* Samuele Giovanni Tonon [EMAIL PROTECTED] [030808 15:09]:
What the h.ll does this mean?
Apparently some moron tries to find a job through SPAMming.
maybe he wants a job inside debian.
we must redirect him to http://nm.debian.org :-)
So he can redesign it in flash?
Yours sincerely
On Wed, Aug 06, 2003 at 05:56:47PM +0200, Thijs Welman wrote:
Alan James wrote:
Maybe they brute forced the root password ? Do you have
PermitRootLogin yes in sshd_config ?
No, i didn't at that moment. But there's no sign of an succesfull root
login. Not in ps aux, not in netstat and no ssh
On Fri, Aug 08, 2003 at 11:58:45AM -0500, Greg Norris wrote:
On Fri, Aug 08, 2003 at 04:21:50PM +1000, Geoff Crompton wrote:
I have succesfully configued sshd to allow opie logons, without
disabling PrivSep, by configuring pam to use the libpam-opie
module for ssh.
In this case the
hi,
my config:
debian stable 3.0r1
postfix
qpopper
I have a small problem:
my smtp after pop3 configuration works fine, no open relay possible, but
the authentificated users can fake their own e-mail address.
How can I stop it, so they can only use the adress which were set up for
them.
Hi all,
can anyone explain me the DSA-361-2?
Does it mean that the vulnerabilities reported were already addressed in
woody in version 2.2.2-6woody2 ?
I haven't found 2.2.2-6woody2 in the changelog, however 2.2.2-6 has been
released in december 2001, so i've to assume fake vulnerabilities (CAN
On Sun, Aug 10, 2003 at 01:27:50PM +0200, Gian Piero Carrubba wrote:
can anyone explain me the DSA-361-2? Does it mean that the
vulnerabilities reported were already addressed in woody in version
2.2.2-6woody2 ?
I haven't found 2.2.2-6woody2 in the changelog, however 2.2.2-6 has been
6 matches
Mail list logo