>Ya empezo el FUD. Me va a decir ahora que Sarge es >"inestable"... O que no tiene soporte de seguridad.... >Que pena, hablar con argumentos era mejor...
para los que siguen cantando la misma cancion: Q: How is security handled in Debian? A: Once the security team receives a notification of an incident, one or more members review it and consider its impact on the stable release of Debian (i.e. if it's vulnerable or not). If our system is vulnerable, we work on a fix for the problem. The package maintainer is contacted as well, if they didn't contact the security team already. Finally, the fix is tested and new packages are prepared, which are then compiled on all stable architectures and uploaded afterwards. After all of that is done, an advisory is published. >PD : Sarge SI TIENE soporte del equipo de Seguridad de Debian. Y en >menos de un mes, sera estable. De hecho, Sarge/Testing es bastante >alejado de ser inestable. para que vean la cantidad de cosas que dicen sin darse el trabajo de leer primero: Q: How is security handled for testing and unstable? A: The short answer is: it's not. Testing and unstable are rapidly moving targets and the security team does not have the resources needed to properly support those. If you want to have a secure (and stable) server you are strongly encouraged to stay with stable. However, the security secretaries will try to fix problems in testing and unstable after they are fixed in the stable release. Q: How does testing get security updates? A: Security updates will migrate into the testing distribution via unstable. They are usually uploaded with their priority set to high, which will reduce the quarantine time to two days. After this period, the packages will migrate into testing automatically, given that they are built for all architectures and their dependencies are fulfilled in testing. Q: How is security handled for contrib and non-free? A: The short answer is: it's not. Contrib and non-free aren't official parts of the Debian Distribution and are not released, and thus not supported by the security team. Some non-free packages are distributed without source or without a license allowing the distribution of modified versions. In those cases no security fixes can be made at all. If it is possible to fix the problem, and the package maintainer or someone else provides correct updated packages, then the security team will generally process them and release an advisory. Ahora me van a salir no se con que cosa..... mejor le hago caso a mi jefe y me dejo de buscar la forma de hacer entender a la gente lo que no quiere entender Xhau -- Carlos Manuel Duclos Vergara http://www.elbazaar.cl From [EMAIL PROTECTED] Fri May 13 17:30:27 2005 From: [EMAIL PROTECTED] (augusto ingunza) Date: Fri May 13 18:30:39 2005 Subject: Asignacion dinamica de disco Message-ID: <[EMAIL PROTECTED]> Amigos: Saben si Linux tiene la posibilidad de adicionar discos a su array 5 y si los distribuye automaticamente? Gracias __________________________________ Yahoo! Mail Mobile Take Yahoo! Mail with you! Check email on your mobile phone. http://mobile.yahoo.com/learn/mail From [EMAIL PROTECTED] Fri May 13 18:33:40 2005 From: [EMAIL PROTECTED] (Jose Miguel Vidal Lavin) Date: Fri May 13 18:33:48 2005 Subject: reparar filesystem In-Reply-To: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> Carlos Molina wrote: >Estimados, >tengo una servidor con suse 9.0 que posee por "harte de magia" el >sistema de archivos dañado, ocasionando que no arranque, los discos >estan con reiserfs. >al inciarlo me dice que haga el chequeo manual.... lo hago con reiserfsck <dev> >y con las opciones q me indica el suse pero al reiniciar vuelve a >suceder lo mismo, >alguno de uds, ha tenido algun experiencia similiar ? y de ser asi, >podria indicarme como lo arreglaron... > >Atte. > > con un live cd respaldar e instalar de cero con fs etx3 saludos From [EMAIL PROTECTED] Fri May 13 16:52:03 2005 From: [EMAIL PROTECTED] (Daniel Ocaranza) Date: Fri May 13 18:38:51 2005 Subject: hacker In-Reply-To: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> lol xD ahi esta el log completo de la discucion! http://www.totalillusions.net/forum/index.php?showtopic=328 aunque en realidad todos tenemos ip 127.0.0.1 asi que metaforicamente si ataco a 127.0.0.1 estaria atacandote a ti tb :p On 5/13/05, Miguel Oyarzo O. <[EMAIL PROTECTED]> wrote: > > > Estimados > > lean este novedoso metodo de ataque de este hacker. > espero q no les pase a ustedes: > > http://www.diarioti.com/gate/n.php?id=8596 > > Cualquier comentario bienvenido > > Saludos > > Miguel Oyarzo > INALAMBRICA > Punta Arenas > > -- Atentamente Daniel Ocaranza B