Hi all!
Can someone advise me to place where i can obtain some kind of
"official" md5 sums of packages included in 2.2r2? Didn't found
something like this on ftp. Only sums for disk images and base2_2.tgz
packet. Those are great benefit for me, but surely not all that i've
need right now. Thanks
On Wed, Mar 28, 2001 at 03:33:32PM +0700 , [EMAIL PROTECTED] wrote:
Hi all!
Can someone advise me to place where i can obtain some kind of
"official" md5 sums of packages included in 2.2r2? Didn't found
Packages
Petr Cech
--
Debian GNU/Linux maintainer -
On 28 Mar 2001 [EMAIL PROTECTED] wrote:
Hi all!
Can someone advise me to place where i can obtain some kind of
"official" md5 sums of packages included in 2.2r2? Didn't found
something like this on ftp. Only sums for disk images and base2_2.tgz
packet. Those are great benefit for me,
Hi!
How do you get on the security update notification list?
I thought I had joined, but noticed several updates that I wasn't notified
about.
Thanks!
Steve
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Wed, Mar 28, 2001 at 10:06:32AM -0500, Steve Rudd wrote:
Hi!
How do you get on the security update notification list?
I thought I had joined, but noticed several updates that I wasn't notified
about.
I'm subscribed to the debian-security-announce mailing list, and I get
updates from
Greetings,
I have reciently loaded IPPL onto a server, now I get barraged with the
following messages in syslog (Running Debian 2.2)
Mar 29 10:02:51 ## ippl: ICMP message type destination unreachable -
bad port
from localhost [127.0.0.1] (127.0.0.1-127.0.0.1)
This occurs every couple of
On Thu, Mar 29, 2001 at 11:15:03AM +1000, Shane Machon wrote:
Greetings,
I have reciently loaded IPPL onto a server, now I get barraged with the
following messages in syslog (Running Debian 2.2)
Mar 29 10:02:51 ## ippl: ICMP message type destination unreachable -
bad port
from
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb files, but the /usr/bin/ files that come from them)
can be obtained?
[EMAIL PROTECTED] (William R. Ward) writes:
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb files, but the /usr/bin/
On Wed, Mar 28, 2001 at 06:42:37PM -0800, William R. Ward wrote:
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb files,
Ethan Benson wrote:
On Wed, Mar 28, 2001 at 06:42:37PM -0800, William R. Ward wrote:
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
Olaf Meeuwissen writes:
[EMAIL PROTECTED] (William R. Ward) writes:
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb
Hi all!
Can someone advise me to place where i can obtain some kind of
official md5 sums of packages included in 2.2r2? Didn't found
something like this on ftp. Only sums for disk images and base2_2.tgz
packet. Those are great benefit for me, but surely not all that i've
need right now. Thanks in
On Wed, Mar 28, 2001 at 03:33:32PM +0700 , [EMAIL PROTECTED] wrote:
Hi all!
Can someone advise me to place where i can obtain some kind of
official md5 sums of packages included in 2.2r2? Didn't found
Packages
Petr Cech
--
Debian GNU/Linux maintainer -
On 28 Mar 2001 [EMAIL PROTECTED] wrote:
Hi all!
Can someone advise me to place where i can obtain some kind of
official md5 sums of packages included in 2.2r2? Didn't found
something like this on ftp. Only sums for disk images and base2_2.tgz
packet. Those are great benefit for me, but
Hi!
How do you get on the security update notification list?
I thought I had joined, but noticed several updates that I wasn't notified
about.
Thanks!
Steve
On Wed, Mar 28, 2001 at 10:06:32AM -0500, Steve Rudd wrote:
Hi!
How do you get on the security update notification list?
I thought I had joined, but noticed several updates that I wasn't notified
about.
I'm subscribed to the debian-security-announce mailing list, and I get
updates from
Greetings,
I have reciently loaded IPPL onto a server, now I get barraged with the
following messages in syslog (Running Debian 2.2)
Mar 29 10:02:51 ## ippl: ICMP message type destination unreachable -
bad port
from localhost [127.0.0.1] (127.0.0.1-127.0.0.1)
This occurs every couple of
On Thu, Mar 29, 2001 at 11:15:03AM +1000, Shane Machon wrote:
Greetings,
I have reciently loaded IPPL onto a server, now I get barraged with the
following messages in syslog (Running Debian 2.2)
Mar 29 10:02:51 ## ippl: ICMP message type destination unreachable -
bad port
from
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb files, but the /usr/bin/ files that come from them)
can be obtained?
[EMAIL PROTECTED] (William R. Ward) writes:
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb files, but the /usr/bin/
On Wed, Mar 28, 2001 at 06:42:37PM -0800, William R. Ward wrote:
One way to test if you have been hacked is to run an MD5 checksum of
key binaries and look to see if it's been replaced by the intruder.
Is there any place where the MD5 sums of individual executable files
(not the .deb files,
22 matches
Mail list logo