h a non-standard port are probably
less likely to set up anything stupid with port forwarding than the average
semi-clued user who only barely knows how to use ssh. Don't know if that
has anything to do with the decision...
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROT
less you're providing public NFS service, or some other RPC thing, then
no, there's no good reason whatsoever.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound
ve a TCP connection coming from any FTP
server you could bounce from. Or, you could make a few votes using your own
IP and your ISP's web proxy (assuming they run one).
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found
ackage that pipe into less on a console, so you can
search and go back, but I just use
*.*/dev/tty10
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this
On Thu, Apr 12, 2001 at 01:10:17AM +, Adam Olsen wrote:
> What's /dev/xconsole though?
It's where console log messages get redirected if you run xconsole.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who firs
On Thu, Apr 12, 2001 at 02:55:58AM -0300, Peter Cordes wrote:
> On Thu, Apr 12, 2001 at 01:10:17AM +, Adam Olsen wrote:
> > What's /dev/xconsole though?
>
> It's where console log messages get redirected if you run xconsole.
I said that wrong. It's a pipe
On Fri, Apr 13, 2001 at 02:45:43AM +0200, Janto Trappe wrote:
> On Wed, Apr 11, 2001 at 10:13:36AM -0300, Peter Cordes wrote:
> > debugging. There's a package that pipe into less on a console, so you can
> Do you know the name of this package? I think its very useful.
It
that lets you easily search for stuff that
isn't immediately available for install on the machine you're using.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too,
eb to have a tag in its
control info saying whether it was supposed to be stable or what. If anyone
ever decides to add control info, they should add something like that along
with signatures, and other stuff I haven't thought of right now :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X(
ust wait a bit and
testing will catch up with where unstable was, and apt should just upgrade
to the newest testing version.
Well, I guess it's a pretty handy feature that works well most of the time :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
&qu
ed
> to /mnt/floppy ;)
Other arguments about the utility of append-only aside, why not use ext2
floppies? There's not too much space overhead.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distingui
ng with an md5sum binary and a kernel. (you'd
have to gzip them, but they would fit if you did.)
You can also use debsums to generate md5sums for packages that are missing
them. This would be a good idea before making a floppy.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED
t
you install both at once. That's not so bad. You can tell apt to download
source, build the package, and install it for you if you don't have the lib
versions it was compiled against.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods conf
On Fri, Apr 20, 2001 at 08:24:03PM +0200, Lupe Christoph wrote:
> On Friday, 2001-04-20 at 14:14:13 -0300, Peter Cordes wrote:
> > On Fri, Apr 20, 2001 at 10:12:42AM -0600, Tim Uckun wrote:
> > > Shared libraries may have been a good idea but somehow the implementation
> &g
sions of packages that were
linked against different libs. It would get ugly, especially when package
maintainers got behind and didn't keep up with new libraries coming out.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
nterpreted by the kernel, so different shells will not do it differently.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut a
4526718, 0x4}, 1000, 0, 0x3e8) = 0
chmod("/boot/backup/home/peter/hackfile", 0100664) = 0
/backup/home/peter/hackfile is safely unlinked before it is opened for
writing. However, if the user has write permission in the destination
directory, there is still a race condition. If they rec
##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
a
> kernel thing? I am using Kernel 2.4.
It's not a kernel thing. All you need is a web browser that does
encryption. I'm not sure how to do this with Netsape or Mozilla from the
debian packages, but lynx-ssl for one works fine. konqueror +
kdebase-crypto also works fine.
--
#def
can by e.g. nmap.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
cept for something Sun cooked up with DES. I
don't know the details.
Besides that, ssh has _way_ different uses than RPC. (of course, you could
write a remote shell kind of program using rpc, but why bother? No such
thing exists now, but ssh kicks ass.)
--
#define X(x,y) x##y
Peter
r fancy. Just be
careful about suggesting potentially dangerous stuff.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hac
ystem by installing tripwire.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
se (/var/lib/locate/locatedb), so that
> people can't use the old locate.
>
> slocate will automatically make a symlink from locate to its own binary,
> so you can still use the "locate" command.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns
ppies,
especially if you are using the boot-menu feature.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
e server, and have them go in the clear
between the server and the X terminal.
How secure is MIT-MAGIC-COOKE-1, anyway?
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, t
r/terminals, but you could use a laptop or two with a serial port for
each direction of the connection to capture everything even at high speed.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish t
urther, so I'll shut up now, and hope nobody replies
to the list about this.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a su
> Not much else gets logged at level alert so it should be OK and not
> > > upset other logging.
>
> Isn't there a problem? Logs at level notice (5) and below are sent to
> the console. If host activity is too high, console will become unusable
> (kind of DoS).
U
nd you could potentially
exploit other programs through utmp. This is especially important if
these other programs are being run by root.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
C
figuration info, would do the job for
X11. (BTW, AGP acts like another PCI bus). Limiting things to only
PCI-reported memory spaces would stop access from user space to ISA
memory, but who would want to do that anyway...
I like this idea. It would kick ass, so we should do it.
--
#define X(x,y)
On Sun, Jun 17, 2001 at 10:42:17PM -0800, Ethan Benson wrote:
> On Mon, Jun 18, 2001 at 01:38:16AM -0300, Peter Cordes wrote:
> > I like the package signing idea. That would be cool. That way, you
> > could still load and unload modules. I like being able to do that.
> >
s it. If not, then the
updated packages that the new security-fix package depends on must
become part of potato somehow.
IMHO, security fixes should still go into security.d.o ASAP, without
waiting for packages that depend on them to be updated, but those
packages _do_ need to be updated.
--
will break if you
turn it off, turn it off and see if something breaks. If nothing
breaks, leave it off.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this pl
code, you lose. (That's
another reason why the module signing + user-space memory access stuff
would be good.)
Of course, unless the password is very long and strong, the brute for
attack will be much cheaper than breaking MD5 usually is.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X
something about it to keep
your machine safe, or at least check that it already is safe.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a su
nk this was due to an an honest mistake on your part,
since most people spend their time getting other stuff done, instead of
learning about crypto.
(If I screwed up any facts in the above, somebody please correct me. If I
didn't, then I don't think there is anything more to flame anyo
or the resulting DoS.
>
> But I should not be responsible if I scan someone who's system is so flaky
> that it can't take the scan.
I think the only time you can ever be in the wrong when port scanning
is when you are actively trying to cause damage, by DoS or otherwise. If
you
On Sun, Jan 14, 2001 at 04:22:48AM -0400, Peter Cordes wrote:
> On Sat, Jan 13, 2001 at 08:25:00PM -0600, Jordan Bettis wrote:
> > [snippage]
> > > revisions of MacOS 9. The moral of the story? Be careful who you scan, they
> > > may care, and be careful what OS yo
mba listen on 0.0.0.0, instead of just the
internal IPs.) I'm not too concerned about attacks, since I'm not running
anything very complicated. I check on my log messages every now and then,
though :)
BTW, I did think twice before admitting the above on a public list, but
I'll ta
-
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
d to do it by hand. Also, the default config files for almost
all packages have been set up so that they work well with the rest of the
Debian system, instead of just leaving them as they were in the source
tarball (which usually means you need to change them to get them to work, or
to get them
om ever reaching the
spoofed host. However, another way to accomplish the blocking is to DoS the
spoofed host.
I don't remember where I read this, either in an RFC, or in the book
"Practical Unix and Internet Security".
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECT
il address?)
The best practice is to notify a human of the situation, so they can do
something intelligent :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in
A news
story that said, "... your email is insecure ... run this to make it better
http://debian.org/ :)", might get some people using non-outlook, esp if the
URI was for a decent windoze email client instead of a whole new OS :) (I've
never checked email from 'doze in my lif
ate packages, e.g. xntp ->
ntpdate, ntp or the netkit split. dist-upgrade will do everything it can to
upgrade as much as possible, but it does make sure nothing has broken
dependencies once it's all done.)
BTW, before the upgrade would be a good time to backup the whole system :)
--
#defi
27;t have to do anything. If you
build it into the kernel proper, you still don't have to do anything :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in th
ut
investing some of your time to learn the system and keep up with security
announcements. (choosing a system which has good security announcements is
obviously important, or you might not hear about problems until it's too late.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PR
a woody machine?
I installed ssh 2.3.0p1-1.11 from unstable on my woody machines at home.
It works great.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in th
allow execution of arbitrary CGI programs, the CGI program
could do anything, including start a shell listening on a TCP port, or even
sshd, for someone to connect to. Allowing arbitrary CGI is equivalent to
giving public shell access.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PRO
ntly installed CGI scripts.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!&q
get everything.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -
s while you
aren't doing anything with the network. See if your card is generating
interrupts when there is network traffic that isn't to or from you (and
isn't broadcast.) If it is, then the hardware is in promiscuous mode.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PRO
shouldn't be punished unless it causes a DoS or something.
If you feel otherwise, you might want to show the logs you have to the
scanner's ISP, with timestamp, so they can figure out who had that IP at
that time. I think that would be going to more trouble than it's worth,
thoug
s/proc.txt, in the kernel source tree.) Read
/etc/init.d/networking to see what gets set up when you config networking.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, w
symmetric
routing setups, where packets do come in on a different interface from the
one replies will be sent on, so you have to do it manually with ipchains for
that case. Otherwise, you don't even need to compile ipchains into the
kernel for rp_filter to work.)
--
#define X(x,y) x##y
n the code. You would have to write and tweak
some code to work around TCP's retransmission algorithm, since retransmitted
packets are useless to you because of the unknown extra delay.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who
On Mon, Mar 12, 2001 at 06:36:25PM +, Jim Breton wrote:
> On Mon, Mar 12, 2001 at 02:31:57PM -0400, Peter Cordes wrote:
> > Doesn't rp_filter do this, or am I missing something? It should make the
> > kernel drop packets coming in on interfaces they shouldn't be,
27;t start a connection. exim is
listening on *:25, (i.e. INADDR_ANY, not the interface addresses).
nc 10.0.0.1 25 connects to exim normally.
It's not so easy to check what happens if you send a packet with a
destination in 127.0.0.0/8, but I'd be surprised if it was accepted.
--
#d
oot and arp -s it
> to point to llama?
Here's why:
bigfoot:~# ifconfig lo down
bigfoot:~# arp
Address HWtype HWaddress Flags Mask Iface
llamaether 00:00:92:96:51:C0 C eth0
bigfoot:~# arp -s 127.0.0.1 00:00:92:96:51:C0
SIOCSARP: I
On Wed, Mar 14, 2001 at 12:14:07AM +0100, Carel Fellinger wrote:
> On Mon, Mar 12, 2001 at 10:14:17PM -0400, Peter Cordes wrote:
> > I decided to check this out,
>
> For now I guess you wanted to check that Linux *does* filter on packet
> *destinations* , but I can't fo
(ssh
won't let people talk to FTP or SMTP servers, though, unlike telnet. This
is a good thing.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in
s obsolete.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Pl
t;
> I'd say the malformed packet _is_ the wicked event.
Right. See http://www.scyld.com/network/ethercard.html.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too
-apt is pretty good. Also, aptitude is even more powerful than
dselect (most of the time).
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up
unce mailing list, and I get
updates from it. Is it not working or something?
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut an
re it was
doing a "real" check.
You can't use a possibly-cracked machine to check itself, unless you are
checking for breakins on non-root accounts. (e.g. web page defacement if
they got in through httpd.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
orlds computers and a
lot of time.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small
,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
--
To UNSUBS
#x27;s always funny when people leave their
opinions in their software.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and ha
as you said, you need to use the equiv. of -P. I
fired up putty on my machine, and there doesn't look like an option to do
that. I guess you'll have to download the source and recompile. All hail
Free software :-)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED]
e admin and put klogd back where it belongs :-)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wr
h a non-standard port are probably
less likely to set up anything stupid with port forwarding than the average
semi-clued user who only barely knows how to use ssh. Don't know if that
has anything to do with the decision...
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROT
tant.
Unless you're providing public NFS service, or some other RPC thing, then
no, there's no good reason whatsoever.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound
ve a TCP connection coming from any FTP
server you could bounce from. Or, you could make a few votes using your own
IP and your ISP's web proxy (assuming they run one).
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found
s a package that pipe into less on a console, so you can
search and go back, but I just use
*.*/dev/tty10
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this
On Thu, Apr 12, 2001 at 01:10:17AM +, Adam Olsen wrote:
> What's /dev/xconsole though?
It's where console log messages get redirected if you run xconsole.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who firs
On Thu, Apr 12, 2001 at 02:55:58AM -0300, Peter Cordes wrote:
> On Thu, Apr 12, 2001 at 01:10:17AM +, Adam Olsen wrote:
> > What's /dev/xconsole though?
>
> It's where console log messages get redirected if you run xconsole.
I said that wrong. It's a pipe
On Fri, Apr 13, 2001 at 02:45:43AM +0200, Janto Trappe wrote:
> On Wed, Apr 11, 2001 at 10:13:36AM -0300, Peter Cordes wrote:
> > debugging. There's a package that pipe into less on a console, so you can
> Do you know the name of this package? I think its very useful.
It
that lets you easily search for stuff that
isn't immediately available for install on the machine you're using.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too,
r the .deb to have a tag in its
control info saying whether it was supposed to be stable or what. If anyone
ever decides to add control info, they should add something like that along
with signatures, and other stuff I haven't thought of right now :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail
ust wait a bit and
testing will catch up with where unstable was, and apt should just upgrade
to the newest testing version.
Well, I guess it's a pretty handy feature that works well most of the time :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
&qu
ed
> to /mnt/floppy ;)
Other arguments about the utility of append-only aside, why not use ext2
floppies? There's not too much space overhead.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distingui
ng with an md5sum binary and a kernel. (you'd
have to gzip them, but they would fit if you did.)
You can also use debsums to generate md5sums for packages that are missing
them. This would be a good idea before making a floppy.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED
t
you install both at once. That's not so bad. You can tell apt to download
source, build the package, and install it for you if you don't have the lib
versions it was compiled against.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods conf
On Fri, Apr 20, 2001 at 08:24:03PM +0200, Lupe Christoph wrote:
> On Friday, 2001-04-20 at 14:14:13 -0300, Peter Cordes wrote:
> > On Fri, Apr 20, 2001 at 10:12:42AM -0600, Tim Uckun wrote:
> > > Shared libraries may have been a good idea but somehow the implementation
> &g
ersions of packages that were
linked against different libs. It would get ugly, especially when package
maintainers got behind and didn't keep up with new libraries coming out.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man
nterpreted by the kernel, so different shells will not do it differently.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut a
23296, {134526718, 0x4}, 1000, 0, 0x3e8) = 0
chmod("/boot/backup/home/peter/hackfile", 0100664) = 0
/backup/home/peter/hackfile is safely unlinked before it is opened for
writing. However, if the user has write permission in the destination
directory, there is still a race condition. If they
##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
--
To UNSUBSCRIBE, em
a
> kernel thing? I am using Kernel 2.4.
It's not a kernel thing. All you need is a web browser that does
encryption. I'm not sure how to do this with Netsape or Mozilla from the
debian packages, but lynx-ssl for one works fine. konqueror +
kdebase-crypto also works fine.
--
#def
scan by e.g. nmap.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!&q
except for something Sun cooked up with DES. I
don't know the details.
Besides that, ssh has _way_ different uses than RPC. (of course, you could
write a remote shell kind of program using rpc, but why bother? No such
thing exists now, but ssh kicks ass.)
--
#define X(x,y) x##y
Peter
r fancy. Just be
careful about suggesting potentially dangerous stuff.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hac
ystem by installing tripwire.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small p
ppies,
especially if you are using the boot-menu feature.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day
se (/var/lib/locate/locatedb), so that
> people can't use the old locate.
>
> slocate will automatically make a symlink from locate to its own binary,
> so you can still use the "locate" command.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns
e server, and have them go in the clear
between the server and the X terminal.
How secure is MIT-MAGIC-COOKE-1, anyway?
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, t
nter/terminals, but you could use a laptop or two with a serial port for
each direction of the connection to capture everything even at high speed.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish t
so I'll shut up now, and hope nobody replies
to the list about this.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and
201 - 300 of 403 matches
Mail list logo