I just got a bunch of these in my firewall logs. The box routes real
ip's (no-masq). Does anyone recogize these types packets? Is it just a
fragmented portscan or something more dangerous? The x address is from
outside and the y is inside...
Feb 4 12:54:33 cone kernel: Suspect short first fra
I just got a bunch of these in my firewall logs. The box routes real
ip's (no-masq). Does anyone recogize these types packets? Is it just a
fragmented portscan or something more dangerous? The x address is from
outside and the y is inside...
Feb 4 12:54:33 cone kernel: Suspect short first fr
hi all,
I've been using the loopback crypto stuff for a while and I'm looking
for a secure way of doing this from my user account instead of having to
su to call losetup.
Does anyone have suggestions / experience with doing this?
I see that you can't just run /sbin/losetup from non-root:
$ losetu
hi all,
I've been using the loopback crypto stuff for a while and I'm looking
for a secure way of doing this from my user account instead of having to
su to call losetup.
Does anyone have suggestions / experience with doing this?
I see that you can't just run /sbin/losetup from non-root:
$ loset
4 matches
Mail list logo