> On Fri, Nov 15, 2002 at 16:16:35 -0500, Phillip Hofmeister wrote:
>
>
> :0:
> * ^Subject: unsubscribe
> * ^X-Mailing-List: <[EMAIL PROTECTED]>
> /var/mail/probably-uninteresting
>
Just think, you'd be missing out on this *very* interesting thread!
Leonard Leblanc
> On Fri, Nov 15, 2002 at 16:16:35 -0500, Phillip Hofmeister wrote:
>
>
> :0:
> * ^Subject: unsubscribe
> * ^X-Mailing-List:
> /var/mail/probably-uninteresting
>
Just think, you'd be missing out on this *very* interesting thread!
Leonard Leblanc
--
To
You can also view the Iana well known port list at the following link.
http://www.iana.org/assignments/port-numbers
--
Leonard Leblanc
Vice President - Technology
www.emergeknowledge.com
- Original Message -
From: "Osvaldo Mundim Junior" <[EMAIL PROTECTED]>
To:
Sent: T
You can also view the Iana well known port list at the following link.
http://www.iana.org/assignments/port-numbers
--
Leonard Leblanc
Vice President - Technology
www.emergeknowledge.com
- Original Message -
From: "Osvaldo Mundim Junior" <[EMAIL PROTECTED]>
To: <[EMA
e are
multiple constants defined which point to the template files using the
$ENV{DOCUMENT_ROOT} environment variable.
Does this present any more/less of a security risk then just hardcoding the
entire path into the script?
Thanks in advance.
--
Leonard Leblanc
Vice President - Techn
e are
multiple constants defined which point to the template files using the
$ENV{DOCUMENT_ROOT} environment variable.
Does this present any more/less of a security risk then just hardcoding the
entire path into the script?
Thanks in advance.
--
Leonard Leblanc
Vice President - Techn
What's the best way to go about writing an Acceptable Use Policy for
networks?
My searches for information have come up empty so if anyone has any links,
they would be greatly appreciated.
Thanks in advance,
Leonard Leblanc
Vice-president - Technology
www.emergeknowledge.com
What's the best way to go about writing an Acceptable Use Policy for
networks?
My searches for information have come up empty so if anyone has any links,
they would be greatly appreciated.
Thanks in advance,
Leonard Leblanc
Vice-president - Technology
www.emergeknowledge.com
--
Check out the firewall building tool at
http://www.linux-firewall-tools.com/linux/firewall/index.html
Leonard Leblanc
Webmaster / Intranet Administrator
www.emergeknowledge.com
- Original Message -
From: "Eric LaMunyon" <[EMAIL PROTECTED]>
To:
Sent: Monday, June 0
Check out the firewall building tool at
http://www.linux-firewall-tools.com/linux/firewall/index.html
Leonard Leblanc
Webmaster / Intranet Administrator
www.emergeknowledge.com
- Original Message -
From: "Eric LaMunyon" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
&& net_ratelimit())
printk("Suspect short first fragment.\n");
dump_packet(ip,rif,NULL,NULL,0,0,0,0);
}
return FW_BLOCK;
}
Hope this helps (and it's right ;))
-- gg sullivan
Leonard Leblanc
- Original Mess
&& net_ratelimit())
printk("Suspect short first fragment.\n");
dump_packet(ip,rif,NULL,NULL,0,0,0,0);
}
return FW_BLOCK;
}
Hope this helps (and it's right ;))
-- gg sullivan
Leonard Leblanc
- Origina
12 matches
Mail list logo