very bad news
On Tue, 13 May 2008 14:06:39 +0200, Florian Weimer [EMAIL PROTECTED]
wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1571-1 [EMAIL PROTECTED]
exploit this vulnerability
against our site:
http://filippo.io/Heartbleed/#noflag.org.uk
https://www.ssllabs.com/ssltest/analyze.html?d=noflag.org.uk
What could be going on here?
Thanks in advance for all your help,
Daniel
Salvatore Bonaccorso wrote
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thank you all for your help. Mod_spdy has a statically-linked vulnerable
version of OpenSSL. After the standard update we are no longer vulnerable.
Daniel
Estelmann, Christian wrote:
Your server talks spdy. Have you upgraded mod_spdy to 0.9.4.2
(linked to earlier)
difficult to understand and apply in this regard.
Daniel
Cédric Lemarchand wrote:
Please, honestly, do you know what every features in this list does,
how they could be benefit for you and in which way ?
Or did your choice will *only* be based on the number of
supported
On Fri, May 30, 2014 at 11:50:32PM +1000, Alfie John wrote:
Several times (public and private) I tried to explain how the download
of APT (the binary itself) on an initial Debian install could be
compromised via MITM since it's over plaintext. Then the verification of
packages could simply be
On Mon, Jul 07, 2014 at 02:54:15PM -0400, Hans-Christoph Steiner wrote:
Do you have another idea for making it difficult for network observers to keep
track of the software people are using?
Well, you can always mirror the entire repository and configure
your server/desktop to use that
in the
knowledge that they would not be back in the office to deal with the problem
until August 25th. Such vacation mails would make my job alot easier.
IT is fortunate for the senders of such mails that I am not a malicious
individual.
Best regards,
Daniel
On 6 Aug 2014, at 09:49, Grond wrote
like needsrestart and
apt-listchanges, and a test suite for your applications to check if
they still work with the new packages and that every service is back to
normal afterwards.
Just sharing my thoughts about this.
- Daniel
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 196-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Daniel Jacobowitz
November 14th, 2002
e. Thanks for the quick fix!
Daniel
Hi *
the amd64 build for 0.8-3+deb8u2 seems to be missing from [1].
Is this an error or am I missing something?
Thanks
Daniel
[1] http://security.debian.org/pool/updates/main/libv/libvdpau/
On 11/02/2015 08:27 PM, Alessandro Ghedini wrote
On 09/06/2015 07:14 PM, Paul Wise wrote:
> On Sun, Sep 6, 2015 at 10:20 AM, Daniel Reichelt wrote:
>
>> [1]
>> http://ftp.nl.debian.org/debian/dists/stretch/main/installer-amd64/current/images/
>
> ftp://ftp.debian.org/debian/dists/stretch/Release
> ftp://ftp.debi
missing s.th.? Looking forward to suggestions!
If I'm really the first one to bring this up: IMHO the simplest solution would
be to gpg-sign the hash lists under [1]/[2] and provide signed hash lists for
[3] as well.
Thanks
Daniel
[1]
http://ftp.nl.debian.org/debian/dists/stretch/main
mv tiffanyryan2...@gmail.com /dev/null
2016-03-31 9:42 GMT-05:00 Tiffany Ryan <tiffanyryan2...@gmail.com>:
> Please remove my email from you system
>
> tiffanyryan2...@gmail.com
>
--
"La imaginación es más importante que el conocimiento. Einstein"
*Daniel
=Licensing#License_of_Fedora_SPEC_Files
The upstream repository (which includes the .spec file too) is licensed
under GPLv2+. That's probably an inconsistency that I should fix...
Regards,
--
Daniel Kopeček
Software Engineer, Special Projects
Red Hat, Inc.
On 19/05/16 03:17, Paul Wise wrote:
> On Wed, May 18, 2016 at 9:20 PM, Daniel Pocock wrote:
>
>> Can anybody comment on how Debian users will be impacted by SHA-1
>> deprecation?
>
> There is some info related to that in these two wiki pages:
>
> https://w
Can anybody comment on how Debian users will be impacted by SHA-1
deprecation?
In particular:
- will libraries like OpenSSL and GnuTLS continue to support it in
stretch and beyond?
- will web servers like Apache support it in server certificates or
certificate chains?
- will web servers and
Uhpppopppiujiki
MN
I have
.. buy bio
Yg.viuuu
On 18 Jul 2016 17:32, "Salvatore Bonaccorso" wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> - -
> Debian Security Advisory DSA-3621-1
moving it into place
(thus retaining the inode number).
Cheers
Daniel
signature.asc
Description: OpenPGP digital signature
On 01/28/2017 03:51 PM, Holger Levsen wrote:
> On Sat, Jan 28, 2017 at 03:04:56PM +0100, Daniel Reichelt wrote:
>> I highly suspect this stems from packages' rules files supporting
>> reproducible builds.
>
> I rather think this is due to binNMUs not modifying debian/change
unsubscrbe
On Thu, Aug 25, 2016 at 11:03 PM, Sebastien Delafond wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> -
> -
> Debian Security Advisory DSA-3654-1
re. Thanks for jumping in and reporting this, I wasn't sure if I
hadn't just messed up my apt-pinning...
> The 32bit i386 packages on the hand are fine, probably because they
> were built by a buildd.
On an i386 VM the upgrade ran fine here as well.
Cheers
Daniel
signature.asc
Description: OpenPGP digital signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe
On 01/11/17 13:55, Donald Haley wrote:
> Please unsuscribe me. > > Thanks
-BEGIN PGP SIGNATURE-
Hi Team!
I am working a new version of wifite[1], Could someone check it out?
Thank you very much!
Regards
[1]: https://salsa.debian.org/pkg-security-team/wifite/
--
Daniel Echeverry
http://wiki.debian.org/DanielEcheverry
http://rinconinformatico.net
Linux user: #477840
Debian user
alt+tab
--
*Daniel Romo*
d4nnr.blogspot.com.co #Blog_Personal
El 11 de enero de 2018, 10:45, DANIEL ROMO<danielromogar...@gmail.com>
escribió:
> Hola
>
> puedes enviar un print screen ? (con tu celular)
>
>
> amt+tab para cambiar de ventana es una solución
>
>
Hola
puedes enviar un print screen ? (con tu celular)
amt+tab para cambiar de ventana es una solución
;)
--
*Daniel Romo*
d4nnr.blogspot.com.co #Blog_Personal
El 11 de enero de 2018, 02:42, R Calleja<rcalle...@gmail.com> escribió:
> Hola buenos dias, alquien puede ayudarme.
&g
> The Python job finished successfully here after 10 hours.
6h40 mins here as I ported your improved logic to the python2 version :).
# git filter-branch --tree-filter '/usr/bin/python2 /split-by-year.pyc' HEAD
Rewrite 1169d256b27eb7244273671582cc08ba88002819 (68356/68357) (24226 seconds
passed,
Am 13.11.18 um 23:09 schrieb Moritz Muehlenhoff:
> The current data structure works very well for us and splitting the files
> has many downsides.
Could you detail what those many downsides are besides the scripts that
need to be amended?
The main issue is that we need to get clone and diff+render operations
back into normal time frames. The salsa workers (e.g. to render a
diff) time out after 60s. Similar time constraints are put onto other
rendering frond-ends. Actually you can easily get Apache to segfault
if you do not
Zobel brought up the security-tracker git discussion in the
#debian-security irc channel again and I'd like to record a few of the
items touched there for others that were not present:
DLange has a running mirror of the git repo with split files since three
months. This is based on anarcat's
Am 06.06.19 um 07:31 schrieb Salvatore Bonaccorso:
Could you again point me to your splitted up variant mirror?
https://git.faster-it.de/debian_security_security-tracker_split_files/
as requested in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908678#139
we have created a data/CVE/.list repo ("v2") during MiniDebConf HH
It is mirrored at Salsa:
https://salsa.debian.org/dlange/debian_security_security-tracker_split_files_v2
Hi Sophie!
El mar., 10 de dic. de 2019 a la(s) 05:24, Sophie Brun (sop...@freexian.com)
escribió:
> Hi Daniel,
>
>
> Le 26/11/2019 à 16:14, Daniel Echeverry a écrit :
> > Hi!
> > [..]
> > I wrote to the upstream, and he will make a new release this weekend,
supported behind an authenticated HTTP zone for trusted
users
@Florian That linked message is yours; any objections from you?
Thanks,
Daniel
P.S. Priority "important" since binutils' rdeps include dpkg-dev, gcc,
and clang, so I assume this is quite visible.
> Some of its checks look inherently dangerous, e.g. the bash -n check for
> shell syntax.
Why would bash -n be dangerous?
signature.asc
Description: OpenPGP digital signature
on
> paste.debian.net.
Clearly someone tries to run a command put as an address. Out of curiosity:
Which kind of vulnerability are they trying to use here?
Regards, Daniel
--
Regards,
Daniel Leidert | https://www.wgdd.de/
GPG-Key RSA4096 / BEED4DED5544A4C03E283DC74BCD0567C296D05D
GPG-Key E
.html
* https://lists.debian.org/debian-devel/2021/08/msg00167.html
* https://lists.debian.org/debian-devel/2021/08/msg00172.html
but no consensus.
Thank you!
Daniel Lewart
Urbana, Illinois
Georgi Naplatanov wrote:
> I have no opinion but found this
> https://wiki.debian.org/SourcesList
SZÉPE Viktor wrote:
> And there is this
> https://wiki.debian.org/NewInBullseye#Changes
Both of these were referenced in my original message:
l a kernel update from d-security that should get installed but
doesn't.
As soon as I remove the Default-Release line from apt.conf the update gets
offered for installation. Has anyone else observed this or is something
broken in my apt config somewhere?
--Daniel
Hi Paul,
On Fri, Jul 21, 2023 at 10:17:28AM +0800, Paul Wise wrote:
> On Thu, 2023-07-20 at 22:12 +0200, Daniel Gröber wrote:
>
> > It seems packages from the debian-security repository are not affected by
> > this increased priority and will not get in
enting security updates.
Who do I contact about the archive aspects? FTP-master or the
security-team? The security-team is in CC on the doc bugs so I'm hoping
they will see it anyway.
Thanks,
--Daniel
uble? Contact [EMAIL PROTECTED]
Dan
/\ /----\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon University |
| [EMAIL PROTECTED] | |
On Tue, Oct 10, 2000 at 10:28:39PM -0400, Ben Pfaff wrote:
Daniel Jacobowitz [EMAIL PROTECTED] writes:
This was fixed a month or two before potato was released.
I've seen those too, on up-to-date woody, so I don't think it
really got fixed.
To clarify this, the logging of the message
trojan. Maybe a sub7 variant? There's a trojan
list on the web somewhere.
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon University
know about it, and
hopefully. 3.0.18 will be out soon.
Yep, so I've gathered. I'll do a new security upload when this
happens.
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux
(if any)?
I believe it is a matter of trust and of instant distribution; we can
provide uploads to everyone using the security site in a very limited
amount of time.
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002
, and there will
occasionally be things available there before in unstable. But fixes
also tend to go straight into unstable.
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer
ures.
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon University |
| [EMAIL PROTECTED] | | [EMAIL
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon University |
| [EMAIL PROTECTED] | | [EMAIL PROTECTED
On Tue, Dec 26, 2000 at 09:27:53PM +0200, Pavel Minev Penev wrote:
On Tue, Dec 26, 2000 at 05:27:07PM +0300, [EMAIL PROTECTED] wrote:
Of course plain md5 hashes are not very helpful. But we can keep MAC[1] for
binaries. Tampering with MAC database is useless.
...
[1] Message
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon University |
| [EMAIL PROTECTED] | | [EMAIL PROTECTED
me that this was a bug in the automatic
regeneration of the web pages; it should be fixed.
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon
ence slink any more...
Dan
/\ /\
| Daniel Jacobowitz|__|SCS Class of 2002 |
| Debian GNU/Linux Developer__Carnegie Mellon University |
| [EMAIL PROTECTED] | | [EMAIL
otice". Security fixes go into unstable and trickle into testing.
The principal, I think, is that we can throttle the packages being
allowed into testing for an easier release cycle.
Dan
/\ /\
| Daniel
When you clone mirrors you usually have to take some steps. Typically,
depending on your mirror, you need to break the mirror and clone each side
seperately. Someone told me this was because of drive signing or some other
thing, but I'm not sure if that's the truth.
From: Carel Fellinger
How exactly did you get hacked? Did you leave security wholes large enough
for a bus to drive through open? Open your inetd.conf file and # out
everything! The only thing you need open is port 22. Others will disagree,
but depending on what you server is used for, this should be your first
You know, Ghost 2001 supports the ext2 partition on certain versions of
Linux. It doesn't officially support Debian Linux, but I've cloned my
Debian laptop and my Debian desktop many times.
From: "Thor" [EMAIL PROTECTED]
To: "Zak Kipling" [EMAIL PROTECTED], [EMAIL PROTECTED]
CC: [EMAIL
+0100 (CET)
-BEGIN PGP SIGNED MESSAGE-
On Tue, 20 Feb 2001, Steve Rudd wrote:
Daniel Stark asked:
At 01:53 PM 2/20/01 -0800, you wrote:
How exactly did you get hacked? Did you leave security wholes large
enough for a bus to drive through open? Open your inetd.conf file and
#
out
files back in place. The javascripts are attached, take a peek and
see
if they fit the bill. If not, at least you still have the option to quickly
disable VBS scripting :)
-Original Message-----
From: Daniel Stark [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 21, 2001 9:12 AM
To: [EMAIL
Yes, you should be concerned. Now-a-days most people are using SSH for all
communication. It's really the way to go for remote access. Take a look at
openssh.com for some more information. Plus it's free, and we like free. ;)
From: Steve Rudd [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
I ssh from my Windows 2000 machine at work to my Debian machine at home.
You just need the proper client. There are free ones out there for Windows.
From: Adam Spickler [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: how secure is mail and ftp and netscape/IE???
Date: Wed, 21 Feb 2001
too.
I'm fairly sure there's a lot more - you can access them through PAM
somehow, I think...
--
Daniel Jacobowitz Debian GNU/Linux Developer
Monta Vista Software Debian Security Team
"I am croutons!"
--
T
? Is there a
Nope, you're safe if you saw the % signs in your logs.
way to track down who
connected to rpc.statd?
Run a tcp logger, like ippl.
--
Daniel Jacobowitz Debian GNU/Linux Developer
Monta Vista Software Debian Security Team
.
--
Daniel Jacobowitz Debian GNU/Linux Developer
Monta Vista Software Debian Security Team
"I am croutons!"
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Tro
On Wed, Jun 13, 2001 at 10:57:08AM -0500, Steve Greenland wrote:
Tim, good fixups, a few C coding/style nitpicks:
On 12-Jun-01, 17:57 (CDT), Tim van Erven [EMAIL PROTECTED] wrote:
#include stdio.h
#include unistd.h /* For execlp */
#include stdlib.h /* For exit */
int main()
int
On Wed, Jun 13, 2001 at 02:02:10PM -0500, Steve Greenland wrote:
[snip]
I'd still argue that exit(_macro_) is better style than return from
main(), but I'm hard pressed to find a technical argument.
There's subtle difference between returning from main and calling exit.
Excelent explanation
On Monday 02 July 2001 18:25, you wrote:
ipmasquerading?
No, they have public ip's and I would like to keep this setting. The clients
config should not change at all.
Daniel
_
Daniel Faller
Fakultaet fuer Physik
Abt. Honerkamp
Albert-Ludwigs
Just a friendly Jedi Knight wrote:
On Fri, Jul 06, 2001 at 01:19:24PM +0300, Juha Jykk wrote:
I distrust allowing root logins from anywhere but local console(s)
or non-modem gettys i.e. from anywhere over the not-owned-by-me cable.
umm do You want to run in circles from one machine to
?! - Thank you!
Try running X -nolisten tcp.
HTH,
Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Tue, Aug 21, 2001 at 01:28:24PM -0700, Daniel Schepler wrote:
I've gotten logs several times that read something like
Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error for ^X
F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7FF
BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x
with security
updates, or track unstable daily and hope maintainers are responsive.
We try to see that woody is in coherent shape just before release, but
we can't supply fixes for it on any more urgent basis. It moves too
fast.
--
Daniel Jacobowitz Carnegie Mellon
unsubscribe
[EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
also netstat -n -p -t --listening | grep :PORT
VD Hi,
VD On Sat, Oct 20, 2001 at 09:22:57PM -0700,
VD tony mancill [EMAIL PROTECTED] wrote:
On Sat, 20 Oct 2001, Marc Wilson wrote:
Adding or removing lines in /etc/services doesn't open or close
ipchains with something
like
/sbin/ipchains -s 0/0 -d MY_MACHINE_IP 111 -p tcp -j DENY -l
cya
Petre L. Daniel
Linux Administrator,Canad Systems Pitesti
http://www.cyber.ro email:[EMAIL PROTECTED]
phone: +4048220044,+4048206200
- -Mesaj original-
De la: J. Paul Bruns-Bielkowicz [mailto
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Heya,
I run a potato at home and i will set the computer at work
with potato as well.Since that will be a 24h internet connected
pc,i am wondering what are the 2.2 release 3 vulnerabilities for
the sistem installed from the cds without any
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN
How do I stop this from happening. Apparently my bud telented to port 25
and somehow sent mail from my root account. Any suggestions, white papers
or links? Id would like to block the telnet application all together, but I
dont think thats possible.
Thanks in advance,
Daniel
im a newbie so
dis be!
foo! hehehe later..
- Original Message -
From: Jamie Heilman [EMAIL PROTECTED]
To: Daniel Rychlik [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, December 14, 2001 6:33 PM
Subject: Re: Exim mail
Daniel Rychlik wrote:
How do I stop this from happening. Apparently my
- Original Message -
From: Thomas Hallaran [EMAIL PROTECTED]
To: Daniel Rychlik [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, December 14, 2001 6:53 PM
Subject: Re: Exim mail
spoofing mail:
telnet to port 25 on machine you want to spoof through.
1.Type 'mail from: [EMAIL
- Original Message -
From: Brian P. Flaherty [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, December 15, 2001 8:41 AM
Subject: Re: Exim mail
Daniel Rychlik [EMAIL PROTECTED] writes:
How do I stop this from happening. Apparently my bud telented to port
25
and somehow
- Original Message -
From: Bender, Jeff [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, December 17, 2001 12:08 PM
Subject: Problem with IPTables
I am having troubles with IPTables. My rules are having troubles with
handling -m state --state ESTABLISHED options. The error I
I was wandering if I edited my /etc/passwd file and
replaced all the /bin/sh to /bin/false , will that break anything?
What Im seeing is accounts like lp, games, uucp,
proxy, postgres, and a slew of others that I dont use.
Thanks in advance Debian Guruz!
Daniel
most of them are relics of software that you probably dont need,but be
carefully what account you erase.
better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or
even /bin/false and they won't be able to login into the machine no more..
At 06:24 PM 12/27/01 -0600, Daniel
domains to server to the outside world, you just list the intranet
(NAT) interface in here.
forward only means that you will forward all request (and work ;]) to the
dns servers listed in forwarders.
--
BOFH excuse #57:
Groundskeepers stole the root password
Petre L. Daniel,System Administrator
On Mon, Dec 31, 2001 at 09:11:41PM +0100, David Gestel wrote:
What is this? I don't think anyone got in though, everything seems to be
fine.
I'm running woody and rpc.statd version 0.3.3
Yep. The fact that it was logged in this particular case means you're
fine.
--
Daniel Jacobowitz
Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
surprised to note that Debian, a distro with
~850 developers and a dedicated security team, is behind Slackware on
security issues.
d
--
Daniel Stone[EMAIL PROTECTED]
WARNING: The consumption of alcohol may make you think you have mystical
Kung Fu
.
Of course, if you're using unstable, fixes tend to appear quickly, but :
- tend to is not acceptable when security is concerned
- it may take a lot more time depending on your local mirror
--
Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
, it's that you have to disallow v1. A recent daemon allowing ssh1
connections is vulnerable.
--
Daniel
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Tue, Jan 22, 2002 at 01:11:18AM +0100, Christian Jaeger wrote:
This can be a real security hole, at least when you are not aware of
it (I have just discovered a working way to exploit it on one of my
machines).
And isn't that a bug in the package in question? :)
--
Daniel Jacobowitz
Hello ,
I've got 750k of this log daily
May 15 03:40:01 sm-msp-queue[16123]: STARTTLS=client, error: load verify locs
/etc/ssl/certs/, /etc/mail/ssl/sendmail-server.crt failed: 0
May 15 03:40:01 sm-msp-queue[16123]: STARTTLS=client, error: load verify locs
/etc/ssl/certs/,
makes a change not to have the un at the begining.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I can't remember where I found this program, but it should do what you want:
http://packetspike.net/~daniel/programs/sockstat.c
On Wednesday 09 October 2002 10:36 pm, Hantzley wrote:
Hi,
Is there a way to know to which process belong
Specifically, port 16001 is ESD (ESound) IIRC..
On Tue, 2002-10-15 at 10:55, Giacomo Mulas wrote:
On Tue, 15 Oct 2002, Jussi Ekholm wrote:
So, what would try to connect to my system's port 16001 and 111 from
within my own system? Should I be concerned? Should I expect the worst?
port
I don't know if it's the catch on your problem, but it'll be interesting
reading noless;
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0037.html
On Wed, 2002-10-16 at 12:19, Simon Langhof wrote:
Hi
I noticed some (40 until now) strange entries in my Apache access.log. They started
would do the trick
-Daniel Lysfjord-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
,
klisa) packages, will start appearing on kde.org roughly Thursday
evening AEST (UTC+10). I've got exams until Thursday, so no sooner.
-d
--
Daniel Stone [EMAIL PROTECTED] [EMAIL PROTECTED]
Developer - http://kopete.kde.org, http://www.kde.org
msg07685/pgp0.pgp
, of their own
choosing.
--
Daniel Stone [EMAIL PROTECTED]
Developer, Trinity College, University of Melbourne
msg07781/pgp0.pgp
Description: PGP signature
in the bounce saying that this address has never existed, and
is being abused by spammers? If yes, _how_ should I do it?
I hope this is the right forum to ask...
Cheers,
Kjetil
--
Daniel J. Rychlik
Java/Perl Developer
http://daniel.rychlik.ws
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED
1 - 100 of 415 matches
Mail list logo