On 29/11/24 10:59, Barry wrote:
On 28 Nov 2024, at 22:45, Stephen Morris wrote:
being /usr/bin/egrep and /usr/bin/fgrep because it has said they have been
replaced by a script, is that standard Fedora?
Did you check what was in the files and where they were installed from?
The scripts print
On Fri, 2024-11-29 at 20:37 +, Will McDonald wrote:
> Indeed. I've jumped between RH-based and Debian-based distros a little in
> the last few years. I started tracking some of the deltas here:
> https://github.com/wmcdonald404/distrosetta-stone
You might want to change the yum references to d
On Fri, 29 Nov 2024 at 20:01, George N. White III wrote:
> On Fri, Nov 29, 2024 at 3:09 PM Will McDonald wrote:
>
>> On Fri, 29 Nov 2024 at 18:20, home user via users <
>> users@lists.fedoraproject.org> wrote:
>> There's a lot of commonality across most distros, so while something (the
>> link I
On Fri, Nov 29, 2024 at 3:09 PM Will McDonald wrote:
> On Fri, 29 Nov 2024 at 18:20, home user via users <
> users@lists.fedoraproject.org> wrote:
> There's a lot of commonality across most distros, so while something (the
> link I referenced, for example) was from an Ask Ubuntu branch of
> Stack
On Fri, 29 Nov 2024 at 18:20, home user via users <
users@lists.fedoraproject.org> wrote:
> On 11/28/24 10:24 AM, home user via users wrote:
> > (f-40, stand-alone workstation, gnome)
> >
> > A few times in the past couple of months, I've received the following
> warning from "chkrootkit":
> > - -
On 11/28/24 10:24 AM, home user via users wrote:
(f-40, stand-alone workstation, gnome)
A few times in the past couple of months, I've received the following warning from
"chkrootkit":
- - - - - -
bash.1[~]: chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
[snip]
Checking `bindshell'... no
On Thu, 28 Nov 2024 at 17:38, Jeffrey Walton wrote:
> On Thu, Nov 28, 2024 at 12:25 PM home user via users
> wrote:
> > Checking `lkm'... You have 1 process hidden for ps command
> >
> > What's going on with that lkm warning?
>
> Do you really need us to google it for you?
>
And what Jeffer
> On 28 Nov 2024, at 22:45, Stephen Morris wrote:
>
> being /usr/bin/egrep and /usr/bin/fgrep because it has said they have been
> replaced by a script, is that standard Fedora?
Did you check what was in the files and where they were installed from?
The scripts print a warning message then r
On Fri, 2024-11-29 at 09:45 +1100, Stephen Morris wrote:
> I've run chkrootkit and it said there were no issues, but rkhunter has
> reported two suspect files, being /usr/bin/egrep and /usr/bin/fgrep
> because it has said they have been replaced by a script, is that
> standard Fedora?
fgrep and
On 29/11/24 04:37, Jeffrey Walton wrote:
On Thu, Nov 28, 2024 at 12:25 PM home user via users
wrote:
(f-40, stand-alone workstation, gnome)
A few times in the past couple of months, I've received the following
warning from "chkrootkit":
- - - - - -
bash.1[~]: chkrootkit
ROOTDIR is `/'
Checking
On Thu, Nov 28, 2024 at 12:25 PM home user via users
wrote:
>
> (f-40, stand-alone workstation, gnome)
>
> A few times in the past couple of months, I've received the following
> warning from "chkrootkit":
> - - - - - -
> bash.1[~]: chkrootkit
> ROOTDIR is `/'
> Checking `amd'... not found
> [snip
(f-40, stand-alone workstation, gnome)
A few times in the past couple of months, I've received the following
warning from "chkrootkit":
- - - - - -
bash.1[~]: chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
[snip]
Checking `bindshell'... not infected
Checking `lkm'... You have 1 proce
On 11/16/23 20:39, Tim via users wrote:
On Thu, 2023-11-16 at 18:36 -0800, ToddAndMargo via users wrote:
$ dnf info redhat-lsb-submod-security
Last metadata expiration check: 3:57:51 ago on Thu 16 Nov 2023 02:37:19
PM PST.
Installed Packages
Name : redhat-lsb-submod-security
Version
On Thu, 2023-11-16 at 18:36 -0800, ToddAndMargo via users wrote:
> $ dnf info redhat-lsb-submod-security
>
> Last metadata expiration check: 3:57:51 ago on Thu 16 Nov 2023 02:37:19
> PM PST.
> Installed Packages
> Name : redhat-lsb-submod-security
> Version : 4.
On 11/16/23 02:57, ToddAndMargo via users wrote:
Hi All,
I am in the process of purging all the fc38 packages
from my fc39 install.
What is "redhat-lsb-submod-security"?
And do I need it on fc39? No other package is
dependent on it.
Many thanks,
-T
$ dnf info redhat-lsb-submo
found in the
other email.
Well, when dnf got updated from 38 to 39 in
a recent update, and consequently crashed,
it became a stellar idea to get all the
packages it needed updated to 39.
I will wait a bit and see if redhat-lsb-submod-security
gets rebuilt
uot;redhat-lsb-submod-security"?
And do I need it on fc39? No other package is
dependent on it.
It's part of the lsb (Linux Standard Base, a compatibility package). If
you don't need it, then you can remove it. I think there was a devel
email about the lsb or parts o
Hi All,
I am in the process of purging all the fc38 packages
from my fc39 install.
What is "redhat-lsb-submod-security"?
And do I need it on fc39? No other package is
dependent on it.
Many thanks,
-T
--
~~
Computers are like air conditio
evil deeds, and boom,
you are hacked.
Am I missing something?
If the bad guy can overwrite the executable, then you have a bigger
security problem.
I can see if someone is not careful so make sure the
programs in sudoers are not locked to root, you
would get in trouble, as you did state
that program with his evil deeds, and boom,
you are hacked.
Am I missing something?
If the bad guy can overwrite the executable, then you have a bigger security
problem.
True. But also, /etc/sudoers should not be readable by
anyone other than root:
On f37:
$ rpm -qlv sudo | grep /etc
gt;> overwrite that program with his evil deeds, and boom,
>> you are hacked.
>>
>> Am I missing something?
>
> If the bad guy can overwrite the executable, then you have a bigger security
> problem.
True. But also, /etc/sudoers should not be readable by
anyone
.
Am I missing something?
If the bad guy can overwrite the executable, then you have a bigger
security problem.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of
Hi All,
It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite that program with his evil deeds, and boom,
you are hacked.
Am I missing something?
-T
--
~~
Here's some interesting reading. "On the security of the Linux disk
encryption LUKS," https://dys2p.com/en/2023-05-luks-security.html:
Background
On April 17, 2023 Matthew “mjg59” Garrett published an appeal to
change the key derivation function (KDF) of LUKS-encrypted volumes:
PS
On Fri, 2023-04-07 at 10:17 -0400, Todd Zullinger wrote:
> semanage fcontext -a -t httpd_sys_content_t "/web(/.*)?"
> restorecon -R -v /web
>
That seems to do the trick, thanks.
> Yes, if you knew what command to use, finding the manpage
> [...]
The old UNIX joke was that any man page
Patrick O'Callaghan wrote:
> I've set up a simple web server for private use (though I will enable
> https access from outside the network), but I want some of the content
> to be outside the default /var/www/html tree. When I do this, I get
> file access errors when SElinux is enabled, but not whe
I've set up a simple web server for private use (though I will enable
https access from outside the network), but I want some of the content
to be outside the default /var/www/html tree. When I do this, I get
file access errors when SElinux is enabled, but not when I set
'setenforcing=0'.
I'd pref
ame of the file, itself, to do a job.
Stephen Morris:
What I'm trying to determine is why journal-offline get a security
failure on that file and not the equivalent file that has system before
the @, especially when all 4 files in /var/log/journal are owned by
root. If the ".#" i
the
>> name of the file, itself, to do a job.
>
Stephen Morris:
> What I'm trying to determine is why journal-offline get a security
> failure on that file and not the equivalent file that has system before
> the @, especially when all 4 files in /var/log/journal are owne
;file" would
try to identify it, the others will just show you the contents for you
to try and identify it.
If it's zero bytes in size, the system is probably just using the name
of the file, itself, to do a job.
What I'm trying to determine is why journal-offline get a security
On Sat, 2022-12-24 at 10:33 +1100, Stephen Morris wrote:
> How do I identify what file
> .#user-1000@7668ca11a5184a26bcf4a7c1858f9574-0a42-0005ef6078e3e7f0.journalc7d37931ac52343c
>
> is?
You could use the file, less, cat, or hexdump commands. "file" would
try to identify it, the o
On 24/12/22 12:28, Samuel Sieb wrote:
On 12/23/22 17:27, Samuel Sieb wrote:
On 12/23/22 15:33, Stephen Morris wrote:
Hi,
How do I identify what file
.#user-1000@7668ca11a5184a26bcf4a7c1858f9574-0a42-0005ef6078e3e7f0.journalc7d37931ac52343c
is? The component before the "@" in
On 12/23/22 17:27, Samuel Sieb wrote:
On 12/23/22 15:33, Stephen Morris wrote:
Hi,
How do I identify what file
.#user-1000@7668ca11a5184a26bcf4a7c1858f9574-0a42-0005ef6078e3e7f0.journalc7d37931ac52343c is? The component before the "@" in the file name looks like the file may be
On 12/23/22 15:33, Stephen Morris wrote:
Hi,
How do I identify what file
.#user-1000@7668ca11a5184a26bcf4a7c1858f9574-0a42-0005ef6078e3e7f0.journalc7d37931ac52343c is? The component before the "@" in the file name looks like the file may be relative to my userid. I'm using an F3
Hi,
How do I identify what file
.#user-1000@7668ca11a5184a26bcf4a7c1858f9574-0a42-0005ef6078e3e7f0.journalc7d37931ac52343c
is? The component before the "@" in the file name looks like the file
may be relative to my userid. I'm using an F37 system upgraded from F36.
Also how
Sorry I were speak to Samuel instead gordon,
Regards.
Dorian Rosse.
From: Dorian ROSSE
Sent: Saturday, February 26, 2022 9:41:45 AM
To: Community support for Fedora users
Subject: Re: If venv is a reality can I build a program python wit it for more
security
ild a program python wit it for more
security ?
On 2/25/22 00:55, Dorian ROSSE wrote:
> I hope in some month buy a VMware license I have an Intel i9 10 core and
> 20 thread,
Why vmware? Fedora comes with a virtualization system already. If you
want really simple, you can try using
Rosse.
From: Samuel Sieb
Sent: Friday, February 25, 2022 10:54:57 PM
To: users@lists.fedoraproject.org
Subject: Re: If venv is a reality can I build a program python wit it for more
security ?
On 2/25/22 00:55, Dorian ROSSE wrote:
> I hope in some month buy a VMware license I have an Intel i9
On 2/25/22 00:55, Dorian ROSSE wrote:
I hope in some month buy a VMware license I have an Intel i9 10 core and
20 thread,
Why vmware? Fedora comes with a virtualization system already. If you
want really simple, you can try using Gnome Boxes.
___
@lists.fedoraproject.org
Subject: Re: If venv is a reality can I build a program python wit it for more
security ?
On 2/24/22 02:33, Dorian ROSSE wrote:
> If venv is a reality can I build a program python wit it for more
> security ?
No, venv won't give you any additional security if a python module ha
On 2/24/22 02:33, Dorian ROSSE wrote:
If venv is a reality can I build a program python wit it for more
security ?
No, venv won't give you any additional security if a python module has
malicious code.
If you don't fully trust a python module but you want to run it anyway,
Hello,
If venv is a reality can I build a program python wit it for more security ?
Thanks you in advance for your answer,
Regards.
Dorian Rosse.
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le
n F34) desktop requests
it. This Missing password
request in MATE seems to be a security hole.
Your opinion?
When you say "suspended" do you mean the system has gone into suspend mode or
just that the screensaver
becam active?
Hi Ed,
I suspended my machine actively by "sudo syste
On 11/27/21 00:08, Joachim Backes wrote:
I'm running my F35 desktop with MATE. If I wake up after having
suspended the box using some key, no
password is requested, whereas the Cinnamon (I used it in F34) desktop
requests it. This Missing password
request in MATE seems to be a security
On 27/11/2021 16:08, Joachim Backes wrote:
I'm running my F35 desktop with MATE. If I wake up after having suspended the
box using some key, no
password is requested, whereas the Cinnamon (I used it in F34) desktop requests
it. This Missing password
request in MATE seems to be a security
On 27/11/2021 16:08, Joachim Backes wrote:
I'm running my F35 desktop with MATE. If I wake up after having suspended the
box using some key, no
password is requested, whereas the Cinnamon (I used it in F34) desktop requests
it. This Missing password
request in MATE seems to be a security
Hi Guys,
I'm running my F35 desktop with MATE. If I wake up after having
suspended the box using some key, no
password is requested, whereas the Cinnamon (I used it in F34) desktop
requests it. This Missing password
request in MATE seems to be a security hole.
Your opinion?
Kind re
hat every app/program needs to take security/privacy
into consideration when being developed.
If a app/program is going to implement a securityprivacy feature (which
encryption is) then best practices should be followed
with them being the default. Then, let the end user decide if they want to o
On Mon., 20 Sep. 2021, 23:44 Ed Greshko, wrote:
>
>
> This means if you get an encrypted message, walk away from you system, and
> forget to secure it
> anyone can click on an encrypted message it will be displayed.
>
. If you walk away from your system and forget to secure it and you don't
trus
Latest version of Thunderbird does integrate OpenPGP and does provide
end-to-end encryption.
There is, IMO, a security flaw. The "Generate Key" function they supply does
not have the
option to create a private key with a pass phrase.
This means if you get an encrypted message, walk
Roberto Ragusa wrote:
> and then the best:
> - installs with: "curl http://random_site/install_script | sudo bash"
Owww, my eyes! Please, make it stop.
Any software I see which recommends that idiom in their
instructions is immediately on the "never install this
crapware under any circumstances.
On 12/17/20 6:58 PM, Jorge Fábregas wrote:
Yes... and how the malicious bits were delivered thru the update
mechanism...a nice reminder for us on how careful we need to be when
adding 3rd-party repos be it yum repos, flatpak repos, container repos
and so on.
True.
Even a single gpgcheck=0 is a
On Thursday, December 17, 2020 10:08:54 AM EST Jonathan Ryshpan wrote:
> I read that there has been a major security hack of at least two
> companies, FireEye and SolarWinds, which supply security software
> to the US Government and to major corporations. (see:
> https://www.nytimes
On 12/17/20 1:41 PM, stan via users wrote:
> The deeper issue is that this illustrates how easy it is for skilled
> programmers to insert malicious code into software so that it does
> nefarious things while not being detected. That certainly affects
> Fedora because it affects any system using co
On Thu, 17 Dec 2020 07:08:54 -0800
Jonathan Ryshpan wrote:
> I read that there has been a major security hack of at least two
> companies, FireEye and SolarWinds, which supply security software to
> the US Government and to major corporations.
> (see:
> https://www.nytimes
On Thu, Dec 17, 2020 at 07:08:54AM -0800, Jonathan Ryshpan wrote:
> I read that there has been a major security hack of at least two
> companies, FireEye and SolarWinds, which supply security software to
> the US Government and to major corporations.
> (see:
> https://www.nytimes
I read that there has been a major security hack of at least two
companies, FireEye and SolarWinds, which supply security software to
the US Government and to major corporations.
(see:
https://www.nytimes.com/2020/12/16/opinion/fireeye-solarwinds-russia-hack.html
). Does this have any effect
On Fri, 2020-05-01 at 21:37 -0500, Chris Adams wrote:
> FYI: "UseDNS no" has been the default in OpenSSH for a while now.
Though, if you have a specific need, sometimes it is a good idea to
specify them. Defaults can change. Or defaults applied by
distribution-installed config files might not be
Once upon a time, Cameron Simpson said:
> The UseDNS one is only slightly security - by disabling DNS lookup
> of incoming clients we (a) speed things up, particularly on high
> latency links and (b) stop leaking information about who is
> connecting to use to upstream DNS servers (
:
- PermitRootLogin no
- PasswordAuthentication no
- AllowUsers just specific logins names here
- UseDNS no
The UseDNS one is only slightly security - by disabling DNS lookup of
incoming clients we (a) speed things up, particularly on high latency
links and (b) stop leaking information about who is connecting to
Hi.
Looking through lots of online sites for making changes/mods to
sshd_config files to harden/secure the process.
Would it be cool to post the changes here for comment? Also, anyone
have suggestions as well?
thanks
___
users mailing list -- users@lis
es of their
";logon:" magazine public a year after publication. These contain reports
from security interest groups, book reviews, and articles highlighting
tools for security monitoring.
> I'm thinking the monitoring/scanning process needs to check for,
> or handle the followi
Hi/Morning.
This is a continuation of my looking to nail down what should be
Monitored/Scanned to secure a Fed server/VM.
I've looked over a number of Monitor apps (Solarwinds/Nagios/Zabbix/etc).
Can't really find a good list of the things that should be monitored, so
I've compiled the following
On Wed, Apr 22, 2020 at 10:45 AM bruce wrote:
>
>
>
> .
> .
> .
> Hey Mauricio,
>
> researching Security Onion, never hear of "zeek'
>>
You might have heard of it in its old name, bro.
https://securityonion.readthedocs.io/en/latest/zeek.html
&
.
.
.
Hey Mauricio,
researching Security Onion, never hear of "zeek'
> >>> zeek? Security Onion?
>
I'm putting together a list of scanning tools that would run on the
"client" server, but I'm tying to wrap my head around how all of the
resulti
On Tue, Apr 21, 2020 at 12:23 PM bruce wrote:
>
> Hey Ed.
>
> Thanks for the reply.
>
> Regarding the security/monitoring issue.
>
> Here's my use case:
>
> I'm looking to have multiple servers.
> Servers would be running different apps for differen
Hey Ed.
Thanks for the reply.
Regarding the security/monitoring issue.
Here's my use case:
I'm looking to have multiple servers.
Servers would be running different apps for different purposes.
All Servers running Fed
-DB Server -mysql/mariadb
-Server running webapps/httpd
-Serve
On 2020-04-21 21:33, bruce wrote:
> Not willing to step on toes. Is asking for opinions on tools to do
> system/security monitoring off topic? Been doing research, thought I'd ask
> here as well - if it's acceptable?
Not off topic at all.
Fedora supplies tools used in the
Hey.
Not willing to step on toes. Is asking for opinions on tools to do
system/security monitoring off topic? Been doing research, thought I'd ask
here as well - if it's acceptable?
thanks
___
users mailing list -- users@lists.fedoraproj
r address in a similar way (e.g. john...@gmail.com
versus john@gmail.com versus jo.hnd...@gmail.com), or use them to
simply make combined names more readable.
At times you'll find some service that doesn't accept plus addressing,
claiming it's for some kind of (crap) security reas
(responding to Samuel, George, and Tim)
> If you're not sure and it's important, then try contacting
> them to verify it. Use an alternate method if possible.
That's how the message that triggered this thread was ultimately solved.
But sometimes that's not available. I have several foreign fr
On Mon, 15 Jul 2019 at 22:52, Samuel Sieb wrote:
[...]
> Are you going to change your email accounts every time some spammer
> starts using the address? My email address has been used by virii and
> spam for at least 15 years. It was funny because when this started to
> be a thing, I got a few
On 7/15/19 8:28 PM, Tim via users wrote:
One day someone might think to create a plug-in that checks links with
two different addresses in such links, and red flags them.
Thunderbird warns me about some links. I'm not sure what its criteria
are, but it asks if I'm sure that I want to go to th
Tim:
>> I think he means:
>> 1. Look at the lines up to and including the next received line.
>> 2. Repeat the process, upwards.
>> 3. Otherwise, stop looking any further, it's spam.
Bill:
> Parse Error! My mind incorrectly parsed what Tony said.
I didn't find the language too clear, either. Bu
server got it straight from the
Fedora mailman server. Before that it bounced around in the Fedora
infrastructure a few times, but eventually you see that they got it from
a Yahoo server. The Yahoo server doesn't say where it got it from, so
maybe it was webmail or else they hide the client IP a
Thank-you, Tim, for the follow-up.
> > 'If that line says the "from" is reasonable,
> > look at the lines up to and inclucing the
> > next Received: line and loop, otherwise
> > stop, it's spam.'
> I think he means:
> 1. Look at the lines up to and including the next received line.
> 2. Repeat t
On Sat, 2019-07-13 at 18:58 -0600, home user via users wrote:
> Still, what is the "line and loop, otherwise stop, it's spam." that
> Tony mentioned?
'If that line says the "from" is reasonable, look at the lines up to
and inclucing the next Received: line and loop, otherwise stop, it's
spam.'
I
Good evening,
(jdow asked)
> Do the "Reply-To:" and "From:" headers make sense
> when considered together?
They match.
>Does the "From:" make sense considering the contents.
Yes. Likewise the subject. But the info in those parts could have been
obtained from social networking sites.
(res
On 7/14/19 7:56 AM, jdow wrote:
> You erased one of the more important clues for legitimacy. Do the "Reply-To:"
> and "From:" headers make sense when considered together?
You forgot the most important factor.
If you have to ask the question: "Is this message probably genuine or probably
a spoo
On 20190713 16:29:20, home user via users wrote:
(Tony Nelson said)
> [snip]
>
> Look at the message header. (View Source is a good way,
> as it will be exact.) The first Received: line and any
> lines before it come from your email provider, who is
> mostly to be trusted, though anyone can
On 07/13/2019 05:58 PM, home user via users wrote:
I just received a message from
[sender]@gmail.com
but the last line in the message is a bluish line saying
"Sent from Yahoo Mail on Android"
I do know someone named [sender] but the from address is not what I have
for that person, thoug
(Tony Nelson said)
> [snip]
>
> Look at the message header. (View Source is a good way,
> as it will be exact.) The first Received: line and any
> lines before it come from your email provider, who is
> mostly to be trusted, though anyone can make mistakes.
> If that line says the "from" is reason
On 19-07-13 17:58:12, home user via users wrote:
I just received a message from
[sender]@gmail.com
but the last line in the message is a bluish line saying
"Sent from Yahoo Mail on Android"
I do know someone named [sender] but the from address is not what
I have for that person, though the
I just received a message from
[sender]@gmail.com
but the last line in the message is a bluish line saying
"Sent from Yahoo Mail on Android"
I do know someone named [sender] but the from address is not what I have
for that person, though the sender could have gotten a new e-mail
address ve
On Fri, 2018-12-28 at 13:43 -0700, home user via users wrote:
> The problem that motivated this thread seems to have (magically!)
> disappeared. Perhaps the problem was on the verizon-yahoo end.
That does happen.
Also, if you've had a few unsuccessful connections, a server may lock
you out for
On 12/28/18 12:43 PM, home user via users wrote:
> The problem that motivated this thread seems to have (magically!)
> disappeared. Perhaps the problem was on the verizon-yahoo end.
>
> I use Thunderbird almost exclusively (>99%) for my e-mail. All accounts
> are set to "SSL/TLS" and "Normal pas
The problem that motivated this thread seems to have (magically!)
disappeared. Perhaps the problem was on the verizon-yahoo end.
I use Thunderbird almost exclusively (>99%) for my e-mail. All accounts
are set to "SSL/TLS" and "Normal password". If I understand Tim and
Rick correctly, authen
your system never even gets as far as sending your the
password, and probably even before you even send a username.
Encryption is only as good as the encryption is. But it's the best
choice, and any security failure is limited to that particular bad
service.
Various third party aut
On 12/26/18 11:05 AM, home user via users wrote:
> Thank-you, Tim.
>
>> ... Look them all up on Wikipedia, if you want mostly understandable
>> explanations of each of them.
> I used to think Wikipedia is great. Lately, my opinion of it is
> declining. It's not always authoritative, it's not ver
Thank-you, Tim.
> ... Look them all up on Wikipedia, if you want mostly understandable
> explanations of each of them.
I used to think Wikipedia is great. Lately, my opinion of it is
declining. It's not always authoritative, it's not very stable (article
contents change too much, too often),
Allegedly, on or about 24 December 2018, home user via users sent:
> 2. What are the advantages, disadvantages, and security risks of each
> of the 6 authentication methods offered by Thunderbird for yahoo e-
> mail?
You can only use the options that the ISP supports as well. Which
rking accounts,
so I cannot use 2-factor.
questions
=
1. Am I correct is believing that nothing that I did in the "unwanted
checks for updates." thread would cause these problems?
2. What are the advantages, disadvantages, and security risks of each of
the 6 authentication met
On 12/8/18 9:38 AM, home user via users wrote:
Kevin (and everyone else),
View -> Message Source
and
More -> View Source
do the same thing as Control-U. Unfortunately, what I get (after the
header) is three blocks of seemingly random characters, not html.
Changing the
View -> Text Encoding
se
Howard:
> Thanks for the tip Bill, ...
Thank Kevin, not me.
Kevin (and everyone else),
View -> Message Source
and
More -> View Source
do the same thing as Control-U. Unfortunately, what I get (after the
header) is three blocks of seemingly random characters, not html.
Changing the
View -> Tex
On Thu, 2018-12-06 at 21:03 -0500, Kevin Cummings wrote:
> On 12/1/18 3:51 PM, home user via users wrote:
>
> > I'm using Thunderbird on Fedora-28; there is no "anti-virus"
> > available.
> > Is this safe?
>
> If you're using Thunderbird, then a simple control-U works
> wonders. It
> shows the e
On 12/1/18 3:51 PM, home user via users wrote:
> I'm using Thunderbird on Fedora-28; there is no "anti-virus" available.
> Is this safe?
If you're using Thunderbird, then a simple control-U works wonders. It
shows the email "source code" unmasking any HTML hiding the link. This
is only useful i
On Wed, 2018-12-05 at 15:20 +1030, Tim wrote:
> Tim:
> > > Look in the View menu, inside the Layout section, enable the Show
> > > Status Bar item.
>
> Howard Howell:
> > It shows 4 options, all checked. What did you think I would find
> > there?
>
> Amongst other options, the one I just describ
On Tue, 2018-12-04 at 10:11 -0800, Howard Howell wrote:
> After the latest update I show five, too. They are all checked, but
> the hover function described still doesn't work. Maybe something in my
> setup or .config. I'll create a new user and see what shows up there.
>
> It's not a big deal,
Tim:
>> Look in the View menu, inside the Layout section, enable the Show
>> Status Bar item.
Howard Howell:
> It shows 4 options, all checked. What did you think I would find
> there?
Amongst other options, the one I just described...
If you do have a "Show Status Bar" item in the list, try un
On Mon, 2018-12-03 at 23:12 +, Patrick O'Callaghan wrote:
> On Mon, 2018-12-03 at 10:59 -0800, Howard Howell wrote:
> > On Tue, 2018-12-04 at 00:29 +1030, Tim wrote:
> > > Allegedly, on or about 2 December 2018, Howard Howell sent:
> > > > I'm still using evolution in F28 and it doesn't do that
1 - 100 of 686 matches
Mail list logo