Sammy,
Orange plan is ONLY for some data SIM only, which means they require a
SIM that will ONLY be used for data communication. You want to use it
for talking too? pay much more for calls.
Cellcom's plan is pricier (129NIS), but you can use your iPhone in
that plan. You also get a USB modem in t
Hi guys,
I found it really useful using ubuntu packages that google offers the
availability to get ubuntu packages for google applications, so if you
need deb or rpm packages go to
http://www.google.com/linuxrepositories/index.html
Regards.
--
Cyril SCETBON
===
Just as a follow-up to Hetz's announcement of new internet packages
from cell providers, I'll share my experience.
I went to Orange yesterday and asked them to switch me from my 200MB
package to the 5GB one mentioned. The rep told me it was a smart move
because it's the same price! 80 she
The new ssl and ssh packages don't work if they are given known vulnerable
During upgrade/update they upgrade/replace bad keys
Thanks,
Noam Rathaus
Beyond Security
-Original Message-
From: "Geoffrey S. Mendelson" <[EMAIL PROTECTED]>
Date: Fri, 16 May 2008 11:42:53
To:Israel Linux Maili
Omer Zak wrote:
On Fri, 2008-05-16 at 11:09 +0300, Shachar Shemesh wrote:
I'll try to give context to Amos's message, as I think it is important.
If you are running an ssh server on a machine which is not Debian, and
was never affected by the openssl key generation bug, you may be under
th
Geoffrey S. Mendelson wrote:
Is there a package of some sort that checks your keys to see if they
are vulnerable?
Since the list of vulnerable keys is known, it should not be too difficult
to write a program which scans your authorized keys file(s) looking for them.
Hopefully someone has alre
"Debian and Ubuntu's openssh package includes a check on the SSH host key
and also includes a tool to check user keys. Where possible, run ssh-vulnkey
-a as root to check all users' keys and authorized_keys for the vulnerable
ones"
Source: http://www.sungate.co.uk/?p=314
Alex
On Fri, May 16, 200
On Fri, 2008-05-16 at 11:09 +0300, Shachar Shemesh wrote:
> I'll try to give context to Amos's message, as I think it is important.
>
> If you are running an ssh server on a machine which is not Debian, and
> was never affected by the openssl key generation bug, you may be under
> the impression
Is there a package of some sort that checks your keys to see if they
are vulnerable?
Since the list of vulnerable keys is known, it should not be too difficult
to write a program which scans your authorized keys file(s) looking for them.
Hopefully someone has already and made it available.
I'm
I'll try to give context to Amos's message, as I think it is important.
If you are running an ssh server on a machine which is not Debian, and
was never affected by the openssl key generation bug, you may be under
the impression that there is no need to do anything. This is not exactly
the cas
10 matches
Mail list logo