But you can't trust ld.so and all those shared libraries ... sure you
may link all your tools fully static, even then they rely on syscalls
and devices, which may also not trustworthy due to the possibly
compromised kernel.
On 02/08/2012 06:46 PM, Fernando Mercês wrote:
Reading memory after t
Hy,
I have the same file on my woody box.
Don't worry about it:
1.
f-prot /usr/bin/ssh-copy-id
Virus scanning report - 15. January 2004 21:26
F-PROT 3.12d
SIGN.DEF created 9. January 2004
SIGN2.DEF created 9. January 2004
MACRO.DEF created 12. January 2004
Search: /usr/
Hy,
I have the same file on my woody box.
Don't worry about it:
1.
f-prot /usr/bin/ssh-copy-id
Virus scanning report - 15. January 2004 21:26
F-PROT 3.12d
SIGN.DEF created 9. January 2004
SIGN2.DEF created 9. January 2004
MACRO.DEF created 12. January 2004
Search: /usr/bin
Hy,
bridging is not routing! A bridge forwards frames at leyer 2, a router
forwards ip packets at leyer 3.
However iptables is a 3rd leyer firewall, therefore bridged traffic is
not affected by any iptables rule!
Francisco Oliveira wrote:
hi
I have compiled kernel 2.4.22 for bridge and ipt
Hy,
bridging is not routing! A bridge forwards frames at leyer 2, a router
forwards ip packets at leyer 3.
However iptables is a 3rd leyer firewall, therefore bridged traffic is
not affected by any iptables rule!
Francisco Oliveira wrote:
hi
I have compiled kernel 2.4.22 for bridge and iptabl
Hy Michelle,
Your problem seems to be offtopic here. All the same we have noticed
that some e-mail sent from tudelf.nl to iit.uni-miskolc.hu was lost.
According to our MTA logs the messages was never tried to deliver to us,
so it seems the flaw is at tudelft.nl. Two professors at Delft was ver
Hy Michelle,
Your problem seems to be offtopic here. All the same we have noticed
that some e-mail sent from tudelf.nl to iit.uni-miskolc.hu was lost.
According to our MTA logs the messages was never tried to deliver to us,
so it seems the flaw is at tudelft.nl. Two professors at Delft was very
Hy,
just follow the steps described in /usr/share/sendmail/examples/amavis
download the lates sources and it works. I've installed it a few weeks
ago and it is running well. I'm using it with f-prot, but You can config
it for any antivir software You want.
Regards,
Tibor Repa
Hy!
What is /bin/ping6 ??? Is it normal that /bin/ping and /bin/ping6 has setuid
to root?
regards,
Tibor Repasi
Hy!
What is /bin/ping6 ??? Is it normal that /bin/ping and /bin/ping6 has setuid
to root?
regards,
Tibor Repasi
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
This box is hosted in a hosting center, I thing there aren't any cats or other
animals.
It is a possibility that somebody droped his coat or something else to the
keyboard, but a
more important question is, why crashes the system so that it needed a hw reset
to restart?
I don't find any other
This box is hosted in a hosting center, I thing there aren't any cats or other
animals.
It is a possibility that somebody droped his coat or something else to the keyboard,
but a
more important question is, why crashes the system so that it needed a hw reset to
restart?
I don't find any other
Hi there,
I've some strange lines in my auth.log :
Jan 5 19:45:57 panda PAM_unix[500]: bad username [ ]
Jan 5 19:46:00 panda login[500]: FAILED LOGIN (1) on `tty1' FOR `UNKNOWN',
User not known to the underlying authentication module
Jan 5 19:46:05 panda PAM_unix[500]: bad username [ ]
Jan
Hi there,
I've some strange lines in my auth.log :
Jan 5 19:45:57 panda PAM_unix[500]: bad username [ ]
Jan 5 19:46:00 panda login[500]: FAILED LOGIN (1) on `tty1' FOR `UNKNOWN',
User not known to the underlying authentication module
Jan 5 19:46:05 panda PAM_unix[500]: bad username [ ]
Ja
14 matches
Mail list logo