ahaah.
Nice reply Sparky.
MustLive, seems you've been defaced :-)
antisnatchor
laurent gaffie
February 5, 2011 3:36 AM
Hey
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 02/04/11 16:36, Erik Falor wrote:
On Fri, Feb 04, 2011 at 04:18:53PM -0300, Zerial. wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 02/04/11 16:13, valdis.kletni...@vt.edu wrote:
On Fri, 04 Feb 2011 16:06:06 -0300, Zerial. said:
what
Nice tip, but this solution doesn't work for me. I don't wanna avoid
logging commands nor delete the bash history nor hide the commands. I
wanna encrypt the file. I don't wanna miss commands which I executed.
Another solution may be copy and move the history file from the server
to the
To be honest, none of these methods will actually be effective: root can do
what he/she likes, including monitoring *everything* you do. Worrying about
shell history is not going to solve anything.
Your only choices are to trust root, or setup your own host.
Peter Maxwell
On 6 February 2011
I agree with Peter, if you control the root user ... the bash history
is the minnor problem ...
Emanuel dos Reis Rodrigues
Senior Level Linux Professional (LPIC-3)
LPI 302 (Mixed Environment) Specialty
LPI 304 (Virtualization and High Availability) Specialty
C|EH Certified Ethical Hacker
Hi all,
I would like to get some feedback about the vswitches and how to deal
with physical network separation.
I have an idea about this but I would like to know the consensus of the
security community to feel more confortable with it.
There is a great article summing up the possible
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
phocean said the following on 06/02/11 15:47:
I would like to get some feedback about the vswitches and how to deal
with physical network separation.
vmware certifies the solution DMZ+LAN within a single vmware host with two
vswitches.
This is of
Hi Luigi,
vmware certifies the solution DMZ+LAN within a single vmware host with two
vswitches.
This sounds highly questionable, especially after reading the article of
Brad. The same goes with Cisco of course.
So what else than the marketing guy certification can we get? Before
designing an
For instance, the switch software isolates the communication betwenn port A,
B,
and C, that is if you send an unicast packet from A to B, C cannot read it.
But
the switching engine is not hardware, is software, so you could not trust
it.
This is the same when you compare physical
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
phocean said the following on 06/02/11 16:58:
So my worries remain... how do they address this?
You don't mean that we have to wait for the next 0-day for the VMware
claim to be proved false? There are coding vulnerabilities everywhere.
We could
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
phocean said the following on 06/02/11 16:58:
So my worries remain... how do they address this?
You don't mean that we have to wait for the next 0-day for the VMware
claim to be proved false? There are coding vulnerabilities everywhere.
vmware has come out with their vshield virtual firewall product.
Altor/Juniper has had a virtual firewalling product for a while now.
On Sun, Feb 6, 2011 at 11:24 AM, phocean 0...@phocean.net wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
phocean said the following on 06/02/11
Pretty much what the others said with the addition that if you can't trust
root, you simply cannot trust *any* command on that machine, including gpg,
since root can compromise them in many ways, too. Best bet is to download it
every session and clear it -- but be warned that even any method used
Le dimanche 06 février 2011 à 13:48 -0600, Albert R. Campa a écrit :
vmware has come out with their vshield virtual firewall product.
Altor/Juniper has had a virtual firewalling product for a while now.
Which is still another module running on the same host with the same
OS...
So, the Windows based 'Resource Monitor' seems to have a neat little feature
called 'Wait chain', which lets you see which processes are currently stuck
waiting for IO.
Is anyone aware of a Linux based CLI equivalent, which will show the
processes stuck in IO wait, in a tree format? And before
This may/may not be relevant to your interests.
Me and a friend once stumbled across a lovely sys admin many years ago, that
patched bash to force it to log remotely (no I don't have the source).
Long story short, it got the desired effect that the sys admin was wanting
lol.
On Sun, Feb 6, 2011
I think it's time for a group hug :|
On Sun, Feb 6, 2011 at 10:43 AM, Michele Orru antisnatc...@gmail.comwrote:
ahaah.
Nice reply Sparky.
MustLive, seems you've been defaced :-)
antisnatchor
--
laurent gaffie laurent.gaf...@gmail.com
February 5, 2011
17 matches
Mail list logo