On Fri, Apr 11, 2014 at 2:26 PM, wrote:
> I receive daily email from the host which normally shows port audits and
> vulnerabilities. However, I did not sport anything related to CVE-2014-0160
> in this email. I expected the same info comes in this email about the base
> system as well.
>
> Ho
On Wed, Mar 5, 2014 at 11:39 PM, Xin Li wrote:
> This is NOT a problem with jail. For starters, it's very bad idea to
> give out host shell account, privileged or not, to jail users if they
> are not trusted. Let's consider this scenario:
>
> jail$ su -l
> jail# cp /usr/bin/less /bin/root_shell
On Sat, Nov 2, 2013 at 12:18 AM, Dimitry Andric wrote:
> On 01 Nov 2013, at 17:31, Tom Evans wrote:
>> On Fri, Nov 1, 2013 at 4:05 PM, Karl Pielorz wrote:
>>>
>>> Hi,
>>>
>>> A friend who uses linux a lot happened to notice on a FreeBSD box I
>
On Fri, Nov 1, 2013 at 4:05 PM, Karl Pielorz wrote:
>
> Hi,
>
> A friend who uses linux a lot happened to notice on a FreeBSD box I
> installed the other day and updated to 9.2-R that it's using ntpd 4.2.4p8.
>
> They reckon that's had a lot of issues (e.g. CVE reports) against it - and
> it shoul
On Sun, Apr 14, 2013 at 9:48 AM, Pétur Ingi Egilsson wrote:
> The general understanding by users, be it right or wrong, is that whenever a
> files' permission is changed, then the effect is immediate everywhere in the
> system.
> This wrong metal model _could_ result in malicious access to a fil
On Tue, May 15, 2012 at 9:40 AM, mahdieh salamat
wrote:
> Thanks all,I have an other question.certainly you see this message in
> startup FreeBSD:"Hit [Enter] to boot immediately, or any other key for
> command prompt."
> after see it if press any key you enter to an other mode and if you type
> '
On Wed, Jan 11, 2012 at 5:52 AM, sasha wrote:
> superpolka.com.ua 8.2-STABLE FreeBSD 8.2-STABLE #3: Sat Jan 7 10:03:34 EET
> 2012 r...@superpolka.com.ua:/usr/src/sys/amd64/compile/NAS2 amd64
>
> [root@artvideo /home/sh]# freebsd-update fetch
>
You cannot use freebsd-update to update a custom kern
On Thu, 2009-10-01 at 19:46 +0100, István wrote:
> "The bad news is that it can indeed take a badly-configured apache
> server down, and the worse news is that that includes a low-traffic
> out-of-the box configuration. Even with the Event MPM, slowloris can
> tie up one worker thread per connecti
On Thu, 2009-10-01 at 19:48 +0200, Eirik Øverby wrote:
> On 1. okt. 2009, at 10.59, Tom Evans wrote:
>
> > On Thu, 2009-10-01 at 02:40 +0200, Thomas Rasmussen wrote:
> >> Martin Turgeon wrote:
> >>> Hi list!
> >>>
> >>> We tested m
On Thu, 2009-10-01 at 02:40 +0200, Thomas Rasmussen wrote:
> Martin Turgeon wrote:
> > Hi list!
> >
> > We tested mod_antiloris 0.4 and found it quite efficient, but before
> > putting it in production, we would like to hear some feedback from
> > freebsd users. We are using Apache 2.2.x on Freeb
you
stuff.
FreeBSD is a volunteer project. This means that there is no-one at all
who is paid by FreeBSD to write code for FreeBSD.
If this doesn't fit your needs, perhaps you need to re-evaluate your
choices.
My 2 cents..
Tom Evans
signature.asc
Description: This is a digitally signed message part
> Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory
> FreeBSD-SA-07:04.file
> Date: Thu, 24 May 2007 15:37:36 +0200
> From: Dag-Erling Smørgrav <[EMAIL PROTECTED]>
> To: Brian A. Seklecki <[EMAIL PROTECTED]>
> CC: FreeBSD Security Advisories <[EMAIL PROTECTED]>,
> freebsd-security@freebsd
12 matches
Mail list logo