Re: [SECURITY] [DSA 4078-1] linux security update

2018-01-11 Thread Frank Nord
Hello, Am 2018-01-11 um 12:29 schrieb Frank Nord: > Hello, > > > Am 2018-01-11 um 11:58 schrieb Henrique de Moraes Holschuh: >> On Thu, 11 Jan 2018, Frank Nord wrote: >>> I've problems applying this on my mac mini (Intel(R) Core(TM) 2 Duo CPU, >>> P755

Re: [SECURITY] [DSA 4078-1] linux security update

2018-01-11 Thread Frank Nord
Hello, Am 2018-01-11 um 11:58 schrieb Henrique de Moraes Holschuh: > On Thu, 11 Jan 2018, Frank Nord wrote: >> I've problems applying this on my mac mini (Intel(R) Core(TM) 2 Duo CPU, >> P7550 @ 2.6 GHz). >> 3.20170707.1~deb9u1 from stretch. What's the recommende

Re: [SECURITY] [DSA 4078-1] linux security update

2018-01-10 Thread Frank Nord
he recommended microcode-version for this kernel? Thanks, Frank -- For those of you without hope, we have rooms with color TV, cable and air conditioning

Re: [SECURITY] [DSA 3654-1] quagga security update

2016-08-26 Thread Frank de Bruijn
I always mail them the unsubscribe link privately, usually with a comment about their actions (very or mildly sarcastic, depending on my mood). Also, keep in mind the list they want to unsubscribe from is the security annouce list (debian-security-announce), not the security list (debian-security) Regards, Frank

SCAP security guide and tools BoF (automatic verification of security configuration)

2015-08-18 Thread Frank Lin PIAT
BoF at 14:00 in room Madrid ! Short: Debian doesn't provide a security guide in SCAP format, let's fix that. Long: SCAP guides are really nice for users because it's really easy "audit" (evaluate) one or many systems. Also, SCAP security guides can contain multiple profiles (Server, Desktop, Vir

SCAP security guide and tools BoF (automatic verification of security configuration)

2015-08-18 Thread Frank Lin PIAT
BoF at 14:00 in room Madrid ! Short: Debian doesn't provide a security guide in SCAP format, let's fix that. Long: SCAP guides are really nice for users because it's really easy "audit" (evaluate) one or many systems. Also, SCAP security guides can contain multiple profiles (Server, Desktop, Vir

Re: finding a process that bind a spcific port

2014-01-22 Thread Frank
:* 0 5950269 - > Try as root. Best Frank

Re: debian wheezy i386 nginx iframe rootkit

2013-09-12 Thread E Frank Ball III
> Maybe build the server as a VM and take snapshots as you go. Or > rebuild it on a different machine, with the old server reboot from a > live CD before each major step and use the tools on the live CD to > take the snapshots. > > -- > Joel Reese This is a KVM vir

Re: debian wheezy i386 nginx iframe rootkit

2013-09-11 Thread E Frank Ball III
On Thu, Sep 12, 2013 at 09:13:46AM +0900, Joel Rees wrote: > On Thu, Sep 12, 2013 at 7:48 AM, E Frank Ball III wrote: > > Last fall there was a debian 64-bit / nginx rootkit going around, > > now I've been hit with what sounds similar but on 32-bit wheezy. > > >

debian wheezy i386 nginx iframe rootkit

2013-09-11 Thread E Frank Ball III
stalled nginx and tried the nginx-light from debian wheezy but it made no difference. This machine was built on July 19th. I've uninstalled nginx. I'll hold off rebuilding for now, maybe somebody here has some ideas? E Frank Ball fra...@efball.com -- To UNSUBSCRIBE, email

Re: idea: switch default MTA from exim4 to postfix (wheezy+1)

2012-11-01 Thread E Frank Ball III
ed with new features. -- Frank Ball fra...@efball.com -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20121101181149.gb11...@kamajii.efball.com

AUTO: Frank Rebold/Germany/IBM is out of the office. (returning 27.06.2011)

2011-06-25 Thread Frank Rebold
I am out of the office until 27.06.2011. Note: This is an automated response to your message "[SECURITY] [DSA-2210-2] tiff security update" sent on 25/6/11 12:31:46. This is the only notification you will receive while this person is away. -- To UNSUBSCRIBE, email to debian-security-requ.

Embedded ICU copy in texlive-bin (was: [SECURITY] [DSA 1889-1] New icu packages correct multibyte sequence parsing)

2009-09-17 Thread Frank Küster
te of texlive right now, and Norbert is busy as well. I have added the information to embedded-code-copies, a diff (which also includes some more TeXLive-related corrections) is attached. Regards, Frank -- Dr. Frank Küster Debian Developer (TeXLive) VCD Aschaffenburg-Miltenberg, ADFC Miltenber

unmet dependency after pidgin update

2009-08-21 Thread Frank Loeffler
f a suggestion [1] in a similar bug report about that pidgin update. I also CCed that other bug report in hope to get attention that way and to document publicly that this has ben reported. Please let me know if I should instead open another bug report. thanks for your work on Debian, Frank [1] h

Re: Out of office replies

2009-01-17 Thread Frank Lanitz
to register on ML etc. with these addresses on the one hand and setting these messages on the other side. To avoid such things the first step needs to be done on user side e.g. forcing them to create folders for lists and setting such rules only folder wide. But I doubt this will be very su

Out of office replies

2009-01-16 Thread Frank Lanitz
On Fri, 16 Jan 2009 11:10:09 +1100 "Stephen Vaughan" wrote: > returning 29/09/2008 ?? > > When will people learn not to set auto replies When other people understand, email is not a real time medium. "Didn't you get my mail I've sent 2 minutes ago!

Re: encrypted partition question

2008-09-04 Thread Frank Störzer
Hi Alexander, Am Donnerstag, 4. September 2008 22:12:14 schrieb Alexander Golovin: > Hi Frank! > > I've added "crypt /dev/hda6 none luks" string in /etc/crypttab > file, what you had written, but unfartunately, I don't have the crypt > file in /dev/mapper a

Re: encrypted partition question

2008-09-04 Thread Frank Störzer
c used with linux). I have used the debian installer to encrypt my partions and as far I know, cryptsetup always uses luks to encrypt partitions on debian. I suppose, that your line have to look like this line: crypt /dev/hda6 none luks Greetings Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Find installed contrib and non-free packages

2008-06-12 Thread Frank Dietrich
emember, that I once wrote a script using >python-apt to get this information, but the script is lost :~( Maybe this snippet could help you as well. awk '/^Package/ { pkg=$2 } /^Section.*(contrib|non-free)/ { printf("%-20s - %-60s\n", $2, pkg) }' /var/lib/dpkg/status | so

Embedded xpdf code: new incarnation found

2007-07-16 Thread Frank Küster
Hi, is there some publically available list of packages which contain xpdf code? I think I have found a new one: , ipe-6.0pre28/debian/copyright | Ipe uses [...], as well as some code | from Xpdf by Derek B. Noonburg (www.foolabs.com/xpdf). ` Regards, Frank -- Frank Küster Single

RE: Encrypting drive

2007-07-01 Thread Frank Draeger
ypt under linux os. You will find some howto´s here: http://www.tldp.org/HOWTO/HOWTO-INDEX/howtos.html If you want encrypted drives or containers that work under linux and windows try a look at treucrypt (www.truecrypt.org) Bye Frank No virus found in this outgoing message. Checked by AVG Free

Re: [SECURITY] [DSA 1266-1] New gnupg packages fix signature forgery

2007-03-14 Thread Frank Küster
Steve Langasek <[EMAIL PROTECTED]> wrote: > On Wed, Mar 14, 2007 at 11:43:40AM +0100, Frank Küster wrote: >> Moritz Muehlenhoff <[EMAIL PROTECTED]> wrote: > >> > For the upcoming stable distribution (etch) these problems have been >> > fixed in version 1

Re: [SECURITY] [DSA 1266-1] New gnupg packages fix signature forgery

2007-03-14 Thread Frank Küster
s in etch, but it doesn't seem proper to announce the availability in a DSA if it's not yet true... Regards, Frank -- Dr. Frank Küster Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich Debian Developer (teTeX/TeXLive)

Re: [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure

2007-02-14 Thread Frank Küster
was not fixed in this version, but in 6.3.6-1. Since this is the version in etch, there's no practical difference, but in case you keep some statistics... Thanks for your work! Frank -- Dr. Frank Küster Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich Debian Developer (teTeX/TeXLive)

Re: apt-get upgrade rückgängig machen

2006-05-04 Thread Frank Terbeck
(Frank is asking how to revoke an 'apt-get upgrade', I'm pointing him to debian-user-german.) Frank Riedel <[EMAIL PROTECTED]>: > gibt es die Möglichkeit ein apt-get upgrade rückgängig zu machen, also > den Ursprungszustand vor dem upgrade wieder herzustellen? >

apt-get upgrade rückgängig machen

2006-05-03 Thread Frank Riedel
Hallo, viel gesucht, nichts gefunden :( gibt es die Möglichkeit ein apt-get upgrade rückgängig zu machen, also den Ursprungszustand vor dem upgrade wieder herzustellen? Was sollte/muss ich vorher beachten, erledigen? Tipps? Gruß Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

recent kernel vulnerabilities - debian specific?

2006-03-29 Thread Frank Van Damme
advance. -- Frank Van Damme

unsubscribe

2005-11-08 Thread Frank Allaby
none [EMAIL PROTECTED] __ Yahoo! Mail - PC Magazine Editors' Choice 2005 http://mail.yahoo.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: [SECURITY] [DSA 875-1] New OpenSSL packages fix cryptographic weakness

2005-10-27 Thread Frank Küster
, and was surprised that aptitude had nothing to upgrade. I had to read the mail again, scrolling along the list of woody packages, to learn that there is nothing but woody packages. Thanks for considering, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer pgpdzRSPNxVcZ.pgp Description: PGP signature

Re: [SECURITY] [DSA 797-2] Updated zsync i386 packages fix build error

2005-09-29 Thread Frank Küster
e people, but also some clever DSA-generation script. Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer

Re: On Mozilla-* updates

2005-08-02 Thread Frank Wein
OSAF spirit anyways. I'm in Los Angeles, California, US. Well, you would need to go to Mountain View ;), there you can find the Mozilla Foundation. Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: On Mozilla-* updates

2005-08-01 Thread Frank Wein
too hurried in the end. Frank -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFC7hqJaT2V74kAr9URAoEPAJ9njED6owfPx7hx/jPcPdX/kLthiwCgoK2C 9H3W+xiYjG6mxtN7ya6RfPU= =2Rrj -END PGP SIGNATURE- -- To UNSUBSCRIB

Re: On Mozilla-* updates

2005-08-01 Thread Frank Wein
which will display you the diff or check out the new version from the CVS mirror (cvs-mirror.mozilla.org) for example by doing "cvs -j1.11 - -j1.11.44 -r AVIARY_1_0_1_20050124_BRANCH mozilla/js/src/xpconnect/src/XPCDispObject.cpp". You can get the version numbers needed by clicking on the vers

Re: xpdf vulnerability?

2005-03-23 Thread Frank Küster
Hubert Chan <[EMAIL PROTECTED]> wrote: > On 2005-03-22 08:20:32 -0500 Frank Küster <[EMAIL PROTECTED]> wrote: > >> However, that doesn't invalidate the check. >> The main point of CAN-2004-0206, as I understand it, is that the >> upstream/original che

Re: xpdf vulnerability?

2005-03-23 Thread Frank Küster
ooking at the available information. Maybe I am dumb, but then probably other Debian maintainers are, too... Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote: > On Tue, Mar 22, 2005 at 02:01:37PM +0100, Frank Küster wrote: >> >> Thank you, I found it extremely diff

Re: xpdf vulnerability?

2005-03-22 Thread Frank Küster
Hamish Moffatt <[EMAIL PROTECTED]> wrote: > On Tue, Mar 22, 2005 at 11:57:01AM +0100, Frank Küster wrote: >> Hamish Moffatt <[EMAIL PROTECTED]> wrote: >> > I was tempted to revert all the security patches and apply upstream's >> > versions, but

Re: xpdf vulnerability?

2005-03-22 Thread Frank Küster
[restricting Cc to the lists] Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote: > On Tue, Mar 22, 2005 at 11:57:01AM +0100, Frank Küster wrote: >> >> Me neither. I find these CVE pages on mitre.org annyoing, giving no >> real information, only meta-info

Re: xpdf vulnerability?

2005-03-22 Thread Frank Küster
int.h). > > This name is reserved. It is undefined behaviour if you define it. So what is the recommended way to do this correctly? And why is my analysis wrong that INT_MAX is defined in limits.h? Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer

Re: xpdf vulnerability?

2005-03-22 Thread Frank Küster
Hamish Moffatt <[EMAIL PROTECTED]> wrote: > On Fri, Mar 18, 2005 at 09:38:14AM +0100, Hilmar Preusse wrote: >> As thex extension to CAN-2004-0888 (CAN-2005-0206) came in after the >> latest tetex-bin upload we can't have the fix in sarge. I'll file a >> bu

Re: xpdf vulnerability?

2005-03-18 Thread Frank Küster
ize >= INT_MAX/sizeof(XRefEntry)) { | error(-1, "Invalid 'obj' parameters'"); | goto err1; | } | | entries = (XRefEntry *)grealloc(entries, newSize * sizeof(XRefEntry)); | for (i = size; i < newSize; ++i) { ` Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer

Re: xpdf vulnerability?

2005-03-16 Thread Frank Küster
[Seems I messed up the first attempt of this mail] Frank Küster <[EMAIL PROTECTED]> wrote: > Micah Anderson <[EMAIL PROTECTED]> wrote: > >> 7. Is our xpdf vulnerable to CAN-2005-0206[13]? > > This also needs to be checked for pdftex (in tetex-bin) and pdftoh

Re: xpdf vulnerability?

2005-03-16 Thread Frank Küster
Frank Küster <[EMAIL PROTECTED]> wrote: > Micah Anderson <[EMAIL PROTECTED]> wrote: > >> 7. Is our xpdf vulnerable to CAN-2005-0206[13]? > > This also needs to be checked for pdftex (in tetex-bin) and pdftohtml, > and perhaps others that include xpdf code. Can an

xpdf vulnerability? (was: Bits from the Testing Security team)

2005-03-16 Thread Frank Küster
Micah Anderson <[EMAIL PROTECTED]> wrote: > 7. Is our xpdf vulnerable to CAN-2005-0206[13]? This also needs to be checked for pdftex (in tetex-bin) and pdftohtml, and perhaps others that include xpdf code. Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer

Re: [SECURITY] [DSA 671-1] New xemacs21 packages fix arbitrary code execution

2005-02-08 Thread Frank Küster
U Emacs is affected, at least it makes GNU Emacs (emacs21) users wonder whether their editor is affected, too. Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer

Re: [SECURITY] [DSA 599-1] New tetex-bin packages fix arbitrary code execution

2004-11-30 Thread Frank Küster
the mentioned > version. This has been fixed now, using a patch-CAN-2004-0888 in debian/patches. Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer

Re: [SECURITY] [DSA 599-1] New tetex-bin packages fix arbitrary code execution

2004-11-29 Thread Frank Küster
dium > > Wenn looking into the code I found out that there were done no changes > in the libs/xpdf code between 2.0.2-14.1 and 2.0.2-23 as mentioned in: This is done in debian/patches/patch-src. However, this is only a partial fix, the complete thing will come soon. Regards, Frank -- F

Re: Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-11-01 Thread Frank Lichtenheld
On Mon, Nov 01, 2004 at 11:02:21AM +, Steve Kemp wrote: > On Fri, Oct 29, 2004 at 10:12:33PM +0200, Frank Lichtenheld wrote: > > > Perhaps someone with a little more experience in identifying security > > problems should take a look, too. I CC'ed debian-security. >

Re: Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Frank Lichtenheld
tags 278777 security thanks On Fri, Oct 29, 2004 at 09:46:00PM +0200, Thomas Wana wrote: > Frank Lichtenheld wrote: > > > >But you too, since that was the wrong part ;) The LANG vuln is fixed in > >the current package (the patch is in debian/patches and gets applied at > &

Re: owner for /dev/vcsa*

2004-10-28 Thread Frank Dietrich
Hi Matthias, Matthias Kestenholz <[EMAIL PROTECTED]> wrote: > On Thu, 2004-10-28 at 08:31 +0200, Frank Dietrich wrote: > > can I get into some failures when I change the owner for all > > /dev/vcsa devices to an other user the root, e.g. vcsa? > > > > Background:

owner for /dev/vcsa*

2004-10-27 Thread Frank Dietrich
Hi there, can I get into some failures when I change the owner for all /dev/vcsa devices to an other user the root, e.g. vcsa? Background: The /usr/lib/mc/cons.saver needs read support for this device. I will change owner for this file to vcsa and setuid it. Frank -- To UNSUBSCRIBE, email to

Re: [DSA 563-2] New cyrus-sasl packages really fix arbitrary code execution

2004-10-13 Thread Frank Strauß
I'm sorry to say that, but version 1.5.27-3woody3 seems to still have at least one common bug with the previous "woody2" version: We use it for our sendmail server. Along with "woody2" *and* "woody3", sendmail is not able to detect the available SASL-based AUTH mechanisms. So I had to downgrade aga

Re: wget for sarge update

2004-10-02 Thread Frank Lichtenheld
the freeze and then ask the RMs to hint it through. Gruesse, -- Frank Lichtenheld <[EMAIL PROTECTED]> www: http://www.djpig.de/ signature.asc Description: Digital signature

Re: Possible buffer overflows = security problem?

2003-09-06 Thread Frank Lichtenheld
arge and prepare a new, rewritten version. Thanks, -- Frank Lichtenheld <[EMAIL PROTECTED]> www: http://www.djpig.de/

Re: Possible buffer overflows = security problem?

2003-09-06 Thread Frank Lichtenheld
arge and prepare a new, rewritten version. Thanks, -- Frank Lichtenheld <[EMAIL PROTECTED]> www: http://www.djpig.de/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Possible buffer overflows = security problem?

2003-09-05 Thread Frank Lichtenheld
On Fri, Sep 05, 2003 at 04:26:55PM +0100, Thomas Horsten wrote: > Hi Frank, > > On Fri, 5 Sep 2003, Frank Lichtenheld wrote: > > > char path[256]; > > sprintf( path, "some string/%s", packagename); > > > > There are no further checks as I can see.

Re: Possible buffer overflows = security problem?

2003-09-05 Thread Frank Lichtenheld
On Fri, Sep 05, 2003 at 04:26:55PM +0100, Thomas Horsten wrote: > Hi Frank, > > On Fri, 5 Sep 2003, Frank Lichtenheld wrote: > > > char path[256]; > > sprintf( path, "some string/%s", packagename); > > > > There are no further checks as I can see.

Possible buffer overflows = security problem?

2003-09-05 Thread Frank Lichtenheld
tring/%s", packagename); There are no further checks as I can see. I'm not very experienced in C programming and don't know much about the details of exploiting buffer overflows or the like... Is such code (away from the fact that it can easily lead to segfaults) a security problem

Possible buffer overflows = security problem?

2003-09-05 Thread Frank Lichtenheld
tring/%s", packagename); There are no further checks as I can see. I'm not very experienced in C programming and don't know much about the details of exploiting buffer overflows or the like... Is such code (away from the fact that it can easily lead to segfaults) a security problem

Re: Recommended security management packages

2003-05-21 Thread Frank Becker
In article <[EMAIL PROTECTED]>, Tib wrote: Hi, >> and snort (IDS). > Would this interfere with portsentry? No. Portsentry waits for SYNs to come on ports you configure. Snort just listens and analyses traffic. Bye, Frank -- Frank Becker <[EMAIL PROTECTED]> | May t

Re: Kernel 2.4.20 and patches to be save?

2003-05-19 Thread Frank Becker
sr/share/doc/kernel-source-2.4.20/changelog.gz Bye, Frank -- Frank Becker <[EMAIL PROTECTED]> | May the source be with GNU... GnuPG: 0xADC29ECD | F01B 5E9C 1D09 981B 5B40 50D3 C80F 7459 ADC2 9ECD If privacy is outlawed, only outlaws will have privacy. P. Zimmermann

Re: bind squid to interface

2003-03-26 Thread Frank Peters
tely it was changed to be included in the "http_port" option. HTH Frank

Re: bind squid to interface

2003-03-26 Thread Frank Peters
tely it was changed to be included in the "http_port" option. HTH Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Blocking sub-range of IP addresses

2003-03-11 Thread Frank Peters
binary 00010111 55 = binary 00110111 Since those two do not follow the scheme of [same bit]^N[0]^M and [same bit]^N[1]^M, you could not use the short form, you would have to block most of them individually. HTH Frank

Re: Blocking sub-range of IP addresses

2003-03-11 Thread Frank Peters
binary 00010111 55 = binary 00110111 Since those two do not follow the scheme of [same bit]^N[0]^M and [same bit]^N[1]^M, you could not use the short form, you would have to block most of them individually. HTH Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Some more port closing questions

2002-07-31 Thread Frank Copeland
ning is that if you install a package including a daemon you are assumed to want the daemon to run. update-rc.d allows you to modify that assumption. Frank -- Home Page: http://thingy.apana.org.au/~fjc/> Not the Scientology Home Page: http://xenu.apana.org.au/ntshp/>

Re: Iptables config

2002-04-12 Thread Albrecht Frank
Here is where i am now - if i dont run iptables it all works - for some reason closing all the ports and setting the deafult policy to deny dosent seam to work (if i then after set smtp, pop3 ssh to allow). But setting the default policy to allow and then useing nmap to detect what ports that ar

Re: Iptables config

2002-04-12 Thread Albrecht Frank
> >>Here is where i am now - if i dont run iptables it all works - for some >>reason closing all the ports and setting the deafult policy to deny dosent >>seam to work (if i then after set smtp, pop3 ssh to allow). But setting >>the default policy to allow and then useing nmap to detect what port

Re: I want to try something for freedom.

2000-11-01 Thread Frank Belew
!). > > But I still have a dream to develop this authentication client clone before I > graduate and give freedom to other Linux users. > > Does anybody has an idea where to start? Is this what you want? http://opensource.zeroknowledge.com/ -- Frank aka Myth The unix learning

Re: I want to try something for freedom.

2000-11-01 Thread Frank Belew
> > But I still have a dream to develop this authentication client clone before I >graduate and give freedom to other Linux users. > > Does anybody has an idea where to start? Is this what you want? http://opensource.zeroknowledge.com/ -- Frank aka Myth The unix learning cu

Re: Logging atempts

2000-07-22 Thread Frank Copeland
Michel Verdier wrote: >Is there major differences between Logcheck and logsurfer ? [EMAIL PROTECTED]:~$ apt-cache show logsurfer W: Unable to locate package logsurfer Logcheck is at least packaged for Debian. Frank

Re: Logging atempts

2000-07-22 Thread Frank Copeland
Michel Verdier wrote: >Is there major differences between Logcheck and logsurfer ? fjc@wossname:~$ apt-cache show logsurfer W: Unable to locate package logsurfer Logcheck is at least packaged for Debian. Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "uns

Re: Logging atempts

2000-07-21 Thread Frank Copeland
lps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail. This program is free to use at any site. Please read the disclaimer before you use any of this software. installed-size: 196 Frank

Re: Logging atempts

2000-07-21 Thread Frank Copeland
lps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail. This program is free to use at any site. Please read the disclaimer before you use any of this software. installed-size: 196 Frank -- To UNSUBSCRIBE, email to [EMAIL PROTECT