-
I want to write not to Mozilla, as they dont answer any question right
for users !!
Debianers have to solve this never ending shit!
To Mozilla:
If this BUG-HOLES (some developers "forget" ha ha.. ) will not end in
12/2017
and you sell your data sniffing apps again in 2018 ,
t
As a user I have run into this with X11 files myself. I use rsnapshot to backup
the root partition to a location on /home mounted on its own much larger
partition before I do upgrades. A while back when xorg was crashing a lot I had
to restore from this backup. I routinely use "debsums -ca" afte
https://igurublog.wordpress.com/2014/04/08/julian-assange-debian-is-owned-by-the-nsa/
Am 12.07.2016 um 04:06 schrieb ater...@yahoo.com:
> Hi,
>
> isn't it amazing & SAD that currently DEBIAN USERs CANNOT OBTAIN ANY
> hash/integrity CODE/file, or signature/sign code/file for CD-DVD ISO file, o
hi
this is a very good plan.
my idea:
- make a new "info table" for all packages
"privacy data used by app "
- what exact meta data
- who gets the data ; if third who?
- how long ist the data saved and in which country
--> write to all developers an email ,and ask them to fill out the
t
window stays frozen with no refresh...
After cd../.. they are still wrong.
Crazy error, or?
who can fix it ?
regards
Weber
Hi
i only can imagine, that mozilla or developers are under control
of "zero day" companies or other services .
if this is so, i hope to get soon a better browser
with less code and better security.
This bug desaster will never stop ! sec. holes are a feature not a
mistake" / bug.
I think in
Package:iceweasel
version : 38.3.0 esr
Linux debian 3.2.0-4-686-pae #1 SMP Debian 3.2.68-1+deb7u3 i686 GNU/Linux
dear developers
after my upgrade today , i startet firefox in su terminal
i got these errors see below -->:
after second start ,the error was different.
has someone forgotten aga
gle ist
on debian nr 1.
?
regards
weber
Am 01.04.2015 um 18:10 schrieb Salvatore Bonaccorso:
> -
> Debian Security Advisory DSA-3211-1 secur...@debian.org
> http://www.debian.org/security/
Ich werde ab 06.02.2006 nicht im Büro sein. Ich kehre zurück am
11.02.2006.
Ich werde Ihre Nachricht nach meiner Rückkehr beantworten.
Hi
I finished the discussed mod_perl module and published it on CPAN.
It's name is Apache::AutoLogin
Thanks again for the input from everyone.
Cheers
Marcel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Richard Atterer wrote:
On Thu, Aug 12, 2004 at 01:56:53PM +0200, Marcel Weber wrote:
No, it doesn't mean that. Current browsers will cache the password, AFAIK
until the end of the session by default, and forever if you enable the
option "Remember this password" or similar.
I k
Hi all
Well, I figured out the problem, why my module hanged... It was a
programming fault... Well in that case, I do not need any md5 checksum
at all...
Problem solved
Thanks again for all precious input I got
Cheers
Marcel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsub
Hi
Richard Atterer wrote:
My solution is a mod_perl module, that catches every request before the
authentication module and supplies the credentials automatically. This
works with ANY apache authentication modules using basic authentication.
This strikes me as a weird solution. What's wrong with
Hi
Although this question is a bit off topic, I think that this list is the
best audience to answer it.
For the company I'm working I had to write an apache module, that the
users do not have to enter their username password everytime they log
onto the intranet web server.
My solution is a mod
Rudolf Lohner wrote:
[snip]
file hello.dyn
hello.dyn: ELF 32-bit LSB executable, Intel 80386, version 1, dynamically linked (uses shared libs), not stripped
file hello.stat
hello.stat: ELF 32-bit LSB executable, Intel 80386, version 1, statically linked, not stripped
[snip]
Greetings, R
Rudolf Lohner wrote:
[snip]
file hello.dyn
hello.dyn: ELF 32-bit LSB executable, Intel 80386, version 1, dynamically linked (uses shared libs), not stripped
file hello.stat
hello.stat: ELF 32-bit LSB executable, Intel 80386, version 1, statically linked, not stripped
[snip]
Greetings, Rudolf
Bill Marcum wrote:
On Mon, Jan 05, 2004 at 02:44:05PM +0100, Marcel Weber wrote:
What exactly did chkrootkit say about those files? Were they writable
by non-root users, did they have setuid permission, or what?
They had the following access rights:
They had the usual access rights 751
Bill Marcum wrote:
On Mon, Jan 05, 2004 at 02:44:05PM +0100, Marcel Weber wrote:
What exactly did chkrootkit say about those files? Were they writable
by non-root users, did they have setuid permission, or what?
They had the following access rights:
They had the usual access rights 751
Emmanuel Lacour wrote:
It's a gzip file of the perl modules available from CPAN...
Try "zcat your_file"
Thanks! I counter checked and indeed I upgraded perl to 5.8.0 on the
same date these "suspicious" directories have. In this case everything
should be fine. The env and netstat were fa
Emmanuel Lacour wrote:
It's a gzip file of the perl modules available from CPAN...
Try "zcat your_file"
Thanks! I counter checked and indeed I upgraded perl to 5.8.0 on the
same date these "suspicious" directories have. In this case everything
should be fine. The env and netstat were false
Hi
It isn't exactly a debian question, but nevertheless I think this is the
appropriate place to post this.
I ran chkrootkit 0.43 on my LFS box. This system is a mail and web
server. Chkrootkit complained about two files: /bin/netstat and
/usr/bin/env. Both of these files were quite big (215
Hi
It isn't exactly a debian question, but nevertheless I think this is the
appropriate place to post this.
I ran chkrootkit 0.43 on my LFS box. This system is a mail and web
server. Chkrootkit complained about two files: /bin/netstat and
/usr/bin/env. Both of these files were quite big (215 k
Noah L. Meyerhans wrote:
This method is especially effective in the case where the bayesian
classifier only looks at the first MIME attachment, because the second
is then free to contain whatever spam tokens they want to put in it.
IIRC, this is how most bayesian filters behave.
noah
I got s
Noah L. Meyerhans wrote:
This method is especially effective in the case where the bayesian
classifier only looks at the first MIME attachment, because the second
is then free to contain whatever spam tokens they want to put in it.
IIRC, this is how most bayesian filters behave.
noah
I got such a
Russell Coker wrote:
Signing a key you don't know is not a good idea, it's easy to accidentally
upload a key...
There is a gpg option "lsign" which can be used for this, it's like a regular
signature but it can never be exported.
Right: But if he is sure he trusts this key he should si
s. keeling wrote:
gpg: Signature made Sun Dec 21 17:14:28 2003 MST using DSA key ID 946886AE
gpg: Good signature from "Trey Sizemore <[EMAIL PROTECTED]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owne
Russell Coker wrote:
Signing a key you don't know is not a good idea, it's easy to accidentally
upload a key...
There is a gpg option "lsign" which can be used for this, it's like a regular
signature but it can never be exported.
Right: But if he is sure he trusts this key he should sign it
s. keeling wrote:
gpg: Signature made Sun Dec 21 17:14:28 2003 MST using DSA key ID 946886AE
gpg: Good signature from "Trey Sizemore <[EMAIL PROTECTED]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Marcel Weber wrote:
In the actual case of the hacked servers it was not just a bug, but a
security problem (CAN-2003-0961) without an existing exploit.
I want to correct myself: CAN-2003-0961 dates from the 26th November
2003, as far I could see on the CVE.org site. This means that unless
Marcel Weber wrote:
In the actual case of the hacked servers it was not just a bug, but a
security problem (CAN-2003-0961) without an existing exploit.
I want to correct myself: CAN-2003-0961 dates from the 26th November
2003, as far I could see on the CVE.org site. This means that unless
Michael Stone wrote:
The issue isn't whether the bug is fixed (it already was) the issue is
whther its publicized as a security fix with a big notice that everybody
must upgrade now. Have you looked at the diffs between kernel revisions?
That's a whole lotta fixed bugs. There's a human factor i
Michael Stone wrote:
The issue isn't whether the bug is fixed (it already was) the issue is
whther its publicized as a security fix with a big notice that everybody
must upgrade now. Have you looked at the diffs between kernel revisions?
That's a whole lotta fixed bugs. There's a human factor in t
J.H.M. Dassen (Ray) wrote:
On Tue, Dec 02, 2003 at 13:35:51 -0600, Micah Anderson wrote:
Previous kernel security holes have been treated with a lot more
"transparancy" and communication than this one was, I am disappointed that
this one wasn't.
I fail to see how this was treated with less t
J.H.M. Dassen (Ray) wrote:
On Tue, Dec 02, 2003 at 13:35:51 -0600, Micah Anderson wrote:
Previous kernel security holes have been treated with a lot more
"transparancy" and communication than this one was, I am disappointed that
this one wasn't.
I fail to see how this was treated with less trans
Linux wrote:
OK, now I got really worried
Because I'm a bit lazy I've put the apt-get update & upgrade into the crontab
of one of my machines.
Now is the question, how do I know if those installed packages are hacked or
not ? Some suggestions and help please ?
I think they are not. They ar
Linux wrote:
OK, now I got really worried
Because I'm a bit lazy I've put the apt-get update & upgrade into the crontab
of one of my machines.
Now is the question, how do I know if those installed packages are hacked or
not ? Some suggestions and help please ?
I think they are not. T
Jim Hubbard wrote:
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
Well wait for the findings of the debian security t
Jim Hubbard wrote:
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
Well wait for the findings of the debian security team.
Tarjei Huse wrote:
This might help:
http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt
On Mon, 2003-08-11 at 13:37, Marcel Weber wrote:
Another good thing is the postfix ([EMAIL PROTECTED]) mailing
list. It is quite a high traffic mailing list, but there are very
expirienced people reading
Tarjei Huse wrote:
This might help:
http://jimsun.linxnet.com/misc/postfix-anti-UCE.txt
On Mon, 2003-08-11 at 13:37, Marcel Weber wrote:
Another good thing is the postfix ([EMAIL PROTECTED]) mailing
list. It is quite a high traffic mailing list, but there are very
expirienced people
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am Montag, 11.08.03, um 12:59 Uhr (Europe/Zurich) schrieb Tomasz
Papszun:
If you want to prevent them from using non existing sender addresses
from your domain, you can do it by creating a file (lookup table) for
postmap(1), containing all allow
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am Montag, 11.08.03, um 12:59 Uhr (Europe/Zurich) schrieb Tomasz
Papszun:
If you want to prevent them from using non existing sender addresses
from your domain, you can do it by creating a file (lookup table) for
postmap(1), containing all allowed add
Harry Brueckner wrote:
On the other hand - what will you do if your server gets a hardware
problem and you have to replace/expand the system with a new NIC, add
another CPU, exchange anything in the box.
So after a simple hardware problem all your own data is lost as well,
even if the harddriv
Harry Brueckner wrote:
Hey there,
Making the encryption key hardware dependent would make it a hard job to
decrypt the harddrive in another computer...
On the other hand - what will you do if your server gets a hardware
problem and you have to replace/expand the system with a new NIC, add
ano
Luis Gomez - InfoEmergencias wrote:
We're already looking at that (btw, IIRC loop-aes is included into the
cryptoapi of kerneli.org). The problem is what Dariush points: if your
machine has the pass to mount the filesystem, someone can put the HD in
another machine, remove the root password, pu
Harry Brueckner wrote:
On the other hand - what will you do if your server gets a hardware
problem and you have to replace/expand the system with a new NIC, add
another CPU, exchange anything in the box.
So after a simple hardware problem all your own data is lost as well,
even if the harddri
Harry Brueckner wrote:
Hey there,
Making the encryption key hardware dependent would make it a hard job to
decrypt the harddrive in another computer...
On the other hand - what will you do if your server gets a hardware
problem and you have to replace/expand the system with a new NIC, add
Luis Gomez - InfoEmergencias wrote:
We're already looking at that (btw, IIRC loop-aes is included into the
cryptoapi of kerneli.org). The problem is what Dariush points: if your
machine has the pass to mount the filesystem, someone can put the HD in
another machine, remove the root password,
Jayson Vantuyl wrote:
This has been a hit on about seven different machines with vastly
different configurations (some missing everything but SSH) and all
firewalled down to the minimum.
I did not reread the whole thread, so sorry if I'm asking silly
questions, but perhaps it's not a security is
Jayson Vantuyl wrote:
This has been a hit on about seven different machines with vastly
different configurations (some missing everything but SSH) and all
firewalled down to the minimum.
I did not reread the whole thread, so sorry if I'm asking silly
questions, but perhaps it's not a securi
Raphael SurcouF wrote:
On Fri, 16 May 2003 01:21:44 +0200, Marcel Weber wrote:
I do this with vpnd. The server has a dyndns domain name. On the client
side, you can put in the fully qualified domain name of the server
instead of the ip address. Works quite reliable. Of course from time to
Philipe Gaspar wrote:
>
>
> What VPN between two dynamic ip's?! How can i do that?
>
>
>> Thing
Hi
I do this with vpnd. The server has a dyndns domain name. On the client
side, you can put in the fully qualified domain name of the server
instead of the ip address. Works quite reliable. Of c
Rudolph van Graan wrote:
Hi all,
Probably a stupid question, but one I don't know the answer for. Is
there any simple way of telling apt or dpkg to *only* download and
install security patches instead of other changes to a release [thinking
testing or unstable here]. For example on one of my "s
David Ramsden wrote:
Hi,
Noticed on vil.mcafee.com that a proof of concept exploit for Snort to
exploit the vuln. found in v1.8 through to 1.9.1.
Packet Storm Security have this proof of concept on their site (local
exploit at the moment).
It uses a call-back technique to spawn a shell on the
Hobbs, Richard wrote:
Hello,
Where is the 2.4.20 kernel in apt??
Hi
You do not miss anything (or I would miss the same thing...). The 2.4.20
kernel is part of sid and not woody. For a 2.4.20 kernel grab sid's
kernel source or the plain vanilla kernel from kernel.org.
Regards
Marcel
Hi
Isn't this a product advertisement? I'm quoting the debian mailing list
policies:
Debian mailing list advertising policy
This policy is intended to fight mailing-list "spamming".
The Debian mailing lists accept commercial advertising for payment. The
fee for advertisments is a donat
Hi
Isn't this a product advertisement? I'm quoting the debian mailing list
policies:
Debian mailing list advertising policy
This policy is intended to fight mailing-list "spamming".
The Debian mailing lists accept commercial advertising for payment. The
fee for advertisments is a donation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Listas schrieb:
Which of your network interfaces is internal / external?
| What this logs means?
|
| IPT FORWARD packet died: IN=eth0 OUT=eth1 SRC=externalIP DST=192.168.0.1
| LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=33110 DF PROTO=TCP SPT=33000 DPT=80
|
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Listas schrieb:
Which of your network interfaces is internal / external?
| What this logs means?
|
| IPT FORWARD packet died: IN=eth0 OUT=eth1 SRC=externalIP DST=192.168.0.1
| LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=33110 DF PROTO=TCP SPT=33000 DPT=80
|
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
I need some advice for this decision:
We are about to replace our existing watchguard firebox II. There has
been a decision for a hardware device which I cannot alter. But with
all the VPN interop problems we had with the watchguard products I
am
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
I need some advice for this decision:
We are about to replace our existing watchguard firebox II. There has
been a decision for a hardware device which I cannot alter. But with
all the VPN interop problems we had with the watchguard products I
am
Miles Beck wrote:
Is there an updated OPENSSL package for Debian greater than OpenSSL-0.9.6c?
~/Net_SSLeay.pm-1.21$ perl Makefile.PL
Checking for OpenSSL-0.9.6g or newer...
You have OpenSSL-0.9.6c installed in /usr
openssl-0.9.6d and earlier versions have security flaws, see advisory at
www.open
Miles Beck wrote:
Is there an updated OPENSSL package for Debian greater than OpenSSL-0.9.6c?
~/Net_SSLeay.pm-1.21$ perl Makefile.PL
Checking for OpenSSL-0.9.6g or newer...
You have OpenSSL-0.9.6c installed in /usr
openssl-0.9.6d and earlier versions have security flaws, see advisory at
www.ope
mysql tables. I
would really recommend using sql tables for authentication. Like this
the pop3 user base is seperated from the unix user base (imagine someone
sniffing a unix password and you forgot to disable login for the pop3
users...)
Marcel
- --
Marcel Weber - [EMAIL PROTECTED]
PGP/GP
mysql tables. I
would really recommend using sql tables for authentication. Like this
the pop3 user base is seperated from the unix user base (imagine someone
sniffing a unix password and you forgot to disable login for the pop3
users...)
Marcel
- --
Marcel Weber - [EMAIL PROTECTED]
PGP/GP
well as the tool itself.
What about considering outdated security tools as hazardous to the
system's security? Taking this point of view, why not distributing
updated versions via debian-security?
Marcel
- --
Marcel Weber - [EMAIL PROTECTED]
PGP/GPG Key: http://www.ncpro.com/GPG/mmweb
well as the tool itself.
What about considering outdated security tools as hazardous to the
system's security? Taking this point of view, why not distributing
updated versions via debian-security?
Marcel
- --
Marcel Weber - [EMAIL PROTECTED]
PGP/GPG Key: http://www.ncpro.com/GPG/mmweb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hanasaki JiJi schrieb:
| 1.8.4-Beta1 Build 91
|
| It also seems to be dying without any reports to syslog
|
This also happens to my setup. I'm restarting snort every night now.
Marcel
- --
Marcel Weber - [EMAIL PROTECTED]
PGP/GPG Key:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hanasaki JiJi schrieb:
| 1.8.4-Beta1 Build 91
|
| It also seems to be dying without any reports to syslog
|
This also happens to my setup. I'm restarting snort every night now.
Marcel
- --
Marcel Weber - [EMAIL PROTECTED]
PGP/GPG Key:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
I've got a special problem: I would like to use a debian box as a
firewall with an interface for the internal, external network and one
for the dmz.
The problem is this: The database server that has to be accessed from
the webservers in the dmz i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
I've got a special problem: I would like to use a debian box as a
firewall with an interface for the internal, external network and one
for the dmz.
The problem is this: The database server that has to be accessed from
the webservers in the dmz is
e good for. If by the way
somebody knows it already I would appreciate.
Regards
Marcel
Arne Rusek wrote:
| On Mon, Nov 18, 2002 at 11:54:01PM +0100, Marcel Weber wrote:
|
|>Hi
|>
|>Today I had a whole bunch of large ICMP packages on the company's LAN
|>(about 20).
|>Interesting is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
Thanks very much. The probably hacked windows 2000 servers have nothing to do
with
debian though. I first thought of a false snort alarm of the debian box I
am using as a nids.
Goosh... Windoze is evil though...
Marcel
[EMAIL PROTECTED] wrote
Hi
Today I had a whole bunch of large ICMP packages on the company's LAN (about
20).
Interesting is, that they came mostly from the Windows 2000 Servers. I
discovered the first of these packages 2 or 3 weeks ago.
These packets are long (2090 Bytes) and not filled with nulls, but with
more or le
e good for. If by the way
somebody knows it already I would appreciate.
Regards
Marcel
Arne Rusek wrote:
| On Mon, Nov 18, 2002 at 11:54:01PM +0100, Marcel Weber wrote:
|
|>Hi
|>
|>Today I had a whole bunch of large ICMP packages on the company's LAN
|>(about 20).
|>Interesting is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
Thanks very much. The probably hacked windows 2000 servers have nothing to do with
debian though. I first thought of a false snort alarm of the debian box I
am using as a nids.
Goosh... Windoze is evil though...
Marcel
[EMAIL PROTECTED] wrote:
Hi
Today I had a whole bunch of large ICMP packages on the company's LAN (about 20).
Interesting is, that they came mostly from the Windows 2000 Servers. I
discovered the first of these packages 2 or 3 weeks ago.
These packets are long (2090 Bytes) and not filled with nulls, but with
more or less
uot;. Trouble? Contact
[EMAIL PROTECTED]
|>>
|>
|>--
|>Jonathan Crockett
|>Network Engineer
|>Midcontinent Communications
|>
|>
|>--
|>To UNSUBSCRIBE, email to [EMAIL PROTECTED]
|>with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
|>
|
|
-
Contact
[EMAIL PROTECTED]
|>>
|>
|>--
|>Jonathan Crockett
|>Network Engineer
|>Midcontinent Communications
|>
|>
|>--
|>To UNSUBSCRIBE, email to [EMAIL PROTECTED]
|>with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
|>
|
|
- --
Mar
I think he meant France with the limitation of 56 bit encription.
Marcel
PGP / GPG Key:http://www.ncpro.com/GPG/mmweber-at-ncpro-com.asc
> -Ursprungliche Nachricht-
> Von: Javier Fernandez-Sanguino Pena [mailto:[EMAIL PROTECTED]
> Gesendet: Donnerstag, 10. Okt
I think he meant France with the limitation of 56 bit encription.
Marcel
PGP / GPG Key:http://www.ncpro.com/GPG/mmweber-at-ncpro-com.asc
> -Ursprungliche Nachricht-
> Von: Javier Fernandez-Sanguino Pena [mailto:[EMAIL PROTECTED]]
> Gesendet: Donnerstag, 10. O
ncpro.com/GPG/mmweber-at-ncpro-com.asc
> -Ursprüngliche Nachricht-
> Von: DL [mailto:[EMAIL PROTECTED]
> Gesendet: Sonntag, 6. Oktober 2002 01:45
> An: Marcel Weber
> Cc: debian-security@lists.debian.org
> Betreff: Re: Bizarre apache logs
>
>
>
> Looks lik
Hi
I had some bizarre 404 entries in my apache logs. They are very rare, but it
looks as they resulted from an attempted attack. Well say it was a rather
lame attack, but I wonder where the 404 and 400 came from. As the server is
configured, there should be only 403 answers, as the whole http part
ncpro.com/GPG/mmweber-at-ncpro-com.asc
> -Ursprüngliche Nachricht-
> Von: DL [mailto:[EMAIL PROTECTED]]
> Gesendet: Sonntag, 6. Oktober 2002 01:45
> An: Marcel Weber
> Cc: [EMAIL PROTECTED]
> Betreff: Re: Bizarre apache logs
>
>
>
> Looks like part of the Nimda
Hi
I had some bizarre 404 entries in my apache logs. They are very rare, but it
looks as they resulted from an attempted attack. Well say it was a rather
lame attack, but I wonder where the 404 and 400 came from. As the server is
configured, there should be only 403 answers, as the whole http par
You're right. Apparently he IS a lamer, at least his name is lamer style. I
remember those from my Amiga times... And further more they usually have a
bigger problem with their spelling...
Marcel
PGP / GPG Key:http://www.ncpro.com/GPG/mmweber-at-ncpro-com.asc
> -Urs
You're right. Apparently he IS a lamer, at least his name is lamer style. I
remember those from my Amiga times... And further more they usually have a
bigger problem with their spelling...
Marcel
PGP / GPG Key:http://www.ncpro.com/GPG/mmweber-at-ncpro-com.asc
> -Ur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi bloodkiller
When I take a look at the debian mailing list rules, I see that for
posting advertisments or spam to one of the lists you get charged US$
5000.-.
Seriously: It's a good sign for debian, when newbies start asking
questions in the m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi bloodkiller
When I take a look at the debian mailing list rules, I see that for
posting advertisments or spam to one of the lists you get charged US$
5000.-.
Seriously: It's a good sign for debian, when newbies start asking
questions in the ma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Something that would be totally legal would be to send an email to the
[EMAIL PROTECTED], in the hope, that they have such an email
address. Of course one has to pay attention, that this email address
does not get flooded, when thousands of the
ca
Hi
Phillip Hofmeister is right. This tool exists.
We used this at our companies network (a bigger one, some 100'000 users ;-).
All those Frontpage or I don't know what the hell they're using users with
iis and nimda on it, were difficult to track down. Of course we tried to
warn them before imple
Hi
First the one included in the samba howto:
http://www.tldp.org/HOWTO/SMB-HOWTO-9.html
This is a nice one if you're printing via cups:
http://rectory.pointclark.net/ccprintserver/
This one explains how to use SAMBA together with LPRng
http://web.mit.edu/source/third/lprng/doc/LPRng-HOWTO-5.
Also sprach "Stephen Gran" <[EMAIL PROTECTED]> am Tage Tue, 3 Sep 2002
20:47:02 -0400:
> Hello all,
>
> There are several questions I have at this point:
>
> I would like to add user accounts, so that exim and qpopper (or IMAP)
> accept and deliver mail for them, but not allow these users she
Sorry for not reading the first mail in it's full length. Yes, the release file
issue isn't resolved yet, as far as I know.
And sorry for posting to all these mailing lists, I did not check the mail
before sending, but just hit, reply to all. Posting a message to more than one
list is BAD BEHAV
Hi
As I remember we had this discussion already. My latest knowledge is, if you
install debsig-verify, debsigs and debian-keyring you get the feature
requested. As the dpkg used in woody checks if debsig-verify is installed and
if so checks the signatures of the packages you want to install. If
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
Does anybody know if there are any news concerning freeswan and
Watchguard Firebox 2 interoperability? Some time ago I read that the two
would not work together, as Watchguard does not use triple DES during
the negotiation phase. Is there a pa
It's rather something like, installation failed due to bad signature or so.
Actually it never happened to me.
Marcel
-Ursprüngliche Nachricht-
Von: Jussi Ekholm [mailto:[EMAIL PROTECTED]
Ok, thanks. Of course, GnuPG/PGP signature is a bit different than MD5
checksums, but thanks a lot
On Sat, 3 Aug 2002 11:47:19 +0300
"Jussi Ekholm" <[EMAIL PROTECTED]> wrote:
> You are most likely correct, but I'm just mapping my options here; are
> Debian packages md5summed regularily? If so, I have ``debsums'' package
> installed. Does this software check the MD5 checksum before the package
>
Hi
Perhaps I am the only one to have this problem. Today I tried to apt
upgrade one of my servers. But dselect insisted to deinstall j2sdk and
locales because the glibc_2.2.5-9.woody.4.deb would be missing. I had a
look at the ftp://security.debian.org/ server and it was missing indeed.
Loo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi there
Thanks! So to bring my questions to an end: In dpkg 1.9.21 the signature
checking feature for the .debs is compiled into the code AND active as
soon as debsig-verify is installed. I read the mentioned thread too, but
it was not clear to m
1 - 100 of 109 matches
Mail list logo