At 15:38 2002-05-08 -0600, Tim Uckun wrote:
The situation right now is that for production you run an ancient system
or cross your fingers, hold your breath and run unstable.
Coming from a corporate environment I hardly feel that stable is ancient.
With most commercial operating systems the qu
It's a cron job belonging to root that changes its user before it goes to work.
At 11:21 2002-04-05 +0600, Kirill Zverev wrote:
Hi!
I found that in my logs:
Apr 4 06:25:01 cmss su[30315]: + ??? root-nobody
Apr 4 06:25:01 cmss PAM_unix[30315]: (su) session opened for user nobody
by (uid=0)
It's a cron job belonging to root that changes its user before it goes to work.
At 11:21 2002-04-05 +0600, Kirill Zverev wrote:
>Hi!
>
>I found that in my logs:
>
>Apr 4 06:25:01 cmss su[30315]: + ??? root-nobody
>Apr 4 06:25:01 cmss PAM_unix[30315]: (su) session opened for user nobody
>by (ui
At 10:08 2001-10-09 +1000, brendan hack wrote:
Hi All,
I found a strange entry hidden among all the IIS exploit attempts
in my apache access log today:
61.177.66.228 - - [07/Oct/2001:21:28:44 +1000] "GET
http://61.177.66.228:8283/ HTTP/1.0" 200 756
Does anyone know if this
At 10:08 2001-10-09 +1000, brendan hack wrote:
>Hi All,
>
> I found a strange entry hidden among all the IIS exploit attempts
> in my apache access log today:
>
>61.177.66.228 - - [07/Oct/2001:21:28:44 +1000] "GET
>http://61.177.66.228:8283/ HTTP/1.0" 200 756
>
> Does anyone know
5 matches
Mail list logo