On 3/12/19 5:37 AM, Srinivas Rao wrote:
> Hi Debian team,
>
> could you please tell me , secure boot is available in Debian 9 stretch
> or not ?
It is not.
Doesn't apply to our systems.
Matthew Baxa
Cloud Engineer - Zillow
P 402-417-0421
M 785-213-3252
-Original Message-
From: Michael Gilbert [mailto:mgilb...@debian.org]
Sent: Friday, April 15, 2016 6:59 AM
To: debian-security-annou...@lists.debian.org
Subject: [SECURITY] [DSA 3
Created MOPS-2468
Matthew Baxa
System Administrator - Zillow
P 402-417-0421
M 785-213-3252
-Original Message-
From: Salvatore Bonaccorso [mailto:car...@debian.org]
Sent: Wednesday, January 13, 2016 4:14 PM
To: debian-security-annou...@lists.debian.org
Subject: [SECURITY] [DSA 3445-1
Perhaps in your haste, you missed something.
If I run netstat -anpe as a user I get this specific message and the PID
column is populated with only a "-" for all entries, just like you
showed.
I.E.
netstat -anpe |grep udp
(Not all processes could be identified, non-owned process info
will not b
I am glad some one asked if the browser is running on the server; I had
that thought too. The problem could be something in between the actual
client and the server. Additionally, this could be done without using
any "malicious software", like a rootkit. Legitimate software could be
configured to c
Hello
Thank you for starting this thread!!!
The command that you are referring to is (would be) a functional
equivalent to Red Hat's "rpm -v all" command. Reference -
I have looked into doing this in Debian and am very sad to see that
there is no equivalent command in Debian, further *disappoint
On Sat Jan 24 14:08, Josselin Mouette wrote:
> Le samedi 24 janvier 2009 à 10:05 +0000, Matthew Johnson a écrit :
> > Well, if they are using DBUS this should be fine. You cannot connect to
> > a session bus with a uid other than the one it is running as (including
> > root
(I have to admit that I didn't check it myself, since I
> haven't developed an application which uses gnome-keyring yet).
Well, if they are using DBUS this should be fine. You cannot connect to
a session bus with a uid other than the one it is running as (including
root)
Matt
--
Matthew Johnson
signature.asc
Description: Digital signature
which should. The longer list is rdepends of
libdbus-1-3, it will definitely not be anything not on this list.
Opinions?
Matt
--
Matthew Johnson
Masayuki Hatta (mhatta)
cups (U)
Moray Allan
gpe-bluetooth (U)
Michael Biebl
consolekit (U)
dhcdbd (U)
hal (U)
knetworkmanager
20. And many of the shots were alley-oop dunks and rim-rattling jams postseason
because of NCAA sanctions. In four seasons at Seton Hall, Amaker previous three games and
take it on the road with us.'' The Suns had won 24
- Original Message -
From: "Matthew Willso&
On Tue, May 23, 2006 at 03:44:04PM +0200, Christian Holler wrote:
> I'm currently setting up a bridge on Debian, which is meant to act as
> an invisible filter in our network which is otherwise directly exposed
> to the internet (every host directly reachable from the internet, no
> NAT or anything
On Wed, Dec 21, 2005 at 03:05:01PM +0100, Martin Schulze wrote:
> Kurt Fitzner discovered a buffer overflow in nbd, the network block
> device client and server that could potentially allow arbitrary cod on
> the NBD server.
Do penguins eat cod, or just herring? Personally, I consider this a maj
On Sun, Jul 10, 2005 at 12:28:15AM +0200, Christoph Haas wrote:
> Dear list...
>
> our package 'pdns' in Sarge has a serious bug which can be abused to run a
> DoS attack against a name server. My co-maintainer already mailed the
> security team but did not get a response yet.
>
> Currently we ar
On Tue, Jun 28, 2005 at 10:36:34AM +0200, Marek Olejniczak wrote:
> On Tue, 28 Jun 2005, martin f krafft wrote:
> >We are working to fix it. The last thing we need now are people
> >complaining and moaning.
>
> I'm working for many ISP providers. And now I have problems with security
> on this se
[MFT set to d-curiosa, as this is utterly off-topic for d-security]
On Wed, Mar 30, 2005 at 09:07:01PM +1000, David Pastern wrote:
> On Wed, 2005-03-30 at 20:34 +1000, Matthew Palmer wrote:
>
> > On Wed, Mar 30, 2005 at 07:02:55PM +1000, David Pastern wrote:
> > > Redhat/Fed
On Wed, Mar 30, 2005 at 07:02:55PM +1000, David Pastern wrote:
> Redhat/Fedora/Suse/Mandrake are just plain silliness. However - there
> is a big difference between a one year release cycle, and the fact that
> it's been nearly 3 years since the release of Woody. That's a huge
You're not the fir
On Mon, Feb 07, 2005 at 07:26:43PM +0100, Milan P. Stanic wrote:
> On Mon, Feb 07, 2005 at 06:25:19PM +1100, Matthew Palmer wrote:
> > Obviously you've never done this. Good luck finding someone who even knows
> > what TCP/IP is, let alone sufficient knowledge to be able to tr
On Sun, Feb 06, 2005 at 11:53:50PM -0800, Alvin Oga wrote:
>
> On Mon, 7 Feb 2005, Matthew Palmer wrote:
>
> > On Sun, Feb 06, 2005 at 10:52:50PM -0800, Alvin Oga wrote:
> > > it's best when you can call the fbi (on the phone) and say, they're
> > &g
On Sun, Feb 06, 2005 at 10:52:50PM -0800, Alvin Oga wrote:
> it's best when you can call the fbi (on the phone) and say, they're
> back, trace um "NOW"
Obviously you've never done this. Good luck finding someone who even knows
what TCP/IP is, let alone sufficient knowledge to be able to track a
On Tue, Dec 21, 2004 at 01:28:00PM +0100, martin f krafft wrote:
> Stop using PHP. Learn Zope and PostgreSQL.
Because, of course, neither of those ever have security vulnerabilities, and
if they did, their upstreams would naturally help us to backport security
fixes to 3 year old versions of the s
On Thu, Nov 25, 2004 at 10:34:48AM +0100, Martin Schulze wrote:
> For the stable distribution (woody) these problems have been fixed in
> version 1.5.19-9.2
>
> For the unstable distribution (sid) these problems have been fixed in
> version 2.1.17-1.
Uhm, cyrus-imapd in unstable is 1.5.19-20. cy
On Wed, Oct 06, 2004 at 12:22:47PM +0200, Jasper Filon wrote:
> I agree with you that maybe it would be better if the browser would
> interpret a authorisation request on a favicon.ico as a 404 (or 403)
> error, but on the other hand, the request for favicon isn't any different
> from a normal http
On Wed, Oct 06, 2004 at 11:43:21AM +0200, Jasper Filon wrote:
> I have a little issue with the favicon file. My www root is password
> protected. But i also have a /public directory, which can be accessed by
> everyone. However, when someone opens a picture in his webbrowser by
> opening "www.mydom
On Fri, Sep 24, 2004 at 11:24:54PM +0100, Dale Amon wrote:
> On Fri, Sep 24, 2004 at 04:15:09PM -0600, s. keeling wrote:
> > Is anyone still using telnet when there's ssh? Why? I wouldn't even
> > use it inside my own firewalled LAN. ssh is just better.
>
> Unfortuneately if you use Cisco gear
On Wed, Aug 25, 2004 at 10:01:25AM +0100, Dale Amon wrote:
> On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote:
> > Somewhat more seriously: are there generally any defining criteria for
> > something one would call a 'hash function', saying that it always must
> > map some larger input
On Wed, Aug 25, 2004 at 09:24:01AM -0400, Phillip Hofmeister wrote:
> On Tue, 24 Aug 2004 at 06:18:50PM -0400, Matthew Palmer wrote:
> > In the case of hashing algorithms, there's one 'key' involved -- the
> > plaintext -- and for password security, you
On Tue, Aug 24, 2004 at 09:11:34PM -0400, Michael Stone wrote:
> On Wed, Aug 25, 2004 at 12:39:57AM +0200, Rolf Kutz wrote:
> >This depends on how the attack really works. If
> >you just need to flip a few bits in a document it
> >might just look like typos (think crc32). If your
> >document is a t
On Wed, Aug 25, 2004 at 12:44:43AM +1000, Daniel Pittman wrote:
> Also, while there are issues with those hash algorithms, I don't think
> they are quite bad enough that there is a significant *immediate* risk
> to my systems; the cost of breaking in through the detected collisions
> is lower than
On Tue, Aug 24, 2004 at 12:20:24PM -0400, Phillip Hofmeister wrote:
> On Tue, 24 Aug 2004 at 10:50:38AM -0400, Daniel Pittman wrote:
> > Be aware that this sort of technique "multi-encryption" technique can
> > lead to significant exposures when applied to traditional crypto; it can
> > produce res
prefer, but this is a judgment call that sysadmins need to make based on
the needs of their users. Neither choice forces poor netiquette.
Matthew
r, but this is a judgment call that sysadmins need to make based on
the needs of their users. Neither choice forces poor netiquette.
Matthew
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
fact that he is reporting that kmail specifically doesn't like an
attached .asc does not suggest that the problem is with inline
signatures. IMHO, inline signatures should not be used ever as they are
liable to corruption unless the entire message + signature is encoded in
quoted-printable before sending.
Matthew
fact that he is reporting that kmail specifically doesn't like an
attached .asc does not suggest that the problem is with inline
signatures. IMHO, inline signatures should not be used ever as they are
liable to corruption unless the entire message + signature is encoded in
quoted-printabl
a folder instead so that I can debug.
Matthew Whitworth
s. keeling wrote:
FYI, procmail users: This appears to work fairly well so far; fwiw:
#
# inept mailing list (un)su[b]?scribe attempts, and "vacation" dorks.
#
:0 HB
* 1^0 ()(I will be out o
a folder instead so that I can debug.
Matthew Whitworth
s. keeling wrote:
FYI, procmail users: This appears to work fairly well so far; fwiw:
#
# inept mailing list (un)su[b]?scribe attempts, and "vacation" dorks.
#
:0 HB
* 1^0 ()(I will be out o
Hey, morons, don't drop people from the CC. Otherwise they'll never
know what you're saying.
On Fri, Oct 31, 2003 at 03:07:26PM +0100, Lupe Christoph wrote:
> Quoting Phillip Hofmeister <[EMAIL PROTECTED]>:
>
> > I believe your justification can be found:
>
> > http://bugs.debian.org/cgi-bin/b
On Fri, Oct 31, 2003 at 09:07:57PM +0900, Hideki Yamane wrote:
> I checked woody's apache source and I cannot find any patches
> for mod_alias.c in apache-1.3.26/debian/patches directory.
> So I guess debian's apache is effected by this vulnerability.
>
> Do I misunderstand this? Does apache
Hey, morons, don't drop people from the CC. Otherwise they'll never
know what you're saying.
On Fri, Oct 31, 2003 at 03:07:26PM +0100, Lupe Christoph wrote:
> Quoting Phillip Hofmeister <[EMAIL PROTECTED]>:
>
> > I believe your justification can be found:
>
> > http://bugs.debian.org/cgi-bin/b
On Fri, Oct 31, 2003 at 09:07:57PM +0900, Hideki Yamane wrote:
> I checked woody's apache source and I cannot find any patches
> for mod_alias.c in apache-1.3.26/debian/patches directory.
> So I guess debian's apache is effected by this vulnerability.
>
> Do I misunderstand this? Does apache
2:57:41.457929-07
(1 row)
The hardware clock is set to GMT and the OS is set to use the PST8PDT
time zone. I'm using the snort-pgsql 2.0.0 and postgresql 7.3.2
packages currently in the "testing" branch. Anyone ever seen anything
like this?
Thanks in advance,
Matthew
--
T
7 22:57:41.457929-07
(1 row)
The hardware clock is set to GMT and the OS is set to use the PST8PDT
time zone. I'm using the snort-pgsql 2.0.0 and postgresql 7.3.2
packages currently in the "testing" branch. Anyone ever seen anything
like this?
Thanks in advance,
Matthew
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:76747137 (73.1 MiB) TX bytes:0 (0.0 b)
Interrupt:10 Base address:0x8000
...
Thanks tons!
Matthew
Keegan Quinn wrote:
Hello Matthew,
On Wed, Jul 23, 2003 at 10:34:32PM
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:76747137 (73.1 MiB) TX bytes:0 (0.0 b)
Interrupt:10 Base address:0x8000
...
Thanks tons!
Matthew
Keegan Quinn wrote:
Hello Matthew,
On Wed, Jul 23, 2003 at 10:34:32PM -0700
to do this using the /etc/network/interfaces file and the
ifup/ifdown commands. If there is, I can't seem to get the syntax.
Thanks,
Matthew
to do this using the /etc/network/interfaces file and the
ifup/ifdown commands. If there is, I can't seem to get the syntax.
Thanks,
Matthew
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
, Matthew Grant wrote:
Hi There!
Sorry about making a racket, but I am posting this for the edification
of all, as there is a work around without breaking your server for this
one.
As you can read below, I have found that the patch on 2.4.x also BREAKS
kill() 2 when
ernel developers, please fix it
properly!
Thanks heaps,
Matthew Grant
On Thu, 2003-03-20 at 09:34, Matthew Grant wrote:
Dear All,
The patch also breaks kill(2) on a process with signal number 0 - This
is used by a lot of monitoring programs running as one user ID to make
s
, Matthew Grant wrote:
Hi There!
Sorry about making a racket, but I am posting this for the edification
of all, as there is a work around without breaking your server for this
one.
As you can read below, I have found that the patch on 2.4.x also BREAKS
kill() 2 when
ernel developers, please fix it
properly!
Thanks heaps,
Matthew Grant
On Thu, 2003-03-20 at 09:34, Matthew Grant wrote:
Dear All,
The patch also breaks kill(2) on a process with signal number 0 - This
is used by a lot of monitoring programs running as one user ID to make
s
On Thu, Feb 13, 2003 at 12:02:22PM -0500, John wrote:
> > Hi,
> >
> > Has anyone used the frontpage extension? If so, what is your opinion on
> > its security?
> > Is it a good thinks to install on server?
> > Where can I find information about it?
> > Thanks for your help?
Start here
http://w
On Thu, Feb 13, 2003 at 12:02:22PM -0500, John wrote:
> > Hi,
> >
> > Has anyone used the frontpage extension? If so, what is your opinion on
> > its security?
> > Is it a good thinks to install on server?
> > Where can I find information about it?
> > Thanks for your help?
Start here
http://w
killall mozilla-bin
>
> to stop that (when I noticed there wad unnormal load on my box).
Those are standard PHP errors, but it looks like there were a LOT of
them. However, whatever the problem was on their end is fixed, because
the Printer Friendly link works now.
--
:wq
Matthew Daubenspeck
http://www.oddprocess.org
killall mozilla-bin
>
> to stop that (when I noticed there wad unnormal load on my box).
Those are standard PHP errors, but it looks like there were a LOT of
them. However, whatever the problem was on their end is fixed, because
the Printer Friendly link works now.
--
:wq
Matthew Dau
On Tue, Dec 10, 2002 at 02:21:46PM -0800, Ted Roby wrote:
> I see no reason to broadcast to the world exactly what version of
> exim I am running, or even that I am running exim for smtp services.
> I've already modified the received_header_text variable in exim.conf
> to reflect the information I
On Tue, Dec 10, 2002 at 02:21:46PM -0800, Ted Roby wrote:
> I see no reason to broadcast to the world exactly what version of
> exim I am running, or even that I am running exim for smtp services.
> I've already modified the received_header_text variable in exim.conf
> to reflect the information I
(%esp) #
+ andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+ pushl %eax
+ popfl
movl %edx,EIP(%esp) # Now we move them to their "normal" places
movl %ecx,CS(%esp) #
movl %esp,%ebx
Best Regards,
an the follwing exploit on 2.2.x, and the machine locked
completely
I have not check 2.0.x, but given the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a d
(%esp) #
+ andl $~(NT_MASK|TF_MASK|DF_MASK), %eax
+ pushl %eax
+ popfl
movl %edx,EIP(%esp) # Now we move them to their "normal" places
movl %ecx,CS(%esp) #
movl %esp,%ebx
Best Regards,
an the follwing exploit on 2.2.x, and the machine locked
completely
I have not check 2.0.x, but given the staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a d
Hi HTere!
Please find the patch for this attached. It is against linux 2.2.20.
I have not tested it, but since the lcall7() code in 2.2.x is the
same as for 2.4.x, it should work. It is based on Linus's and Petr's
patch for 2.5.x and Alan Cox's 2.4.x
Best Regards,
Matthew Gr
Hi HTere!
Please find the patch for this attached. It is against linux 2.2.20.
I have not tested it, but since the lcall7() code in 2.2.x is the
same as for 2.4.x, it should work. It is based on Linus's and Petr's
patch for 2.5.x and Alan Cox's 2.4.x
Best Regards,
Matthew Gr
staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer...
Exploit code from lkml Andrea Arcangeli <[EMAIL PROTECTED]>
> we just can't a
staleness of this code segment, it
may also be affected.
The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks
fairly easy to do.
Best Regards,
Matthew Grant
PS: I am a debian developer...
Exploit code from lkml Andrea Arcangeli <[EMAIL PROTECTED]>
> we just can't a
On Sun, Aug 18, 2002 at 11:52:02AM +0200, Cristian Ionescu-Idbohrn wrote:
> Matthew,
>
> On Wed, 14 Aug 2002, Matthew Sackman wrote:
>
> [snip]
>
> > Does anyone know of a simple program that will return info on whois IP
> > lookup in a set format?
>
> Y
ogram that will return info on whois IP
lookup in a set format?
Thanks,
Matthew
--
Matthew Sackman
Nottingham
England
BOFH Excuse Board:
Someone was smoking in the computer room and set off the halon systems.
y would feel somewhat better with security related things, if
I knew that this was done.
--
Matthew Johnson. <[EMAIL PROTECTED]>
"They that would give up essential liberty for temporary safety
deserve neither liberty nor safety."
-- Benjamin Franklin
PGP Key ID: 0x5BE86FB9
http://www
On Mon, Jun 24, 2002 at 07:33:12AM -0400, Anthony DeRobertis wrote:
>
> On Sunday, June 23, 2002, at 05:21 , Matthew Sackman wrote:
>
> >If I've missed something obvious, please shout at me ;-)
>
> Only problem is that a Snort that has reached its second
> birth
On Mon, Jun 24, 2002 at 08:49:16PM -0400, buggz wrote:
>
> Does 3.3 work w/ 2.20 kernels ?
>
> Jun 23 10:11:38 buggz1 sshd[9598]: fatal: mmap(65536): Invalid argument
>
> I get that everytime I try connecting.
Works on all my 2.2.20 machines...
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
ons, it
tracks unstable.
If I've missed something obvious, please shout at me ;-)
So now we need a list of packages that are going to need individual
definition packages and to get going. I guess we really should have
another package (security-updater?) that updates sources.list with the
n
debian
packaging. Therefore I am really not looking to become a leader for
this: I am very willing to work on this, but not to lead it!
Matthew
--
Matthew Sackman
Nottingham
England
BOFH Excuse Board:
not properly grounded, please bury computer
pgpsKcyhjLAh2.pgp
Description: PGP signature
lots of time to getting e-mail virus scanning up to snuff under Debian
for this project. Hence my interest in this to help Debian puul its
socks up with regard to this sort of software.
Please let me know what you think. I will be following the discussion on
debian-devel and debian-security.
Best Re
do NMU with new security system, or someone else can
look after it. Matthew? Steve?
Best Regards,
Matthew Grant
--
===
Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\
A Linux Network Guy
apache chunk size stuff for i386 on woody and sid
NOW! Source .dsc and .diff is there if others want to build for other
architectures. The i386 .deb works on my home system.
Did not know how to do NMU with new security system, or someone else can
look after it. Matthew? Steve?
Best Regards,
Matthew
e from all
of the servers. I've no idea how true that is, or how long any such
propogation would take, but I seldom ever come across gpg signed mail
that mutt won't find the key for.
Matthew
--
Matthew Sackman
Nottingham
England
BOFH Excuse Board:
loop found in loop in redundant loopback
pgpsmbaYjZ9Gh.pgp
Description: PGP signature
ludes it at
http://www.srcf.ucam.org/utilities/ssh/srcf-ssh.exe
I've had a few problems with it, but it generally works fine
--
Matthew Johnson
---
Matthew 6:25-34
"Therefore I tell you, do not worry... But seek first His Kingdom and
His Righteousness, and all these things w
Wichert Akkerman writes:
> Previously Matthew Vernon wrote:
> > retitle 130876 Sending server software version information should be
> > optional
>
> I'm not sure I agree with that: that easily leads to the configurable
> version response option that was disc
curityByObscurity yes' or something.
Matthew
--
Rapun.sel - outermost outpost of the Pick Empire
http://www.pick.ucam.org
Wichert Akkerman writes:
> Previously Matthew Vernon wrote:
> > retitle 130876 Sending server software version information should be optional
>
> I'm not sure I agree with that: that easily leads to the configurable
> version response option that was discussed on ope
curityByObscurity yes' or something.
Matthew
--
Rapun.sel - outermost outpost of the Pick Empire
http://www.pick.ucam.org
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
g a daemon and re-writing the
hurd call library to take advantage of it, though no re-writing of the user
space daemons would be necessary afaict.
Matthew
On Fri, Dec 21, 2001 at 11:23:59AM -0600, Kelly Martin wrote:
> As far as I know, Linux does not support doing that. So the way you do it
>
g a daemon and re-writing the
hurd call library to take advantage of it, though no re-writing of the user
space daemons would be necessary afaict.
Matthew
On Fri, Dec 21, 2001 at 11:23:59AM -0600, Kelly Martin wrote:
> As far as I know, Linux does not support doing that. So the way you do i
SMTP is an easy protocol
to learn.
just my 2p
--
Matthew Sackman
Nottingham,
ENGLAND
SMTP is an easy protocol
to learn.
just my 2p
--
Matthew Sackman
Nottingham,
ENGLAND
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi people
Thanks to all who responded off list (as this is OT).
I've now corrected the website so if you want to take a look at the code
you will now find it at namkas.com/ncgpg/
Thanks,
Matthew
On Wed, Oct 03, 2001 at 10:20:24PM +0100, Matthew Sackman wrote:
> Hi people,
>
>
Hi people
Thanks to all who responded off list (as this is OT).
I've now corrected the website so if you want to take a look at the code
you will now find it at namkas.com/ncgpg/
Thanks,
Matthew
On Wed, Oct 03, 2001 at 10:20:24PM +0100, Matthew Sackman wrote:
> Hi people,
>
>
turn to. It works currently, and I think is fairly secure, but I'm not
sure about i) the security of nc and ii) how to avoid putting the gpg
passphrase in the process list when encrypting text (see the code).
Hope this isn't too out of place on this list...
T
turn to. It works currently, and I think is fairly secure, but I'm not
sure about i) the security of nc and ii) how to avoid putting the gpg
passphrase in the process list when encrypting text (see the code).
Hope this isn't too out of place on this list...
T
that they manage to steal from your system
are faked, then they'll waste 2 days running a brute force cracker
and will then get upset when the usernames/passwords don't work...
Nice! ;-)
Matthew
On Wed, Aug 15, 2001 at 09:59:27AM +0200, J?rgen Persson wrote:
> On Wed, Aug 15, 2001 a
that they manage to steal from your system
are faked, then they'll waste 2 days running a brute force cracker
and will then get upset when the usernames/passwords don't work...
Nice! ;-)
Matthew
On Wed, Aug 15, 2001 at 09:59:27AM +0200, J?rgen Persson wrote:
> On Wed, Aug 15, 2001 a
e were a bunch), but I was wondering
if there is a dpkg -l flag of some sort that shows you the timestamps of when a
package was added, and if I could get the listing of files altered by those
packages once I know which ones they are?
--
Matthew H. Ray
[EMAIL PROTECTED]
[EMAIL PROTECTED] (secure)
(there were a bunch), but I was wondering
if there is a dpkg -l flag of some sort that shows you the timestamps of when a
package was added, and if I could get the listing of files altered by those
packages once I know which ones they are?
--
Matthew H. Ray
[EMAIL PROTECTED]
[EMAIL PROTECTED
What's chroot ?
What's chroot ?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Daniel Stark wrote:
> You wouldn't actually imply that hackers are out their providing a
> welcome service do you? I can see if you asked for your network to
> be stress tested, but to go as far as saying they provide a welcome
> service? Come on! Yeah, they might have found a security w
Daniel Stark wrote:
You wouldn't actually imply that hackers are out their providing a
welcome service do you? I can see if you asked for your network to
be stress tested, but to go as far as saying they provide a welcome
service? Come on! Yeah, they might have found a security whole, bu
I'm running Debian on a CVS server and have Debian clients. We're using
OpenSSH to replace the rsh calls in CVS. The problem is that every time
a cvs user makes a CVS call (like cvs diff file), they have to enter my
password. I know there's a way around this, but I can't find clear
documentation
Are there any gpl or similar anti-virus programs for linux ?
Any reccomendations ?
GBY
It may get too heavy to not mirror the security update packages.
Why don't we put signature verification into apt and dpkg and mirror
everything ?
And perhaps have a tool that checks a bunch of known mirrors for
discrepencies in the keyring packages ?
And have a single URL, location aware,
I'm running Debian on a CVS server and have Debian clients. We're using
OpenSSH to replace the rsh calls in CVS. The problem is that every time
a cvs user makes a CVS call (like cvs diff file), they have to enter my
password. I know there's a way around this, but I can't find clear
documentatio
Are there any gpl or similar anti-virus programs for linux ?
Any reccomendations ?
GBY
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
1 - 100 of 129 matches
Mail list logo