Hi David!
Well, in my case the terminal is an VT-100, so it's connected directly to
the one of the serial ports of the server, so nothing's going wildly to the
network in cleartext.
I don't know about Xterminals, though... I guess they are networked, but I
really don't know much about the protocol
Hi David!
Well, in my case the terminal is an VT-100, so it's connected directly to
the one of the serial ports of the server, so nothing's going wildly to the
network in cleartext.
I don't know about Xterminals, though... I guess they are networked, but I
really don't know much about the protocol
Whoa! Amazing :) This is exactly the sort of feedback I expected, thanks a
lot guys! I don't have trouble understanding your suggersions, my main
delight comes from wondering how on earth can you think of so many tiny
details :) And I thought I was paraonid :)
Really, thanks a lot, that taught me q
Whoa! Amazing :) This is exactly the sort of feedback I expected, thanks a
lot guys! I don't have trouble understanding your suggersions, my main
delight comes from wondering how on earth can you think of so many tiny
details :) And I thought I was paraonid :)
Really, thanks a lot, that taught me
Hi all!
We have several vt-100 terminal that log to the naub server at our office.
Still, some users without account in the main server would like to login to
another machine, so I was planning on creating a passwordless acount with a
shell that's a program that asks for usernames and then execs ss
Hi all!
We have several vt-100 terminal that log to the naub server at our office.
Still, some users without account in the main server would like to login to
another machine, so I was planning on creating a passwordless acount with a
shell that's a program that asks for usernames and then execs s
Hi there!
What do you think of this? is 2.1.8.8 vulnerable? I checked the source code
for my potato xinetd and it doesn't look like it is...
Any opinions?
Miquel Martín
- Forwarded message from [EMAIL PROTECTED] -
Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm
List-Id:
List-Post:
Hi there!
What do you think of this? is 2.1.8.8 vulnerable? I checked the source code
for my potato xinetd and it doesn't look like it is...
Any opinions?
Miquel Martín
- Forwarded message from [EMAIL PROTECTED] -
Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm
List-Id:
List-Post
Hi all,
Without no apparent reason, I started receiving thousands of packets to one
of the interfaces. The network card is an rtl8029, and I logged between 70 and
80.000 packacges per second. They all where too big to be ethernet packets,
and they were reported by the kernel as:
Jun 4 12:20:15 ne
Hi all,
Without no apparent reason, I started receiving thousands of packets to one
of the interfaces. The network card is an rtl8029, and I logged between 70 and
80.000 packacges per second. They all where too big to be ethernet packets,
and they were reported by the kernel as:
Jun 4 12:20:15 n
10 matches
Mail list logo