RE: [Full-Disclosure] Automating patch deployment

2003-08-06 Thread Bassett, Mark
The good thing about SUS is that you can set it up to not push out the packages until you approve them. The SUS box downloads all the critical updates and then they sit in queue until you tell them it's ok to push them out. I think that's the best way to handle the situation. Sure it creates a l

Re: [Full-Disclosure] Administrivia: Duplicate Messages

2003-08-06 Thread Valdis . Kletnieks
On Wed, 06 Aug 2003 21:43:04 EDT, Len Rose <[EMAIL PROTECTED]> said: > So even though it was seen and transmitted to the Full > Disclosure list (often days before) it gets re-transmitted > because the stupid Micro$oft will apparently resend to > any other address found on the To: line. You'd thi

RE: [Full-Disclosure] Automating patch deployment

2003-08-06 Thread David Vincent
> > The good thing about SUS is that you can set it up to not > > push out the packages until you approve them. The SUS box > > downloads all the critical updates and then they sit in queue > > until you tell them it's ok to push them out. I think that's > > the best way to handle the situati

Re: [Full-Disclosure] f-prot not catching mimail ?

2003-08-06 Thread Paul Szabo
Nik, > As previously noted, the problem here seems to be with the f-prot > binary, not the actual virus signatures/definitions. Yes, that is what I was saying. > Try upgrading the f-prot package, and it'll probably work fine. Done: there was a message yesterday on full-disclosure saying this h

[Full-Disclosure] Samba Server Scannen

2003-08-06 Thread NRG-X
Is there a Posibilety to scann Samba Server ?

RE: [inbox] Re: [Full-Disclosure] Reacting to a server compromise

2003-08-06 Thread Michal Zalewski
On Mon, 4 Aug 2003, Curt Purdy wrote: > Actually the traditionally accepted court evidence is real-time printouts of > data received by the syslog server. So what would stop anyone from replacing some of the printouts after the fact? It's pretty much as insecure as log files in terms of being su

[Full-Disclosure] ¿Bruce Schneir no intelligente?

2003-08-06 Thread Lorenzo Figueroa-Acuna-Gonzales-Garcia-Ortiz-Trujillo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ¡Bueno! I reading these informacions, I no think Bruce Schneir smart. This error made by kids. ¿Matt Murphy right? - - Program description: - --- Password Safe is a tool that allows you to have a different password for all the differe

Re: [Full-Disclosure] Hard drive images

2003-08-06 Thread ldreamer
On Wed, 2003-08-06 at 10:26, Craig Pratt wrote: > On Tuesday, Aug 5, 2003, at 13:23 US/Pacific, Ron DuFresne wrote: > > On Tue, 5 Aug 2003, David Hayes wrote: > > > >> Our old standby, "dd", is perfectly acceptable for making an image of > >> a hard drive to be used in court. It's even the #1 choi

AW: [Full-Disclosure] How to easily bypass a firewall...

2003-08-06 Thread vogt
> Whereas if they were using, say, NetBSD with IPFilter and turned > the securelevel to be >= 2, you cannot turn off or otherwise change > ipf's configuration without a reboot. > > Of course this then leads back to the problem of having all the > requisite bootup files immutable to prevent trojan'

Re: [Full-Disclosure] Hard drive images

2003-08-06 Thread madsaxon
At 03:26 PM 8/5/03 -0700, you wrote: >I believe there are ways to recover data at the >physical/magnetic level - magnetic remnants of >previously-deleted data, for instance - which would >require access to the original platters. I read an >article about this somewhere - would have to be SciAm or

[Full-Disclosure] vulnrability for dummy 101

2003-08-06 Thread brent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 holos gentlemens of the list, it is once again time to bdazzl the F D SUBS with some new 0day . . this time i try to make some focus on some verry silly vulnearbilties that i often see report to the list . . .call these a joke 0day , but i do not mea