account to log into.
Whatever is hard to transfer to ssh is most likely worth to be transferred
immediately ;)
With a company from the 80s, you'll surely have problems with migration, as
there will surely be forgotten processes trying to do rsh. But... migrate
anyway. rsh/rhosts is pure s
account to log into.
Whatever is hard to transfer to ssh is most likely worth to be transferred
immediately ;)
With a company from the 80s, you'll surely have problems with migration, as
there will surely be forgotten processes trying to do rsh. But... migrate
anyway. rsh/rhosts is pure s
rus mails are in my inbox, the system load
jumps up to 25 (!!)
==SNIP procmailrc
:0fw
|/usr/bin/spamassassin
:0fw
|/usr/local/bin/clamfilter.pl
==SNIP
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty no
rus mails are in my inbox, the system load
jumps up to 25 (!!)
==SNIP procmailrc
:0fw
|/usr/bin/spamassassin
:0fw
|/usr/local/bin/clamfilter.pl
==SNIP
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty no
ter English nor German are programming languages ;)
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
ter English nor German are programming languages ;)
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
ly reason to autodelete mails in a private mailbox would be masses
of those mails anyway, so a new worm on the loose should be worth a filter
entry. But on the other hand, maybe, I 'll just push them into a folder and
mark them read...
Greetings,
--
Thomas Ritter
"Those who would gi
ly reason to autodelete mails in a private mailbox would be masses
of those mails anyway, so a new worm on the loose should be worth a filter
entry. But on the other hand, maybe, I 'll just push them into a folder and
mark them read...
Greetings,
--
Thomas Ritter
"Those who would gi
and found it as "not usable" because of not enough virii.
... But I am sure it will soon grow big enough.
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
and found it as "not usable" because of not enough virii.
... But I am sure it will soon grow big enough.
Greetings,
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Fran
mail with a M$ EXE
should really score 4.5 or so, because even if one of my friends sends me an
EXE file on purpose, I would look for that in my Spam folder first ;)
[1] http://www.openantivirus.org/
[2] http://www.everysoft.com/clamfilter.html
--
Thomas Ritter
"Those who would give up ess
mail with a M$ EXE
should really score 4.5 or so, because even if one of my friends sends me an
EXE file on purpose, I would look for that in my Spam folder first ;)
[1] http://www.openantivirus.org/
[2] http://www.everysoft.com/clamfilter.html
--
Thomas Ritter
"Those who would give up ess
[...]
> but apparently they have reversed the priority. Now rsh, rlogin, etc.
> works, but still not remote X windows.
What about configuring X for network access? Wasn't X configured not to use
network and sockets instead by default?
--
Thomas Ritter
"Those who would g
[...]
> but apparently they have reversed the priority. Now rsh, rlogin, etc.
> works, but still not remote X windows.
What about configuring X for network access? Wasn't X configured not to use
network and sockets instead by default?
--
Thomas Ritter
"Those who would g
e to
clean out for yourself. This is ugly.
But, with 2-3 XML Parsers for config files defining patterns, actions and
rules (pattern->action), you could build a rather easy to maintain threat
reaction system in Perl with little effort.
If you're interested in building one, I am...
Greeti
e to
clean out for yourself. This is ugly.
But, with 2-3 XML Parsers for config files defining patterns, actions and
rules (pattern->action), you could build a rather easy to maintain threat
reaction system in Perl with little effort.
If you're interested in building one, I am...
Greeti
ll
end up on a piece of paper pinned to the monitor. Servers have to be booted
when they go down, not when the one sysadmin who knows the PW comes back...
Don't make too much fuss about encrypting. If your machine has one little
security hole, the attacker will get all data unencrypted.
ll
end up on a piece of paper pinned to the monitor. Servers have to be booted
when they go down, not when the one sysadmin who knows the PW comes back...
Don't make too much fuss about encrypting. If your machine has one little
security hole, the attacker will get all data unencrypted.
inet.c(689)
Is it a bug or a feature? Doea anyone know? sid with 2.4.20 selfcompiled
--
Thomas Ritter
"Those who would give up essential liberty, to purchase a little temporary
safety, deserve neither liberty nor safety." - Benjamin Franklin
Yes, iptables -F (and/or calling your firewall script if you have one).
But don't forget to clean up /etc/hosts.deny from time to time, it can get
very big if you switched TCP wrappers denial in portsentry.
Thomas Ritter
Yes, iptables -F (and/or calling your firewall script if you have one).
But don't forget to clean up /etc/hosts.deny from time to time, it can get
very big if you switched TCP wrappers denial in portsentry.
Thomas Ritter
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subje
u only get
the interesting stuff. It's one or two weeks long 2-3 minutes of adding
ignore entries and one minute from time to time to cope with what updated
programs write into the log ;)
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
u only get
the interesting stuff. It's one or two weeks long 2-3 minutes of adding
ignore entries and one minute from time to time to cope with what updated
programs write into the log ;)
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
--
To UNSUBSCRIBE, em
7;s no way this would be done
for a single thread, and the interesting thing is THAT the thread consists of
debian-security subscribers.
(By the way, I just note my KMail has no easy "ignore this thread" context
menu entry... *jump-to-the-bugwizard*)
Okay, it's in the kmail wishlist now, using filters it would be 4-5 clicks ;)
--
Thomas Ritter
7;s no way this would be done
for a single thread, and the interesting thing is THAT the thread consists of
debian-security subscribers.
(By the way, I just note my KMail has no easy "ignore this thread" context
menu entry... *jump-to-the-bugwizard*)
Okay, it's in the kmail wishl
e-only-use... Are there any
licenses forbidding religious people to use software? They don't need
computers and internet, they can pray all day long...
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
e-only-use... Are there any
licenses forbidding religious people to use software? They don't need
computers and internet, they can pray all day long...
--
Thomas Ritter
Fight against TCPA - http://www.againsttcpa.com/index.shtml
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a s
y NFS with
ACLs, no Quota... But that seems okay for many uses.
When building systems with subadministrators, this really comes in handy. The
old UNIX file rights are okay for many uses, but there really are reasons for
ACLs.
Thomas Ritter
y NFS with
ACLs, no Quota... But that seems okay for many uses.
When building systems with subadministrators, this really comes in handy. The
old UNIX file rights are okay for many uses, but there really are reasons for
ACLs.
Thomas Ritter
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
w
29 matches
Mail list logo