It seems that most people here don't like CR systems, and I'd have to
agree with that consensus.
I'm just wondering what is the general feeling about using hashcash and
other header signatures systems.
Patrick
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe.
We have the same problem here. Someone has been using our domain name
in their headers since January. At times, we were getting a few
thousand bounces from mail to over-quota or non-existant accounts.
I added the following line to my exim.conf
receiver_try_verify = true
This results in an
We have the same problem here. Someone has been using our domain name
in their headers since January. At times, we were getting a few
thousand bounces from mail to over-quota or non-existant accounts.
I added the following line to my exim.conf
receiver_try_verify = true
This results in an
I'm using Mutt 1.4i (2002-05-29) on a sid (debian unstable) box with a
2.4.16 kernel.
Over the past several months, I have been receiving email messages that
(probably) contain various forms of malware. In these messages, there
are two attachments: the first is the (DOS/Win) executable, and the
Hi Sylvain,
I should have looked a little closer at _ALL_ of the headers. I missed
the alternative part. I just thought it was strange that an exe was
hidden from view. I was worried that openning the attachment might
open the wrong one, however, i rarely open attachments anyway.
Thanks,
Hi Joshua,
There should be no problem with using PasswordAuthentication with SSH
since the passwords are _NOT_ sent in the clear. Rather, the clear
text password is sent over the encrypted channel. From the SSH(1) man
page:
The password is sent to the remote host for checking; however,
Hi Joshua,
There should be no problem with using PasswordAuthentication with SSH
since the passwords are _NOT_ sent in the clear. Rather, the clear
text password is sent over the encrypted channel. From the SSH(1) man
page:
The password is sent to the remote host for checking; however, since
On Fri, Apr 19, 2002 at 02:47:08PM +0200, Jan Johansson wrote:
Why some people says that eg. tripwire doesn't discover it ?
Then they dont know what they are saying, i would say that Tripwire /
AIDE / such will be 100% efficient in detecting kits _PROVIDING_ that
your database is current,
On Fri, Apr 19, 2002 at 02:47:08PM +0200, Jan Johansson wrote:
Why some people says that eg. tripwire doesn't discover it ?
Then they dont know what they are saying, i would say that Tripwire /
AIDE / such will be 100% efficient in detecting kits _PROVIDING_ that
your database is current,
On Fri, Apr 06, 2001 at 10:31:27AM -0500, Vinh Truong wrote:
I have sshd set up on my machine at home. Instead of the default port
22, I uninstalled telnetd and run sshd on 23. I do this mostly because
I want to ssh into my machine from work where they don't open port 22 on
the firewall.
.
Patrick Maheral
On Wed, 1 Nov 2000, Alexander Hvostov wrote:
Penguin,
Because the patents and IP on your radio expired a long time ago. The ones
on the algorithms haven't. :)
Regards,
Isn't there a provision in American (or Canadian) law that allows reverse
engineering (not disassembling code) for
On Wed, 1 Nov 2000, Alexander Hvostov wrote:
Penguin,
Because the patents and IP on your radio expired a long time ago. The ones
on the algorithms haven't. :)
Regards,
Isn't there a provision in American (or Canadian) law that allows reverse
engineering (not disassembling code) for
13 matches
Mail list logo