No need to pay more - cheapest OEM online.

2005-07-11 Thread Morris

Loaded with technology for business and home.
http://whznl.c1grxtun9mcjrdc.shoatmache.com




Do not let us mistake necessary evils for good.
I'd give you my seat, but I'm sitting in it.   




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



guadagnare con internet.

2005-07-11 Thread carlo speranza

NON E' ILLEGALE, E' SOLO UN GIOCO CHE FA GUADAGNARE SOLDI REALI E SICURI SOLO A 
CHI PARTECIPA, QUI NESSUNO REGALA NIENTE, L' INVESTIMENTO E' DI SOLI 5 €
Leggiti attentamente questa notizia!
Magari nn ti cambierà la vita, ma io al momento che ti scrivo ci ho guadagnato 
450 euro in 1 settimana!!!

ATTENZIONE NON FATE NESSUNA OFFERTA VI STO DANDO
QUESTE INFORMAZIONI GRATIS!!! LEGGETE BENE TUTTO IL TESTO,
OGGI POTREBBE ESSERE IL VOSTRO GIORNO FORTUNATO!!!
ECCO IL MIGLIORE METODO PER FARE SOLDI!!!
Per la prima volta in Italia, appena tradotto dall'Inglese, un programma
Approvato da PAYPAL,  semplice e veloce per ricevere tanti soldi
facilmente e velocemente.
NON ci credi??? Beh!!! non ci credevo neanch'io... l'ho provato ed oggi
mi sento di tradurlo e di proporlo ai miei connazionali, anche perchè
non mi sembra giusto far guadagnare solo Americani ed Inglesi )
Siamo i PRIMI  APPROFITTANE prima che anche il WEB ed EBAY Italia
saranno pieni di queste offerte chi prima arriva... più guadagna
Di seguito ti riporto la traduzione in Italiano del testo in inglese
(che troverai su EBAY USA)
Se vuoi saperne di più su PAYPAL consulta il sito https://www.paypal.com/it/

Se hai un' attività commerciale clicca qui 
https://www.paypal.com/it/mrb/pal=EHZMRCMPY632S


--
Questo è un programma geniale!! Il potere di EBAY e delle mail per
ricevere velocemente un sacco di soldi Funziona davvero... Leggi qui!!!
COPIA E INCOLLA QUESTA PAGINA,
SEGUI CON CURA LE ISTRUZIONI,
QUINDI MANDALA VIA E MAIL O PUBBLICIZZALA SU EBAY O DOVE ALTRO VUOI
NON DIMENTICARE DI AGGIUNGERE IL TUO NOME
SE SEI SCETTICO ASCOLTA PAYPAL!!!
PayPal ha verificato che questo schema di investimento di Pound 3
(5 Euro ... essendo nato in Inghilterra era originariamente in Pound o
Sterline) è LEGALE e si rivelato il migliore dell'anno.
Leggi la nota qui sotto e se non ci credi chiedi a loro direttamente!!!
Caro Membro,
E' arrivato alla nostra attenzione che è in giro un sistema di guadagno
su PayPay di cui forse avrai visto o sentito parlare (Lo schema £3).
Puoi prendere parte a questo schema. Noi abbiamo risposto a migliaia di
domande riguardo a questo schema e la risposta è SI, funziona ed è
sicuro seguendo le istruzioni e le regole. E' assolutamente legale ed è
stato il migliore su interent quest'anno.
--
Ho controllato su EBAY per molte di queste offerte e tutte sono state
approvate !!!
La cosa che rende questo schema vincente è:
IL FATTORE DI BASSO RISCHIO
5 Euro è una cifra a basso rischio da investire per una
INFINITA OPPORTUNITA' DI GUADAGNO
DOVE C'E' SEMPRE UN'ALTISSIMO TASSO DI RISPOSTA CHE PERMETTE
DI AVERE UN ENORME RIENTRO MONETARIO GIA' DOPO UN MESE
SEGUI I 3 PASSI QUI SOTTO E GUADAGNI 5000 EURO
ANCORA SCETTICO??? LEGGI QUESTO:
"Rimasi scioccato quando vidi quanti soldi arrivavano nel mio account
PAYPAL"
Ho trasformato £3 (€5) in £ 14,706 (27.000 Euro) nei primi 30 giorni di
operatività del piano di guadagno che ti sto per rivelare GRATIS. Se
deciderai di aderire seguendo le istruzioni di seguito posso Garantirti
che avrai guadagni simili.
Non essere scettico su questo programma. Al massimo pensaci per qualche
giorno.
Altrimente butterai via guadagni superiori ai 18000 Euro in contanti!!!.
Questo sistema sta funzionando da 2 anni per oltre 2 milioni di persone
che hanno aderito e sono rimaste stupite dei risultati ottenuti
semplicemente grazie a 5 EURO 
Potrai farlo anche tu!!!
Fui licenziato dal mio lavoro nell'agosto del 2001, come tanti altri
dipendenti nella azienda dove lavoravo. In quel momento sopravvivevo ma
ero pieno di debiti.
Poi nel Marzo 2002 ricevetti una breve mail dove era spiegato come
guadagnare (18000 EURO) in breve tempo. Ovviamente la ignorai in quanto
ero scettico. Comunque non la cancellai in quanto qualcosa dentro di me
aveva capito che poteva essere vero, ed ero disperato nel cercare di
capire come poter fare un po' di soldi in breve tempo. In quel periodo,
ero ancora pieno di debiti, ed ero quasi alla disperazione. Finalmente
realizzai che non avevo nulla da perdere se avessi aderito al programma
che mi spiegavano in quella mail e quindi cominciai a chiedermi:" E se
funzionasse davvero???"
Allora, misi da parte i miei dubbi e seguii i facili passi descritti
nella mail. Il tutto mi impegnò per 30 minuti e il costo fu solo di 5
EURO. Alla fine del 2002, fui in grado di prenotare per tutta la
famiglia una vacanza a vita a MIAMI, E ovviamente non devo neanche un
cent a nessuno
A oggi ho realizzato esattamente 720.000 Euro. Il conto è cresciuto a
dismisura e nei prossimi 24 mesi sarò Milionario, esclusivamente con
questo semplice business creato da solo.
Mentre scrivo queste parole ripenso come ho lavorato duramente, come
tante altre persone, tutta una vita per non ottenere NULLA e come
qualcosa di cosi semplice è stata la svolta di tutta una vita. Se penso
a quante m

Thanks

2005-07-11 Thread Dr . Johnson Motene
ATTN: PRESIDENT/CEO

It gives me a great pleasure to send you this business/partnership proposal. I 
am writing to seek your partnership in a business of mutual benefit. Within the 
South African Department of Transport where I work as the director of audit and 
project implementation, we (my colleagues and I) have in our possession an 
unclaimed payment bills totaling $18,500,000.00 USD. This represent the balance 
of the total contract over invoiced value executed on behalf of my ministry by 
a contracting firm who has left South Africa since the completion of their 
contract work.

We want to transfer abroad with the assistance and co-operation of a foreign 
company or individual who will receive the said funds on our behalf in a 
reliable foreign company or non-company?s account with as little or zero 
balance in the account to receive such funds. We have in principles an approval 
to remit these funds to a foreign bank account. The successful remittance of 
these funds can be achieved by filing application for transfer of rights and 
privileges of the said funds and other necessary documents.

I have the authority of my colleagues involved to propose that your consent to 
this transaction will be kept confidential and your assistance highly 
compensated by a portion of the $18.5M United States Dollars. We are willing to 
set aside a portion for taxation purposes if required. Note also that all legal 
documents will be properly secured and documented. Besides your assistance is 
needed as the South African Civil Service Code of Conduct prohibit us from 
operating foreign accounts while still in service 

I can assure you that my partners and I are in a position to make this payment 
claim fruitful, provided you can give us the assurance and guarantee that our 
share will be secured. Visualize this business opportunity as an indirect 
financial resource; also your area of specialization is not a hindrance in the 
successful execution of this transaction. More details will be made available 
to you once you accept this partnership proposal. If interested, please contact 
me immediately on ([EMAIL PROTECTED]) as you are aware I am still in active 
government service as such must be treated strictly confidential.

Thank you.

Yours faithfully.

Dr. Johnson Motene.


Re: Security risks due to packages that are no longer part of Debian?

2005-07-11 Thread Sam Morris

Florian Weimer wrote:

If a User upgrades his woody system to sarge and one package that has
been part of woody is now no longer part of Debian nor being superseded by
another package, will apt-get warn the user that this package is a potential
security risk as Debian does not monitor nor provide fixes for reported
security issues in this package?


No, of course not.


For such a cases it would even be a reasonable advice to have both,
woody/updates and sarge/updates, in the sources.list, or?


I doubt that this will work in general.

A tool which lists all packages which are no longer downloadable from
any APT source would be more helpful, I think.  Does it already exist?


You can use aptitude to discover obsolete packages on your system. See 
 
for more info.


--
Sam Morris
http://robots.org.uk/

PGP key id 5EA01078
3412 EA18 1277 354B 991B  C869 B219 7FDB 5EA0 1078


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Security risks due to packages that are no longer part of Debian?

2005-07-11 Thread Florian Weimer
* Christian Hammers:

> If a User upgrades his woody system to sarge and one package that has
> been part of woody is now no longer part of Debian nor being superseded by
> another package, will apt-get warn the user that this package is a potential
> security risk as Debian does not monitor nor provide fixes for reported
> security issues in this package?

No, of course not.

> For such a cases it would even be a reasonable advice to have both,
> woody/updates and sarge/updates, in the sources.list, or?

I doubt that this will work in general.

A tool which lists all packages which are no longer downloadable from
any APT source would be more helpful, I think.  Does it already exist?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Security risks due to packages that are no longer part of Debian?

2005-07-11 Thread Christian Hammers
Hello

If a User upgrades his woody system to sarge and one package that has
been part of woody is now no longer part of Debian nor being superseded by
another package, will apt-get warn the user that this package is a potential
security risk as Debian does not monitor nor provide fixes for reported
security issues in this package?

For such a cases it would even be a reasonable advice to have both,
woody/updates and sarge/updates, in the sources.list, or?

A possible solution would be to be asked to flag such packages with
  echo "mypackage local" | dpkg --set-selections
or similar which would then surpress the apt-get warnings or optionally
show them explicitly as "watch these on your own".

bye,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 751-1] New squid packages fix IP spoofing vulnerability

2005-07-11 Thread Florian Weimer
* Martin Schulze:

> The upstream developers have discovered a bug in the DNS lookup code
> of Squid, the popular WWW proxy cache.  When the DNS client UDP port
> (assigned by the operating system at startup) is unfiltered and the
> network is not protected from IP spoofing, malicious users can spoof
> DNS lookups which could result in users being redirected to arbitrary
> web sites.

What is the exact cause of the problem?  Non-random message IDs?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 748-1] New ruby1.8 packages fix arbitrary command execution

2005-07-11 Thread Tomas Pospisek
The release frequency of the Security Team seems to be getting up to speed 
again. Congrats to the Security Team for making your way out of the 
problems so quickly.


Thanks a lot!
*t

--

  Tomas Pospisek
  http://sourcepole.com -  Linux & Open Source Solutions



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Ausencia / Abwesenheit

2005-07-11 Thread bodo . tiegel
Muchas gracias por su mensaje. Del 11/07/05 al 05/08/05 no estaré
localizable en la oficina. En casos urgentes pueden ponerse en contacto con
Tomás Gutiérrez a través de [EMAIL PROTECTED]  / Tel +34 945 29 71 13. 
Por favor, tenga en cuenta que su mensaje no se reenvía automáticamente.

Besten Dank für Ihre Nachricht. Ich bin vom 11.07.05 bis 05.08.05 nicht im
Hause. In dringenden Fällen sprechen Sie gerne Herrn Barjo Khalil
an: [EMAIL PROTECTED] / Tel +34 945 29 71 10. Bitte beachten Sie dass
Ihre Mail nicht automatisch weitergeleitet wird.





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



unsubscribe

2005-07-11 Thread Tim Hofman
 

-Original Message-
From: Michael Stone [mailto:[EMAIL PROTECTED] 
Sent: zondag 10 juli 2005 19:55
To: debian-security-announce@lists.debian.org
Subject: [SECURITY] [DSA 749-1] New ettercap packages fix arbitrary code
execution

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA 749-1   [EMAIL PROTECTED]
http://www.debian.org/security/Michael Stone
July 10, 2005 http://www.debian.org/security/faq
- 

Package: ettercap
Vulnerability  : arbitrary code execution
Problem type   : format string error
Debian-specific: no
CVE Id(s)  : CAN-2005-1796

A vulnerability was discovered in the ettercap package which could allow a
remote attacker to execute arbitrary code on the system running ettercap.

The old stable distribution (woody) did not include ettercap.

For the stable distribution (sarge), this problem has been fixed in version
0.7.1-1sarge1.

For the unstable distribution (sid), this problem has been fixed in version
0.7.3-1.

We recommend that you upgrade your ettercap package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list
as given below:

apt-get update
will update the internal database apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the footer to
the proper configuration.


Debian 3.1 (sarge)
- --

  sarge was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
powerpc, s390 and sparc.

  Source archives:

 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1.orig.
tar.gz
  Size/MD5 checksum:  1121758 f769039e0e967e9e09d0365fe358d683
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1.diff.gz
  Size/MD5 checksum: 4027 409603f119d07401bf7671b317e8ccef
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1.dsc
  Size/MD5 checksum:  746 12b96cbc18bdb3bd7b431efbbfa73c34

  alpha architecture (DEC Alpha)

 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1
sarge1_alpha.deb
  Size/MD5 checksum:   262674 3360122f7ee141aa6f2d410f4f834933
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.
1-1sarge1_alpha.deb
  Size/MD5 checksum:   318266 4b09b93eba161a30b2f6cd28c33d0f1d
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1_alpha.deb
  Size/MD5 checksum:   221836 dbe0a871072bcd8d90318b271af1952b

  arm architecture (ARM)

 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1
sarge1_arm.deb
  Size/MD5 checksum:   202390 6feb651f0b27a18e36612804388356e8
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.
1-1sarge1_arm.deb
  Size/MD5 checksum:   288022 062a0e8b4fdc2985a5bf9f5a0bc14fc4
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1_arm.deb
  Size/MD5 checksum:   169426 b08226c852071b61b66c16fd012412ec

  hppa architecture (HP PA RISC)

 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.
1-1sarge1_hppa.deb
  Size/MD5 checksum:   304744 59be8a0479f3b0c9512e5193865c6bc2
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1
sarge1_hppa.deb
  Size/MD5 checksum:   227462 c364ecfec15360338b93176d45d759f3
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1_hppa.deb
  Size/MD5 checksum:   190422 abbb689c039c829ab4358c4983c96c96

  i386 architecture (Intel ia32)

 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1
sarge1_i386.deb
  Size/MD5 checksum:   208398 91059e61c393851e8edb3b841450b46d
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.
1-1sarge1_i386.deb
  Size/MD5 checksum:   286292 be3fff62821300e02ee004deb7a3bf91
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1_i386.deb
  Size/MD5 checksum:   173010 cba1a300d2d2add3c7c8720c287a7d10

  ia64 architecture (Intel ia64)

 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.
1-1sarge1_ia64.deb
  Size/MD5 checksum:   331966 f316f4df7dfc6ea666288f7aa1ef955b
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarg
e1_ia64.deb
  Size/MD5 checksum:   256862 64f34b09f95832daa6de66f4e5a9be0b
 
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1
sarge1_ia64.deb
  Size/MD5 checksum:   304328 6781371e63adcedd74db7a9435f77a64

  m68k architecture (Motorola Mc680x0)

 
http://security.debian.