I take issue with some of these governmental decisions. If we as a country
have a short coming, work on it and make it better. Do not roll over and
play dead!
So far, off shore consulting has not hurt me however if they ever get their
act together they could literally kill me. I cannot
Am 16. Mar, 2008 schwätzte Josef Lowder so:
Are Linux boxes vulnerable to be used by botnets?
Theoretically yes, but not really. If there were a security hole that
could be exploited someone could take advantage of it to deliver a payload
that would turn GNU/Linux boxen into trojans.
Linux boxen are very usable as bots. I am currently involved in a forensic
investigation of a compromised system that was used as part of a bot-net.
Don't fool yourself into thinking you are any safer than Windows users. You
will simply be pwnt by moderately more talented hackers is all. Lock
An acquaintance of mine is in need of a good software developer that is
well versed in the following areas:
C/C++
3D geometry (application to physical models)
OpenGL
video hardware interfacing
Please reply directly to me if you are interested or know someone who might.
Thanks,
Walter
Josef Lowder wrote:
.
Are Linux boxes vulnerable to be used by botnets?
This article in USA Today is frightening.
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
---
PLUG-discuss mailing list -
Jon M. Hanson wrote:
Josef Lowder wrote:
.
Are Linux boxes vulnerable to be used by botnets?
This article in USA Today is frightening.
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
Probably at least once a day my Linux box that I have
I recommend Single Packet Authentication or Port Knocking for use in
conjunction with your SSH service.
On Mon, Mar 17, 2008 at 8:37 AM, Mike Bydalek
[EMAIL PROTECTED] wrote:
Jon M. Hanson wrote:
Josef Lowder wrote:
.
Are Linux boxes vulnerable to be used by botnets?
This article in
.
On Mon, 17 Mar 2008 08:37, Mike Bydalek wrote
Jon M. Hanson wrote:
Josef Lowder wrote:
Are Linux boxes vulnerable to be used by botnets?
Probably at least once a day my Linux box that I have co-located is
probed for a weak password /account through SSH.
[snipped]
That seems
After a long battle with technology, Erich Newell wrote:
[ botnets, ssh brute force attacks, etcetera ]
I recommend Single Packet Authentication or Port Knocking for use in
conjunction with your SSH service.
Port knocking is really useful, but you need to have something on the remote
client
I now strictly use ssh key authentication for my home system, with a
password on the key of course.
One thing about port knocking - I have found in the past that an
extremely fast port scanner, such as scanrand, can hit all the ports
fast enough to get me to an ssh prompt on a machine using it.
On Mon, Mar 17, 2008 at 09:57:05AM -0600, Josef Lowder wrote:
.
On Mon, 17 Mar 2008 08:37, Mike Bydalek wrote
Jon M. Hanson wrote:
Josef Lowder wrote:
Are Linux boxes vulnerable to be used by botnets?
Probably at least once a day my Linux box that I have co-located is
probed
After a long battle with technology, Josef Lowder wrote:
This is all very interesting ... and confusing for my simple mind.
It sounds like most of the replies to my question pertain to
boxes that are used as servers and not just regular users.
Or are we all servers?
If you're running
Ping.
I'm at work at a contract right now, I will send you my full information
tonight.
Walter J. Mack [EMAIL PROTECTED] wrote:
An acquaintance of mine is in need of a good software developer that is
well versed in the following areas:
C/C++
3D geometry (application to
keith smith wrote:
I agree, we need to be courteous. A few hundred phone calls to her
office might get her thinking though.
*/Craig White [EMAIL PROTECTED]/* wrote:
On Sat, 2008-03-15 at 20:10 -0700, Joshua Zeidner wrote:
At this point, I would suggest young americans
You make a few good points. I still feel bringing people from other counties
to work in jobs that could be filled locally is not right.
If US talent is not available then we need to fix that by creating an
environment where these skills can be nurtured.
David Huerta [EMAIL PROTECTED]
I vote for Vaughn for office!!! Well said my friend!
Vaughn Treude [EMAIL PROTECTED] wrote: keith smith wrote:
I agree, we need to be courteous. A few hundred phone calls to her
office might get her thinking though.
*/Craig White /* wrote:
On Sat, 2008-03-15 at 20:10 -0700,
I called her office since I now live in Tucson. I confirmed she is working on
a bill to extend the h-1b visas. I informed her assistant that this
information was moving through the tech community and if she continues to
moving in a direction that threatens our jobs we are going to do
After a long battle with technology, Erich Newell wrote:
I recommend Single Packet Authentication or Port Knocking for use in
conjunction with your SSH service.
Single packet authentication: http://www.linuxjournal.com/article/9621
It looks interesting. However, the program described in that
.
On Mon, 17 Mar 2008 09:17, Matt Graham wrote (in part)
After a long battle with technology, Josef Lowder wrote:
This is all very interesting ... and confusing for my simple mind.
It sounds like most of the replies to my question pertain to
boxes that are used as servers and not just
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Nathan wrote:
How many of you have used both vmware and virtual box? I have downloaded
I use both. VMWare's interface is a little nicer but vbox seems to have
copied it's layout for the most part.
feature set is pretty much the same.
usually can
Am 13. Mar, 2008 schwätzte Nathan Aubrey so:
moin moin Nathan,
I don't see any answers to this, so I'll take a stab at it.
I'm trying to create a cpio image to use during boot. I have one already, but
I am editing a script, then re-creating the image. It seems after so many
modifications I
test
--
Bob Holtzman
If you think you're getting free lunch,
check the price of the beer
---
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
.
Last year I used the IRS supplied pdf forms to prepare my tax returns.
When I finished filling in the fill-in pdf forms, somehow, I converted
each one to a new pdf form that had *fixed* data for printing out,
emailing, etc. But now I can't remember how I did that.
How does one convert a
Josef Lowder wrote:
.
Last year I used the IRS supplied pdf forms to prepare my tax returns.
When I finished filling in the fill-in pdf forms, somehow, I converted
each one to a new pdf form that had *fixed* data for printing out,
emailing, etc. But now I can't remember how I did that.
On Mon, 2008-03-17 at 05:59 -0700, Vaughn Treude wrote:
I agree that the whole H-1b visa thing completely stinks and I presume
that IBM and perhaps some other corporate interests are probably the
motivation for this.
I agree that the corporate interests have way too much
On Mon, 17 Mar 2008 18:07:30 -0700, Charles Jones wrote
Josef Lowder wrote:
.
Last year I used the IRS supplied pdf forms to prepare my tax returns.
When I finished filling in the fill-in pdf forms, somehow, I converted
each one to a new pdf form that had *fixed* data for printing out,
Josef Lowder wrote:
On Mon, 17 Mar 2008 18:07:30 -0700, Charles Jones wrote
Josef Lowder wrote:
.
Last year I used the IRS supplied pdf forms to prepare my tax returns.
When I finished filling in the fill-in pdf forms, somehow, I converted
each one to a new pdf form that had *fixed*
good article!
Craig White [EMAIL PROTECTED] wrote: On Mon, 2008-03-17 at 05:59 -0700,
Vaughn Treude wrote:
I agree that the whole H-1b visa thing completely stinks and I presume
that IBM and perhaps some other corporate interests are probably the
motivation for this.
I
I'm trying to write a perl script that will
- read a txt file with name=value pairs
- loop through a shell script (see attached .txt file)
- grab the contents of a particular function
- replace the name=value pairs from the function with the value from the
txt file
- grab the corresponding
On Mon, 2008-03-17 at 19:05 -0600, Josef Lowder wrote:
.
Last year I used the IRS supplied pdf forms to prepare my tax returns.
When I finished filling in the fill-in pdf forms, somehow, I converted
each one to a new pdf form that had *fixed* data for printing out,
emailing, etc. But now
Robert Holtzman wrote:
test
Robert,
Four email tests in two days is quite a few.
Are the tests working? Do you need some help with something?
Alan
signature.asc
Description: OpenPGP digital signature
---
PLUG-discuss mailing list -
I installed a postscript printer like HP IIP and I
selected print to file at time of installing printer.
I then print the filled in pdf and select the HP IIP
printer. I then give it a file name like output.ps
then open up a terminal a use the $ps2pdf output.ps
output.pdf and you'll have the pdf
32 matches
Mail list logo