ed, keep in mind that this is a small persentage of the spam we
are actually seeing..
also, it's nice to run the mail through bogofilter, which gives me quite
accurate readings on how effective different spamassassin filters are ;)
Sami
--
-< Sami Haahtinen >-
ed, keep in mind that this is a small persentage of the spam we
are actually seeing..
also, it's nice to run the mail through bogofilter, which gives me quite
accurate readings on how effective different spamassassin filters are ;)
Sami
--
-< Sami Haahtinen >-
es pam_login_attribute with pam_filter and searches in base)
- bind as the user
(uses the dn received with the previous search and the password
given to pam)
That is an over simplified version how things work. Also, usually you
only need to set the 'host
es pam_login_attribute with pam_filter and searches in base)
- bind as the user
(uses the dn received with the previous search and the password
given to pam)
That is an over simplified version how things work. Also, usually you
only need to set the 'host
onnect, maybe it is different with your version of ssh.
try either:
ssh [EMAIL PROTECTED]
or:
ssh -l myusername xxx.xxx.xxx.xxx
it might be something else, or it might be this..
Sami
--
-< Sami Haahtinen >-
-[ Notify immediately
familiar', Useless Use of
-awards from usenet =)
Sami
--
-< Sami Haahtinen >-
-[ Is it still a bug, if we have learned to live with it? ]-
-< 2209 3C53 D0FB 041C F7B1 F908 A9B6 F730 B83D 761C >-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
familiar', Useless Use of
-awards from usenet =)
Sami
--
-< Sami Haahtinen >-
-[ Is it still a bug, if we have learned to live with it? ]-
-< 2209 3C53 D0FB 041C F7B1 F908 A9B6 F730 B83D 761C >-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
others =)
anyways this discussion is going outside the scope of the thread, the
point being, use LDAP, it's re-usable.. you can build bridges to NIS
from ldap, you can use it as your global addressbook. to put it simply,
LDAP+TLS a good solution for the user distribution. =)
Sami
--
others =)
anyways this discussion is going outside the scope of the thread, the
point being, use LDAP, it's re-usable.. you can build bridges to NIS
from ldap, you can use it as your global addressbook. to put it simply,
LDAP+TLS a good solution for the user distribution. =)
Sami
--
our userbase, unlike libpam-ldap,
where you are not forced to allow userpassword read access to the
database. The cracker just needs to hack this machine, read the password
from config and voila, ur nt3w0rk has been 0wn3d!
Sami
--
-< Sami Haahtinen >-
-[ Is it still a b
our userbase, unlike libpam-ldap,
where you are not forced to allow userpassword read access to the
database. The cracker just needs to hack this machine, read the password
from config and voila, ur nt3w0rk has been 0wn3d!
Sami
--
-< Sami Haahtinen >-
-[ Is it stil
messages).
> Obviously, mutt/mutt and kmail/kmail messages are working perfectly.
have you tried pressing ESC-P (thats capital P) in mutt, it will decode
inline PGP messages.
Sami
--
-< Sami Haahtinen >-
-[ Is it still a bug, if we have learned to live with
messages).
> Obviously, mutt/mutt and kmail/kmail messages are working perfectly.
have you tried pressing ESC-P (thats capital P) in mutt, it will decode
inline PGP messages.
Sami
--
-< Sami Haahtinen >-
-[ Is it still a bug, if we have learned to live
On Sun, May 27, 2001 at 09:31:46AM -0700, Eric N. Valor wrote:
>
> I also like "lsof | grep ":[port#]"".
or, lsof -i :812 to do it without hassle.
--
-< Sami Haahtinen >-
-< 2209 3C53 D0FB 041C F7B1 F908 A9B6 F730 B83D 761C >-
On Sun, May 27, 2001 at 09:31:46AM -0700, Eric N. Valor wrote:
>
> I also like "lsof | grep ":[port#]"".
or, lsof -i :812 to do it without hassle.
--
-< Sami Haahtinen >-
-< 2209 3C53 D0FB 041C F7B1 F908 A9B6 F730
c to move and you'll just fine..
i personally like the ssh solution more:
ssh -L 5901:remotehost:5900 remoteGW
and then connect to local machine and server 1. Although you should set a
compression method if you use this, by default it's raw and it's slw.
--
c to move and you'll just fine..
i personally like the ssh solution more:
ssh -L 5901:remotehost:5900 remoteGW
and then connect to local machine and server 1. Although you should set a
compression method if you use this, by default it's raw and it's slw.
--
ew bios or flashing the current one =)
try checking if you have some software that adjusts your time.
--
-< Sami Haahtinen >-
-< 2209 3C53 D0FB 041C F7B1 F908 A9B6 F730 B83D 761C >-
| 'If you haven't backed up your files recently
ew bios or flashing the current one =)
try checking if you have some software that adjusts your time.
--
-< Sami Haahtinen >-
-< 2209 3C53 D0FB 041C F7B1 F908 A9B6 F730 B83D 761C >-
| 'If you haven't backed up your files recently
On Wed, Mar 14, 2001 at 07:16:21PM +0100, Pshemol wrote:
> Is there any other way to get your mails? I have to fetch about a 20 mailis
> per day, Is the debian-security on any news server? like
> debian.security.annonce ?
> thx pshemol
i was informed last time that i asked that all debian lists sh
On Wed, Mar 14, 2001 at 07:16:21PM +0100, Pshemol wrote:
> Is there any other way to get your mails? I have to fetch about a 20 mailis
> per day, Is the debian-security on any news server? like
> debian.security.annonce ?
> thx pshemol
i was informed last time that i asked that all debian lists s
try falselogin, it acts as shell for the user, (what it really does it shows
that the user can't login and dies) thats what i use for mail only accounts.
ofcourse you need to add falselogin to list of valid shells.
On Tue, Mar 13, 2001 at 10:51:00AM -0600, Kenneth Pronovici wrote:
> I have a situ
try falselogin, it acts as shell for the user, (what it really does it shows
that the user can't login and dies) thats what i use for mail only accounts.
ofcourse you need to add falselogin to list of valid shells.
On Tue, Mar 13, 2001 at 10:51:00AM -0600, Kenneth Pronovici wrote:
> I have a sit
23 matches
Mail list logo