Just some different versions. Here you go,
bind.x86_64 30:9.3.6-20.P1.el5_8.5 base
bind97.x86_64 32:9.7.0-17.P2.el5 base
As you can see, bind is 9.3.6-20.P1, and bind97 is 9.7.0-17.P2.
Banyan He
Blog: http://www.rootong.com
Email: ban...@root
Hi,
sorry if this has been covered, I searched google for this but can't find an
answer (maybe I am trying the incorrect search terms).
What is bind97?
What are the differences between bind97 and bind?
thanks
Jobst
--
Fortune: No such file or directory.
| |0| | Jobst Schmalenbach, jo.
m.r...@5-cent.us wrote:
> m.r...@5-cent.us wrote:
>> Odd problem. Two 6.4 boxes, and a user's home directory is automounted.
>> /etc/passwd are identical... but once mounted on the other server, if we
>> su - to that user, what we see is an old UID of his, from a while back
>> (years?), while on t
m.r...@5-cent.us wrote:
> Odd problem. Two 6.4 boxes, and a user's home directory is automounted.
> /etc/passwd are identical... but once mounted on the other server, if we
> su - to that user, what we see is an old UID of his, from a while back
> (years?), while on the home directory server, it's
Odd problem. Two 6.4 boxes, and a user's home directory is automounted.
/etc/passwd are identical... but once mounted on the other server, if we
su - to that user, what we see is an old UID of his, from a while back
(years?), while on the home directory server, it's the current, correct
UID.
Anyo
Bry8 Star wrote:
> Hi,
> QUESTION:
> what implications are there when using the "root" or a root type of
> account via a port-forwarding ssh-tunnel inside (or on top of)
> another non-root type of user's ssh-tunnel ?
>
> Is such double layer of encryption brings more security or system
> still vuln
On Mon, 1 Apr 2013, Eero Volotinen wrote:
> http://blog.acsystem.sk/linux/brute-force-attack-dovecot-imap-server-blocking-ip-with-tcp-wrappers
Much thanks for the link; there is this one also:
http://wiki2.dovecot.org/LoginProcess (you need to go to the very bottom)
> so, I think that process na
Hi,
QUESTION:
what implications are there when using the "root" or a root type of
account via a port-forwarding ssh-tunnel inside (or on top of)
another non-root type of user's ssh-tunnel ?
Is such double layer of encryption brings more security or system
still vulnerable same as single layer of S
8 matches
Mail list logo