sure, but the structure is not the
same.
One solution is to simulate a hard-disk on top of another hard-disk
(or memory or whatever), something like a virtual hard-disk that allow
you to forget about these hardware differences.
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAI
sure, but the structure is not the
same.
One solution is to simulate a hard-disk on top of another hard-disk
(or memory or whatever), something like a virtual hard-disk that allow
you to forget about these hardware differences.
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAI
ntion the hardware functionality implemented by the
hardware, like error checking and other things.
I have never look at any hard disk driver but i think u will have to
do it if u want to be sure.
Maybe u can disable some hardware functionality with some IOCTL.
--
Alberto Cortés Martín | Ing
ntion the hardware functionality implemented by the
hardware, like error checking and other things.
I have never look at any hard disk driver but i think u will have to
do it if u want to be sure.
Maybe u can disable some hardware functionality with some IOCTL.
--
Alberto Cortés Martín | Ing
NIS too.
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAIL PROTECTED] | Universidad Carlos III
Jabber y MSN: alcortes43 | Madrid
ICQ#: 101088159 | Spain
url: http://montoya.aig.uc3m.es/~acortes/index.html
1A8B 0FE6 2094 8E48 38A2 7785 03CD 07CD 6CA4 E242
pgpZBpor
NIS too.
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAIL PROTECTED] | Universidad Carlos III
Jabber y MSN: alcortes43 | Madrid
ICQ#: 101088159 | Spain
url: http://montoya.aig.uc3m.es/~acortes/index.html
1A8B 0FE6 2094 8E48 38A2 7785 03CD 07CD 6CA4 E242
msg07371
thanks to all of you!
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAIL PROTECTED] | Universidad Carlos III
Jabber y MSN: alcortes43 | Madrid
ICQ#: 101088159 | Spain
url: http://montoya.aig.uc3m.es/~acortes/index.html
1A8B 0FE6 2094 8E48 38A2 7785 03CD 07CD
thanks to all of you!
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAIL PROTECTED] | Universidad Carlos III
Jabber y MSN: alcortes43 | Madrid
ICQ#: 101088159 | Spain
url: http://montoya.aig.uc3m.es/~acortes/index.html
1A8B 0FE6 2094 8E48 38A2 7785 03CD 07CD
s deals with
cryptographic software, I understand that it will be illegal for me
downloading these updates from outside of the USA.
In other words, is http://security.debian.org/ located outside the
US?.
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAIL PROTECTED] | Universidad Carlo
s deals with
cryptographic software, I understand that it will be illegal for me
downloading these updates from outside of the USA.
In other words, is http://security.debian.org/ located outside the
US?.
--
Alberto Cortés Martín | Ing. en Telecomunicación
email: [EMAIL PROTECTED] | Universida
> use NIS or NFS just chown the file again to executable.
OPSS, i mean chmod not chown.
--
Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED] | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
mobile: 600 42 77 57 | Spain
url: h
c/init.d/portmap a
non-executable file -> no more listening on 111. Whenever you have to
use NIS or NFS just chown the file again to executable.
--
Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED] | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
mo
> use NIS or NFS just chown the file again to executable.
OPSS, i mean chmod not chown.
--
Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED] | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
mobile: 600 42 77 57 | Spain
url: h
e /etc/init.d/portmap a
non-executable file -> no more listening on 111. Whenever you have to
use NIS or NFS just chown the file again to executable.
--
Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED] | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
mo
s so high that for the most common cases it's is sufficient
with publishing your fingerprint on every email and your telephone
number.
Also use the common sense for this things, it is the best way
of been real sure of the integrity of someone's public key.
--
use the source,
s so high that for the most common cases it's is sufficient
with publishing your fingerprint on every email and your telephone
number.
Also use the common sense for this things, it is the best way
of been real sure of the integrity of someone's public key.
--
use the source,
El sáb, 15 de sep de 2001, a las 13:30 -0400,
Russell decía que:
> What's a good piece of software to monitor for system accesses?
snort is good for detecting well known attacks to your system.
> Should I report the IP to RBL or something like that?
I use to run whois on the attacker IP an
El sáb, 15 de sep de 2001, a las 13:30 -0400,
Russell decía que:
> What's a good piece of software to monitor for system accesses?
snort is good for detecting well known attacks to your system.
> Should I report the IP to RBL or something like that?
I use to run whois on the attacker IP a
e an up to date,
secure system?
--
Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED] | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
cel: 600 42 77 57 | Spain
icq# 101088159|
e an up to date,
secure system?
--
Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED] | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
cel: 600 42 77 57 | Spain
icq# 101088159|
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
20 matches
Mail list logo