On Maw, 2003-09-16 at 16:26, Michael Stone wrote:
On Tue, Sep 16, 2003 at 04:00:30PM +0100, Thomas Horsten wrote:
Is there an emergency patch/workaround for this, if disabling ssh is not
an option?
No.
You could install Openssh 3.7 manually, or apply the patch mentioned at
On Maw, 2003-09-16 at 16:26, Michael Stone wrote:
On Tue, Sep 16, 2003 at 04:00:30PM +0100, Thomas Horsten wrote:
Is there an emergency patch/workaround for this, if disabling ssh is not
an option?
No.
You could install Openssh 3.7 manually, or apply the patch mentioned at
On Mon, Aug 19, 2002 at 11:24:19PM +0300, Pavel Minev Penev wrote:
as possible. They allow even ads from time to time (there was a $1000
fine for commercial messages IIRC, is there still one?)
Still there...
http://www.debian.org/MailingLists/#ads
Gareth
Seeing how many DSAs have been released in the last few days, I was wondering
what scripts etc people had in place for dealing with them? For example, one
thing I'd like to do is get the alerts forwarded to my mobile phone if I have
the package installed on one or more of my machines (using dpkg
On Tue, Jul 30, 2002 at 04:31:48PM -0400, Ahmed Charles wrote:
Good Day,
Is there an updated package list that i can download manually so that my
dselect is up-to-date?
And if there is, where can i get it?
dselect has an Update option which will grab the latest packages list. It
does this
On Tue, Jul 30, 2002 at 08:15:49PM -0400, Ahmed Charles wrote:
Good Day,
Thanks for the response but my question was alike vague, what i meant to ask
was about the security updates, if a package list containing the new ones
was available anywhere for download (thats why I didnt post it to
On Sat, Apr 27, 2002 at 03:32:45AM +0200, martin f krafft wrote:
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.26.1955 +0200]:
Second more, if your users are allowed to have pages on the same
address as the login system, the browser can, without much effort,
be tricked into giving away
On Sat, Apr 27, 2002 at 03:32:45AM +0200, martin f krafft wrote:
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.26.1955 +0200]:
Second more, if your users are allowed to have pages on the same
address as the login system, the browser can, without much effort,
be tricked into giving away
On Thu, Apr 25, 2002 at 10:38:43AM -0500, Kenneth Pronovici wrote:
I use logcheck right now to analyze my logs on an hourly basis. As it
turns out, the iptables entries (about denied connections, etc.) are
most of what's in the logcheck emails. This is a little tiring because
a lot of the
On Thu, Apr 25, 2002 at 10:38:43AM -0500, Kenneth Pronovici wrote:
I use logcheck right now to analyze my logs on an hourly basis. As it
turns out, the iptables entries (about denied connections, etc.) are
most of what's in the logcheck emails. This is a little tiring because
a lot of the
On Tue, Apr 09, 2002 at 07:20:18PM +0600, Mikhail Romanenko wrote:
snip
These ports is denied by script, but I do not understand what
does it mean. If some private net user browser try to connect
to some Internet www server (DPT=80) it has to use one of the
dynamic and/or private ports
On Tue, Apr 09, 2002 at 04:02:34PM -0500, Rob VanFleet wrote:
On Tue, Apr 09, 2002 at 07:23:28AM -0700, Luca Filipozzi wrote:
You run those service locally on each machine only. You don't make them
available to other hosts.
Sorry if I'm being completely dense here, but aren't the
On Tue, Apr 09, 2002 at 07:20:18PM +0600, Mikhail Romanenko wrote:
snip
These ports is denied by script, but I do not understand what
does it mean. If some private net user browser try to connect
to some Internet www server (DPT=80) it has to use one of the
dynamic and/or private ports
On Tue, Apr 09, 2002 at 04:02:34PM -0500, Rob VanFleet wrote:
On Tue, Apr 09, 2002 at 07:23:28AM -0700, Luca Filipozzi wrote:
You run those service locally on each machine only. You don't make them
available to other hosts.
Sorry if I'm being completely dense here, but aren't the ports
It's quite a useful document, certainly. I've only got one comment on it,
which is to explain what the changes are that are being made: i.e.
disabling tcp listening for X means that you can't run remote X sessions from
the machine blah blah, but that crackers can't blah blah.
It just makes it
15 matches
Mail list logo