CentOS Errata and Security Advisory 2010:0749 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0749.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
66ee1357503afe32ee034b91227b70a2
CentOS Errata and Security Advisory 2010:0749 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0749.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
72e449e8db5b17a87cdba060c072b823
CentOS Errata and Bugfix Advisory 2010:0646
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0646.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
9c3052568673423d60d3a49eb020338d
CentOS Errata and Bugfix Advisory 2010:0646
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0646.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
a3dd062c82646f0ef41667217ac66eff
CentOS Errata and Security Advisory 2010:0742 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0742.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
cb420292f2b778da1364c78ef841cd50
CentOS Errata and Security Advisory 2010:0753 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0753.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
1cf0c1d049128c5391141fbad6fe1bbb
CentOS Errata and Security Advisory 2010:0720 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0720.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
fb576dead59bd03479e4da16b10a4fe4
CentOS Errata and Bugfix Advisory 2010:0708
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0708.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
a627871ba4ec41f8c41cf870706c64ca
CentOS Errata and Bugfix Advisory 2010:0708
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0708.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
2d2d94c9d29772dda82e85cc52eb3241
CentOS Errata and Bugfix Advisory 2010:0744
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0744.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
7a7ed5e8aae2f92cd1112622dca1e453
CentOS Errata and Bugfix Advisory 2010:0744
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0744.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
785f021ca998cdf3d662d761e36e
CentOS Errata and Security Advisory 2010:0742 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0742.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
a2f087dd2963808a1b0001d6917ab5ee
CentOS Errata and Security Advisory 2010:0742 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2010-0742.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
0e1254a1eade7a996020c491a9952d35
CentOS Errata and Bugfix Advisory 2010:0716
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0716.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
093a78cb38f91231691bc8fdac6d8ed2
CentOS Errata and Bugfix Advisory 2010:0716
Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0716.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
024f57483c6345cba1c26bcf5d4dfe4c
Gracias Eduardo
Para comenzar, he ejecutado wget con -4 y funcionó de forma instantánea.
Cuando lo ejecuto sin la opción -4, veo a través de iptraf muchas
solicitudes UDP al DNS que tengo configurado hasta que finalmente
resuelve y descarga. En cambio si lo ejecuto con -4 envía solo una
Ya verificaste en el /etc/resolv.conf que tengas ahi la ip de tu dns, deberas
de tener al menos 3 nameservers, y has probado con dig y nslookup tu dns y
resolucion inversa, tambien checa si tu dns esta en chroot
Saludos
Enviado desde mi Nokia E71 3G de Telcel
-- mens. original --
Asunto: Re:
On Sun, Oct 10, 2010 at 10:58:51PM -0700, Dave Stevens wrote:
Quoting Scott Robbins scot...@nyc.rr.com:
Is movieplayer mplayer?
I don't think so I think it's Totem
Totem often seems to have problems, even in more up to date
distributions such as Fedora and Ubuntu.
If that's the case,
For some reason all the perl man pages cause yum errors like
-
Transaction Check Error:
file /usr/share/man/man1/c2ph.1.gz from install of
perl-5.8.8-32.el5_5.2.x86_64 conflicts with file from package
perl-5.8.8-32.el5_5.1.i386
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thus Timothy Murphy spake:
For some reason all the perl man pages cause yum errors like
-
Transaction Check Error:
file /usr/share/man/man1/c2ph.1.gz from install of
perl-5.8.8-32.el5_5.2.x86_64 conflicts
I can't understand exactly what these security updates do? Why is there a
need to have a security update?
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thus Ritika Garg spake:
I can't understand exactly what these security updates do? Why is there a
need to have a security update?
YMMD.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
On Mon, October 11, 2010 13:36, Ritika Garg wrote:
I can't understand exactly what these security updates do? Why is there a
need to have a security update?
___
What is your IP? :-D
___
CentOS mailing list
I have the same problem on it . Isn't the CentOS very safe?
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
Am 11.10.10 14:30, schrieb sync:
I have the same problem on it . Isn't the CentOS very safe?
Okay, I'll bite.
From time to time there are bugs found in the software which CentOS
ships. These bugs can lead your code to crash, your machine to be denied
of service as the process which has the bug
On 11/10/10 11:30 PM, sync wrote:
I have the same problem on it . Isn't the CentOS very safe?
*Sigh*
If you don't update it then it won't remain so. It's like buying a
brand new deadlock for the door to your house and then leaving the door
wide open when you go out. Chances are that sooner or
At Mon, 11 Oct 2010 20:30:04 +0800 CentOS mailing list centos@centos.org
wrote:
I have the same problem on it . Isn't the CentOS very safe?
If you apply ALL of the security updates as they become available. ALL
O/Ss have security updates from time-to-time (what do you think those
From: Timothy Murphy gayle...@eircom.net
For some reason all the perl man pages cause yum errors like
-
Transaction Check Error:
file /usr/share/man/man1/c2ph.1.gz from install of
perl-5.8.8-32.el5_5.2.x86_64 conflicts with file from package
From: Giles Coochey gi...@coochey.net
On Mon, October 11, 2010 13:36, Ritika Garg wrote:
I can't understand exactly what these security updates do? Why is there a
need to have a security update?
What is your IP? :-D
Keep this information secret, but I think his IP is 127.0.0.1 ...
And
On Mon, Oct 11, 2010 at 2:30 PM, sync jian...@gmail.com wrote:
I have the same problem on it . Isn't the CentOS very safe?
CentOS (RHEL 5) is one of the most secure operating systems worldwide.
Best regards,
Morten
___
CentOS mailing list
On 10/11/2010 07:10 AM, Mathieu Baudier wrote:
[snip]
- install 'mock' (IMPORTANT: install the one from CentOS, exclude the
one from EPEL in your repo file)
Would you mind giving a hint why one should not use mock from EPEL?
Afaict the mock version in the CentOS repo is 0.6.13 which was
Would you mind giving a hint why one should not use mock from EPEL?
Because the one in CentOS will, out of the box, pull out and properly
configure the CentOS buildsys package, which itself is a meta-package
whose dependencies are the minimal set required to create a chroot
build environment:
On Mon, 11 Oct 2010, Patrick Lists wrote:
Would you mind giving a hint why one should not use mock from EPEL?
Afaict the mock version in the CentOS repo is 0.6.13 which was released
years ago and the one in EPEL is 1.0.7 which is current.
ehh??
mock-1.1.5-1orc.src.rpm from upstream Raw Hide
Robert P. J. Day wrote on 10/10/2010 05:56 PM:
...
http://wiki.centos.org/PackageManagement/SourceInstalls
seems just a touch on the hysterical side. i don't disagree that
installing packages from the source rpm is probably a questionable
idea. but that doesn't justify simply not
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
On Sunday, October 10, 2010 05:56:47 pm Robert P. J. Day wrote:
frankly, the wiki page on downloading from source:
http://wiki.centos.org/PackageManagement/SourceInstalls
seems just a touch on the hysterical side.
For certain uses and certain software stacks from source is the only sane
On 10/11/2010 05:12 PM, R P Herrold wrote:
On Mon, 11 Oct 2010, Patrick Lists wrote:
Would you mind giving a hint why one should not use mock from EPEL?
Afaict the mock version in the CentOS repo is 0.6.13 which was released
years ago and the one in EPEL is 1.0.7 which is current.
ehh??
On Mon, Sep 20, 2010 at 4:49 PM, Ron Blizzard rb4cen...@gmail.com wrote:
A few weeks ago I asked about firewalls and family filters. Lanny
Marcus, I believe, suggested OpenDNS. Just wanted to thank him (and
everyone here) for their suggestions.
snip
Ron: My pleasure. Usually, I am the one
On Mon, 11 Oct 2010, Patrick Lists wrote:
On 10/11/2010 05:12 PM, R P Herrold wrote:
The mock inplementaion is a moving target --- I do not
know the particulars of why the other party recommmended
using THE ONE CENTOS BUILT ON for CentOS, but ...
Sorry but I don't get it. Are you saying
Abwesenheitsnotiz:
Vielen Dank für Ihre Nachricht. Ich bin ab dem 22.10. wieder im Büro erreichbar.
In dringenden Fällen wenden Sie sich bitte an Herrn Ostermann,
Email osterm...@dimast.de.
Vielen Dank!
___
CentOS mailing list
CentOS@centos.org
I have two CentOS servers running SSH on two different non-standard
ports. So far as I can tell, they have identical /etc/ssh/sshd_config
files with the exception of the different port (both are 22xx).
However, when running nmap on them, one betrays the port that SSH is
running on, and the other
On 10/11/2010 04:21 PM, Dotan Cohen wrote:
However, when running nmap on them, one betrays the port that SSH is
running on, and the other does not. I have shut down iptables on both
machines and the behaviour remains this way. What could be the cause?
You're probably not running a full port
However, when running nmap on them, one betrays the port that SSH is running
on, and the other does not.
What does betray mean?
I have shut down iptables on both machines and the behaviour remains this way.
What could be the cause?
Public facing machines w/ iptables off?
Specifically, how
On a semi-related subtopic,
Why do I want WoL? What concrete examples are there where it's useful?
I understand what it is and how it works but the why has eluded me.
--
Drew
Nothing in life is to be feared. It is only to be understood.
--Marie Curie
On 10/11/2010 7:44 PM, Joseph L. Casale wrote:
Specifically, how can I hide the port that SSH is running on?
I'm sorry that I cannot provide the IP addresses, the owner of the servers
doesn't want that! I also know how silly it is to do stealth
ports but I'm not the one making the decision!
On Mon, Oct 11, 2010 at 4:41 PM, Drew drew@gmail.com wrote:
On a semi-related subtopic,
Why do I want WoL? What concrete examples are there where it's useful?
I understand what it is and how it works but the why has eluded me.
You want to VNC or SSH into a remote workstation that happens
I understand what it is and how it works but the why has eluded me.
You need to do maintenance on hardware and you don't want it running
wasting power or it happen to be off such as the case with many client boxes?
You need to start a node and you don't want it running wasting power while
you
Hi, all :
I have a thought of writing the script to implement the LDAP mail
noticerecently.
That's to say , after creating the new account and his passwd , then how to
send an E-mail to notice him?
By the way , I used the LDAP tool called 389 LDAP or openldap recently .
Could
A while back I posted about my new HP J3600 scan/fax/copy/print-er and how
it was visible to the root but not me as an ordinary user. I had no trouble
configuring it as a printer, but the scanner was invisible to xsane until I
added my user id to the lp group.
Now it's gone again, except that it
I have a thought of writing the script to implement the LDAP mail
noticerecently.
That's to say , after creating the new account and his passwd , then
how to send an E-mail to notice him?
By the way , I used the LDAP tool called 389 LDAP or openldap recently .
Could
2010/10/12 Ryan Manikowski jee...@gmail.com:
On 10/11/2010 7:44 PM, Joseph L. Casale wrote:
Specifically, how can I hide the port that SSH is running on?
I'm sorry that I cannot provide the IP addresses, the owner of the servers
doesn't want that! I also know how silly it is to do stealth
On 10/11/10 10:34 PM, sync wrote:
What you said is right . I'm trying to write a script to create the
new account and his password and then can email them .
By the way , My Mail server is not the Linux Server(CentOS) , it is
the Windows 2003 Server . So how can I do that ?
hire a
On Tue, Oct 12, 2010 at 1:56 PM, sync jian...@gmail.com wrote:
On Tue, Oct 12, 2010 at 1:36 PM, John R Pierce pie...@hogranch.comwrote:
On 10/11/10 10:34 PM, sync wrote:
What you said is right . I'm trying to write a script to create the new
account and his password and then can email
53 matches
Mail list logo