Hi!
How do you get on the security update notification list?
I thought I had joined, but noticed several updates that I wasn't notified
about.
Thanks!
Steve
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi!
How do you get on the security update notification list?
I thought I had joined, but noticed several updates that I wasn't notified
about.
Thanks!
Steve
in the log file?
Thanks!
Steve Rudd
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
file?
Thanks!
Steve Rudd
Hi! Steve Rudd with more "disconsolate mumbling" (great term g)
So if I did publish a user name and password (not that I would) that had
pop 3 and ftp access with no shell access and was restricted to public html
directories, is that a risk to the rest of the system? A standard publi
Peter Cords said:
If you allow execution of
CGI programs from public_html, then users will be able to execute code
(probably under their UID). Then you have to secure your machine against
local exploits. Obviously, you should do this anyway, but if crackers can
run arbitrary code (as a
Hi! Steve Rudd with more disconsolate mumbling (great term g)
So if I did publish a user name and password (not that I would) that had
pop 3 and ftp access with no shell access and was restricted to public html
directories, is that a risk to the rest of the system? A standard public
box has
Peter Cords said:
If you allow execution of
CGI programs from public_html, then users will be able to execute code
(probably under their UID). Then you have to secure your machine against
local exploits. Obviously, you should do this anyway, but if crackers can
run arbitrary code (as a
Hello! Steve here,
Well I am one of the family now! My server is Debian 2.2r2. A benign hacker
got me. All he seemed to do was overwrite my root index.html page and
notify the "hackers watchdog" group to take responsibility for the act!
I have some security questions:
1. How secure is it
Hi!
I tore down my redhat box and installed debian about 3 days ago. I decided
to use separate users and passwd for each telnet and email.
User#1: standard unsecure telnet cuteftp and Eudora.
User#1 has no shell access and is restricted to public "html" files
directories.
User#2: CRTssh
I have been told by a Mac-head that the Mac is the most secure server and
that it is significantly more secure than any unix system, including Linux.
Any comments
Hi!
I tore down my redhat box and installed debian about 3 days ago. I decided
to use separate users and passwd for each telnet and email.
User#1: standard unsecure telnet cuteftp and Eudora.
User#1 has no shell access and is restricted to public html files
directories.
User#2: CRTssh
Hello! Steve here,
Well I am one of the family now
My server is Debian 2.2r2. A benign hacker
got me. All he seemed to do was overwrite my root index.html page and
notify the "hackers watchdog" group to take responsibility for the act!
I have some security questions:
1. How secure is it
Hello! Steve here,
Well I am one of the family now! My server is Debian 2.2r2. A benign hacker
got me. All he seemed to do was overwrite my root index.html page and
notify the hackers watchdog group to take responsibility for the act!
I have some security questions:
1. How secure is it
Hello! Steve here,
Well I am one of the family now
My server is Debian 2.2r2. A benign hacker
got me. All he seemed to do was overwrite my root index.html page and
notify the hackers watchdog group to take responsibility for the act!
I have some security questions:
1. How secure is it
Daniel Stark asked:
At 01:53 PM 2/20/01 -0800, you wrote:
How exactly did you get hacked? Did you leave security wholes large
enough for a bus to drive through open? Open your inetd.conf file and #
out everything! The only thing you need open is port 22. Others will
disagree, but
Daniel Stark asked:
At 01:53 PM 2/20/01 -0800, you wrote:
How exactly did you get hacked? Did you leave security wholes large
enough for a bus to drive through open? Open your inetd.conf file and #
out everything! The only thing you need open is port 22. Others will
disagree, but
considering joining the debian family, but am a bit concerned about
security.
Just how much more secure is Debian than redhat?
Thanks!
Steve Rudd
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Steve here,
I want to install "Real Basic Server 8" and "Webinator" search program on
the latest version of Debian 2.2r2.
1. Will they install or are they not compatible. For example, while
Webinator would work with Redhat 7, Realserver 8 would not. (But Real
Server 7 did install on Redhat
Steve here,
Well first, I repent of calling Linux 7: Redhat 7. Yes I am new. I have
been maintaining my own box from a su level for about 3 months. That is why
I was calling in an expert to install Debian tomorrow. It has become quite
obvious to me that I am way over my head in trying to get
Steve here,
Several have voiced an interest in the hack. Well here is a guess and some
facts:
THE HACK:
For those interested in the hack, I think it was the "Dameon worm" but
could not find any evidence of the trace files on my system. Here is what
happened:
1. I get a letter from "[EMAIL
considering joining the debian family, but am a bit concerned about
security.
Just how much more secure is Debian than redhat?
Thanks!
Steve Rudd
Steve here,
I want to install Real Basic Server 8 and Webinator search program on
the latest version of Debian 2.2r2.
1. Will they install or are they not compatible. For example, while
Webinator would work with Redhat 7, Realserver 8 would not. (But Real
Server 7 did install on Redhat 6)
23 matches
Mail list logo