On Fri, Dec 24, 2021, 10:26 John Hasler wrote:
> Philippe LeCavalier writes:
> > If the device isn't compromised (which, you saying so doesn't in any
> > way vet the device as safe and not compromised btw) then the desktop
> > you got the number from is the n
On Fri, Dec 24, 2021, 09:57 wrote:
> On Thursday, December 23, 2021 04:26:54 PM Jeremy Ardley wrote:
> > Getting back to the OP, on the scale of likelihood:
> >
> > - zero probability a bad guy was sitting across the street to intercept
> > his phone
> >
> > - zero probability a carrier exchange
On Thu, Dec 23, 2021, 16:27 Jeremy Ardley wrote:
>
> On 24/12/21 5:03 am, Curt wrote:
> >
> > It wasn't really that "rhetorical" a van because it was precisely the
> > very concrete "mobile FBI van" described on the Wikipedia page the OP
> > referenced.
> >
> > As for the accurate representation
On Wed, Dec 22, 2021 at 1:45 PM wrote:
> On Wednesday, December 22, 2021 09:19:31 AM Curt wrote:
> > On 2021-12-21, rhkra...@gmail.com wrote:
> > > That is a known thing (a telephone intercept of a cell phone call), I
> > > have found nothing so far about such a thing happening with a VOIP
> pho
On Tue, Dec 21, 2021, 17:23 tv.deb...@googlemail.com <
tv.deb...@googlemail.com> wrote:
> Le 21/12/2021 à 16:20, Richmond a écrit :
> > Jeremy Ardley writes:
> >
> >> On 21/12/21 9:59 am, rhkra...@gmail.com wrote:
> >>> On Monday, December 20, 2021 02:28:13 PM Brian wrote:
> On Mon 20 Dec 20
On Sun, Feb 23, 2020, 17:28 Stefan Monnier wrote:
> >> > defense in depth / layered defense... would you recommend having a
> Linux
> >> > anti-malware?
> >> No. All those only try to recognize known threats. When a threat is
> >> known, the security hole it exploits is also known, and the fix
On Sun, Feb 23, 2020, 15:13 Reco wrote:
> Hi.
>
> On Sun, Feb 23, 2020 at 02:07:00PM -0500, Philippe LeCavalier wrote:
> > On Sun, Feb 23, 2020, 14:04 Stefan Monnier
> wrote:
> >
> > > > defense in depth / layered defense... would you recommend h
On Sun, Feb 23, 2020, 14:04 Stefan Monnier wrote:
> > defense in depth / layered defense... would you recommend having a Linux
> > anti-malware?
>
> No. All those only try to recognize known threats. When a threat is
> known, the security hole it exploits is also known, and the fix for it
> alr
On Sun, Feb 23, 2020, 07:03 mlnl wrote:
> Hi l0f...@tuta.io,
>
> l0f...@tuta.io wrote:
>
> >Considering the fact I am human so not perfect at all + other notions
> >like defense in depth / layered defense... would you recommend having
> >a Linux anti-malware?
>
> I have used clamav, linux malware
On Sun, Mar 26, 2017 at 6:04 PM Joshua Schaeffer
wrote:
>
> On 03/26/2017 08:30 AM, Cindy-Sue Causey wrote:
>
>
> In the case I'm thinking, it's about manually adding multiple lines to
> a file that I'm not completely remembering just now. Gut is saying
> it's /etc/network/interfaces. Mine's almo
On Sat, Mar 25, 2017, 17:52 wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Sat, Mar 25, 2017 at 06:56:03PM +0000, Philippe LeCavalier wrote:
>
> [...]
>
> > Nevermind. I changed the forward to another box and can't get to it
> either
> >
On Sat, Mar 25, 2017 at 2:49 PM Philippe LeCavalier
wrote:
> On Sat, Mar 25, 2017 at 2:08 PM Nate Bargmann wrote:
>
> * On 2017 25 Mar 12:36 -0500, Philippe LeCavalier wrote:
>
> > One obvious aspect is firewalling. Rest assured I have opened TCP 22 and
> > ofrwarded
On Sat, Mar 25, 2017 at 2:08 PM Nate Bargmann wrote:
> * On 2017 25 Mar 12:36 -0500, Philippe LeCavalier wrote:
>
> > One obvious aspect is firewalling. Rest assured I have opened TCP 22 and
> > ofrwarded to the correct host(the debian box). I can access all the other
> >
Hi All,
Long time linux/debian/ssh user here. I've never seen this particular
problem I'm experiencing which has left me scratching my head for answers.
At this point I'm still trying to eliminate sources so please bare with
me...
I've recently installed a new server for a client, using Deb 8.5 n
14 matches
Mail list logo