m wrote:
Hello,
Another question :
it is possible to control arp protocol packets by kernel ?
... if so - this will solve some of problems. But how control arps?
perhaps on firewall ? kern 2.4.24/grsec/...
You can adjust the refresh timer by setting
/proc/sys/net/ipv4/neigh/*/gc_stale_time, or
m wrote:
Hello,
Another question :
it is possible to control arp protocol packets by kernel ?
... if so - this will solve some of problems. But how control arps?
perhaps on firewall ? kern 2.4.24/grsec/...
You can adjust the refresh timer by setting
/proc/sys/net/ipv4/neigh/*/gc_stale_time,
Sven Hoexter wrote:
On Wed, Feb 18, 2004 at 07:54:45PM +0100, Jan Lühr wrote:
After the last OpenSSH exploit, I thought that this kind of intransparency is
limited to OpenBSD, but to what f*** h*** is OpenSource software driving to?
Tranparency is the most important aspect of secure OpenSource
Sven Hoexter wrote:
On Wed, Feb 18, 2004 at 07:54:45PM +0100, Jan Lühr wrote:
After the last OpenSSH exploit, I thought that this kind of intransparency is
limited to OpenBSD, but to what f*** h*** is OpenSource software driving to?
Tranparency is the most important aspect of secure OpenSource
From the manual page of umask ( man umask ):
umask sets the umask to mask 0777.
The umask is used by open(2) to set initial file
permissions on a newly-created file. Specifically, permissions in the
umask are turned off from the mode argument to open(2) (so, for
Daniel Lysfjord wrote:
Quoting Tom White [EMAIL PROTECTED]:
Dear List,
I'm looking for a decent, secure, web based password changer for
user accounts. Something that I can install on a debian box with a
minimum amount of tweaking, and that isn't really any less secure than
a shell user
Daniel Lysfjord wrote:
Quoting Tom White [EMAIL PROTECTED]:
Dear List,
I'm looking for a decent, secure, web based password changer for
user accounts. Something that I can install on a debian box with a
minimum amount of tweaking, and that isn't really any less secure than
a shell user
7 matches
Mail list logo