On 02/06/2015 12:50 AM, Kahlil Hodgson wrote:
On 6 February 2015 at 10:23, Always Learning cen...@u64.u22.net wrote:
Logically ?
1. to change the permissions on shadow from -rw-x-- or from
-- to -rw-r--r-- requires root permissions ?
2. if so, then what is the advantage of
The following packages are updated for Xen4CentOS for CentOS 6:
Source:
91e65bf3d0bd8586fbbfcac77ecc7b677ef3582acd8ac11893c71d511edb59cb
e1000e-2.5.4-3.10.68.2.el6.centos.alt.src.rpm
d2019ca40e3d4beb2c7a55ed8bfd7bb0295d9028726f71bf6dff1389d79ae5cd
kernel-3.10.68-11.el6.centos.alt.src.rpm
On 2/6/2015 7:19 AM, Always Learning wrote:
stronger passwords for SQL
the hackers had the database administrators user account credentials,
and were coming in through the VPN via said credentials. I doubt
stronger passwords would have mattered.
--
john r pierce
On Fri, Feb 6, 2015 at 5:05 PM, John R Pierce pie...@hogranch.com wrote:
On 2/6/2015 7:19 AM, Always Learning wrote:
stronger passwords for SQL
the hackers had the database administrators user account credentials, and
were coming in through the VPN via said credentials. I doubt
On 2/6/2015 3:24 PM, Les Mikesell wrote:
Hmmm, maybe a reasonable argument for the crypto-card type VPNs where
the passwords aren't reusable...
indeed, my $job uses an RSA token based authentication for the VPN, but
internal host access uses simple username/password.
--
john r pierce
On Fri, 2015-02-06 at 17:24 -0600, Les Mikesell wrote:
On Fri, Feb 6, 2015 at 5:05 PM, John R Pierce pie...@hogranch.com wrote:
On 2/6/2015 7:19 AM, Always Learning wrote:
stronger passwords for SQL
the hackers had the database administrators user account credentials, and
On Tue, 03 Feb 2015 20:44:33 +, Always Learning wrote:
[]
There should be a basic defence that when the password is wrong 'n'
occasions the IP address is blocked automatically and permanently unless
it is specifically allowed in IP Tables. If specifically allowed in IP
Tables,
On 02/07/2015 12:48 PM, Always Learning wrote:
On Fri, 2015-02-06 at 17:24 -0600, Les Mikesell wrote:
On Fri, Feb 6, 2015 at 5:05 PM, John R Pierce pie...@hogranch.com wrote:
On 2/6/2015 7:19 AM, Always Learning wrote:
stronger passwords for SQL
the hackers had the database
On Thu, Feb 5, 2015 at 7:56 PM, Ted Miller tedli...@sbcglobal.net wrote:
On 02/05/2015 01:03 PM, g wrote:
On 02/02/2015 02:15 PM, Tim wrote:
Am 1. Februar 2015 21:30:52 MEZ, schrieb g gel...@bellsouth.net:
greetings.
while attempting to install c7, i got lost at 'repository' entry.
i
On Fri, Feb 6, 2015 at 8:17 AM, Chris Wensink
cwens...@five-star-plastics.com wrote:
Hello Everyone,
Does anyone have any more detail about what kind of system Anthem / Blue
Cross was running and what kind of attack broke into their system?
It's terrible that it happened, but I think it
Hello Everyone,
Does anyone have any more detail about what kind of system Anthem / Blue
Cross was running and what kind of attack broke into their system?
It's terrible that it happened, but I think it would benefit all Admins
everywhere to learn how it happened so that we can secure our
On 02/06/2015 08:17 AM, Chris Wensink wrote:
Hello Everyone,
Does anyone have any more detail about what kind of system Anthem / Blue
Cross was running and what kind of attack broke into their system?
It's terrible that it happened, but I think it would benefit all Admins
everywhere to learn
On Fri, February 6, 2015 9:19 am, Always Learning wrote:
On Fri, 2015-02-06 at 08:40 -0600, mshinn wrote:
I recommend reading up on kreb's site:
http://krebsonsecurity.com/2015/02/china-to-blame-in-anthem-hack/
Not sure the hack was an issue with their platforms per se.
âOn January
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
Hi,
In the past my mirrorlist for SCL,
http://mirrorlist.centos.org/?release=6arch=x86_64repo=SCL has
worked without any issues.
Recently http://mirrorlist.centos.org/?release=6arch=x86_64repo=SCL
redirects to http://mirror.centos.org/centos/6/scl/x86_64/ which leads
to 404, instead it should be
Hello List,
Does anyone know why this is not available in CentOS 6.6. I found it in a SL
repo but not in CentOS.
I found several CentOS Bugs one answered by JH
http://bugs.centos.org/print_bug_page.php?bug_id=6822
saying it had been added to 6.5
2013-12-09 19:05JohnnyHughesResolution
On Fri, 2015-02-06 at 08:40 -0600, mshinn wrote:
I recommend reading up on kreb's site:
http://krebsonsecurity.com/2015/02/china-to-blame-in-anthem-hack/
Not sure the hack was an issue with their platforms per se.
“On January 27, 2015, an Anthem associate, a database administrator,
CentOS Errata and Enhancement Advisory 2015:0141
Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-0141.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
CentOS Errata and Enhancement Advisory 2015:0141
Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-0141.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
CentOS Errata and Enhancement Advisory 2015:0141
Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-0141.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
20 matches
Mail list logo