hey Lug, can you guys give me the local average price estimates for website design and maintenance?
--- [EMAIL PROTECTED] wrote: > Send LUG mailing list submissions to > [email protected] > > To subscribe or unsubscribe via the World Wide Web, > visit > http://kym.net/mailman/listinfo/lug > or, via email, send a message with subject or body > 'help' to > [EMAIL PROTECTED] > > You can reach the person managing the list at > [EMAIL PROTECTED] > > When replying, please edit your Subject line so it > is more specific > than "Re: Contents of LUG digest..." > > Today's Topics: > > 1. Re: Mail admins wanted @yahoo! (McTim) > 2. Re: [LUG]Ndugu Linux (Robert K Lutaaya) > 3. Fwd: [c-nsp] Cisco Security Advisory: IOS HTTP > Server Command > Injection Vulnerability (Mark Tinka) > 4. Re: [LUG]Ndugu Linux (Ernest Byaruhanga) > > From: McTim <[EMAIL PROTECTED]> > To: Linux Users Group Uganda <[email protected]> > Date: Thu, 1 Dec 2005 12:09:18 +0300 > Subject: Re: [LUG] Mail admins wanted @yahoo! > > On 12/1/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> > wrote: > > Sorbs is one of the most annoying Black lists I > have had the displeasure of > > encountering. You need to make some sort of > "donation" of $50 to get off the > > blacklist and you can get on it for no apparent > reason. > > It is not a blacklist but more like blackmail (pun > intended) > > I long ago made the > > conclusion that anyone who uses Sorbs has no > business getting mail from me > > anyway! > > unfortunately, you can be Sorbed withut "using > Sorbs" ;-( > > -- > Cheers, > > McTim > $ whois -h whois.afrinic.net mctim > > > From: "Robert K Lutaaya" <[EMAIL PROTECTED]> > To: "Linux Users Group Uganda" <[email protected]> > Date: Thu, 1 Dec 2005 21:48:03 +0300 (EAT) > Subject: Re: [LUG]Ndugu Linux > > > Chris Kasangaki of EACOSS is setting up Customised > Debian Kernel for > Schools, Small Buisnesses, Civil Society > Organizations. > > You are all welcome to join the project. > > Robert > > > > > On Thu, December 1, 2005 11:41 am, Ronny said: > > At least 90% of families in Ug if not Africa have > lost a member to the > > pandemic.Can't forget this day.Good talent has > been lost thank God we > > still living but pray /"the deadly cron will be > killed" hope you do get > > that. > > /Amazingly as usual Linux is in the fight against > it :-\ > > > --------------------------------------------------------------------------------- > > Researchers at the University at Buffalo, the > State University of New > > York, have fired up a 2,000-node, 4,000 processor > Linux cluster and hope > > the cluster's help in studying the human genome > will lead to > > breakthroughs in the treatment of cancer, > Alzheimer's and AIDS. > > > http://os.newsforge.com/article.pl?sid=02/09/10/1516202&tid=2&tid=60&tid=16&tid=31 > > > > Yos > > Ronny > > > > -- > > > ******************************************************************* > > PGP Fingerprint: 6695 794A B84E D922 88FB 73CC > 6CBD 8036 B3CD 7304 > > We can't become what we need to be by remaining > what we are > > > ******************************************************************* > > > > > > > > _______________________________________________ > > LUG mailing list > > [email protected] > > http://kym.net/mailman/listinfo/lug > > %LUG is generously hosted by INFOCOM > http://www.infocom.co.ug/ > > > > The above comments and data are owned by whoever > posted them (including > > attachments if any). The List's Host is not > responsible for them in any > > way. > > --------------------------------------- > > > > > > > Robert K Lutaaya > 075-808889 > 041-223 802 > EACOSS > > > > > From: Mark Tinka <[EMAIL PROTECTED]> > To: "Linux Users Group Uganda" <[email protected]> > Date: Thu, 1 Dec 2005 23:59:27 -0500 > Subject: [LUG] Fwd: [c-nsp] Cisco Security Advisory: > IOS HTTP Server Command > Injection Vulnerability > > FYI. > > Mark. > > ---------- Forwarded Message ---------- > > Subject: [c-nsp] Cisco Security Advisory: IOS HTTP > Server > Command Injection Vulnerability > Date: Friday 02 December 2005 00:43 > From: Cisco Systems Product Security Incident > Response > Team <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Cc: [EMAIL PROTECTED] > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > Cisco Security Advisory: IOS HTTP Server Command > Injection Vulnerability > > ======================================================== > ================ > > Document ID: 68322 > > Advisory ID: cisco-sa-20051201-http > > http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht > tp.shtml > > Revision 1.0 > > For Public Release 2005 December 01 2100 UTC (GMT) > > - > > -------------------------------------------------------- > --------------- > > Contents > ======== > > Summary > Affected Products > Details > Impact > Software Versions and Fixes > Workarounds > Obtaining Fixed Software > Exploitation and Public Announcements > Status of This Notice: INTERIM > Distribution > Revision History > Cisco Security Procedures > > - > > -------------------------------------------------------- > --------------- > > Summary > ======= > > A vulnerability exists in the IOS HTTP server in > which > HTML code inserted into dynamically generated > output, > such as the output from a "show buffers" command, > will > be passed to the browser requesting the page. This > HTML > code could be interpreted by the client browser and > potentially execute malicious commands against the > device or other possible cross-site scripting > attacks. > Successful exploitation of this vulnerability > requires > that a user browse a page containing dynamic > content in > which HTML commands have been injected. > > Cisco will be making free software available to > address > this vulnerability for affected customers. There > are > workarounds available to mitigate the effects of > the > vulnerability. > > This advisory is posted at > http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht > tp.shtml. > > Affected Products > ================= > > This security advisory applies to all Cisco products > that > run Cisco IOS Software versions 11.0 through 12.4 > with > the HTTP server enabled. A system which contains > the IOS > HTTP server or HTTP secure server, but does not > have it > enabled, is not affected. > > To determine if the HTTP server is running on your > device, issue the "show ip http server status" and > "show > ip http server secure status" commands at the > prompt and > look for output similar to: > > Router>show ip http server status > HTTP server status: Enabled > > > If the device is not running the HTTP server, you > should > see output similar to: > > Router>show ip http server status > HTTP server status: Disabled > > > Any version of Cisco IOS prior to the versions which > will > be listed in the Fixed Software section below may > be > vulnerable. > > Cisco IOS XR is not affected. > > To determine the software running on a Cisco > product, log > in to the device and issue the "show version" > command to > display the system banner. Cisco IOS Software will > identify itself as "Internetwork Operating System > Software" or simply "IOS". On the next line of > output, > the image name will be displayed between > parentheses, > followed by "Version" and the IOS release name. > Other > Cisco devices will not have the "show version" > command > or will give different output. > > The following example identifies a Cisco product > running > IOS release 12.3(6) with an installed image name of > C3640-I-M: > > Cisco Internetwork Operating System Software > IOS (tm) 3600 Software (C3640-I-M), Version > 12.3(6), > RELEASE SOFTWARE (fc3) > > > The next example shows a product running IOS release > 12.3(11)T3 with an image name of > C3845-ADVIPSERVICESK9-M: > > Cisco IOS Software, 3800 Software > (C3845-ADVIPSERVICESK9-M), Version 12.3(11)T3, > RELEASE > SOFTWARE (fc4) Technical Support: > http://www.cisco.com/techsupport Copyright (c) > 1986-2005 > by Cisco Systems, Inc. > > > Additional information about Cisco IOS release > naming can > be found at > http://www.cisco.com/warp/public/620/1.html. > > No other Cisco products are currently known to be > affected by the vulnerability addressed in this > advisory. > > Details > ======= > > The Cisco IOS Web browser interface (which enables > the > device to perform as an HTTP server) allows > configuration and monitoring of a router or access > server using any web browser. This feature was > introduced in IOS 11.0. > > A vulnerability exists in the IOS HTTP server in > which > HTML code inserted into dynamically generated > output, > such as the output from a "show buffers" command, > will > === message truncated ===> From: Ernest Byaruhanga <[EMAIL PROTECTED]> > CC: > To: [EMAIL PROTECTED], Linux Users Group Uganda > <[email protected]> > Date: Fri, 02 Dec 2005 08:42:09 +0200 > Subject: Re: [LUG]Ndugu Linux > > > > Robert K Lutaaya wrote the following on 12/01/2005 > 08:48 PM: > > Chris Kasangaki of EACOSS is setting up Customised > Debian Kernel for > > Schools, Small Buisnesses, Civil Society > Organizations. > > what 'customizations' is he particulary putting in > the kernel? > > ernest > > > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > __________________________________ Start your day with Yahoo! - Make it your home page! http://www.yahoo.com/r/hs _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
