Rainer Duffner wrote:
Am 22.08.2009 um 10:26 schrieb Christoph Maser:
Am Freitag, den 21.08.2009, 23:29 +0200 schrieb Rainer Duffner:
Because there's no alternative.
mysql gui-tools (http://dev.mysql.com/downloads/gui-tools/5.0.html)
openoffice base
Fat client - FAIL
;-)
*Some* of
Am Freitag, den 21.08.2009, 23:29 +0200 schrieb Rainer Duffner:
Am 21.08.2009 um 23:24 schrieb R P Herrold:
On Fri, 21 Aug 2009, Gregory P. Ennis wrote:
place. I looked like the hacker downloaded his paypal spoof files
into
a subdirectory of /var/www/phpmyadmin
I am running 5.3
Am 22.08.2009 um 10:26 schrieb Christoph Maser:
Am Freitag, den 21.08.2009, 23:29 +0200 schrieb Rainer Duffner:
Because there's no alternative.
mysql gui-tools (http://dev.mysql.com/downloads/gui-tools/5.0.html)
openoffice base
Fat client - FAIL
;-)
*Some* of our customers do use
Everyone,
This morning I received a notice from PayPal that one of our sites got
hacked and was spoofing a PayPal web site.
When I checked the the site, I was surprised to find they were correct.
About 5 days a go we had a server that got hacked and somehow the file
paypal.com.tar got uploaded
On Fri, Aug 21, 2009 at 04:08:43PM -0500, Gregory P. Ennis wrote:
Everyone,
This morning I received a notice from PayPal that one of our sites got
hacked and was spoofing a PayPal web site.
When I checked the the site, I was surprised to find they were correct.
About 5 days a go we had a
Am 21.08.2009 um 23:08 schrieb Gregory P. Ennis:
I have tried to obtain dialog with PayPal about this but they have not
responded to my queries.
Big surprise.
They're like ebay (well, they *are* ebay...).
Only boilerplate responses.
Or nothing.
In their defense, they must get a lot of spam.
Gregory P. Ennis wrote:
P.S. I found the following entry in my error_log of /var/log/httpd/ :
[Sun Aug 16 04:26:19 2009] [info] Server built: Jul 14 2009 06:02:39
--00:21:14-- http://code.go.ro/paypal.com.tar
Resolving code.go.ro... 81.196.20.134
Connecting to
On Fri, 21 Aug 2009, Gregory P. Ennis wrote:
place. I looked like the hacker downloaded his paypal spoof files into
a subdirectory of /var/www/phpmyadmin
I am running 5.3 with all current updates.
and third party software as well.
We do not ship phpmyadmin, and clearly and repeatedly
Am 21.08.2009 um 23:24 schrieb R P Herrold:
On Fri, 21 Aug 2009, Gregory P. Ennis wrote:
place. I looked like the hacker downloaded his paypal spoof files
into
a subdirectory of /var/www/phpmyadmin
I am running 5.3 with all current updates.
and third party software as well.
We do
On Fri, Aug 21, 2009 at 11:29:17PM +0200, Rainer Duffner wrote:
Am 21.08.2009 um 23:24 schrieb R P Herrold:
On Fri, 21 Aug 2009, Gregory P. Ennis wrote:
place. I looked like the hacker downloaded his paypal spoof files
into
a subdirectory of /var/www/phpmyadmin
I am running
Am 21.08.2009 um 23:08 schrieb Gregory P. Ennis:
I have tried to obtain dialog with PayPal about this but they have not
responded to my queries.
Big surprise.
They're like ebay (well, they *are* ebay...).
Only boilerplate responses.
Or nothing.
In their defense, they must get a lot of
On Fri, Aug 21, 2009 at 5:17 PM, Ray Van Dolsonra...@bludgeon.org wrote:
- Keep phpMyAdmin up to date. Best way to do this is to use a
package from a well known repository like EPEL that keeps the
package at the latest version for you.
I've not beaten EPEL up too much on things like
On Fri, Aug 21, 2009 at 5:31 PM, Ray Van Dolsonra...@bludgeon.org wrote:
Nope, but you can take steps to prevent (or make it more difficult) for
people that shouldn't be accessing it from accessing it.
Apache allow from, etc... basic authentication, make sure you're using
HTTPS and selinux.
On Fri, Aug 21, 2009 at 05:34:27PM -0400, Jim Perrin wrote:
On Fri, Aug 21, 2009 at 5:17 PM, Ray Van Dolsonra...@bludgeon.org wrote:
- Keep phpMyAdmin up to date. Best way to do this is to use a
package from a well known repository like EPEL that keeps the
package at the latest
On Fri, Aug 21, 2009 at 5:31 PM, Ray Van Dolsonra...@bludgeon.org wrote:
Nope, but you can take steps to prevent (or make it more difficult) for
people that shouldn't be accessing it from accessing it.
Apache allow from, etc... basic authentication, make sure you're using
HTTPS and
On Aug 21, 2009, at 4:17 PM, Ray Van Dolson wrote:
- Keep phpMyAdmin up to date. Best way to do this is to use a
package from a well known repository like EPEL that keeps the
package at the latest version for you.
- Run with SELinux Enforcing
- Protect phpMyAdmin with Basic HTTP
Chris Boyd wrote:
On Aug 21, 2009, at 4:17 PM, Ray Van Dolson wrote:
- Keep phpMyAdmin up to date. Best way to do this is to use a
package from a well known repository like EPEL that keeps the
package at the latest version for you.
- Run with SELinux Enforcing
- Protect
Am 21.08.2009 um 23:58 schrieb R P Herrold:
On Fri, 21 Aug 2009, Rainer Duffner wrote:
Is there an alternative?
mysql at the command line works fine here
So our non-geek customers need not apply ;-)
Because there's no alternative.
There may be no GUI alternative but ignorance needs
Rainer Duffner wrote:
Is there an alternative?
mysql at the command line works fine here
So our non-geek customers need not apply ;-)
Isn't there something in openoffice that hooks to databases these days?
--
Les Mikesell
lesmikes...@gmail.com
On Aug 21, 2009, at 5:47 PM, Gregory P. Ennis po...@pomec.net wrote:
On Fri, Aug 21, 2009 at 5:31 PM, Ray Van Dolsonra...@bludgeon.org
wrote:
Nope, but you can take steps to prevent (or make it more difficult)
for
people that shouldn't be accessing it from accessing it.
Apache
Am 22.08.2009 um 00:37 schrieb Les Mikesell:
Rainer Duffner wrote:
Is there an alternative?
mysql at the command line works fine here
So our non-geek customers need not apply ;-)
Isn't there something in openoffice that hooks to databases these
days?
There might be - but do you
Les Mikesell wrote:
Isn't there something in openoffice that hooks to databases these days?
OOo Data, its a report-n-forms app, somewhat analogous to Microsoft
Access. Natively it uses Derby, I think , but it can connect to any
database you have a JDBC driver for and execute SQL
22 matches
Mail list logo