So your doing it as root. Root can do that. As it has access to everything.
On Sep 1, 2016 8:15 AM, "Andrii Kuzik" wrote:
> Probably a lot of freebsd servers affected
>
> Security bug allows to edit other users crontab
>
> root# pw useradd -n www.promspecbud.com -g nobody -s /bin/sh -d /tmp
>
On Feb 25, 2015 2:05 PM, "Joseph Mingrone" wrote:
>
> Jung-uk Kim writes:
>
> > On 02/25/2015 14:41, Joseph Mingrone wrote:
> >> This morning when I arrived at work I had this email from my
> >> university's IT department (via email.it) informing me that my host
> >> was infected and spreading a
On Thursday, December 18, 2014, Zoran Kolic wrote:
> > This is weird as I now get a thing that "Directory's required to be
> removed ..." and that directory is "/" will this be fixed as this is kinda
> scary seeing "Directory couldn't be removed "rmdir /" or something it
> showed.
>
> I had a
Hello,
This is a very common question the patch level will not change unless the
kernel is updated however the patches are installed.
On Jun 5, 2014 7:10 PM, "Dan Allen" wrote:
> I am not sure if this is the right forum, but since these binary updates
> via freebsd-update are usually security o
Sounds like your openssl is broken it works just fine for me gets gmail
certificate
On Apr 1, 2011 11:01 AM, "István" wrote:
> Hi folks,
>
> Could somebody explain to me how is it possible to ship an operating
system
> without testing basic functionality like SSL working? Unfortunately the
> probl
On Wed, Jan 7, 2009 at 5:49 PM, Matthew Seaman <
m.sea...@infracaninophile.co.uk> wrote:
> FreeBSD Security Advisories wrote:
>
> I. Background
>>
>> FreeBSD includes software from the OpenSSL Project. The OpenSSL Project
>> is
>> a collaborative effort to develop a robust, commercial-grade,
>
On Mon, Nov 24, 2008 at 5:06 PM, William Palfreman <[EMAIL PROTECTED]>wrote:
> 2008/11/24 Volker <[EMAIL PROTECTED]>:
> > On 11/24/08 19:55, William Palfreman wrote:
> >> 2008/11/23 <[EMAIL PROTECTED]>:
> >>> Synopsis: [vuxml] [patch] update audio/streamripper to 1.64.0, fix
> CVE-2008-4829
> >>