Hi,
On Fri, 26 Jul 2002, Gerhard Simon wrote:
> How do i change password and or name in yahoo.
> Thanks for your help.
write email to [EMAIL PROTECTED] with the subject "toss my salad" and your
desired new user name and password in the message body.
hth,
jeedi.
--
To UNSUBSCRIBE, email to [
On Fri, 26 Jul 2002, Gerhard Simon wrote:
> Hi,
>
> How do i change password and or name in yahoo.
Use a little program called fdisk.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Fri, 26 Jul 2002 at 04:30:11PM -0500, Gerhard Simon wrote:
> How do i change password and or name in yahoo.
Not to be rude but this has to do with Debian AND Security...how?
--
Phil
PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/ | gpg --import
--
On Mon, Nov 12, 2001 at 10:46:13AM +0100, Beno?t MARTINET wrote:
> Hi,
>
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
> to login
> using root and users' passwords. Password authentication failed all the time
> and it
> prompted "Permission Denied" on the command l
On Mon, Nov 12, 2001 at 10:46:13AM +0100, Beno?t MARTINET wrote:
> Hi,
>
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
> to login
> using root and users' passwords. Password authentication failed all the time
> and it
> prompted "Permission Denied" on the command
On Sat, Sep 15, 2001 at 12:51:26 -0400, Russell Speed wrote:
> I am curious if the following is an example of a buffer overflow.
It looks like an attempt to exploit a buffer overflow. IIRC the fact that it
got logged to syslog means it didn't work.
> I changed the passwords - and added an entry t
On Sat, Sep 15, 2001 at 12:51:26PM -0400, Russell Speed wrote:
> Should I remove /bin/sh for something less obvious as a general
> protection from buffer overflows?
>
Most shell scripts running on your server call #!/bin/sh, so
removing it will get you in lots of trouble ;-)
Just try:
$ grep "\/
On Sat, Sep 15, 2001 at 12:51:26 -0400, Russell Speed wrote:
> I am curious if the following is an example of a buffer overflow.
It looks like an attempt to exploit a buffer overflow. IIRC the fact that it
got logged to syslog means it didn't work.
> I changed the passwords - and added an entry
On Sat, Sep 15, 2001 at 12:51:26PM -0400, Russell Speed wrote:
> Should I remove /bin/sh for something less obvious as a general
> protection from buffer overflows?
>
Most shell scripts running on your server call #!/bin/sh, so
removing it will get you in lots of trouble ;-)
Just try:
$ grep "\
On Wed, Mar 07, 2001 at 01:18:20AM +0100, [EMAIL PROTECTED] wrote:
> gcc -D__KERNEL__ -DMODULE -DLINUX -DEXPORT_SYMTAB -D__NO_VERSION__
> -I/usr/include -I. -O2 -pipe -DCONFIG_PROC_FS -DIANS -DIANS_BASE_VLAN_TAGGING
^^
That should probably be -I/usr/src/linux/include. You need to
Ivan,
Almost anything will connect to your auth port. ippl will, IRC servers
will, Web and FTP servers often will, as will e-mail servers...
Regards,
Alex.
-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCM d- s:+ a--- C UL P L+++ E W++ N o-- K- w
O--- M- V- PS+ PE- Y PGP t+ 5 X- R tv+ b
* Tim Haynes
| In any event letting on a valid username for "who owns this
| socket/connection" increases security risks, albeit not necessarily
| by much.
Then one can provide the numeric userid instead.
--
Tollef Fog Heen
Unix _IS_ user friendly... It's just selective about who its friend
On Thu, Mar 16, 2000 at 06:25:53PM +0100, Sebastian Stark wrote:
> identd takes two parameters, the server and the source port of a tcp
> connection. it gives back the userid of the user who started it. am i
> right so far?
> i think, the userid may be useful for some purposes but in most cases it
Peter Cordes wrote:
> What you're saying is that if you want to serve web pages to some IPs, but
> not the whole internet, then you have a job for ipchains, which is true.
>
> OTOH, my point was that if you're not running httpd (at all), then you
> don't need packet filtering on port 80. The
On Thu, Mar 16, 2000 at 02:19:53PM -0800, Brian Kimball wrote:
> Peter Cordes wrote:
>
> > This isn't specific to identd, but I'm wondering why you would bother
> > filtering the port instead of just not running identd? (I assume you would
> > have/do turn off identd in /etc/inetd.conf as well a
On Thu, Mar 16, 2000 at 10:07:37PM +, Tim Haynes wrote:
> Alternatively, people might filter based on different incoming host, network
> or interface[1]; if it's from a site I trust I might allow it for speed and/or
> identity "checking" if required; if I'm not sure about them I might let them
Peter Cordes wrote:
> This isn't specific to identd, but I'm wondering why you would bother
> filtering the port instead of just not running identd? (I assume you would
> have/do turn off identd in /etc/inetd.conf as well as using doing port
> filtering.) I've never really understood why people
Yes, the best policy is always to disable anything on your machine that
you're not using. Those you _are_ using, you then filter the crap out of.
Personally, my workstation-type machines only listen on port 6000 (X), 22
(ssh), and occasionally ftp and tftp if I need them for a specific
purpose
On Thu, Mar 16, 2000 at 05:58:00PM -0400, Peter Cordes wrote:
> This isn't specific to identd, but I'm wondering why you would bother
> filtering the port instead of just not running identd? (I assume you would
> have/do turn off identd in /etc/inetd.conf as well as using doing port
> filtering.)
On Thu, Mar 16, 2000 at 04:39:05PM +, Tim Haynes wrote:
> For most (home) purposes it's best to make it REJECT instead of DENY, if you
> choose to block it, so that e.g. remote FTP sites don't have to wait for a
> timeout before letting you in.
This isn't specific to identd, but I'm wonderin
On Thu, 16 Mar 2000, Fredrik Liljegren wrote:
> > i'd turn auth off for security reasons if your box has a direct
> > connection to internet.
> Many people misunderstand the usefulness of identd, and so disable it or
> block all off site requests for it. identd is not there to help out remote
> sit
On Thu, Mar 16, 2000 at 03:01:40PM +, Mark Brown wrote:
> On Thu, Mar 16, 2000 at 03:45:50PM +0100, Ivan Ivanovic wrote:
>
> > On my Slink placed on Inernet often appears auth port connection attempts
> > from various sites... What (common) application needs this port?
>
> The auth port pro
On Thu, Mar 16, 2000 at 03:45:50PM +0100, Ivan Ivanovic wrote:
> On my Slink placed on Inernet often appears auth port connection attempts
> from various sites...
> What (common) application needs this port?
The auth port provides a facility for a remote machine to identify who's
on your end
> irc server make ident connections to clients.
> squid can use ident for authorization.
> sendmail sometimes uses ident.
>
> maybe you want to read rfc1413.
>
> i'd turn auth off for security reasons if your box has a direct
> connection to internet.
Hmm, that's an easy approach, but from Secur
On Thu, 16 Mar 2000, Ivan Ivanovic wrote:
> On my Slink placed on Inernet often appears auth port connection attempts
> from various sites...
> What (common) application needs this port?
irc server make ident connections to clients.
squid can use ident for authorization.
sendmail sometimes us
25 matches
Mail list logo