At 5:11 PM +1300 1/22/02, Adam Warner wrote:
1. Log in as root
2. su - user
3. startx (running KDE, not GNOME)
4. Click on the Control Center
5. There in the Control Center info box it will state that the user is
root!
Why does the KDE Control Center think the user is currently root? In
contrast
At 5:11 PM +1300 1/22/02, Adam Warner wrote:
>1. Log in as root
>2. su - user
>3. startx (running KDE, not GNOME)
>4. Click on the Control Center
>5. There in the Control Center info box it will state that the user is
>root!
>
>Why does the KDE Control Center think the user is currently root? In
>
At 12:37 PM + 1/19/02, Pete Ryland wrote:
I wouldn't always believe the version reported by a large mail server. It's
quite common practice (I'm sure a lot on this list may do so) to display a
version string that is not at all accurate in an attempt to put off crackers
or create a honeypot.
At 12:37 PM + 1/19/02, Pete Ryland wrote:
>I wouldn't always believe the version reported by a large mail server. It's
>quite common practice (I'm sure a lot on this list may do so) to display a
>version string that is not at all accurate in an attempt to put off crackers
>or create a honeypo
At 7:39 PM +0200 6/27/01, Jean-Marc Boursot wrote:
Moreover, I think it's a good idea to disable ftp for people with a
"real" valid shell (ie only include pseudo shells in /etc/shells) as it
isn't a secure protocol.
You should disable shell for any account that can access the machine
via any i
At 7:39 PM +0200 6/27/01, Jean-Marc Boursot wrote:
>Moreover, I think it's a good idea to disable ftp for people with a
>"real" valid shell (ie only include pseudo shells in /etc/shells) as it
>isn't a secure protocol.
You should disable shell for any account that can access the machine
via any
--On Friday, April 13, 2001 3:40 PM -0700 Micah Anderson <[EMAIL PROTECTED]>
hath wrote:
| One additional tweak which falls into line with the security setups, that
| I think is a good idea is to made the log files in /var/log to be chattr
| +a (append only) so logfiles cannot be modified or
--On Friday, April 13, 2001 3:40 PM -0700 Micah Anderson <[EMAIL PROTECTED]>
hath wrote:
| One additional tweak which falls into line with the security setups, that
| I think is a good idea is to made the log files in /var/log to be chattr
| +a (append only) so logfiles cannot be modified or r
At 10:32 -0600 3/10/2001, Piotr Tarnowski wrote:
Hi,
I've installed NTP daemon on my firewall (with sync to
external machine) and
on all internal machines (with sync to my firewall).
I found that this had opend port 123/udp on my firewall,
so now everybody
from the net can use my machine as a
At 10:32 -0600 3/10/2001, Piotr Tarnowski wrote:
>Hi,
>
>I've installed NTP daemon on my firewall (with sync to
>external machine) and
>on all internal machines (with sync to my firewall).
>
>I found that this had opend port 123/udp on my firewall,
>so now everybody
>from the net can use my machi
At 06:08 + 3/2/2001, Jacob Meuser wrote:
I believe it becomes uncommented if one installs over the network? (That
would make sense to ME anyway.)
<[EMAIL PROTECTED]>
It didn't on my network install. I did an FTP install of PowerPC
Debian (Potato). I had to uncomment the security line a
At 06:08 + 3/2/2001, Jacob Meuser wrote:
>I believe it becomes uncommented if one installs over the network? (That
>would make sense to ME anyway.)
>
><[EMAIL PROTECTED]>
It didn't on my network install. I did an FTP install of PowerPC
Debian (Potato). I had to uncomment the security line
op authentication == smtp
authentication, as it seems more secure). Reading through the sample
configs it looks like postfix provides this through sasl but it isn't
recommended using it yet. Is there another way to securely provide
authenticated smtp?
Thanks,
Kevin van Haaren
op authentication == smtp
authentication, as it seems more secure). Reading through the sample
configs it looks like postfix provides this through sasl but it isn't
recommended using it yet. Is there another way to securely provide
authenticated smtp?
Thanks,
Kevin van Haaren
--
To UNSUBSCR
14 matches
Mail list logo