sed some part of the discussion here, but... the computer
won't route packets without power. Are you really switching the machine
off and then wondering why you lose network connectivity?
--
Sam Couter | mailto:[EMAIL PROTECTED]
| jabber:[EMAIL PROTECTED]
OpenPGP fin
Ludo <[EMAIL PROTECTED]> wrote:
> How else does the IP address get released?
DHCP leases have a limited lifetime. If they're not renewed by the
client within that time they're considered expired.
--
Sam Couter | mailto:[EMAIL PROTECTED]
| jabb
Daniel Pittman <[EMAIL PROTECTED]> wrote:
> Sure, a lot of them suck. In fact, most of them *really* suck, in my
> opinion.
>
> I found that 'firehol' was quite a surprise to me -- not only didn't it
> suck, it actually improved my hand-written firewall somewhat.
Firehol still sucks: It's ba
Hans van Leeuwen <[EMAIL PROTECTED]> wrote:
> Hello,
>
> My company has created an application that allows remote users to edit
> their DNS-records. This app needs to restart bind on the remote nameservers.
This is a poor way to do dynamic DNS.
> I have decided to do this thrue SSH by putting t
Stefan Neufeind <[EMAIL PROTECTED]> wrote:
> what is the best way to remotely syslog? In
Use a dedicated machine. Cut the 'transmit' pair in the CAT5 cable.
syslog is UDP, which is only one-way, so it doesn't need to transmit.
Obviously you'll have no remote access to the syslog server, but neith
Peter Cordes <[EMAIL PROTECTED]> wrote:
> dpkg --get-selections | grep '[^A-Za-z]install$' | cut -f1
> should work.
>
> This time for sure :)
How about matching what you really want instead of guessing with grep:
The second field is exactly "install".
And how about doing it all with one command
Peter Cordes <[EMAIL PROTECTED]> wrote:
> dpkg --get-selections | grep '[^A-Za-z]install$' | cut -f1
> should work.
>
> This time for sure :)
How about matching what you really want instead of guessing with grep:
The second field is exactly "install".
And how about doing it all with one comman
Jan Johansson <[EMAIL PROTECTED]> wrote:
> Now, run AIDE check periodically (nightly) against that db. And all is well.
Here's a weakness: The attacker can replace AIDE (or any libraries it
links to, if any exist, or even the kernel) with a fake that just says
"Everything's OK" without really chec
Jan Johansson <[EMAIL PROTECTED]> wrote:
> Now, run AIDE check periodically (nightly) against that db. And all is well.
Here's a weakness: The attacker can replace AIDE (or any libraries it
links to, if any exist, or even the kernel) with a fake that just says
"Everything's OK" without really che
Wichert Akkerman <[EMAIL PROTECTED]> wrote:
>
> It leads to better solutions :)
And fun and entertainment along the way!
--
Sam Couter | Internet Engineer | http://www.topic.com.au/
[EMAIL PROTECTED]| tSA Consulting |
OpenPGP key ID: DE89C75C, avai
Wichert Akkerman <[EMAIL PROTECTED]> wrote:
>
> It leads to better solutions :)
And fun and entertainment along the way!
--
Sam Couter | Internet Engineer | http://www.topic.com.au/
[EMAIL PROTECTED]| tSA Consulting |
OpenPGP key ID: DE89C75C, avai
your DNS server our default gateway...
To forge a Nimda attack would require you to forge a TCP connection. That's
not easy, unless the attacker is on the network path to the forged address.
--
Sam Couter | Internet Engineer | http://www.topic.com.au/
[EMAIL PROTECTED]|
your DNS server our default gateway...
To forge a Nimda attack would require you to forge a TCP connection. That's
not easy, unless the attacker is on the network path to the forged address.
--
Sam Couter | Internet Engineer | http://www.topic.com.au/
[EMAIL PROTECTED]|
ite happy to allow RSA
authenticated root logins with SSH.
Plus, su doesn't forward X connections.
--
Sam Couter | Internet Engineer | http://www.topic.com.au/
[EMAIL PROTECTED]| tSA Consulting |
OpenPGP key ID: DE89C75C, available on key servers
OpenPGP fingerprint
ite happy to allow RSA
authenticated root logins with SSH.
Plus, su doesn't forward X connections.
--
Sam Couter | Internet Engineer | http://www.topic.com.au/
[EMAIL PROTECTED]| tSA Consulting |
OpenPGP key ID: DE89C75C, available on key servers
OpenPGP fingerprint
ode on when coding perl scripts that must run in
hostile environments (eg. CGIs), you're an idiot, and you're going to have
problems sooner or later.
If you *do* have taint mode on, then you need to untaint everything you want
to use, including environment variables that y
ode on when coding perl scripts that must run in
hostile environments (eg. CGIs), you're an idiot, and you're going to have
problems sooner or later.
If you *do* have taint mode on, then you need to untaint everything you want
to use, including environment variables that y
bsolute security. See above
about unnecessary risk. Also see above about layers of security, and think
of the OFF button as just another layer that's fast, easy and very cheap to
implement, as well as being very effective.
--
Sam Couter | Internet Engineer | http://www.topic.com
bsolute security. See above
about unnecessary risk. Also see above about layers of security, and think
of the OFF button as just another layer that's fast, easy and very cheap to
implement, as well as being very effective.
--
Sam Couter | Internet Engineer | http://www.topic.com
19 matches
Mail list logo