y NFS with
ACLs, no Quota... But that seems okay for many uses.
When building systems with subadministrators, this really comes in handy. The
old UNIX file rights are okay for many uses, but there really are reasons for
ACLs.
Thomas Ritter
e-only-use... Are there any
licenses forbidding religious people to use software? They don't need
computers and internet, they can pray all day long...
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
7;s no way this would be done
for a single thread, and the interesting thing is THAT the thread consists of
debian-security subscribers.
(By the way, I just note my KMail has no easy "ignore this thread" context
menu entry... *jump-to-the-bugwizard*)
Okay, it's in the kmail wishlist now, using filters it would be 4-5 clicks ;)
--
Thomas Ritter
u only get
the interesting stuff. It's one or two weeks long 2-3 minutes of adding
ignore entries and one minute from time to time to cope with what updated
programs write into the log ;)
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
Yes, iptables -F (and/or calling your firewall script if you have one).
But don't forget to clean up /etc/hosts.deny from time to time, it can get
very big if you switched TCP wrappers denial in portsentry.
Thomas Ritter
inet.c(689)
Is it a bug or a feature? Doea anyone know? sid with 2.4.20 selfcompiled
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
ll
end up on a piece of paper pinned to the monitor. Servers have to be booted
when they go down, not when the one sysadmin who knows the PW comes back...
Don't make too much fuss about encrypting. If your machine has one little
security hole, the attacker will get all data unencrypted.
e to
clean out for yourself. This is ugly.
But, with 2-3 XML Parsers for config files defining patterns, actions and
rules (pattern->action), you could build a rather easy to maintain threat
reaction system in Perl with little effort.
If you're interested in building one, I am...
Greeti
[...]
> but apparently they have reversed the priority. Now rsh, rlogin, etc.
> works, but still not remote X windows.
What about configuring X for network access? Wasn't X configured not to use
network and sockets instead by default?
--
Thomas Ritter
"Those who would g
mail with a M$ EXE
should really score 4.5 or so, because even if one of my friends sends me an
EXE file on purpose, I would look for that in my Spam folder first ;)
[1] http://www.openantivirus.org/
[2] http://www.everysoft.com/clamfilter.html
--
Thomas Ritter
"Those who would give up ess
and found it as "not usable" because of not enough virii.
... But I am sure it will soon grow big enough.
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
ly reason to autodelete mails in a private mailbox would be masses
of those mails anyway, so a new worm on the loose should be worth a filter
entry. But on the other hand, maybe, I 'll just push them into a folder and
mark them read...
Greetings,
--
Thomas Ritter
"Those who would gi
ter English nor German are programming languages ;)
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
rus mails are in my inbox, the system load
jumps up to 25 (!!)
==SNIP procmailrc
:0fw
|/usr/bin/spamassassin
:0fw
|/usr/local/bin/clamfilter.pl
==SNIP
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty no
account to log into.
Whatever is hard to transfer to ssh is most likely worth to be transferred
immediately ;)
With a company from the 80s, you'll surely have problems with migration, as
there will surely be forgotten processes trying to do rsh. But... migrate
anyway. rsh/rhosts is pure s
y NFS with
ACLs, no Quota... But that seems okay for many uses.
When building systems with subadministrators, this really comes in handy. The
old UNIX file rights are okay for many uses, but there really are reasons for
ACLs.
Thomas Ritter
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
w
e-only-use... Are there any
licenses forbidding religious people to use software? They don't need
computers and internet, they can pray all day long...
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a s
7;s no way this would be done
for a single thread, and the interesting thing is THAT the thread consists of
debian-security subscribers.
(By the way, I just note my KMail has no easy "ignore this thread" context
menu entry... *jump-to-the-bugwizard*)
Okay, it's in the kmail wishl
u only get
the interesting stuff. It's one or two weeks long 2-3 minutes of adding
ignore entries and one minute from time to time to cope with what updated
programs write into the log ;)
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
--
To UNSUBSCRIBE, em
Yes, iptables -F (and/or calling your firewall script if you have one).
But don't forget to clean up /etc/hosts.deny from time to time, it can get
very big if you switched TCP wrappers denial in portsentry.
Thomas Ritter
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subje
ll
end up on a piece of paper pinned to the monitor. Servers have to be booted
when they go down, not when the one sysadmin who knows the PW comes back...
Don't make too much fuss about encrypting. If your machine has one little
security hole, the attacker will get all data unencrypted.
e to
clean out for yourself. This is ugly.
But, with 2-3 XML Parsers for config files defining patterns, actions and
rules (pattern->action), you could build a rather easy to maintain threat
reaction system in Perl with little effort.
If you're interested in building one, I am...
Greeti
[...]
> but apparently they have reversed the priority. Now rsh, rlogin, etc.
> works, but still not remote X windows.
What about configuring X for network access? Wasn't X configured not to use
network and sockets instead by default?
--
Thomas Ritter
"Those who would g
mail with a M$ EXE
should really score 4.5 or so, because even if one of my friends sends me an
EXE file on purpose, I would look for that in my Spam folder first ;)
[1] http://www.openantivirus.org/
[2] http://www.everysoft.com/clamfilter.html
--
Thomas Ritter
"Those who would give up ess
and found it as "not usable" because of not enough virii.
... But I am sure it will soon grow big enough.
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Fran
ly reason to autodelete mails in a private mailbox would be masses
of those mails anyway, so a new worm on the loose should be worth a filter
entry. But on the other hand, maybe, I 'll just push them into a folder and
mark them read...
Greetings,
--
Thomas Ritter
"Those who would gi
ter English nor German are programming languages ;)
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
rus mails are in my inbox, the system load
jumps up to 25 (!!)
==SNIP procmailrc
:0fw
|/usr/bin/spamassassin
:0fw
|/usr/local/bin/clamfilter.pl
==SNIP
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty no
account to log into.
Whatever is hard to transfer to ssh is most likely worth to be transferred
immediately ;)
With a company from the 80s, you'll surely have problems with migration, as
there will surely be forgotten processes trying to do rsh. But... migrate
anyway. rsh/rhosts is pure s
29 matches
Mail list logo