On Wednesday, 2002-10-30 at 13:07:31 -0500, Sean McAvoy wrote:
I was looking at configuring a few of my VPN/Firewall systems to send me
daily backups of vital config files, and selected log files. I was
wondering what would be the easiest method of accomplishing this? I was
thinking something
Thanks for your replies.
On Sat, 2 Nov 2002 15:30:43 +1300 Corrin Lakeland wrote:
When was the last time you fscked the partition?
Your reply had me go fsck both my partitions, / and /home. The /
partition had no errors, but the /home partition had a few, which could
account for about 1% of
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Fri, 01 Nov 2002 at 06:41:43PM -0400, Peter Cordes wrote:
MD5 is still believed to be secure. i.e. Nobody can modify a binary so
that it has different contents but the same MD5 hash, unless they are _very_
_very_ lucky. The task becomes even more difficult if you check the length
of the
I am sure you have all seen this...but just in case.
Phil
- Forwarded message from David Endler [EMAIL PROTECTED] -
From: David Endler [EMAIL PROTECTED]
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse
To: [EMAIL PROTECTED]
Date: Fri, 1 Nov 2002
On Wednesday, 2002-10-30 at 13:07:31 -0500, Sean McAvoy wrote:
I was looking at configuring a few of my VPN/Firewall systems to send me
daily backups of vital config files, and selected log files. I was
wondering what would be the easiest method of accomplishing this? I was
thinking something
Thanks for your replies.
On Sat, 2 Nov 2002 15:30:43 +1300 Corrin Lakeland wrote:
When was the last time you fscked the partition?
Your reply had me go fsck both my partitions, / and /home. The /
partition had no errors, but the /home partition had a few, which could
account for about 1% of
On Fri, 01 Nov 2002 at 06:41:43PM -0400, Peter Cordes wrote:
MD5 is still believed to be secure. i.e. Nobody can modify a binary so
that it has different contents but the same MD5 hash, unless they are _very_
_very_ lucky. The task becomes even more difficult if you check the length
of the
I am sure you have all seen this...but just in case.
Phil
- Forwarded message from David Endler [EMAIL PROTECTED] -
From: David Endler [EMAIL PROTECTED]
Subject: iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in
Abuse
To: bugtraq@securityfocus.com
Date: Fri, 1 Nov
10 matches
Mail list logo