On Mon, 3 Jun 2002, Eric wrote:
However, this command works sometimes, and sometimes only results in
a permission denied, operation not permitted message. For
instance, /usr/bin/cu and /usr/bin/rsh resulted in that error message,
but /usr/bin/lpr did work. Why the difference?
sounds
On Tue, 2002-05-07 at 07:11, [EMAIL PROTECTED] wrote:
Hi Guys:
I got a surprise this morning when I tried to change my credit card payment
on AOL. It is asking you to place credit card information or checking
information in a unsecured form (Dialogue box) .
i don't have access to an aol
On Fri, 2002-04-05 at 10:05, Thiago Mello wrote:
The Iptables runs in freebsd runs in FreeBSD and Linux
cause its runs linux binary, is this correct?
no. iptables is linux 2.4 specific. the code is based in the kernel, so
just because you can run the command line iptables command doesn't mean
On Thu, 2002-03-28 at 22:14, Bailey Kong wrote:
the current work around i got was to chattr +i /etc/passwd
that makes it so /etc/passwd can't be modified, if and when you need to add
a user you can simply do chattr -i /etc/passwd
that's absolutely pointless under linux. the exploit allows
On Wed, 2002-03-20 at 22:58, [EMAIL PROTECTED] wrote:
on linux 2.2.19, slackware 8, i used ipchains -P input DENY, which returned no errors
but when i try ipchains -A input -p tcp http -j ALLOW or ipchains -A input -p tcp
http -j ACCEPT I get an error message?
you really want :/sbin/ipchains
On Sat, 2002-03-09 at 18:07, [EMAIL PROTECTED] wrote:
can anyone please who has done this sort of thing before elaborate more on pros and
cons
also can please send the snippet of actual code ( c, perl or any lang
welcome ) that gets executed on client side while the smtp auth
(plain) ( just
On Wed, 2002-03-06 at 10:15, Mike Carney wrote:
If you turn off active scripting in IE it stops it from happening. :(
actually, you don't need active scripting enabled. see here:
http://security.greymagic.com/adv/gm001-ie/
The downside is that a huge portion of the sites I visit
On Mon, 2002-03-04 at 17:06, Pradeep Pillai wrote:
Folks, what would comprise a Network Enginners tool kit.
---snip---
What else can you think of ?
at the rsa conference in san jose last month, @stake was giving out
credit card sized cd's that were bootable x86 linux distros. i can't
seem to
On Thu, 2002-02-28 at 12:39, Tony Fondo wrote:
lsof is great also.
except (usually) if someone's running a sniffer they've compromised the
box already. in which case they've probably already trojaned all the
binaries that could be used to identify their sniffer (including
netstat, lsof, ps,
honestly, i've found the best network scanner to be nmap
(http://www.insecure.org/nmap), and i'm surprised that no one's
mentioned it so for. It's the swiss army knife of network testing tools.
nessus actually uses it as its' scanning engine. It runs on *nix and
win32 using libpcap. It supports
On Wed, 2002-02-27 at 11:11, Sumit Dhar wrote:
2. How compatible are gnupg and pgp?
http://www.gnupg.org/faq.html#q5
3. Lastly, anyone can send their keys to the keyserver. How does the
keyserver authenticate that [EMAIL PROTECTED] is really X and not some
impersonator?? Or is that beyond
11 matches
Mail list logo