no
For a wide range of mobile phones,free upgrades,accessories and tariffs
plus special deals when you buy online,visit www.o2.co.uk/shop
http://www.o2.co.uk/shop
Try mod_dosevasive on a google search if you're looking for something to
protect apache
- Original Message -
From: Chad Adlawan [EMAIL PROTECTED]
To: debian-isp@lists.debian.org
Sent: Thursday, 20 January, 2005 11:45 PM
Subject: good DoS / DDoS detection tool
Good Day!
Can anyone
Try CESNET Netflow monitor and/or
ntop.
I have used both on Fedora without issues. I
believe both support debian.
Ismail.
On Mon, Jan 17, 2005 at 08:49:24PM +0300, Peter Clark wrote:
On Monday 17 January 2005 12:08, Wouter Verhelst wrote:
Are the things you want to send through the proxy delimited by the
network they appear on? e.g., you want traffic for the 'Net to go
through the proxy, but want to keep
Op zo, 16-01-2005 te 06:21 +0300, schreef Peter Clark:
On Saturday 15 January 2005 16:39, Fraser Campbell wrote:
If you put squid as people's default gateway then you can transparently
redirect all web requests through squid, if they hadn't authenticated then
you could have an
On Mon, 2005-01-10 at 10:48 +0100, nodata wrote:
Good morning,
I'm having a some permissions trouble with suexec running on Sarge.
I have a virtualhost for a user called Bob which specifies User Bob and
Group Bob in the /etc/apache/conf.d/bob.conf file.
The permissions on /var/www/bob
On Monday 17 January 2005 12:08, Wouter Verhelst wrote:
Are the things you want to send through the proxy delimited by the
network they appear on? e.g., you want traffic for the 'Net to go
through the proxy, but want to keep traffic for your local LAN as direct
traffic? If so, then transparent
Hello Peter,
Sunday, January 16, 2005, 4:21:10, you wrote:
PC But this would require changing the user's browser settings, right? The
PC thing is, I don't want _everything_ to go through the proxy, which is what
PC would usually happen if it was set via the browser.
Do I understand right
On Sunday 16 January 2005 02:51, Stephen Gran wrote:
This one time, at band camp, David Schmitt said:
I also have my virtual_domain list in a file:
[EMAIL PROTECTED]:~$ grep
virtual_domains /etc/exim4/conf.d/main/01_exim4-config_listmacrosdefs
domainlist virtual_domains =
On Friday 14 January 2005 03:56, Peter Clark wrote:
I would like to provide a proxy service that can be used only by
accessing a web page. In other words, I don't want users to enter proxy
details in their browser settings, but rather, if they want to go through a
proxy, they can visit a
I am also interested in this thread, but I find some parts obscure.
Would you please be more explicit in the following
* put this into /etc/exim4/conf.d/router/160_local_virtual_users
* add a domainlist virtual_domains = ... to conf.d/main/
that is, what is the syntax for '...' ? would that
On Saturday 15 January 2005 16:16, Antonio Rodriguez wrote:
I am also interested in this thread, but I find some parts obscure.
Would you please be more explicit in the following
* put this into /etc/exim4/conf.d/router/160_local_virtual_users
* add a domainlist virtual_domains = ... to
This one time, at band camp, TR RCPG said:
Would someone kindly post the relevant parts of an
exim4 configuration for a machine that works as isp
with virtual domains, and different users (with
possible not empty intersection set of users for
different domains)? Some directions about combined
This one time, at band camp, David Schmitt said:
I also have my virtual_domain list in a file:
[EMAIL PROTECTED]:~$ grep
virtual_domains /etc/exim4/conf.d/main/01_exim4-config_listmacrosdefs
domainlist virtual_domains = lsearch*;/etc/mail/virtual-domains
Why an lsearch* for
On Saturday 15 January 2005 16:39, Fraser Campbell wrote:
If you put squid as people's default gateway then you can transparently
redirect all web requests through squid, if they hadn't authenticated then
you could have an authentication box pop up or redirect them to an
authentication webpage
Peter Clark wrote:
On Friday 14 January 2005 19:59, MB [c] wrote:
You should be able to do this with a JSP. You should also be able to
get SSL pages as well. I don't have an example handy, but this is not a
trivial task. If there has not been answer from someone else, I'll try
to get you an
Am Thursday den 13. January 2005 schrieb TR RCPG:
Would someone kindly post the relevant parts of an
exim4 configuration for a machine that works as isp
with virtual domains, and different users (with
possible not empty intersection set of users for
different domains)? Some directions about
On Thu, Jan 13, 2005 at 06:14:05PM -0800, TR RCPG wrote:
--- Wouter Verhelst [EMAIL PROTECTED] wrote:
[...]
Hi Walter,
It's Wouter :-)
thank you for answering. Would you recommend following some other
route, may be postfix or some different combination?
That's up to you. I prefer exim, and
--- Wouter Verhelst [EMAIL PROTECTED] wrote:
On Thu, Jan 13, 2005 at 06:14:05PM -0800, TR RCPG
wrote:
--- Wouter Verhelst [EMAIL PROTECTED] wrote:
[...]
Hi Walter,
It's Wouter :-)
I'm sorry. My eyes are getting old. {*_|*}
thank you for answering. Would you recommend
following
Hello,
TR RCPG wrote:
I agree, but the manual is so BIG! Thats the greatest
problem: reading it all and remembering details. Any
shorter doc that you know about it? Browsing I found
the following:
http://www.marlow.dk/site.php/tech/ispworks
Has anybody used this, how does it rate? It somewhat
Op vr, 14-01-2005 te 01:47 -0800, schreef TR RCPG:
I need something simple and yet with enough power.
Well, then exim will certainly do. One of its
original design decisions
was let's not make things needlessly complicated,
but it is extremely
powerful.
I agree, but the manual
Peter Clark wrote:
I would like to provide a proxy service that can be used only by accessing
a web page. In other words, I don't want users to enter proxy details in
their browser settings, but rather, if they want to go through a proxy, they
can visit a webpage, enter a URL in a form, and
TR RCPG wrote:
Would someone kindly post the relevant parts of an
exim4 configuration for a machine that works as isp
with virtual domains, and different users (with
possible not empty intersection set of users for
different domains)? Some directions about combined
remote mail retrieval + web
On Friday 14 January 2005 19:59, MB [c] wrote:
You should be able to do this with a JSP. You should also be able to
get SSL pages as well. I don't have an example handy, but this is not a
trivial task. If there has not been answer from someone else, I'll try
to get you an example soon.
Do
Peter Clark wrote:
I would like to provide a proxy service that can be used only by accessing
a web page. In other words, I don't want users to enter proxy details in
their browser settings, but rather, if they want to go through a proxy, they
can visit a webpage, enter a URL in a form, and
Ok.. Best of things to you.
Best regards,Cristian
Mezei
http://www.xperts.ro
Title: Re: Legal English online seminar
I have some more questions regarding a.m. offering:
What ist the average time input into this seminar on the participant's side?
When are other seminars scheduled for 2005?
Do you have more information on the set up of the seminar?
Thanks,
Monika
Op do, 13-01-2005 te 11:38 -0800, schreef TR RCPG:
Would someone kindly post the relevant parts of an
exim4 configuration for a machine that works as isp
with virtual domains, and different users (with
possible not empty intersection set of users for
different domains)? Some directions about
--- Wouter Verhelst [EMAIL PROTECTED] wrote:
Op do, 13-01-2005 te 11:38 -0800, schreef TR RCPG:
Would someone kindly post the relevant parts of an
exim4 configuration for a machine that works as
isp
with virtual domains, and different users (with
possible not empty intersection set of
Fraser Campbell wrote:
On Sunday 12 December 2004 17:46, Marek Podmaka wrote:
I don't want to give hints on how to exploit this, but the attacker
did wget the .tgz file, unpacked it in /tmp and run the program.
So update all your phpBB installations ASAP (and of course all
installations of
W. Andrew Loe III [EMAIL PROTECTED] wrote:
I'm currently using Courier-IMAP as my IMAP mail server, but the way it
handles folders is a bit annoying (.FolderName/cur/ .FolderName/new/).
Is this standard IMAP protocol, or do different servers handle this
differently? Which other servers
Am 2005-01-12 16:27:05, schrieb W. Andrew Loe III:
I'm currently using Courier-IMAP as my IMAP mail server, but the way it
handles folders is a bit annoying (.FolderName/cur/ .FolderName/new/).
Is this standard IMAP protocol, or do different servers handle this
differently? Which other
Michael F. Sprague wrote:
W. Andrew Loe III [EMAIL PROTECTED] wrote:
I'm currently using Courier-IMAP as my IMAP mail server, but the way it
handles folders is a bit annoying (.FolderName/cur/ .FolderName/new/).
Is this standard IMAP protocol, or do different servers handle this
differently?
On 13 Jan 2005, at 00:07, W. Andrew Loe III wrote:
I'm sorry, I meant to refer to its implementation of Maildir. Is this
the standard format? I had a lot of trouble getting this format to
work well with Apple Mail. I'm pretty sure its Mail's issue as
thunderbird works perfectly.
Eh... I don't
On Jan 12, 2005, at 3:15 PM, Philipp Kern wrote:
On 13 Jan 2005, at 00:07, W. Andrew Loe III wrote:
I'm sorry, I meant to refer to its implementation of Maildir. Is this
the standard format? I had a lot of trouble getting this format to
work well with Apple Mail. I'm pretty sure its Mail's issue
On Wednesday 12 January 2005 18:34, Eric Jennings wrote:
We've experienced some issues with courier-imapd and Mail.app,
specifically where certain IMAP sub-Maildir mailboxes wouldn't display
within Mail.app. The mailboxes work great within Thunderbird.
It's been infrequent enough where we
I do recall at one stage you had to create a symlink back to the base of the
Maildir called INBOX for Mail.app to work:
ln -s Maildir/ Maildir/.INBOX
Hope that helps
Ned
We've experienced some issues with courier-imapd and Mail.app,
specifically where certain IMAP sub-Maildir mailboxes
Adrian von Bidder wrote:
If you believe their advertisement, Exabytes VXA tapes are a cost-effective
solution, compared to other tape solutions.
I have no experience with them, I just thought I'd point you in that
direction if you haven't investigated them yet.
I used some of these a few
Francesco P. Lovergine said:
I run apache using dchroot to avoid the most common problems.
Breaking a chroot is possible, but not so easy and it's more
difficult within dchroot which _should_ drops privileges properly AFAIK
On Saturday 08 January 2005 17.46, Michelle Konzack wrote:
[Tapes]
My only problem is that my purse is very limited
to =700 Euro.
If you believe their advertisement, Exabytes VXA tapes are a cost-effective
solution, compared to other tape solutions.
I have no experience with them, I just
nodata wrote:
Good morning,
I'm having a some permissions trouble with suexec running on Sarge.
I have a virtualhost for a user called Bob which specifies User Bob and
Group Bob in the /etc/apache/conf.d/bob.conf file.
snip
If I switch user to bob, and run ls -la on /, /var, /var/www, /var/www/bob
Blair Strang wrote:
nodata wrote:
Good morning,
I'm having a some permissions trouble with suexec running on Sarge.
I have a virtualhost for a user called Bob which specifies User Bob and
Group Bob in the /etc/apache/conf.d/bob.conf file.
snip
If I switch user to bob, and run ls -la on /, /var,
discussion of User directive in VirtualHost elided
nodata wrote:
Ah this would explain things more - but then shouldn't running
http://website/cgi-bin/test.pl work? I get the same search permissions
error..
Er, yep, as far as I can see, it should. suEXEC can be a little...
finicky :)
What does
discussion of User directive in VirtualHost elided
nodata wrote:
Ah this would explain things more - but then shouldn't running
http://website/cgi-bin/test.pl work? I get the same search permissions
error..
Er, yep, as far as I can see, it should. suEXEC can be a little...
finicky :)
On Monday 10 January 2005 11:34, nodata wrote:
nodata wrote:
From: http://httpd.apache.org/docs/mod/core.html#user
Special note: Use of this directive in VirtualHost requires a properly
configured suEXEC wrapper. When used inside a VirtualHost in this
manner,
only the user that CGIs
On Monday 10 January 2005 11:34, nodata wrote:
nodata wrote:
From: http://httpd.apache.org/docs/mod/core.html#user
Special note: Use of this directive in VirtualHost requires a
properly
configured suEXEC wrapper. When used inside a VirtualHost in this
manner,
only the user that
nodata wrote:
discussion of User directive in VirtualHost elided
nodata wrote:
Ah this would explain things more - but then shouldn't running
http://website/cgi-bin/test.pl work? I get the same search permissions
error..
Er, yep, as far as I can see, it should. suEXEC can be a little...
finicky
On Monday 10 January 2005 12:05, nodata wrote:
On Monday 10 January 2005 11:34, nodata wrote:
nodata wrote:
Ah this would explain things more - but then shouldn't running
http://website/cgi-bin/test.pl work? I get the same search permissions
error..
Why of course. The server
nodata wrote:
discussion of User directive in VirtualHost elided
nodata wrote:
Ah this would explain things more - but then shouldn't running
http://website/cgi-bin/test.pl work? I get the same search permissions
error..
Er, yep, as far as I can see, it should. suEXEC can be a little...
nodata wrote:
Done. chmod o+rx on:
/var/www/bob
/var/www/bob/htdocs
/var/www/bob/cgi-bin
then running a system(touch /tmp/blairtest) from cgi-bin/test.pl creates
a file with bob:bob permissions.
The other thing to check is that your scripts are physically located under
suEXEC's DOC_ROOT
The problem with this setup is that I have to have o+rx permission on
directories and non-executables, which is a little messy (and I'm not
sure
whether vsftpd can handle this).
Plus everyone on the machine can now read the files.
Ack.
Well, to get /proper/ isolation you have to run
On Sat, 2005-01-08 at 17:46 +0100, Michelle Konzack wrote:
Because my old DAT is not more enough, I consider to buy a DLT with
80-160 GByte. Because I have no experience with it, I like to here
some suggestions. My only problem is that my purse is very limited
to =700 Euro.
DLT is a quite
Hello Michelle
On 2005-01-08 Michelle Konzack wrote:
Because my old DAT is not more enough, I consider to buy a DLT with
80-160 GByte. Because I have no experience with it, I like to here
some suggestions. My only problem is that my purse is very limited
to =700 Euro.
Why not take a couple
Am 2005-01-08 18:11:34, schrieb Mark Janssen:
DLT is a quite expensive way to backup, especially considering the price
of the tapes (50-100 euros). Depending on how many backups and how much
data you want to keep around it might be interesting to look at other
solutions
(External harddrives,
Because my old DAT is not more enough, I consider to buy a DLT with
80-160 GByte. Because I have no experience with it, I like to here
some suggestions. My only problem is that my purse is very limited
to =700 Euro.
Are the DLT only SCSI or do they exist in PATA and SATA too ?
I just
Hi.
Why don't you try www.lamit.ro . They have two way mobile systems
too, as wellas fixed solutions.
For more info, contact me at http://forum.xperts.ro . I'll read it for
sure.
Hope i helped and best of things to
you.
BEGIN:VCARD
VERSION:2.1
N:Mezei;Cristian;Mihai;Dl.
FN:Cristian Mihai
Long time ago... :-)
Hello Cristian,
Am 2005-01-07 15:29:37, schrieb Cristian Mezei:
Hi.
Why don't you try www.lamit.ro . They have two way mobile systems too,
as well as fixed solutions.
I will check it out.
For more info, contact me at http://forum.xperts.ro . I'll read it for
sure.
Questa è una risposta automatica.
Ti ringraziamo di averci scritto, ma purtroppo l'indirizzo
[EMAIL PROTECTED] non è più utilizzato, quindi il messaggio che
ci hai inviato non è stato ricevuto.
Ti preghiamo di contattarci attraverso il form sul sito
http://cinema.supereva.it
--
To
Thanks for weighing in with your opinion, which was basically what I
was planning to do anyways unless I heard otherwise. We don't run
cutting-edge kernels, only upgrading for important bug or security
patches. Combined with nightly backups of customer data, I think we'll
be pretty safe
On Thu, Jan 06, 2005 at 01:26:02AM -0700, Glenn Oppegard wrote:
Hello,
We have production machines that have ext3 partitions bigger than
100GB. On our last kernel upgrade, we were surprised to see the
machines do an fsck on all partitions even though they were unmounted
cleanly.
Upon
On Thu, 06 Jan 2005, Wouter Verhelst wrote:
If you always upgrade to the latest kernel when it's out, it's probably
a good idea to leave it on; otherwise, and as long as you don't
experience problems, I suggest to switch it off.
Also, if you do not have ECC RAM (with a chipset/arch that does
On Thursday 06 January 2005 22:48, Wouter Verhelst [EMAIL PROTECTED] wrote:
That is mostly relevant for systems that don't take regular backups. If
you do (and for the sake of your customers, I hope that is the case),
the extra precaution isn't really necessary, and probably a bad idea if
the
Tomasz Papszun wrote:
On Tue, 04 Jan 2005 at 15:37:46 -0600, Rodney Richison wrote:
Am building a new server to replace one. (Trading Redhat for Debian)
On the new machine, which is only recieving for one domain while in
testing, Logcheck is reporting that postfix has a problem looking up
Tomasz Papszun wrote:
On Tue, 04 Jan 2005 at 15:37:46 -0600, Rodney Richison wrote:
Am building a new server to replace one. (Trading Redhat for Debian)
On the new machine, which is only recieving for one domain while in
testing, Logcheck is reporting that postfix has a problem looking up
, , ?
,
?
- !
:
-
,
.
ABGYMNIC -- ,
,.
!
! ..
.
. !
http://DOMOVENOK.INFO/index.php?CID=7
.
What software would people recommend for remotely monitoring a server? I'm
not talking about intrustion detection and whatnot, just keeping an eye on
things like CPU load, memory, bandwidth usage, etc. Bonus points if it uses
something like RRD--graphs and charts are not just pretty
On Tue, 04 Jan 2005 at 15:37:46 -0600, Rodney Richison wrote:
Am building a new server to replace one. (Trading Redhat for Debian)
On the new machine, which is only recieving for one domain while in
testing, Logcheck is reporting that postfix has a problem looking up rbl's.
I am not running
Jacob S wrote:
On Wed, 5 Jan 2005 06:50:24 +0300
Peter Clark [EMAIL PROTECTED] wrote:
What software would people recommend for remotely monitoring a
server? I'm
not talking about intrustion detection and whatnot, just keeping an
eye on things like CPU load, memory, bandwidth usage, etc.
On Wed, Jan 05, 2005 at 08:40:21AM -0500, Mark Bucciarelli wrote:
[ Is debian-mentors the proper list for this type of packaging question? ]
debian-mentors is meant for people who want to package software, I
think. It would probably be best to ask the package maintainer himself
([EMAIL
On Wed, Jan 05, 2005 at 08:40:21AM -0500,
Mark Bucciarelli [EMAIL PROTECTED] wrote
a message of 21 lines which said:
I've done apt-get source and poked around a bit but could not tell
where the Debian patches made to upstream live.
$PACKAGE_$VERSION.diff.gz
(Some big packages use a more
On Wednesday 05 January 2005 08:58, Marcin Owsiany wrote:
On Wed, Jan 05, 2005 at 08:40:21AM -0500, Mark Bucciarelli wrote:
On my Woody box, courier-mta logs pop transactions with the tag
courierpop3login:. The logs of other courier users (freebsd, gentoo
for example) have the string
On 5 Jan 2005, at 14:29, John Barton wrote:
If you want to monitor resources on a remote system, try cacti. It has
great graphing capability using RRD. One of my favorite features is
being able to highlight a section of your graph and have it draw a new
graph to zoom in on the area of concern.
On Tuesday 04 January 2005 03:53, Jens Zahner wrote:
martin f krafft wrote:
Beyond the documentation and the comments in the files in
/etc/courier, you mean?
I couldn't find any helpfull information about ssl cert based auth
neither in the files nor in the documentation and google couldn't
On Tue, Jan 04, 2005 at 08:48:57AM -0500, Mark Bucciarelli wrote:
Did you try this?
# apt-get install courier-imap-ssl
# man mkimapdcert
# cat /etc/courier/imapd.cnf
As I understand, he want to authenticate users with ssl certs, not only
to encrypt the imap transmission. I don't know if
Op ma, 03-01-2005 te 17:28 -0300, schreef Ing. Jorge Escudero:
What POP or IMAP or Web mail Server use to exim on Debian?
I'm not entirely sure I understand your question correctly. Do you mean
What POP or IMAP daemon can I use with exim on Debian?
or rather,
Is there a Web mail client I can
On Tuesday 04 January 2005 08:55, Emmanuel Lacour wrote:
As I understand, he want to authenticate users with ssl certs
Courier can do SASL_PLAIN auth for imap and pop auth.
See /etc/courier/imapd and /etc/courier/pop3d.
Regards,
Mark
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
On Wed, 5 Jan 2005 06:50:24 +0300
Peter Clark [EMAIL PROTECTED] wrote:
What software would people recommend for remotely monitoring a
server? I'm
not talking about intrustion detection and whatnot, just keeping an
eye on things like CPU load, memory, bandwidth usage, etc. Bonus
This one time, at band camp, Peter Clark said:
What software would people recommend for remotely monitoring a server?
I'm
not talking about intrustion detection and whatnot, just keeping an eye on
things like CPU load, memory, bandwidth usage, etc. Bonus points if it uses
something
Many thanks - it works.
But there is another problem. I want ftp to read the file from a pipe. I
get this error:
local: backup.tar.gpg remote: backup.tar.gpg
backup.tar.gpg: not a plain file.
(backup.tar.gpg is a pipe)
Is it anyhow possible to force ftp to read the file from a pipe?
Many thanks
On Monday 03 January 2005 12:29, Antonin Karasek wrote:
Many thanks - it works.
But there is another problem. I want ftp to read the file from a
pipe. I get this error:
local: backup.tar.gpg remote: backup.tar.gpg
backup.tar.gpg: not a plain file.
(backup.tar.gpg is a pipe)
Is it anyhow
It's a little hard-core, but I CAN pipe over ftp - I just found yout how.
Fro a case, that anybody else need this, here is the script:
#!/bin/bash
date
cd /backup
mknod week.tar p
mknod week.tar.gpg p
tar -cpf week.tar --exclude=proc /
echo password | gpg -c --passphrase-fd 0 \
--no-tty
On Monday 03 January 2005 04:05, Antonin Karasek wrote:
I make my backups by tar and encrypt it by gpg.
Are you doing this to protect the stored data or to protect the data in
transit (ftp)?
Is it possible to send the file directly from a pipe? More precisely -
gpg will write it's output
What POP or IMAP or Web mail Server use to exim on Debian?
thanks you
--
Ing. Jorge Escudero
Seguridad Informática
Unidad de Información Financiera
Ministerio de Justicia
Cerrito 264, 3er. piso
1010 - Capital Federal
TE 4384-5981 int. 327
http://www.uif.gov.ar/
--
To UNSUBSCRIBE, email to [EMAIL
Op di, 28-12-2004 te 23:13 -0600, schreef W.AndrewLoeIII:
[...]
sed: -e expression #1, char 43: unterminated `s' command
dpkg: error processing mailman (--configure):
subprocess post-installation script returned error exit status 1
Errors were encountered while processing:
mailman
E:
also sprach Wouter Verhelst [EMAIL PROTECTED] [2004.12.29.0936 +0100]:
Actually, this looks like a bug in the package to me. You'll want to use
'reportbug'.
sed -i -e '1aset -x' /var/lib/dpkg/info/mailman.postinst
apt-get -f install
and include the output of that command in the bug report.
--
also sprach Jens Zahner [EMAIL PROTECTED] [2004.12.29.1121 +0100]:
Any hints?
Beyond the documentation and the comments in the files in
/etc/courier, you mean?
--
Please do not send copies of list mail to me; I read the list!
.''`. martin f. krafft [EMAIL PROTECTED]
: :' :proud
This is not feasible for three good reasons:
1. i would need to authenticate the access page
so giving an username/password to anuy possible user, each one with
its permissions.
2. I do not know in advance not only the users, but neither what are the
possible shares to be used.
On Friday 10 December 2004 21:31, Adrian von Bidder [EMAIL PROTECTED]
wrote:
As has already been suggested it would be good to be able to configure
the number of messages that come through before the client IP is
white-listed.
But I think the
problem of this would be that initial
Andrew,
Look at these 2 sites:
http://www.natecarlson.com/linux/ipsec-x509.php
http://www.jacco2.dds.nl/networking/freeswan-l2tp.html#L2TPoverview
You probebly need something like this in your ipsec.conf
In the basic config:nat_traversal=yes
and in the connection configs:
Sure it's feasible, I've done it. Actually these are all good reasons *to*
do it this way. U retain more control over who can see what. Call me
paranoid. Not knocking smbwebclient, this is just more locked-down.
At 09:50 AM 12/27/04 +0100, Leonardo Boselli wrote:
This is not feasible for
On Sun, Dec 26, 2004 at 11:48:07PM +0100, Leonardo Boselli wrote:
LB I try again on this list:
LB I have seen somewhere a program that acts as a web server that allows to
LB browse throught the window (and samba) servers in a subnet, from a single
LB point.
LB This wopuld allow people to
You can also do it by mounting the share with samba as part of the regular
file system. Then it's just another directory under the document root (or
alias). If u ask me this is safer than using smbwebclient because I
wouldn't trust giving random people free reign into the NT environment. As
an
On Fri, Dec 24, 2004 at 04:14:43PM +0200, naim abu darwish wrote:
hi,
Consider you have a network that you know nothing about. if you have
traceroute results to and from many hosts, theoretically and map could
be drawn to visuallise the network using common intersections. I need
a map, and if
At 09:14 AM 12/24/2004, naim abu darwish wrote:
Consider you have a network that you know nothing about. if you have
traceroute results to and from many hosts, theoretically and map could
be drawn to visuallise the network using common intersections.
Naim, this may or may not be helpful but I
On Fri, 24 Dec 2004 11:29:33 -0500, Marty Landman
[EMAIL PROTECTED] wrote:
At 09:14 AM 12/24/2004, naim abu darwish wrote:
Consider you have a network that you know nothing about. if you have
traceroute results to and from many hosts, theoretically and map could
be drawn to visuallise the
On Fri, Dec 24, 2004 at 07:02:52PM +0200, naim abu darwish wrote:
Thanks Marty
I Forgot to mention that the network has routers. The main objective
is to understand the network better, and have some kind of visual aid,
like a map with the machines labeled.
cheops ?
Steve
--
l want to change my user name
On 22. Dec 2004, at 23:58 Uhr, Jacob S wrote:
You make it sound like the version in Sarge has these security
vulnerabilities fixed. Except, it's still 4.3.9 - instead of 4.3.10
which is supposed to fix this problem.
4.3.10 is already in Sarge. (See http://packages.qa.debian.org/php4)
Regards,
I'd just like to have at least an indication if anyone even _wants_
to fix the existing PHP version, or... not.
Something I don't really get here. Debian states on it's site:
-- IMPORTANT: the `unstable' version of Debian is the version to
which the newest versions of Debian packages are
On Do, 23.12.2004, 09:23, Jasper Metselaar wrote:
...
The `testing' distribution is not necessarily better than `unstable',
because it does not receive security updates quickly. For servers and
other production systems stable should always be used. --
But how can we still stick to the PHP
1 - 100 of 14431 matches
Mail list logo