unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Fri, May 24, 2002 at 03:54:48PM +0200, Christian Hammers wrote:
> On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
> > 1) Check the Debian security announcement list.
> > 2) Compare new announcements to the local package database.
> > 3) If vulnerable packages installed, send a
On Fri, 24 May 2002, Matt Zimmerman wrote:
> On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
>
> > I'm thinking of writing a script but I am hoping that someone else has
> > beaten me to the punch. Perhaps someone has seen something that will do
> > this:
> >
> > 1) Check the D
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
> I'm thinking of writing a script but I am hoping that someone else has
> beaten me to the punch. Perhaps someone has seen something that will do
> this:
>
> 1) Check the Debian security announcement list.
> 2) Compare new announc
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
>
> I'm thinking of writing a script but I am hoping that someone else has
> beaten me to the punch. Perhaps someone has seen something that will do
> this:
>
> 1) Check the Debian security announcement list.
> 2) Compare new annou
Tue, 07 May 2002 17:25:01 +0200
Manuel Segura <[EMAIL PROTECTED]> wrote:
Hi,
> Hello,
> I am creating some server mod-ssl certificates using the script
> mod-ssl-makecert.
>
I used to do it wih openssl. For example
bash:~$ openssl genrsa -des3 -rand /dev/random -out www.domain.tld.key 1024
gen
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Fri, May 24, 2002 at 03:54:48PM +0200, Christian Hammers wrote:
> On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
> > 1) Check the Debian security announcement list.
> > 2) Compare new announcements to the local package database.
> > 3) If vulnerable packages installed, send
On Fri, 24 May 2002, Matt Zimmerman wrote:
> On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
>
> > I'm thinking of writing a script but I am hoping that someone else has
> > beaten me to the punch. Perhaps someone has seen something that will do
> > this:
> >
> > 1) Check the
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
> I'm thinking of writing a script but I am hoping that someone else has
> beaten me to the punch. Perhaps someone has seen something that will do
> this:
>
> 1) Check the Debian security announcement list.
> 2) Compare new announ
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
>
> I'm thinking of writing a script but I am hoping that someone else has
> beaten me to the punch. Perhaps someone has seen something that will do
> this:
>
> 1) Check the Debian security announcement list.
> 2) Compare new anno
Tue, 07 May 2002 17:25:01 +0200
Manuel Segura <[EMAIL PROTECTED]> wrote:
Hi,
> Hello,
> I am creating some server mod-ssl certificates using the script
> mod-ssl-makecert.
>
I used to do it wih openssl. For example
bash:~$ openssl genrsa -des3 -rand /dev/random -out www.domain.tld.key 1024
ge
On Fri, May 24, 2002 at 02:23:38PM +0200, Kjetil Kjernsmo wrote:
>
> OK. This is what nmap says, launched from my workstation:
[snip]
> 137/tcpfilterednetbios-ns
> 138/tcpfilterednetbios-dgm
> 139/tcpfilterednetbios-ssn
[snip]
> 6346/tcp filteredgnutella
"filtered" m
Kjetil Kjernsmo <[EMAIL PROTECTED]> writes:
> On 24 May 2002, Tim Haynes wrote:
>
> >Unfortunately, the only way to examine all the files on the disk/s is to
> >reboot the box off clean r/o media (read: rescue CD), mount them r/o,
> >and examine them by hand.
>
> Yeah, I guess so.
In the absenc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24 May 2002, Tim Haynes wrote:
>Unfortunately, the only way to examine all the files on the disk/s is to
>reboot the box off clean r/o media (read: rescue CD), mount them r/o, and
>examine them by hand.
Yeah, I guess so.
>You're highly unlikely t
On Fri, 24 May 2002 at 15:04:50 +0200, Lars Roland Kristiansen wrote:
[...]
> I have 200 users and whant some new more secure passwords
> (not to long though). Is there a simple way to generate
> secure passwords so i can use them with adduser
pwgen, makepasswd, apg (since Woody).
[ > 11 lin
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
> 1) Check the Debian security announcement list.
> 2) Compare new announcements to the local package database.
> 3) If vulnerable packages installed, send an 'I need updated' email to
> an address defined by the SysAdmin.
Another ni
Kjetil Kjernsmo <[EMAIL PROTECTED]> writes:
> Thanks for all the responses.
>
> I realize it's pretty bold trying put a box on the net without having
> extensive admin experience beforehand. But I think I'm learning fast, and
> I hope I'll be able to do it without placing any burden on the rest o
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed, sen
On Fri, May 24, 2002 at 02:23:38PM +0200, Kjetil Kjernsmo wrote:
>
> OK. This is what nmap says, launched from my workstation:
[snip]
> 137/tcpfilterednetbios-ns
> 138/tcpfilterednetbios-dgm
> 139/tcpfilterednetbios-ssn
[snip]
> 6346/tcp filteredgnutella
"filtered"
On Fri, 24 May 2002 15:04:50 +0200 (MET DST)
Lars Roland Kristiansen <[EMAIL PROTECTED]> wrote:
>
> Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
> mail server. I have 200 users and whant some new more secure passwords
> (not to long though). Is there a simple way to
On Fri, 2002-05-24 at 15:04, Lars Roland Kristiansen wrote:
> Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
> mail server. I have 200 users and whant some new more secure passwords
> (not to long though). Is there a simple way to generate
> secure passwords so i can use
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use them with adduser
Thanks
___
Mvh./Yours sincerely
Lars
=
Kjetil Kjernsmo <[EMAIL PROTECTED]> writes:
> On 24 May 2002, Tim Haynes wrote:
>
> >Unfortunately, the only way to examine all the files on the disk/s is to
> >reboot the box off clean r/o media (read: rescue CD), mount them r/o,
> >and examine them by hand.
>
> Yeah, I guess so.
In the absen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear Tim, dear all,
Thanks for all the responses.
I realize it's pretty bold trying put a box on the net without having
extensive admin experience beforehand. But I think I'm learning fast, and
I hope I'll be able to do it without placing any burden
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24 May 2002, Tim Haynes wrote:
>Unfortunately, the only way to examine all the files on the disk/s is to
>reboot the box off clean r/o media (read: rescue CD), mount them r/o, and
>examine them by hand.
Yeah, I guess so.
>You're highly unlikely
On Fri, 24 May 2002 at 15:04:50 +0200, Lars Roland Kristiansen wrote:
[...]
> I have 200 users and whant some new more secure passwords
> (not to long though). Is there a simple way to generate
> secure passwords so i can use them with adduser
pwgen, makepasswd, apg (since Woody).
[ > 11 li
Langdon Green skrev:
> Hi guys, I am having a bit of trouble with some dodgy emails getting
> sent to my friend...they are strange, not just normal spam, the emails
> have information that is from my company web site (hosted off
> site) Anyway, the header of the emails has this line: Received:
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
> 1) Check the Debian security announcement list.
> 2) Compare new announcements to the local package database.
> 3) If vulnerable packages installed, send an 'I need updated' email to
> an address defined by the SysAdmin.
Another n
Hi guys,
I am having a bit of trouble with some dodgy emails
getting sent to my friend...they are strange, not just normal spam, the emails
have information that is from my company web site (hosted off site)
Anyway, the header of the emails has this
line:
Received: from Wzk ([MYIP])
Kjetil Kjernsmo <[EMAIL PROTECTED]> writes:
> Thanks for all the responses.
>
> I realize it's pretty bold trying put a box on the net without having
> extensive admin experience beforehand. But I think I'm learning fast, and
> I hope I'll be able to do it without placing any burden on the rest
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed, se
On Fri, 24 May 2002 15:04:50 +0200 (MET DST)
Lars Roland Kristiansen <[EMAIL PROTECTED]> wrote:
>
> Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
> mail server. I have 200 users and whant some new more secure passwords
> (not to long though). Is there a simple way to
On Fri, 2002-05-24 at 15:04, Lars Roland Kristiansen wrote:
> Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
> mail server. I have 200 users and whant some new more secure passwords
> (not to long though). Is there a simple way to generate
> secure passwords so i can us
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use them with adduser
Thanks
___
Mvh./Yours sincerely
Lars
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear Tim, dear all,
Thanks for all the responses.
I realize it's pretty bold trying put a box on the net without having
extensive admin experience beforehand. But I think I'm learning fast, and
I hope I'll be able to do it without placing any burden
Langdon Green skrev:
> Hi guys, I am having a bit of trouble with some dodgy emails getting
> sent to my friend...they are strange, not just normal spam, the emails
> have information that is from my company web site (hosted off
> site) Anyway, the header of the emails has this line: Received:
Hi guys,
I am having a bit of trouble with some dodgy emails
getting sent to my friend...they are strange, not just normal spam, the emails
have information that is from my company web site (hosted off site)
Anyway, the header of the emails has this
line:
Received: from Wzk ([MYIP])
There is a good chance if you have been rooted, that the attacker installed
a rootkit to cover his tracks. I saw a good rootkit detecter on
http://freshmeat.net/ . Just do a search for it on there.
From: Tim Haynes <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: Kjetil Kjernsmo <[EMAIL
There is a good chance if you have been rooted, that the attacker installed
a rootkit to cover his tracks. I saw a good rootkit detecter on
http://freshmeat.net/ . Just do a search for it on there.
>From: Tim Haynes <[EMAIL PROTECTED]>
>Reply-To: [EMAIL PROTECTED]
>To: Kjetil Kjernsmo <[EMA
42 matches
Mail list logo