Hello Akemi,
I want to give support to CentOs user with any kind of issue, hence please
suggest me what should I do for that. And also one thing I am new here so
can suggest me the workflow.
Gajanan
On Fri, Dec 19, 2014 at 12:43 AM, Akemi Yagi amy...@gmail.com wrote:
On Wed, Dec 17, 2014 at
CentOS Errata and Security Advisory 2014:2023 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-2023.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
CentOS Errata and Security Advisory 2014:2024 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-2024.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
CentOS Errata and Security Advisory 2014:2025 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-2025.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
CentOS Errata and Security Advisory 2014:2024 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-2024.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
From: Kai Schaetzl mailli...@conactive.com
I would rather work on single files or tars on directory basis. Using a
single big file creates a very large single point of failure.
Or use an encrypted file system (of course, also a single point of
failure, but probably better handling).
Afio
Hello,
Thanks for all feedback I got. I am pretty sure that if I used ³openssl
enc² method, it is able to handle large file over 250g size perfectly. I
think openssl installed on the system is capable of doing large file
support. However, when using ³openssl smime², it is not able to.
Apparently
On 12/20/2014 07:02 AM, Dave Stevens wrote:
$ rpm -q kernel kernel-xen
kernel-2.6.18-371.11.1.el5
kernel-2.6.18-371.12.1.el5
kernel-2.6.18-398.el5
kernel-2.6.18-400.el5
kernel-2.6.18-400.1.1.el5
kernel-xen-2.6.18-371.11.1.el5
kernel-xen-2.6.18-371.12.1.el5
kernel-xen-2.6.18-398.el5
This is actually an old problem with pulseaudio processes no dying
properly on exit.
I think if you remove the exclusive flag from
/etc/security/sepermit.conf
This will work in all situations. The exclussive flag is there to make
sure two different users can not login at the same time.
On
On 12/09/2014 02:39 PM, James B. Byrne wrote:
On Mon, December 8, 2014 21:12, David McGuffey wrote:
I've installed CentOS 6.6 on a workstation at a local non-profit as a
kiosk machine. I used xguest. Works great, except now the customer
wants the Firefox homepage to be one pointing to a
On Wed, Dec 17, 2014 at 12:14 PM, Xinhuan Zheng xzh...@christianbook.com
wrote:
Hello CentOS list,
I have a requirement that I need to use encryption technology to encrypt
very large tar file on a daily basis. The tar file is over 250G size and
those are data backup. Every night the server
On Fri, Dec 19, 2014 at 2:40 PM, Brian Mathis
brian.mathis+cen...@betteradmin.com wrote:
GPG is really what you want to be using for this. OpenSSL is a general
toolkit that provide a lot of good functions, but you need to cobble some
things together yourself. GPG is meant to handle all of
On Fri, Dec 19, 2014 at 3:48 PM, Les Mikesell lesmikes...@gmail.com wrote:
On Fri, Dec 19, 2014 at 2:40 PM, Brian Mathis
brian.mathis+cen...@betteradmin.com wrote:
GPG is really what you want to be using for this. OpenSSL is a general
toolkit that provide a lot of good functions, but
On 12/19/2014 1:22 PM, Brian Mathis wrote:
It doesn't appear to be available for any program running on CentOS 5.
https://www.centos.org/forums/viewtopic.php?t=17713
that article is only talking about openssl... openssh, gpg, and others
use their own crypto implementations.
not
I just saw this:
https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01
which includes this:
A remote attacker can send a carefully crafted packet that can overflow a
stack buffer and potentially allow malicious code to be executed with the
privilege level of the ntpd process. All NTP4 releases
https://access.redhat.com/security/cve/CVE-2014-9295
2014-12-20 4:42 GMT+02:00 listmail listm...@entertech.com:
I just saw this:
https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01
which includes this:
A remote attacker can send a carefully crafted packet that can overflow a
stack
fixed in:
https://rhn.redhat.com/errata/RHSA-2014-2025.html
https://rhn.redhat.com/errata/RHSA-2014-2024.html
maybe it's soon in centos too..
2014-12-20 4:42 GMT+02:00 listmail listm...@entertech.com:
I just saw this:
https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01
which includes
C7 -
http://lists.centos.org/pipermail/centos-announce/2014-December/020850.html
C6 -
http://lists.centos.org/pipermail/centos-announce/2014-December/020852.html
C5 -
http://lists.centos.org/pipermail/centos-announce/2014-December/020851.html
On 20/12/14 14:04, Eero Volotinen wrote:
fixed
On 20.12.2014 03:42, listmail wrote:
I just saw this:
https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01
which includes this:
A remote attacker can send a carefully crafted packet that can overflow a
stack buffer and potentially allow malicious code to be executed with the
privilege
On 12/17/14 23:56, Keith Keller wrote:
On 2014-12-18, Mark LaPierre wrote:
You could also address the email to yourself on a different mail server
than the one your sending it from. I send to the list on gmail and
address a copy to myself on AOL.
That won't help indicate whether your post
21 matches
Mail list logo