Every message that you send to supp...@mitacs.com will be resent to debian-
security. Every message you send to postmaster or abuse will be ignored.
Please everyone, configure your mail servers to block all mail from
85.125.218.18 and all mail with @mitacs.com in the From: field.
If you really
Michelle Konzack
Am 2010-07-14 19:35:02, hacktest Du folgendes herunter:
Every message that you send to supp...@mitacs.com will be resent to debian-
security. Every message you send to postmaster or abuse will be ignored.
Please everyone, configure your mail servers to block all mail from
-
(deutsche Version unten)
Dear SuSE Linux User,
thank you for your message regarding fake.
Please note that the email address you sent your message to
([EMAIL PROTECTED]) is no longer in use. Of course you still can send
-
(deutsche Version unten)
Dear SuSE Linux User,
thank you for your message regarding fake.
Please note that the email address you sent your message to
([EMAIL PROTECTED]) is no longer in use. Of course you still can send
V I R U S A L E R T
Our viruschecker found the
W32/[EMAIL PROTECTED]
virus(es) in your email to the following recipient(s):
- [EMAIL PROTECTED]
Please check your system for viruses, or ask your system administrator
to do so.
For your reference, here are
V I R U S A L E R T
Our viruschecker found the
W32/[EMAIL PROTECTED]
virus(es) in your email to the following recipient(s):
- [EMAIL PROTECTED]
Please check your system for viruses, or ask your system administrator
to do so.
For your reference, here are
Hi,
On Fri, 26 Jul 2002, Gerhard Simon wrote:
How do i change password and or name in yahoo.
Thanks for your help.
write email to [EMAIL PROTECTED] with the subject toss my salad and your
desired new user name and password in the message body.
hth,
jeedi.
--
To UNSUBSCRIBE, email to
On Fri, 26 Jul 2002 at 04:30:11PM -0500, Gerhard Simon wrote:
How do i change password and or name in yahoo.
Not to be rude but this has to do with Debian AND Security...how?
--
Phil
PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/ | gpg --import
--
On Fri, 26 Jul 2002, Gerhard Simon wrote:
Hi,
How do i change password and or name in yahoo.
Use a little program called fdisk.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Mon, Nov 12, 2001 at 10:46:13AM +0100, Beno?t MARTINET wrote:
Hi,
I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed
to login
using root and users' passwords. Password authentication failed all the time
and it
prompted Permission Denied on the command line.
On Sat, Sep 15, 2001 at 12:51:26PM -0400, Russell Speed wrote:
Should I remove /bin/sh for something less obvious as a general
protection from buffer overflows?
Most shell scripts running on your server call #!/bin/sh, so
removing it will get you in lots of trouble ;-)
Just try:
$ grep
On Sat, Sep 15, 2001 at 12:51:26 -0400, Russell Speed wrote:
I am curious if the following is an example of a buffer overflow.
It looks like an attempt to exploit a buffer overflow. IIRC the fact that it
got logged to syslog means it didn't work.
I changed the passwords - and added an entry
On Sat, Sep 15, 2001 at 12:51:26PM -0400, Russell Speed wrote:
Should I remove /bin/sh for something less obvious as a general
protection from buffer overflows?
Most shell scripts running on your server call #!/bin/sh, so
removing it will get you in lots of trouble ;-)
Just try:
$ grep
On Sat, Sep 15, 2001 at 12:51:26 -0400, Russell Speed wrote:
I am curious if the following is an example of a buffer overflow.
It looks like an attempt to exploit a buffer overflow. IIRC the fact that it
got logged to syslog means it didn't work.
I changed the passwords - and added an entry to
On Wed, Mar 07, 2001 at 01:18:20AM +0100, [EMAIL PROTECTED] wrote:
gcc -D__KERNEL__ -DMODULE -DLINUX -DEXPORT_SYMTAB -D__NO_VERSION__
-I/usr/include -I. -O2 -pipe -DCONFIG_PROC_FS -DIANS -DIANS_BASE_VLAN_TAGGING
^^
That should probably be -I/usr/src/linux/include. You need to
Ivan,
Almost anything will connect to your auth port. ippl will, IRC servers
will, Web and FTP servers often will, as will e-mail servers...
Regards,
Alex.
-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCM d- s:+ a--- C UL P L+++ E W++ N o-- K- w
O--- M- V- PS+ PE- Y PGP t+ 5 X- R tv+
On Thu, Mar 16, 2000 at 06:25:53PM +0100, Sebastian Stark wrote:
identd takes two parameters, the server and the source port of a tcp
connection. it gives back the userid of the user who started it. am i
right so far?
i think, the userid may be useful for some purposes but in most cases it
On Thu, 16 Mar 2000, Ivan Ivanovic wrote:
On my Slink placed on Inernet often appears auth port connection attempts
from various sites...
What (common) application needs this port?
irc server make ident connections to clients.
squid can use ident for authorization.
sendmail sometimes uses
irc server make ident connections to clients.
squid can use ident for authorization.
sendmail sometimes uses ident.
maybe you want to read rfc1413.
i'd turn auth off for security reasons if your box has a direct
connection to internet.
Hmm, that's an easy approach, but from
On Thu, Mar 16, 2000 at 03:45:50PM +0100, Ivan Ivanovic wrote:
On my Slink placed on Inernet often appears auth port connection attempts
from various sites...
What (common) application needs this port?
The auth port provides a facility for a remote machine to identify who's
on your end of
On Thu, Mar 16, 2000 at 03:01:40PM +, Mark Brown wrote:
On Thu, Mar 16, 2000 at 03:45:50PM +0100, Ivan Ivanovic wrote:
On my Slink placed on Inernet often appears auth port connection attempts
from various sites... What (common) application needs this port?
The auth port provides a
On Thu, 16 Mar 2000, Fredrik Liljegren wrote:
i'd turn auth off for security reasons if your box has a direct
connection to internet.
Many people misunderstand the usefulness of identd, and so disable it or
block all off site requests for it. identd is not there to help out remote
sites.
On Thu, Mar 16, 2000 at 04:39:05PM +, Tim Haynes wrote:
For most (home) purposes it's best to make it REJECT instead of DENY, if you
choose to block it, so that e.g. remote FTP sites don't have to wait for a
timeout before letting you in.
This isn't specific to identd, but I'm wondering
On Thu, Mar 16, 2000 at 05:58:00PM -0400, Peter Cordes wrote:
This isn't specific to identd, but I'm wondering why you would bother
filtering the port instead of just not running identd? (I assume you would
have/do turn off identd in /etc/inetd.conf as well as using doing port
filtering.)
Yes, the best policy is always to disable anything on your machine that
you're not using. Those you _are_ using, you then filter the crap out of.
Personally, my workstation-type machines only listen on port 6000 (X), 22
(ssh), and occasionally ftp and tftp if I need them for a specific
Peter Cordes wrote:
This isn't specific to identd, but I'm wondering why you would bother
filtering the port instead of just not running identd? (I assume you would
have/do turn off identd in /etc/inetd.conf as well as using doing port
filtering.) I've never really understood why people
On Thu, Mar 16, 2000 at 10:07:37PM +, Tim Haynes wrote:
Alternatively, people might filter based on different incoming host, network
or interface[1]; if it's from a site I trust I might allow it for speed and/or
identity checking if required; if I'm not sure about them I might let them
On Thu, Mar 16, 2000 at 02:19:53PM -0800, Brian Kimball wrote:
Peter Cordes wrote:
This isn't specific to identd, but I'm wondering why you would bother
filtering the port instead of just not running identd? (I assume you would
have/do turn off identd in /etc/inetd.conf as well as using
28 matches
Mail list logo