[rlug] myrinet q.
Salut, A lucrat careva intre voi cu echipamente Myrinet? http://www.myri.com/ Ma intereseaza sa leg un cluster de 8 noduri, care acum functioneaza peste gigabit (destul de incet). Nu stiu daca se justifica achizitia unor echipamente pe 10G, sau cele 2G sunt suficiente in cazul meu, nefiind noduri extrem de rapide sau puternice. Multumesc. ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug
[rlug] proftpd root exploit
Pentru cei cu ProFTPd instalat: http://www.heise-online.co.uk/security/One-year-old-ProFTPD-exploit-now-public--/news/81675 Versiunea din Debian Etch e vulnerabila, inca nu a aparut pachetul cu fixul. HTH ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug
[rlug] ERP romanesc OSS
http://www.computerworld.ro/?page=node&id=6577 Tibi, asteptam o analiza comprehensiva. -- Cu stima, Dragos Manac Lead Operations System & Network Solutions http://www.sns.ro ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug
[rlug] LUG Meeting AZI!
Salut, Dupa cum unii deja stiu, diseara se organizeaza o intalnire informala a membrilor RLUG in Bucuresti, la Terasa Desperado din parcul Herastrau. Locatia este langa statia de metrou Aviatorilor, in capatul bulevadrului Primaverii. Sper ca va descurcati sa ajungeti. (Si NU, NU cautati pe Google terasa desperado bucuresti!). Ca evenimente notabile: 1. Birzan come back 2006. After 3 sabbatical years! + CERF bashing contest. 2. CaCert Assurance Party: http://www.cacert.org/index.php?id=51 Pe scurt, cine va fi asigurat va putea semna/elibera for free oricate ceritificate semnate de CA de la CACert. Pentru a putea porni in .ro asigurarea e nevoie de cel putin 3 persoane cu 150 puncte CACert, iar azi e unul din rarele momente cand sunt toti 3 in Bucuresti. ATENTIE: Aduceti 2 ID-uri la voi, cel putin unul cu poza (chiar si pentru cei care ne/se cunosc). 3. RLUG Org Debate O sa profit de faptul ca vom fi la un loc multi din cei care am pornit sa infiintam organizatia RLUG ca sa vedem in ce masura putem continua ce am inceput acum cativa ani si sa rezolvam o parte din problemele lasate de atunci in aer. Invitatia asta la iesire e cu atat mai importanta pentru cei care au fost sa semneze statutul asociatiei la notar (se stiu ei). Va rog sa veniti. Deja s-au anuntat peste 20 de participanti. Ne vedem acolo! -- Dragos Manac Lead Operations System & Network Solutions http://www.sns.ro ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug
[rlug] mirrorat local
http://ftp.lug.ro/santas-corner/kororaa-xgl-livecd-0.2.iso ftp://ftp.lug.ro/santas-corner/kororaa-xgl-livecd-0.2.iso pentru cei interesati ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug
[rlug] [Fwd: [SECURITY] [DSA 1011-1] New kernel-patch-vserver packages fix root exploit]
Pentru cei ce nu urmaresc listele de securitate si au kernele cu vserver pe Debian. Forwarded Message From: Martin Schulze <[EMAIL PROTECTED]> Reply-To: debian-security@lists.debian.org To: Debian Security Announcements Subject: [SECURITY] [DSA 1011-1] New kernel-patch-vserver packages fix root exploit Date: Tue, 21 Mar 2006 07:53:32 +0100 (CET) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1011-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze March 21st, 2005http://www.debian.org/security/faq - -- Package: kernel-patch-vserver, util-vserver Vulnerability : missing attribute support Problem type : local (remote) Debian-specific: yes CVE IDs: CVE-2005-4347 CVE-2005-4418 Debian Bugs: 329087 329090 Several vulnerabilities have been discovered in the Debian vserver support for Linux. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-4347 Bjørn Steinbrink discovered that the chroot barrier is not set correctly with util-vserver which may result in unauthorised escapes from a vserver to the host system. This vulnerability is limited to the 2.4 kernel patch included in kernel-patch-vserver. The correction to this problem requires updating the util-vserver package as well and installing a new kernel built from the updated kernel-patch-vserver package. CVE-2005-4418 The default policy of util-vserver is set to trust all unknown capabilities instead of considering them as insecure. The old stable distribution (woody) does not contain a kernel-patch-vserver package. For the stable distribution (sarge) this problem has been fixed in version 1.9.5.5 of kernel-patch-vserver and in version 0.30.204-5sarge3 of util-vserver. For the unstable distribution (sid) this problem has been fixed in version 2.3 of kernel-patch-vserver and in version 0.30.208-1 of util-vserver. We recommend that you upgrade your util-vserver and kernel-patch-vserver packages and build a new kernel immediately. Upgrade Instructions - wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - Source archives: http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.dsc Size/MD5 checksum: 637 415731be72a9cd966e2fdb5d4f408c4a http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.tar.gz Size/MD5 checksum: 950447 fe6b34612095d2fbdbaab5aefbd83264 http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.dsc Size/MD5 checksum: 752 e32069a5ca2ef2bc87794cd6c2160821 http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.diff.gz Size/MD5 checksum: 115947 d0bb2cd998a73905189ee24b5f46dd0d http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204.orig.tar.gz Size/MD5 checksum: 677831 b315f375b1cef48da1b644dec18f22bd Architecture independent components: http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5_all.deb Size/MD5 checksum: 436934 b50048ea819d150d660ed96e3988613b Alpha architecture: http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_alpha.deb Size/MD5 checksum: 600660 e52fe0ff93e4c9ca7d58fe8386ebab5a AMD64 architecture: http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_amd64.deb Size/MD5 checksum: 429530 c4155982844c085b7d9bc59d7eaa02c4 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_i386.deb Size/MD5 checksum: 398794 56831faa6fa6d76c601fee78251f50eb Intel IA-64 architecture: http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_ia64.deb Size/MD5 checksum: 640332 ab2b2e4283ca5b62c9d9cf5776b6dadb Big endian MIPS architecture: http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mips.deb Size/MD5 checksum: 612918 e4a60532f25ce776880261de79278e85 Little endian MIPS architecture: http://security.debian.org/pool/u
[rlug] multifunctional pe linux
Salut, Stiti vreun multifunctional care sa fie suportat complet sub linux? (adica printare/scanare). Daca e vreunul potrivit ziceti-mi si cum sta la partea de cartuse/reincarcare. Multumesc. ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug
[rlug] tivo
Salut, Vreau sa fac o masina care sa inregistreze stuff de la tv din cand in cand, un fel de Tivo. Am cautat un pic dar nu am gasit niciun pachet gata facut. E vreo solutie mai comoda decat cron-uri care sa apeleze mplayer/dumpstream? Nu ca asta ar fi criminala, dar s-ar putea sa fie operata si de persoane fara prea mare pregatire tehnica. Multumesc. -- Cu stima, Dragos Manac Lead Operations System & Network Solutions http://www.sns.ro ___ RLUG mailing list RLUG@lists.lug.ro http://lists.lug.ro/mailman/listinfo/rlug