A Windows-worm in the debian-security list? Great :D
BM> - Original message follows -
BM> Microsoft Consumer
BM> this is the latest version of security update, the
BM> "June 2003, Cumulative Patch" update which eliminates all
BM> known security vulnerabilities affecting Internet Explore
A Windows-worm in the debian-security list? Great :D
BM> - Original message follows -
BM> Microsoft Consumer
BM> this is the latest version of security update, the
BM> "June 2003, Cumulative Patch" update which eliminates all
BM> known security vulnerabilities affecting Internet Explore
DDC> using mac addresses for client authentication seems to me as an extremely
DDC> risky business as a mac address can easily be copied/cloned/spoofed...
DDC> imho, it does not offer any authentication at all...
i under stood it as additional security to certificates or passwords (more like
secu
did you consider just to blockother mac-addresses through iptables?
but... i don't know, what you are doing there, but are you sure you
want to grant every user ssh access?
i assume you need to be root for this? how are you going to solve it
over ssh? and how do you prevent users from just shuttin
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
>> I've search for something like this, but did not find anything. How do
>> I flush it?
RK> It would have been the NAT table anyway (my
RK> mistake). You flush it with iptables -F -t nat.
RK> The reboot done the job, so it must be something
RK> else.
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Hi,
I'm running a small router and firewall at home.
eth0 -> LAN
eth1 -> access point -> WLAN
eth2 -> WAN
On a client im running a donkeyclient, so I had to forward port (it
works without, but then you get a so called "low id" with result in
worse downl
AE> Sorry, I see now. This case, the proper solution would be fixing
AE> the program which emits the incorrect warning, isn't it?
the program is chrootkit, isn't it?
--
Public Key erhältlich auf den PGP-Keyservern, sowie mit weiteren Informationen
auf http:\\www.voits.net.
Fingerprint: 9b482c5c
is what what? i cannot see anything, only an unloadable and linked
image...
is this a spam mail?
if not, please do not send such mails but plaintext
AW> Erase your email record here.
AW> --
AW> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
AW> with a subject of "unsubscribe". Trouble? Contact [
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
DCE> for (1) I guess you can put the binaries in a read-only medium and run
DCE> them from there, like a CD-ROM or a write-protected floppy/flash-medium.
Well, the attacker could just stop the cronjob... but great idea
though.
My server is a remote root
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Hi,
I'm just setting up my first webserver in a productive environment.
Now I wonder how I could use chkrootkit.
My first idea was to run a cronjob, butI have two problems with this
solution:
1) An attacker could just change the chkrootkit binaries. I
IRvD> PS I would really like to see you perlscript, if you could send it to me
personallyI would really apriciate it.
place me on the list, too, please.
IRvD> On Thu, 24 Apr 2003 14:17:48 +0200, [EMAIL PROTECTED] wrote:
>> On Thu, Apr 24, 2003 at 11:43:06AM +0200, I.R. van Dongen wrote:
>
Hi,
how do you suggest dealing with firewall logs from a computer which is
connected through a dialup connection?
For I receive a new IP every 24h hours, my logs are full of P2P
connection attempts.
How can I log iptables LOG outputs somewherer different from the
standard output? And is there any
12 matches
Mail list logo