V|
INPUTOUTPUT
|^
+-> local processes -+
Hope that makes it clear
Crispin Wellington
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
of StackGuard: Stack Shield offers no advantages (it is not more
secure and it is not faster) and is much more problematic to deploy.
* Libsafe vs. StackGuard or Stack Shield is a true decision: Libsafe
is incompatible with compiler techniques that munge the call stack
(and in
secure and it is not faster) and is much more problematic to deploy.
* Libsafe vs. StackGuard or Stack Shield is a true decision: Libsafe
is incompatible with compiler techniques that munge the call stack
(and incompatible with -fno-frame-pointer) so you have to choose
one
s as well as all versions of
OpenSSH include the crc32 compensation attack detector, designed to detect and
prevent this attack. The detector renders the attack harder to mount, but
doesn't prevent it entirely. SSH-2 uses cryptographically strong integrity
checks to avoid such problems.
Kind Regards
Crispin
s as well as all versions of OpenSSH
include the crc32 compensation attack detector, designed to detect and prevent this
attack. The detector renders the attack harder to mount, but doesn't prevent it
entirely. SSH-2 uses cryptographically strong integrity checks to avoid such problems.
2 attack. Thus you need
to use SSH2 protocol. OpenSSH supports SSH2. You need different keys though, as
SSH2 so far does not support RSA keypairs and needs DSA keys.
Anyone with more indepth knowledge like to coment?
Crispin
2 attack. Thus you need to use
SSH2 protocol. OpenSSH supports SSH2. You need different keys though, as SSH2 so far
does not support RSA keypairs and needs DSA keys.
Anyone with more indepth knowledge like to coment?
Crispin
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
7 matches
Mail list logo