Corey H wrote:
> how do you guys test all of the potential PNG/JPG potential malware payloads
to check any file for potential malware you can use:
chkrootkit
rkhunter
but you can also try with:
binwalk <- detect/extract binary data in files
string <- to detect strings in the image/audio file
On 14/01/21 11:56, Erik Poupaert wrote:
dpkg -V
The reason why I am carrying out this audit is, however, because I somehow
suspect that the system could be compromised.
as suggested you can use debsums
you can also use
* to detect missing or unexplained files
cruft
Note: the output can
On 01/05/20 22:00, Rebecca N. Palmer wrote:
On 01/05/2020 20:31, Elmar Stellnberger wrote:
https isn´t any more secure than http as long as you do not have a
verifiably trustworthy server certificate that you can check for. As
we know the certification authority system is totally broken.
On 01/01/20 10:29, Elmar Stellnberger wrote:
Up to now I did not see any notable effort to support malware reverse
engineering under Linux. The only program I knew was boomerang for
decompiling malware but it seems to be unsupported since long.
probably here you can find some useful:
On 15/12/19 19:06, Pegro wrote:
I was just unable to recieve an IP address --- the router does NOT allow me to
use static IP addresses
If I don't mistake, router always allow you to use a static IP
address... if you select the IP address in the authorized range.
First you need to know a
On 15/08/19 22:57, Rebecca N. Palmer wrote:
I have only seen intelligence visiting my home when I left an offline
computer around with HDD.
If you feel safe answering: what country was this in? Your name and
time zone suggest Germany/Austria/Switzerland, which I wouldn't have
thought of as
On 24/06/19 01:57, Lou Poppler wrote:
I am only guessing, but I think a possible explanation which resolves this
conundrum might be this: The latest release page is saying that the latest
microcode package contains the latest microcode for this Core2 processor, which
is the version last updated
On 23/06/19 22:28, Henrique de Moraes Holschuh wrote:
The README already tells you how to do
it yourself, and people won't read it, why would them find about an
example downloader script?
$ zless /usr/share/doc/intel-microcode/README.Debian.gz
[...]
Custom Linux kernels must be built with
On 11/06/19 04:19, Henrique de Moraes Holschuh wrote:
On Mon, 10 Jun 2019, Russell Coker wrote:
model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz
Intel upstream decided to not distribute it, for whatever reason. The
Core2 will not get any fixes for MDS either (nor will
On 10/06/19 13:16, Michael Stone wrote:
On Mon, Jun 10, 2019 at 02:01:25PM +1000, Russell Coker wrote:
I just discovered the spectre-meltdown-checker package
model name : Intel(R) Core(TM)2 Quad CPU Q9505 @ 2.83GHz
Your CPU is not supported my Intel, so you either accept the risk
On 06/11/2018 16:16, Salvatore Bonaccorso wrote:
We plan to rebase ghostscript via stretch-security to 9.25 plus cherry
picked security fixes which happened after that release.
Packages are at
https://people.debian.org/~carnil/tmp/ghostscript/
I'm using Buster, but I have download
On 06/11/2018 02:34, Paul Wise wrote:
On Mon, Nov 5, 2018 at 10:29 PM John Goerzen wrote:
So I recently started running debsecan on one of my boxes. It's a
fairly barebones server install, uses unattended-upgrades and is fully
up-to-date. I expected a clean bill of health, but didn't get
On 04/05/2018 04:06, Paul Wise wrote:
On Thu, May 3, 2018 at 4:53 PM, richard lucassen wrote:
There is also an big increase in time before random is initialized:
...
One of the consequences is that openntpd (or a program like
rdate) hangs until the crng is initialized.
What do these two
On 18/02/2018 10:44, who.are.you wrote:
On Sat, Feb 17, 2018 at 07:03:00PM +, Holger Levsen wrote:
is this gcc only useful for
rebuilding the kernel or would it "in theory" (and practice) be better
to rebuild everything with it? (of course the latter is probably not really
practical for
I have try this site:
https://haveibeenpwned.com/
that inform you if your credential have been compromised in data brench
(only for public compromised data).
I have try it with sub...@bugs.debian.org and this account result
compromised!! for: Email addresses, Passwords, Device usage
If I don't mistake the automatic package build system don't require that
the source signature is verified correctly.
In here:
https://buildd.debian.org/status/fetch.php?pkg=gnome-shell=amd64=3.26.2-1=1509919343=0
I have found this:
Unpack source
-
gpgv: unknown type of key
On 29/11/2017 17:09, Jonathan Hutchins wrote:
When doing an in-release upgrade it's usually not necessary to do
"upgrade" first, then "full-upgrade" (equivalent to dist-upgrade).
that is true, but I prefer to do an "upgrade" first because it is
"safer" (it don't remove other packages) and
On 28/11/2017 21:40, P P wrote:
for example https://www.debian.org/security/2016/dsa-3503 for DSA 3503. But the
link doesn't tell which patch to install to fix the bug of DSA 3503.
if you look in the CVE link you find if there is a patch and where is
it, ... for example if you open the
please learn how to quote, so all can understand what is the question
and what is the answer. Also break your line response to 75 character
On 13/05/2016 23:17, Harris Paltrowitz wrote:
I use Icedove on Jessie, and immediately after I received this email I ran
apt-get update and apt-get
On 25/04/2016 10:58, Paul Wise wrote:
On Fri, Apr 22, 2016 at 6:14 PM, SZÉPE Viktor wrote:
Please consider using http://psky.me/ to keep spam out of the list.
The people running the Debian lists can be contacted here:
https://www.debian.org/MailingLists/#maintenance
I've forwarded your
I'm not a security expert.
I will try to give you some security information.
On 22/02/2016 22:23, Hans wrote:
I found a strange behavior with konqueror.
$ apt-cache show konqueror
[...]
Recommends: [...] kpart-webkit
[...]
$ apt-cache show kpart-webkit
[...]
Depends: [...] libqtwebkit4 (>=
On 02/02/2016 17:21, Wolfgang Jeltsch wrote:
• Where is a list of unfixed security issues?
You can know security issues of potentially security issues on packages
you have installed on your system:
1) you can list installed package with open security issues
# apt-get install debsecan
$
On 02/02/2016 22:29, Davide Prina wrote:
On 02/02/2016 17:21, Wolfgang Jeltsch wrote:
• Where is a list of unfixed security issues?
You can know security issues of potentially security issues on packages
you have installed on your system:
1) you can list installed package with open
On 21/01/2016 22:20, Ricardo Palacios wrote:
Unsubscribe
You can unsubscribe from this mailing list:
1) with your browser go to this address:
https://www.debian.org/MailingLists/unsubscribe
2) check the "debian-security" and the "debian-security-announce"
mailing list (note that you must
Hi Mateusz,
I'm not a security expert. And also I'm not an English expert ;-)
On 27/10/2015 12:29, Mateusz Kozłowski wrote:
Could You tell me which debian desktop environment is the most security
and the best privacy and which You recommned for debian users? (KDE, XFCE,
GNOME etc.)?
I
On 05/02/2015 18:58, john wrote:
I saw that my updates weren't working, checked into it and found a notice
on http://mirror.anl.gov/ saying they no longer host any public mirrors
I think it is better to use:
http://http.debian.net/
see instruction on http://http.debian.net/ page
Ciao
Davide
On 13/12/2012 20:52, Jordon Bedwell wrote:
On Thu, Dec 13, 2012 at 1:47 PM, Davide Prina wrote:
su -c USER1 script.sh ... (downloading the file [with ugo+r] in
/tmp/RANDOMDIR [with ugo+x] only once).
Why does the group and other need access again?
for letting other users read the file
On 12/12/2012 23:26, Michael Gilbert wrote:
Ultimately, for anyone even modestly
security-conscious adobe flash should really be avoided at all costs.
+1
I'm not an expert, but I think that packages like this must first ask
the users list on which you want this plugin installed and than
On 16/12/2011 20:57, frederic ollivier wrote:
You are sure that the original su ?
$ type su
/bin/su
$ apt-file -x search /bin/su$
login: /bin/su
so you can check integrity with:
$ debsums -a login
Ciao
Davide
--
Dizionari: http://linguistico.sourceforge.net/wiki
Strumenti per l'ufficio:
but you use top posting... this is bad! ;-)
On 16/12/2011 21:26, Marko Randjelovic wrote:
The same as for hdparm. I reinstalled it and all looks OK.
so try a disk fsck and also a RAM check
I have had problems like these when a RAM was damaged
Ciao
Davide
--
Dizionari:
On 02/01/2011 19:32, Naja Melan wrote:
Then cd to the location of your download and do : md5sum YourDebian.iso.
well preferably one of the other hashing algorithms, since md5
is considered broken
what I have read is that you can easy find another DadFile.iso file
with the same
a dehqan wrote:
[11:19:43] Warning: The file '/usr/sbin/unhide-linux26' exists on the
system, but it is not present in the rkhunter.dat file.
$ apt-file search /usr/sbin/unhide-linux26
unhide: /usr/sbin/unhide-linux26
probably you have installed unhide as suggested by rkhunter and you have
a dehqan wrote:
please quote :-)
# chkconfig --level 23 identd off
identd: unknown service
probably you have mistaken inetd with identd
But port 113 auth is open ! So which service has opened port 113 ?
from root
# netstat -putan
to see all the service listening
to see only 113 port:
a dehqan wrote:
[11:19:43] Warning: The file '/usr/sbin/unhide-linux26' exists on the
system, but it is not present in the rkhunter.dat file.
$ apt-file search /usr/sbin/unhide-linux26
unhide: /usr/sbin/unhide-linux26
probably you have installed unhide as suggested by rkhunter and you have
Rene Engelhard wrote:
MySpell is obsolete.
Please build against Hunspell, which is an improved version of MySpell
retaining full backwards compatibility. That also would make the usage
of hunspell-de-* in iceweasel possible.
probably not so full backwards compatibility.
[ The Problem is
Rene Engelhard wrote:
Davide Prina wrote:
MySpell is obsolete.
Please build against Hunspell, which is an improved version of MySpell
retaining full backwards compatibility. That also would make the usage
of hunspell-de-* in iceweasel possible.
probably not so full backwards compatibility
ahi, ahi, ahi ... top quoting! This is bad! ;-)
http://en.wikipedia.org/wiki/Netiquette
Torsten Sadowski wrote:
Unluckily its not that easy. The homepage preference is not altered and points
to the right site.
It seem to be a search service ... probably have you a Firefox extension
of it?
ahi, ahi, ahi ... top posting ... this is bad ;-)
Robert Dobbs wrote:
I cannot do it because of my company's firewall.
you can go to a keyring site and download the key from here
Why is the key not in debian-keyring package?
key is updated each year ... but next update will be in January
James Miller ha scritto:
W: GPG error: http://mirrors.kernel.org testing Release: The following
signatures couldn't be verified because the public key is not available:
NO_PUBKEY 010908312D230C5F
there are two solutions:
1) with root user:
wget http://ftp-master.debian.org/ziyi_key_2006.asc
steve ha scritto:
connection time, so she simply refused. Moreover, in Italy you have to give
an ID (they do a photocopy of it; she couldn't tell me how long they keep
it..) to be able to use a computer in an Internet Café (terrorism you
know...).
yes. All data (only your person
Nejc Novak ha scritto:
So, for now i killed this process, disabled the cronjob and killed web
server - there is now way the attacker is capable of coming back into
server or is there a chance that there is another backdoor installed
somewhere (chkrootkit doesn't find anything).
try also
hanasaki wrote:
Below are the errors reported by apt-get update. Is this correct? Could
someone explain please?
Thanks.
=== 16:35 CST 2004-11-26
Failed to fetch
http://ftp.us.debian.org/debian/dists/sarge/main/binary-i386/Packages.gz
MD5Sum mismatch
I think this is an error on
Snyder, Dave (D.F.) wrote:
Security,
I just purchased Debian Linux for my home PC and waiting for the CD's to
arrive this week. I'm looking forward to installing so I can eventually
divorce myself from Microsoft Windows.
I've had more calls in the last few weeks from friends and relatives
Marcin ha scritto:
Hello,
I am trying to find solution for finding wiruses in my LAN networks.
I am administrator of ISP router (generaly Debian of course), and in
LAN there are litle storm of wiruses, trojans, spammers, etc shits ...
Is any possible method to find them ?
Any debian tools ?
I was
Marcin ha scritto:
Hello,
I am trying to find solution for finding wiruses in my LAN networks.
I am administrator of ISP router (generaly Debian of course), and in
LAN there are litle storm of wiruses, trojans, spammers, etc shits ...
Is any possible method to find them ?
Any debian tools ?
I
Marcin ha scritto:
Hello,
have you try: # apt-cache search virus?
yes, of course.
$ apt-cache search virus
gnome-xbill - Fight the infection.
mailscanner - An email virus scanner and spam tagger.
renattach - Rename attachments on the fly.
sanitizer - The Anomy Mail Sanitizer - an email
46 matches
Mail list logo