This program is
free to use at any site. Please read the disclaimer before you use any of
this software.
installed-size: 196
Frank
lps spot problems and security violations in your logfiles
automatically and will send the results to you in e-mail. This program is
free to use at any site. Please read the disclaimer before you use any of
this software.
installed-size: 196
Frank
--
To UNSUBSCRIBE, email to [EMAIL PROTECT
73 matches
Mail list logo