On Wed, 23 Jan 2002 18:03:26 -0500 (EST), Emmanuel Valliet
[EMAIL PROTECTED] wrote:
There was a good article of Aleph One on buffer overflows called
'Smashing the stack for fun and profit'. Phrack 49.
Search the web and enjoy :)
I found this one to be quite informative too:
To all:
Sorry about including the list in reply.
David.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Jan 23, [EMAIL PROTECTED] wrote:
it indeed sounds VERY interesting (not only to me) :-)
although I never dealt with special kernel modifications.
But I'll give it a go..can anyone recommend any other
kernel security patch sites? ..would be great!
the only thing you need to bear in mind
On Thu, Jan 24, 2002 at 07:23:35AM +0100, martin f krafft wrote:
also sprach Rob VanFleet
On this list (I beleive) I saw someone mention the use of /bin/passwd
as a shell for mail-only users so they can easily change their password
without having to ask someone. Is this a secure
On Thu, Jan 24, 2002 at 11:17:59AM -0600, Rob VanFleet wrote:
On Thu, Jan 24, 2002 at 07:23:35AM +0100, martin f krafft wrote:
also sprach Rob VanFleet
On this list (I beleive) I saw someone mention the use of /bin/passwd
as a shell for mail-only users so they can easily change
Hi,
David N Moore wrote:
i'm a new poster here, but one thing that strikes me is that the
source to passwd should be hanging around somewhere. It wouldn't be
incredibly difficult to make a custom version which does not ask for
the original password, right? Then you could set it to be the
On Thu, Jan 24, 2002 at 07:05:54PM +0100, Ralf Dreibrodt wrote:
and then no user, who has a valid shell has to enter the old password
from user x, when he wants to change the password of user x.
perhaps even if x=root ;-)
You have to enter it once for the ssh daemon anyways. He just wanted to
And if one do:
procedure example is
type C_String_Type is array (1..10) of Character;
a : C_String_type;
begin
a := ('1','2','3','4','5','6','7','8','9','A','B','C','D');
end example;
then when compiling:
% gnatmake example.adb
gnatgcc -c example.adb
martin f krafft wrote:
that was me, and no, noone has mentioned any bad aspects yet, other than your
users having to type the old password twice. however, it's not the
solution i amlooking for, so i am implementing a highly secure way to do it over and
SSL/TLS-encrypted webform with emphasis
Michael Wood [EMAIL PROTECTED] writes:
On Thu, Jan 24, 2002 at 08:56:56AM +0100, Rainer Sigl wrote:
Hi everyone,
please can me tell somebody how to make MD5 passwords in order
to supply it to ftppasswd file?
You just need to call the standard crypt() function with the
apropriate
Heh, what's funny is that SpamAssassin tagged this message
you sent as spam and sent it to my spam folder.
j.
--
Jeremy L. Gaddis [EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Bryan
Andersen
Sent: Thursday, January 24, 2002 7:04
On Fri, Jan 25, 2002 at 08:31:24AM +0100, Oliver M . Bolzer wrote:
I've heard Razor is (configurabule) part of SpamAssassin. I'd recommend
disabling that check because somebody is tagging about 1/3 of Bugtraq mail
in Razor thus sending it to the Spam folder.
Or you can add
whitelist_from
Hi everyone,
please can me tell somebody how to make MD5 passwords in order
to supply it to ftppasswd file?
Thanks
Rainer Sigl
On Thu, Jan 24, 2002 at 08:56:56AM +0100, Rainer Sigl wrote:
Hi everyone,
please can me tell somebody how to make MD5 passwords in order
to supply it to ftppasswd file?
You just need to call the standard crypt() function with the
apropriate arguments. You can use perl or python or C or
Hi,
Quoting James ([EMAIL PROTECTED]):
We could start by blocking @aol.com =)
Or by all running good anti-spam measures and not replying to spam; I didn't
even know it was there until people started replying to it, and i had to
look up the original posting in my spam folder..
Greets,
On Wed, 23 Jan 2002 18:03:26 -0500 (EST), Emmanuel Valliet
[EMAIL PROTECTED] wrote:
There was a good article of Aleph One on buffer overflows called
'Smashing the stack for fun and profit'. Phrack 49.
Search the web and enjoy :)
I found this one to be quite informative too:
To all:
Sorry about including the list in reply.
David.
On Jan 23, [EMAIL PROTECTED] wrote:
it indeed sounds VERY interesting (not only to me) :-)
although I never dealt with special kernel modifications.
But I'll give it a go..can anyone recommend any other
kernel security patch sites? ..would be great!
the only thing you need to bear in mind
On Thu, Jan 24, 2002 at 07:23:35AM +0100, martin f krafft wrote:
also sprach Rob VanFleet
On this list (I beleive) I saw someone mention the use of /bin/passwd
as a shell for mail-only users so they can easily change their password
without having to ask someone. Is this a secure
On Thu, Jan 24, 2002 at 11:17:59AM -0600, Rob VanFleet wrote:
On Thu, Jan 24, 2002 at 07:23:35AM +0100, martin f krafft wrote:
also sprach Rob VanFleet
On this list (I beleive) I saw someone mention the use of /bin/passwd
as a shell for mail-only users so they can easily change
Hi,
David N Moore wrote:
i'm a new poster here, but one thing that strikes me is that the
source to passwd should be hanging around somewhere. It wouldn't be
incredibly difficult to make a custom version which does not ask for
the original password, right? Then you could set it to be the
On Thu, Jan 24, 2002 at 07:05:54PM +0100, Ralf Dreibrodt wrote:
and then no user, who has a valid shell has to enter the old password
from user x, when he wants to change the password of user x.
perhaps even if x=root ;-)
You have to enter it once for the ssh daemon anyways. He just wanted to
Alvin Oga [EMAIL PROTECTED] wrote on 24/01/2002 (11:13) :
hi ya ralf
i would have thought that gcc would barf on b[20]='X'
and similarly for theother variable assignments since its not prev
allocated/defined.. and yet explicitly assigned (incorrectly??)...
Why there are no range tests in
And if one do:
procedure example is
type C_String_Type is array (1..10) of Character;
a : C_String_type;
begin
a := ('1','2','3','4','5','6','7','8','9','A','B','C','D');
end example;
then when compiling:
% gnatmake example.adb
gnatgcc -c example.adb
martin f krafft wrote:
that was me, and no, noone has mentioned any bad aspects yet, other than your
users having to type the old password twice. however, it's not the
solution i amlooking for, so i am implementing a highly secure way to do it
over and
SSL/TLS-encrypted webform with emphasis
Michael Wood [EMAIL PROTECTED] writes:
On Thu, Jan 24, 2002 at 08:56:56AM +0100, Rainer Sigl wrote:
Hi everyone,
please can me tell somebody how to make MD5 passwords in order
to supply it to ftppasswd file?
You just need to call the standard crypt() function with the
apropriate
On Thu, Jan 24, 2002 at 09:34:35AM +0100, Robert van der Meulen wrote:
Quoting James ([EMAIL PROTECTED]):
We could start by blocking @aol.com =)
Or by all running good anti-spam measures and not replying to spam; I didn't
even know it was there until people started replying to it, and i had
Sebastian Rittau wrote:
On Thu, Jan 24, 2002 at 09:34:35AM +0100, Robert van der Meulen wrote:
Quoting James ([EMAIL PROTECTED]):
We could start by blocking @aol.com =)
Or by all running good anti-spam measures and not replying to spam; I didn't
even know it was there until people
Heh, what's funny is that SpamAssassin tagged this message
you sent as spam and sent it to my spam folder.
j.
--
Jeremy L. Gaddis [EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Bryan
Andersen
Sent: Thursday, January 24, 2002 7:04 PM
29 matches
Mail list logo