[EMAIL PROTECTED] said:
135 is closed in both directions. However, I get the message Neighbour
table overflow on the firewall (debian stable w/ kernel 2.4.27) and the
entire network comes to a standstill. The cpu load isn't even close to a
...
Should it really be possible for a single infected
[EMAIL PROTECTED] said:
That answer is pretty easy to find, too. Look at the description of the
debian-keyring package.
The Debian project wants developers to digitally sign the announcements
of their packages with GnuPG, to protect against forgeries. This package
contains keyrings of GnuPG
[EMAIL PROTECTED] said:
That answer is pretty easy to find, too. Look at the description of the
debian-keyring package.
The Debian project wants developers to digitally sign the announcements
of their packages with GnuPG, to protect against forgeries. This package
contains keyrings of GnuPG
[EMAIL PROTECTED] said:
Where should I get the key? And why isn't it in debian-keyring? I've got
the current sid version.
http://www.debian.org/releases/
Well, that wasn't too hard to find, of course. The where question was
mostly rhetorical. More importantly, why on earth isn't the archive
[EMAIL PROTECTED] said:
This is a call to the community to help test and audit this patch to
APT, and to eventually participate in the policy discussion about the
patch.
Please see http://monk.debian.net/apt-secure/ for more information and
to download Debian packages.
I'm trying the
On Thu, May 29, 2003 at 12:12AM -0500, Jayson Vantuyl wrote:
Question: Can one use a key *AND* a password? That would make me
really happy. I just don't like getting ahold of a file or a password
being enough...
That's how it's done, by default. The key is encrypted on-disk, and is
only
[EMAIL PROTECTED] said:
of them. It's not a password problem either. He seems to have hacked
multiple of them within an hour of each other (his rootkit files
aren't very clever about covering up mtime). I just can't tell how he
got in.
Maybe he didn't use the same method for all of them.
On Thu, May 29, 2003 at 12:12AM -0500, Jayson Vantuyl wrote:
Question: Can one use a key *AND* a password? That would make me
really happy. I just don't like getting ahold of a file or a password
being enough...
That's how it's done, by default. The key is encrypted on-disk, and is
only
[EMAIL PROTECTED] said:
of them. It's not a password problem either. He seems to have hacked
multiple of them within an hour of each other (his rootkit files
aren't very clever about covering up mtime). I just can't tell how he
got in.
Maybe he didn't use the same method for all of them.
does anyone know what squid's udp sockets are for, and how to close
them? As far as I can tell, I don't need them, but I've been unable to
find a combination of squid directives to make them all go away. The icp
port can be closed using icp_port 0, but the other one is dynamic and
isn't referred
[EMAIL PROTECTED] said:
Umm... No.
It's used for ICP, a protocol for intercommunication between squid
caches. For example, at my site we have two different caches. One is
basically transparent. The other provides anonymizing services. But,
through ICP, both caches can make use of each
does anyone know what squid's udp sockets are for, and how to close
them? As far as I can tell, I don't need them, but I've been unable to
find a combination of squid directives to make them all go away. The icp
port can be closed using icp_port 0, but the other one is dynamic and
isn't referred
[EMAIL PROTECTED] said:
Umm... No.
It's used for ICP, a protocol for intercommunication between squid
caches. For example, at my site we have two different caches. One is
basically transparent. The other provides anonymizing services. But,
through ICP, both caches can make use of each
13 matches
Mail list logo