deb http://security.debian.org/debian-security potato/updates main contrib non-
free
deb http://security.debian.org/debian-non-US potato/non-US main contrib non-fre
e
deb http://security.debian.org potato/updates main contrib non-free
Someone administering the www.debian.org security
--
Alan McNatty
Catalyst IT Ltd
Level 22 - 105 The Terrace,
Wellington
phone: 4 4992267 x705
mob: 21 2661571
email: [EMAIL PROTECTED]
test.pl
Improvements always welcome ;-)
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
deb http://security.debian.org potato/updates main contrib non-free
does this actually work from what I can tell it ends up being
http://security.debian.org/potato/updates/main/*
http://security.debian.org/potato/updates/contrib/*
Try
http://security.debian.org/dists/potato/updates/main/*
http://security.debian.org/dists/potato/updates/contrib/*
http://security.debian.org/dists/potato/updates/non-free/*
On Friday 20 July 2001 03:33, Jason Thomas wrote:
On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
deb
On Thu, 19 Jul 2001, Brian Rectanus wrote:
xxx.xxx.xxx.xxx - - [19/Jul/2001:14:28:23 -0400] GET
/default.ida?NNN
http://www.eeye.com/html/Research/Advisories/AL20010717.html
--
[-]
you're wasting my time, chatterbox.
--
To
Hi list,
I wrote a program that needs to run setuid root due to direct hardware access
(Package: avrprog).
This program needs to read data from a file and also write to other file.
I could use some options like this:
$ avrprog -i input.data -o output.data
But I chose to
Hola!
--- Pedro Zorzenon Neto [EMAIL PROTECTED] wrote:
This program needs to read data from a file and
also write to other file.
I could use some options like this:
$ avrprog -i input.data -o output.data
But I chose to use stdin/stdout instead.
$ avrprog
On Fri, Jul 20, 2001 at 12:42:13PM +0100, David Wright wrote:
Do you mean this package?
Programmer for Atmel AVR microcontrolers that uses PC parallel port
Yes.
If so, I'm not sure why you think it needs to be setuid. Just
chgrp somegroup /dev/lp0 (or whichever port) and put yourself
Dilemna:
I want to run iptables, but I'm running stable. I have a
clean, bootable 2.4.6 kernel (took awhile, but I got it), and
then realized that the iptable package in not in stable, but
is in testing and unstable. I looked for deb-src, but
couldn't find any. I figured I
On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
Do I need to dist-upgrade to woody to use iptables?
Nope.
http://netfilter.samba.org
Compiles very easily from source. HTH.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org.
Wichert Akkerman [EMAIL PROTECTED] writes:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org. Almost all attempts were
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org.
Wichert Akkerman was said to been seen saying:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org. Almost all attempts
I got such attempts from 21 distinct addresses against my server in Russia
since
July 19 through July 20. I was able to resolve some of the addresses into
hostnames.
It is forged addresses, isn't it, and we cannot blame this hosts for the
attacks?
Mikhail.
- Original Message -
From:
On Fri, Jul 20, 2001 at 09:33:21PM -0400, Noah L. Meyerhans wrote:
On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
if ya wrote a script... was thinking..wouldnt it be funny
to redirect that incoming attack with the cgi script to
redirect it back to the incoming machine ???
Jim Breton, 2001-Jul-20 20:01 +:
On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
Do I need to dist-upgrade to woody to use iptables?
Nope.
http://netfilter.samba.org
Compiles very easily from source. HTH.
I was able to compile a good 2.4.6 kernel and
On Fri, Jul 20, 2001 at 09:31:07PM -0700, Jeff Coppock wrote:
# modprobe ip_tables
modprobe: Can't locate module ip_tables
But, it's definitely there. I can't figure out how to fix
this. Any help is very much appreciated.
Your version of modutils's 'modprobe' doesn't look
On Thu, Jul 19, 2001 at 08:43:43PM -0500, xbud wrote:
'Nicely' probably isn't a prefered word but you all know what I mean.
Here are some numbers.
Is this thing known to point itself at the private IP blocks?, i.e.
# 10.0.0.0 10.255.255.255
# 172.16.0.0172.31.255.255
# 192.168.0.0
deb http://security.debian.org/debian-security potato/updates main contrib
non-
free
deb http://security.debian.org/debian-non-US potato/non-US main contrib
non-fre
e
deb http://security.debian.org potato/updates main contrib non-free
Someone administering the www.debian.org security
--
Alan McNatty
Catalyst IT Ltd
Level 22 - 105 The Terrace,
Wellington
phone: 4 4992267 x705
mob: 21 2661571
email: [EMAIL PROTECTED]
test.pl
Description: Perl program
Improvements always welcome ;-)
On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
deb http://security.debian.org potato/updates main contrib non-free
does this actually work from what I can tell it ends up being
http://security.debian.org/potato/updates/main/*
http://security.debian.org/potato/updates/contrib/*
Try
http://security.debian.org/dists/potato/updates/main/*
http://security.debian.org/dists/potato/updates/contrib/*
http://security.debian.org/dists/potato/updates/non-free/*
On Friday 20 July 2001 03:33, Jason Thomas wrote:
On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
deb
On Thu, 19 Jul 2001, Brian Rectanus wrote:
xxx.xxx.xxx.xxx - - [19/Jul/2001:14:28:23 -0400] GET
/default.ida?NNN
http://www.eeye.com/html/Research/Advisories/AL20010717.html
--
[-]
you're wasting my time, chatterbox.
Title: RE: CGI Buffer Overflow?
It's a worm called Code Red, spreading thru IIS-servers. Nothing
you have to worry about if you're only running Apache.
We dont, so we should have worried yesterday. =)
There are info on cert.org, eeya.com and probably /. and
so on..
I've seen 100 of this
Hi list,
I wrote a program that needs to run setuid root due to direct hardware
access (Package: avrprog).
This program needs to read data from a file and also write to other file.
I could use some options like this:
$ avrprog -i input.data -o output.data
But I chose to use
Hola!
--- Pedro Zorzenon Neto [EMAIL PROTECTED] wrote:
This program needs to read data from a file and
also write to other file.
I could use some options like this:
$ avrprog -i input.data -o output.data
But I chose to use stdin/stdout instead.
$ avrprog
Quoting Pedro Zorzenon Neto ([EMAIL PROTECTED]):
I wrote a program that needs to run setuid root due to direct hardware
access (Package: avrprog).
Do you mean this package?
Programmer for Atmel AVR microcontrolers that uses PC parallel port
to program the device in serial mode. The
On Fri, Jul 20, 2001 at 08:28:54AM -0300, Pedro Zorzenon Neto wrote:
I could use some options like this:
$ avrprog -i input.data -o output.data
But I chose to use stdin/stdout instead.
$ avrprog input.data output.data
Than I don't need to check if the user has
On Fri, Jul 20, 2001 at 12:42:13PM +0100, David Wright wrote:
Do you mean this package?
Programmer for Atmel AVR microcontrolers that uses PC parallel port
Yes.
If so, I'm not sure why you think it needs to be setuid. Just
chgrp somegroup /dev/lp0 (or whichever port) and put yourself
(and
Dilemna:
I want to run iptables, but I'm running stable. I have a
clean, bootable 2.4.6 kernel (took awhile, but I got it), and
then realized that the iptable package in not in stable, but
is in testing and unstable. I looked for deb-src, but
couldn't find any. I figured I
Someone spammed this out a while back. I just used this a few days ago,
worked just fine
http://www.debian.org/News/2001/20010415
HTH,
Steven Beverly
IS Technician - PHX
IS Operations
EarthLink, Inc.
Cell: 602.723.4485
Pager: [EMAIL PROTECTED]
I am the Illustrious Postmaster and Grand
On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
Do I need to dist-upgrade to woody to use iptables?
Nope.
http://netfilter.samba.org
Compiles very easily from source. HTH.
* Jeff Coppock ([EMAIL PROTECTED]) [010720 12:54]:
Dilemna:
I want to run iptables, but I'm running stable. I have a
clean, bootable 2.4.6 kernel (took awhile, but I got it), and
then realized that the iptable package in not in stable, but
is in testing and unstable. I looked
Hello,
On Fri, Jul 20, 2001 at 12:37:27PM -0700, Jeff Coppock wrote:
Dilemna:
I want to run iptables, but I'm running stable. I have a
clean, bootable 2.4.6 kernel (took awhile, but I got it), and
then realized that the iptable package in not in stable, but
is in testing and
Jeff Coppock wrote on Fri Jul 20, 2001 at 12:37:49PM:
Dilemna:
I want to run iptables, but I'm running stable. I have a
clean, bootable 2.4.6 kernel (took awhile, but I got it), and
then realized that the iptable package in not in stable, but
is in testing and unstable. I
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org. Almost all attempts were made on July 19. Aren't
we glad we all run Linux?
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org.
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org.
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org.
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org.
hi ya Alson..
if ya wrote a script... was thinking..wouldnt it be funny
to redirect that incoming attack with the cgi script to
redirect it back to the incoming machine ???
c ya
alvin
On Sat, 21 Jul 2001, Alson van der Meulen wrote:
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert
Wichert Akkerman was said to been seen saying:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org. Almost all attempts were
On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
if ya wrote a script... was thinking..wouldnt it be funny
to redirect that incoming attack with the cgi script to
redirect it back to the incoming machine ???
It wouldn't get you anything exciting. The source machine has already
been
I got such attempts from 21 distinct addresses against my server in Russia
since
July 19 through July 20. I was able to resolve some of the addresses into
hostnames.
It is forged addresses, isn't it, and we cannot blame this hosts for the
attacks?
Mikhail.
- Original Message -
From:
On Fri, Jul 20, 2001 at 09:33:21PM -0400, Noah L. Meyerhans wrote:
On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
if ya wrote a script... was thinking..wouldnt it be funny
to redirect that incoming attack with the cgi script to
redirect it back to the incoming machine ???
In the depths of that dark day Sat Jul 21, the words of Wichert Akkerman were
the beacon:
For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
Really? As if linux has not had it's worms?
I think blaming Windows here is a tad bit short sighted. What we
hopefully can be glad for is that most of the people on this list
(hopefully) is good at upgrading their systems.
Well yes and no.
First of all MS has to take some of the blame for
50 matches
Mail list logo