On Mon, Aug 20, 2007 at 09:57:38AM +0400, Stanislav Maslovski wrote:
On Sun, Aug 19, 2007 at 10:51:51AM -0700, Russ Allbery wrote:
Stanislav Maslovski [EMAIL PROTECTED] writes:
What do you say, can MD5-based OPIE system be still considered secure?
In the repository there are
On Fri, Aug 17, 2007 at 09:41:41AM -0400, Celejar wrote:
On Thu, 16 Aug 2007 16:49:36 -0700
Russ Allbery [EMAIL PROTECTED] wrote:
[snip]
Firewalls are good in the situation where, whenever you open up new
network access, you want to have to make that choice independently in
multiple
On Fri, Aug 17, 2007 at 07:15:06PM +0100, Joe wrote:
Pat wrote:
Whose responsibility is it, in the US if you manufacture a defective
product legally it is your responsibility if someone is harmed.
There's a bit of a difference between a defective product and one
incorrectly used. When
On 8/20/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Software failures *are* in the worst cases life threatening, and
everyday non-safety-critical systems can easily be a very serious
nuisiance to other users.
I propose we stick a label on: This software is not meant to be run in
life
On Sun, Aug 12, 2007 at 01:16:57PM -0700, Wade Richards wrote:
2) If you really don't like the log messages, then reconfigure your firewall
to not
log dropped packets.
Actually, it might be best to just drop (and not log) packets to these ports
which are flowding your messages' log and log
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thus defeat the purpose). A default firewall simply can't work,
even if we
had some way to implement it perfectly for all packages (without
breaking
any, which we undoubtedly would).
It all depends on context - I agree that a default firewall
On Mon, Aug 20, 2007 at 09:04:18AM +, [EMAIL PROTECTED] wrote:
I'm no security expert, but I would suggest that a benefit of
'Personal' firewalls is the provision of a simple, systematic way of
restricting access to services. Yes, many apps offer some way of doing
this, but
On Fri, Aug 17, 2007 at 12:24:27AM +0200, Izak Burger wrote:
On 8/16/07, Jack T Mudge III [EMAIL PROTECTED] wrote:
My personal view is that there are plenty of simpler distributions out
there,
knoppix for first-time users, Ubuntu/Suse for novices, and RedHat for people
who need
On Fri, Aug 17, 2007 at 10:01:54AM +0200, Johannes Wiedersich wrote:
PS 2: While we are at it: debian by default also does not install or
enable an automated system to install security updates. It is the
responsibility of the user to decide whether and when security updates
are installed.
Not
On Monday 20 August 2007 10:47, alex black wrote:
thus defeat the purpose). A default firewall simply can't work,
even if we
had some way to implement it perfectly for all packages (without
breaking
any, which we undoubtedly would).
It all depends on context - I agree that a default
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
My intention wasn't to say a default firewall can never work, but
that it
can't work for debian, given the community/ideology and existing
user-base
surrounding it.
Ah, now we disagree: I just think you should have install profiles
and make
On 8/20/07, Jonathan Wilson [EMAIL PROTECTED] wrote:
Sorry if this is the wrong place for this, but:
Does anyone know of a place I can get information on setting up CISP (VISA
credit card) compliant Debian systems - or Linux in general, if there's no
Debian-specific info. I've been searching
12 matches
Mail list logo