On Mon, 09 Dec 2019 11:16:32 -0600
John Hasler wrote:
> The data trawling activities of my
> government[2] angers me but when I think about it objectively I
> realize that it does me no actual harm:
How do you know that? Mr. Snowden, among others, has made it abundantly
clear that the US
On Mon 09 Dec 2019 at 16:31:35 +0100, Jonas Smedegaard wrote:
> Quoting Charles Curley (2019-12-09 15:56:26)
> > On Sun, 8 Dec 2019 18:55:12 +0100 (CET)
> > wrote:
> >
> > > Usual advice : use strong passwords (i.e. long enough with high
> > > entropy => generated in a dedicated password
On Mon, Dec 9, 2019 at 11:17 AM John Hasler wrote:
> The data trawling activities of my
> government[2] angers me but when I think about it objectively I realize
> that it does me no actual harm: I'm simply not someone they care about.
>
You are safe (now) so others' freedoms need not be
Charlie writes:
> Over many years, although, I may not ever be in possession of anything
> of interest to anyone?
There are two distinct "security" condsiderations here that are often
munged together:
1) Our ethical/moral/political objections to being tracked and snooped
on
Quoting Charles Curley (2019-12-09 15:56:26)
> On Sun, 8 Dec 2019 18:55:12 +0100 (CET)
> wrote:
>
> > Usual advice : use strong passwords (i.e. long enough with high
> > entropy => generated in a dedicated password manager) AND 1
> > different per service, never the same.
>
> There is a handy
On Mon, 9 Dec 2019, Charles Curley wrote:
> Date: Mon, 9 Dec 2019 09:56:26
> From: Charles Curley
> To: debian-user@lists.debian.org
> Subject: Re: dropbox security situation
> Resent-Date: Mon, 9 Dec 2019 14:57:02 + (UTC)
> Resent-From: debian-user@lists.debian.org
>
On Sun, 8 Dec 2019 18:55:12 +0100 (CET)
wrote:
> Usual advice : use strong passwords (i.e. long enough with high
> entropy => generated in a dedicated password manager) AND 1
> different per service, never the same.
There is a handy password generator available on Debian, called APG
(Automated
Received from Curt on Sun, 8 Dec 2019 14:54:15 - (UTC) Re:
[OT] Google security
> I am waiting to be convinced, though I do infer from a certain number
> of factors, including my personal experience and the experience of
> those around me, that the claim
On Sun 08 Dec 2019 at 13:09:10 -0500, Jude DaShiell wrote:
> No google now has a unique one now but didn't when the incidents
> happened.
I wish I understood what you mean. A "unique" what?
With the strong password that uou have (and the protections Google
provides) the balance of probability
No google now has a unique one now but didn't when the incidents
happened.
On Sun, 8 Dec 2019, l0f...@tuta.io wrote:
> Date: Sun, 8 Dec 2019 12:55:12
> From: l0f...@tuta.io
> To: John Hasler
> Cc: Debian User
> Subject: Re: dropbox security situation
> Resent-Date: Sun, 8
Hi,
8 déc. 2019 à 14:47 de jhas...@newsguy.com:
> Do you use the same username everywhere? It's common for criminals to
> collect lists of usernames and try them in combination with guessed
> passwords on as many services as possible. The yield is low but it's
> cost-effective for them because
On 2019-12-08, John Hasler wrote:
> Curt writes:
>> Yet the confirmation bias of certain ideologues will get them to
>> believing...
>
> Confirmation bias of *all* ideologues and ideologies. Including yours.
How devastatingly clever. But you inverse the roles. I made no
unsubstantiated claim,
Curt writes:
> Yet the confirmation bias of certain ideologues will get them to
> believing...
Confirmation bias of *all* ideologues and ideologies. Including yours.
--
John Hasler
jhas...@newsguy.com
Elmwood, WI USA
Do you use the same username everywhere? It's common for criminals to
collect lists of usernames and try them in combination with guessed
passwords on as many services as possible. The yield is low but it's
cost-effective for them because the process is fully automated using
thousands of bots
On Sun, Dec 08, 2019 at 10:33:42AM -, Curt wrote:
> Also my understanding and experience. Yet the confirmation bias of
> certain ideologues [... ]
Ideologue. Noun. Anyone with views differing from Curt's
> [...] being trigger-happy fanatics) any and all FUD
Fanatic. Noun. Anyone whose
On 2019-12-08, wrote:
> Hi,
>
> 7 déc. 2019 à 18:06 de jdash...@panix.com:
>
>> [...] google accounts whether two-step or not are routinely hacked
>>
> You are probably mixing up different notions here: cracking VS privacy
> VS social engineering (phishing).
Hi,
7 déc. 2019 à 18:06 de jdash...@panix.com:
> [...] google accounts whether two-step or not are routinely hacked
>
You are probably mixing up different notions here: cracking VS privacy VS
social engineering (phishing).
AFAIK, Google account security policy has very high standards t
On Sat, Dec 07, 2019 at 04:24:33PM -0700, Charles Curley wrote:
> On Sat, 07 Dec 2019 19:20:09 +0100
> Hans wrote:
>
> > maybe owncloud or nextcloud are interesting options for you. As the
> > name says: Your own cloud.
>
> Thank you for recommending those before I did. I run nextcloud here,
>
On Sat, Dec 07, 2019 at 11:39:42PM +, Brian wrote:
> On Sat 07 Dec 2019 at 18:23:27 -0500, Jude DaShiell wrote:
[Account of break in which we can't either prove or disprove, yet]
> There was no break-in.
That there was no break-in is a myth. You never provided any
evidence. That is enough
On Sat, 7 Dec 2019 16:24:33 -0700
Charles Curley wrote:
> On Sat, 07 Dec 2019 19:20:09 +0100
> Hans wrote:
...
> > But in the debian repo I only found the client stuff, however I might
> > to remember, the server site were also available in debian (I might
> > be wrong).
>
> I don't see the
On Sat, 07 Dec 2019 19:20:09 +0100
Hans wrote:
> maybe owncloud or nextcloud are interesting options for you. As the
> name says: Your own cloud.
Thank you for recommending those before I did. I run nextcloud here,
and prefer it over owncloud. It seems to have advanced considerably
over
> lesser security account.
> It's possible the break in happened since at the time I enabled two-step
> authentication I didn't know about setting up app-passwords for mua's
> used to connect to the account, but I don't know for sure on that one.
There was no break-in.
--
Brian.
I had to close my original account as a result of the break in, and you
know what was really interesting? The account compromise happened after
I set the account to two-step authentication. For a while it had been a
lesser security account.
It's possible the break in happened since at the time I
On Sat 07 Dec 2019 at 16:45:34 -0500, Jude DaShiell wrote:
> One first-hand experience on google account hacking and contacting
> others who were not surprised when I described my situation in earlier
> email.
Widespread breaking into Google accounts is a myth. You and your
correspondents never
:28
> From: Brian
> To: debian-user@lists.debian.org
> Subject: Re: dropbox security situation
> Resent-Date: Sat, 7 Dec 2019 20:56:43 + (UTC)
> Resent-From: debian-user@lists.debian.org
>
> On Sat 07 Dec 2019 at 12:06:37 -0500, Jude DaShiell wrote:
>
> > Recently I
On Sat 07 Dec 2019 at 12:06:37 -0500, Jude DaShiell wrote:
> Recently I created a dropbox account with my gmail account. Very shortly
> after creation I was refused access since dropbox claimed someone tried
> to change the password on my account and they weren't sure it was me so
> got prompted
Hi Jude,
maybe owncloud or nextcloud are interesting options for you. As the name says:
Your own cloud.
But in the debian repo I only found the client stuff, however I might to
remember, the server site were also available in debian (I might be wrong).
Best
Hans
signature.asc
Description:
On Sat, 7 Dec 2019, Hans wrote:
> Date: Sat, 7 Dec 2019 12:49:17
> From: Hans
> To: debian-user@lists.debian.org
> Subject: Re: dropbox security situation
>
> Am Samstag, 7. Dezember 2019, 18:06:37 CET schrieb Jude DaShiell:
> Hi Jude,
>
> I know, there were several s
Am Samstag, 7. Dezember 2019, 18:06:37 CET schrieb Jude DaShiell:
Hi Jude,
I know, there were several security issues with dropbox in the past, that
frightened me. So dropbox would not be my first choice, although it is most
used by people. (Windows is also most used by people, think of your
Recently I created a dropbox account with my gmail account. Very shortly
after creation I was refused access since dropbox claimed someone tried
to change the password on my account and they weren't sure it was me so
got prompted to change my password.
What I don't know is if high probability
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Kent West wrote:
> Probably not the best place to put this information, but I figure here
> is better than no where...
>
> I'm tinkering with authentication a Debian (10.1) box via Active
> Directory, so that an AD user can log into the Debian
nt person, upon login, becomes the local account person, with
full access as that person.
Advice? Suggestions? Questions?
It seems like you have two options:
1. change the use_fully_qualified_names setting
2. eliminate the westk local account
While the situation has security implications, those impli
of the same name, the
> domain account person, upon login, becomes the local account person, with
> full access as that person.
>
> Advice? Suggestions? Questions?
>
It seems like you have two options:
1. change the use_fully_qualified_names setting
2. eliminate the westk local account
Probably not the best place to put this information, but I figure here
is better than no where...
I'm tinkering with authentication a Debian (10.1) box via Active
Directory, so that an AD user can log into the Debian box.
The relevant /etc/sssd/sssd.conf file has the following modification:
On Fri, 4 Oct 2019 08:45:27 -0400
Greg Wooledge wrote:
Hello Greg,
>Yeah, I gave the (overly) simplified set of warnings.
I'm sure we can all come up with so many different scenarios that this
could run and run if we let it.
Suffice to say, there are always exceptions that prove the rule.
On Fri, Oct 04, 2019 at 10:52:16AM +0100, Brad Rogers wrote:
> Also, currently, digikam is not in testing. No big deal, I have it
> installed and working. *However* if I had just installed testing, I
> would get digikam from stable, because I use it daily, and can't do
> certain things without
Greg Wooledge wrote:
> YOU DO NOT MIX TESTING WITH UNSTABLE.
> If you use one of these, you use that one only. No mixing.
> No Frankendebians.
But you *can* mix Unstable with Testing. (Not the order here.)
Normally no package from Testing will get pulled in, but sometimes this
is the only
Hi,
Brad Rogers wrote:
> > > If one uses sites such as spotify or amazon video
to...@tuxteam.de wrote:
> >...but why on earth would you want to do THAT? Eeeek... ;-)
Brad Rogers wrote:
> *I* don't; It's the kids.
I wonder whether there is a Debian Developer willing to create a package
which
On Fri, 4 Oct 2019 12:14:00 +0200
wrote:
Hello to...@tuxteam.de,
>...but why on earth would you want to do THAT? Eeeek... ;-)
*I* don't; It's the kids.
Honest.
:-)
--
Regards _
/ ) "The blindingly obvious is
/ _)radnever immediately apparent"
Where
On Fri, Oct 04, 2019 at 10:52:16AM +0100, Brad Rogers wrote:
> On Thu, 3 Oct 2019 15:40:53 -0400
> Greg Wooledge wrote:
>
> Hello Greg,
>
> >YOU DO NOT MIX STABLE WITH TESTING.
> >
> >YOU DO NOT MIX STABLE WITH UNSTABLE.
> >
> >YOU DO NOT MIX TESTING WITH UNSTABLE.
>
> By and large, I agree.
>
On Thu, 3 Oct 2019 15:40:53 -0400
Greg Wooledge wrote:
Hello Greg,
>YOU DO NOT MIX STABLE WITH TESTING.
>
>YOU DO NOT MIX STABLE WITH UNSTABLE.
>
>YOU DO NOT MIX TESTING WITH UNSTABLE.
By and large, I agree.
I would add a few caveats, though.
If one uses sites such as spotify or amazon
On Thu, Oct 03, 2019 at 03:40:53PM -0400, Greg Wooledge wrote:
[...]
> YOU DO NOT MIX STABLE WITH TESTING.
>
> YOU DO NOT MIX STABLE WITH UNSTABLE.
>
> YOU DO NOT MIX TESTING WITH UNSTABLE.
Wow. I'd rather say: you do not "do not".
Know the downsides, know what can break, and then, when it's
On Thu, 3 Oct 2019 15:40:53 -0400
Greg Wooledge wrote:
> On Thu, Oct 03, 2019 at 08:35:32PM +0100, mick crane wrote:
> > Debian web page about testing is saying that testing gets infrequent
> > security updates
>
> It's more accurate to say that testing does not get A
On Thu, Oct 03, 2019 at 08:54:37PM +0100, mick crane wrote:
> yes sorry, I realized I made an error and should have typed
> bullseye for main and unstable for security updates just after pressing
> send.
> but you say not to do that ?
Correct. If you want to run unstable, just run unstable.
realized I made an error and should have typed
bullseye for main and unstable for security updates just after pressing
send.
but you say not to do that ?
mick
--
Key ID4BFEBB31
On Thu, Oct 03, 2019 at 08:35:32PM +0100, mick crane wrote:
> Debian web page about testing is saying that testing gets infrequent
> security updates
It's more accurate to say that testing does not get ANY security updates.
Not in any realistic sense. Packages migrate from unstable into t
I didn't type previous correctly did I.
that would be
bullseye for main and unstable for security updates in sources.lists.
Is that what people do ?
mick
--
Key ID4BFEBB31
hello,
Debian web page about testing is saying that testing gets infrequent
security updates and that you can get more frequent security updates
from unstable.
Is that what people do ?
have buster for main and bullseye for security updates in sources.list ?
mick
--
Key ID4BFEBB31
there a way I can get that information on the Debian
> server itself through the command-line?
lynx -dump https://security-tracker.debian.org/tracker/DSA-4535-1
This also works with a CVE number. For example,
lynx -dump https://security-tracker.debian.org/tracker/CVE-2019-5094
Or with a sour
Hello Debian Community,
I've been unable to find information about how to use apt, apt-get, or aptitude
to get security erratum information on a Debian 10 server. Is there a yum
security equivalent in Debian? Specifically I am looking to query the Debian
repos for DSA advisory information
ct within this environment.
I don't either.
First thing you can do is look for a file like /etc/pam.d/gdm3 (or possibly
/etc/pam.d/gdm), and see if it contains the pam_limits.so line. If
it doesn't, then you know it isn't reading /etc/security/limits.conf
file, and your first step would be to ad
On Mon, 12 Aug 2019 15:40:03 +0200, Greg Wooledge wrote:
> You
> could start by telling us which DM it is (lightdm, gdm3, sddm, etc.).
gdm3
And I don't know to let the limits take effect within this environment.
Regards
On Mon, 12 Aug 2019 15:40:03 +0200, Greg Wooledge wrote:
> You
> could start by telling us which DM it is (lightdm, gdm3, sddm, etc.).
gdm3
And I don't know to let the limits take effect within this environment.
Regards
--
.: Hongyi Zhao [ hongyi.zhao AT gmail.com ] Free as in Freedom :.
On Mon, 12 Aug 2019 15:40:03 +0200, Greg Wooledge wrote:
> You
> could start by telling us which DM it is (lightdm, gdm3, sddm, etc.).
gdm3
And I don't know to let the limits take effect within this environment.
Regards
--
.: Hongyi Zhao [ hongyi.zhao AT gmail.com ] Free as in Freedom :.
> Il giorno dom 11 ago 2019 alle ore 05:30 Hongyi Zhao
> ha scritto:
>
> > Hi,
> >
> > I added the following lines into /etc/security/limits.conf:
> >
> > * - nofile 65535
> > root - nofile 65535
> >
> >
> > But it still not take ef
check if you are using pam_limits module
grep -i limit /etc/pam.d/*
Il giorno dom 11 ago 2019 alle ore 05:30 Hongyi Zhao
ha scritto:
> Hi,
>
> I added the following lines into /etc/security/limits.conf:
>
> * - nofile 65535
> root - nofile 65535
>
>
> B
Hi,
I added the following lines into /etc/security/limits.conf:
* - nofile 65535
root - nofile 65535
But it still not take effect for the normal user.
Any hints?
--
.: Hongyi Zhao [ hongyi.zhao AT gmail.com ] Free as in Freedom :.
O repositório security só existe para a stable, porque ele contém as
atualizações de segurança. A Testing não conta com isso, porque ela recebe
updates normalmente.
Em resumo, ele não existe nem vai existir.
--
Francisco
On Wed, 2019-07-10 at 16:08 -0300, Diego Rabatone Oliveira wrote
Provavelmente ainda não, mas vai passar a existir em algum momento em
breve, imagino.
Em qua, 10 de jul de 2019 15:18, Jack Jr. escreveu:
> Uma dúvida. Esse repositório não existe mais?
>
> deb http://security.debian.org/ testing/updates main
>
> --
>
> Jack Pogorelsky Jr.
> Engenheiro Mecânico
Uma dúvida. Esse repositório não existe mais?
deb http://security.debian.org/ testing/updates main
--
Jack Pogorelsky Jr.
Engenheiro Mecânico
Tel/WhatsApp: +55 (51) 982017877
E-mail: j...@sulmail.com
Website: sulmail.com/pogorelsky
Op 13-05-19 om 12:13 schreef Paul van der Vlis:
> Hoi,
>
> Afgelopen nacht was er een security update voor Ghostscript, en ik hoor
> dat verscyhillende printers niet meer werken. Het lijkt er op dat
> PCL6-printers het niet meer doen, en Postscript printers wel. Maar
> m
Hoi,
Afgelopen nacht was er een security update voor Ghostscript, en ik hoor
dat verscyhillende printers niet meer werken. Het lijkt er op dat
PCL6-printers het niet meer doen, en Postscript printers wel. Maar
misschien is dit te algemeen.
Downgraden lijkt het probleem op te lossen:
apt install
Hi Ansgar,
I highly appreciate your detailed response. I had not expected
that the keyserver is restricted to developer keys.
Thanx very much
Harri
nd for remote repository
> buster-security (http://security.debian.org buster/updates)!
> There have been errors!
These keys are already in the debian-archive-keyring package (in
testing/unstable):
+---
| $ gpg --no-default-keyring --keyring
/usr/share/keyrings/debian-archive-k
%2Fupdates_InRelease'.
Signatures in
'/var/www/official/lists/buster-security_buster%2Fupdates_InRelease':
'9D6D8F6BC857C906' (signed 2019-05-03): missing pubkey
'AA8E81B4331F7F50' (signed 2019-05-03): missing pubkey
Error: Not enough signatures found for remote repository buster-security
(http
Arun Vasudevan wrote:
> HI Could you please help on this
>
> On Wed, Apr 10, 2019 at 7:37 PM Dan Ritter wrote:
>
> > Arun Vasudevan wrote:
> > > Hi
> > >
> >
> > Please address replies to the group, so that other people can
> > assist and can be helped in future.
> >
> > -dsr-
Am 10. Apr, 2019 schwätzte Cindy Sue Causey so:
moin moin,
On 4/10/19, Dan Ritter wrote:
Arun Vasudevan wrote:
Could you please help me to install the Security patches only to one of
my
Debian servers.
The usual method is:
sudo apt update
apt list --upgradable
# inspect the packages
On 4/10/19, Dan Ritter wrote:
> Arun Vasudevan wrote:
>> >
>> > Could you please help me to install the Security patches only to one of
>> > my
>> > Debian servers.
>>
>
> The usual method is:
>
> sudo apt update
> apt list --upgradable
Arun Vasudevan wrote:
> Hello Team,
>
> Any one help me here
>
> -- Forwarded message -
> From: Moritz Muehlenhoff
> Date: Wed, Apr 10, 2019 at 6:15 PM
> Subject: Re: Security Installation Method
> To: Arun Vasudevan
> Cc:
>
>
> O
Hello Team,
Any one help me here
-- Forwarded message -
From: Moritz Muehlenhoff
Date: Wed, Apr 10, 2019 at 6:15 PM
Subject: Re: Security Installation Method
To: Arun Vasudevan
Cc:
On Wed, Apr 10, 2019 at 05:55:09PM +0530, Arun Vasudevan wrote:
> Team,
>
> Could y
On Tue, Mar 12, 2019 at 06:35:34PM -0400, deb wrote:
> I see this with an apt-cache search but I drew back when
> I saw that it wants to include "john-data" to crack passwords.
>
>
> *`tiger *- checks system security but uses john-data, which cracks
> passw
I see this with an apt-cache search but I drew back when
I saw that it wants to include "john-data" to crack passwords.
*`tiger *- checks system security but uses john-data, which cracks
passwords`
I look forward to comments from those who have used either or want t
gt; file size is 34.1M, it may take more than 2 hours
> > > jessie installer has just downloaded kernel from a mirror i choose, it's
> > > fast, but security.debian.org is slow
> > > early debian installer allow user to choose whether to install security
> &g
y.debian.org is slow
> early debian installer allow user to choose whether to install security update
> i hope debian developer can read this message
Two things. 1. You can choose whether you want security updates at
install time. (There may be a default value unless you use expert
mode
On Sun, Dec 30, 2018 at 08:00:51PM +0100, Marek Gráfel wrote:
> I also tried the command via the apt-get update terminal, telling me that
> the operation is declined.
Make sure you run apt-get as root or with sudo:
sudo apt-get update
Then:
sudo apt-get upgrade
-- Nazar
On 12/30/18 11:00 AM, Marek Gráfel wrote:
I do not know English well, but I hope that the translation through Google
Is there a Debian mailing list in your native language?
https://lists.debian.org/completeindex.html
David
Marek Gráfel wrote:
...
> I do not know English well, but I hope that the translation through Google
> will be enough to lead me to write a procedure how to install security
> updates, and please explain why your Debian freezes despite Linux Mintu? I
> think Debian is higher than Linux
Good day. Please help. I have the Debian9.6 operating system installed from
Cinnamon. Can I help you find and install security updates on my system? I
looked at the Synaptic package manager, the apt package is installed there.
I also tried the command via the apt-get update terminal, telling me
On Wed, Oct 03, 2018 at 11:16:36AM -0300, francis picabia wrote:
> I hate it when the kernel file isn't changed from the old uname.
Keeping the same ABI is *helpful*, because people don't have to rebuild
their third-party (dkms) modules. Bumping the ABI for security updates
is awful, and
On 03/10/2018 15:58, francis picabia wrote:
> When I do apt-get update && apt-get upgrade to get
> the new kernel which is part of DSA-4308-1 (released Oct 1),
> I get nothing available.
what says
apt-cache policy linux-image-amd64
?
best regards
Ulf
,
> I get nothing available.
>
> I have in sources.list:
>
> deb http://mirror.csclub.uwaterloo.ca/debian/ stretch main contrib
> non-free
> deb-src http://mirror.csclub.uwaterloo.ca/debian/ stretch main contrib
> non-free
>
> deb http://security.debian.org/debian-securit
stretch main contrib
non-free
deb http://security.debian.org/debian-security stretch/updates main contrib
non-free
deb-src http://security.debian.org/debian-security stretch/updates main
contrib non-free
I've tried apt-get clean and even apt-get dist-upgrade
Nothing makes any difference and no
On Fri, Sep 14, 2018 at 11:16:56AM +1000, Zenaan Harkness wrote:
> Anyone know if it's possible to get xterm (or xfce4-terminal or any
> other terminal for that matter) to be a "native/ clean login
> terminal", to increase security when running root commands?
>
Anyone know if it's possible to get xterm (or xfce4-terminal or any
other terminal for that matter) to be a "native/ clean login
terminal", to increase security when running root commands?
To: CypherPunks
On Thu, Sep 13, 2018 at 04:48:58PM +1000, Zenaan Harkness wrote:
> So som
On Thu, Aug 23, 2018 at 01:16:26PM -0400, Roberto C. Sánchez wrote:
deb http://apt-cache.localdomain:3142/security/ stretch/updates main contrib
non-free
deb http://apt-cache.localdomain:3142/debian/ stretch main non-free contrib
apt-cacher would typically be used by putting something like
Roberto C. Sánchez, Do 23 Aug 2018 19:16:26 CEST:
> The corresponding configurations for apt-cacher-ng are:
>
> backends_debian_sec:
> http://security.debian.org
>
> deb_sec_mirrors:
> http://security.debian.org
> However, recent kernel updates have instead been r
I have started noticing something odd with the way apt on my systems
downloads some security updates.
First, I run an instance of apt-cacher-ng on my local network and I have
backends configured for both the normal archive and also the security
archive. My sources.list looks like this:
deb http
Thank's
Le mar. 14 août 2018 à 18:03, Reco a écrit :
>
>
> apt install auditd
>
> auditctl -a always,exit -F dir=/home/backup -F perm=war
>
> md5sum /home/backup/* # any reading/writing command will do
>
> tail /var/log/audit/audit.log
>
> Reco
>
>
--
*Ilyass kaouam*
*Systems administrator*
*
Hi.
On Mon, Aug 13, 2018 at 08:52:35PM +0200, Ilyass Kaouam wrote:
> Hi,
>
> I have a database server in which I save the database (dump)
> let say
> /home/backup directory.
> I would like to monitor this directory and find out if anyone is doing a cp
> or mv or.
apt install auditd
(Please bottom post.)
I'd have the program creating a file, either change file permissions
after writing, or call/trigger some other/ "external" script (which
you write) to do the tidy ups.
Good luck,
On Mon, Aug 13, 2018 at 11:34:40PM +0200, Ilyass Kaouam wrote:
> Thank you for you all,
> I
Thank you for you all,
I will all this.
For other friends, if you have other suggestions please do not hesitate :)
Le lun. 13 août 2018 à 22:57, Roberto C. Sánchez a
écrit :
> On Mon, Aug 13, 2018 at 10:30:02PM +0200, Martin wrote:
> >
> > Oh, yes! How simple. Unfortunately, 'apt-cache search
On Mon, Aug 13, 2018 at 10:30:02PM +0200, Martin wrote:
>
> Oh, yes! How simple. Unfortunately, 'apt-cache search fam' returns 578 hits.
> 'apt-cache search famd' gives zero. Not that smart naming I guess.
>
Try 'apt-cache pkgnames fam' instead.
'pkgnames' considers only package names, where
Am 13.08.2018 um 22:16 schrieb Thomas Schmitt:
> Hi,
>
> Martin wrote:
>> There is -or was, quite some time ago I've last seen this- a software called
>> famd (File Alteration Monitor ->
>> https://en.wikipedia.org/wiki/File_Alteration_Monitor). Looks like there is
>> no .deb in a current repo,
Hi,
Martin wrote:
> There is -or was, quite some time ago I've last seen this- a software called
> famd (File Alteration Monitor ->
> https://en.wikipedia.org/wiki/File_Alteration_Monitor). Looks like there is
> no .deb in a current repo, but may be the name has changes.
Maybe this ?
Am 13.08.2018 um 20:52 schrieb Ilyass Kaouam:
> Hi,
>
> I have a database server in which I save the database (dump)
> let say
> /home/backup directory.
> I would like to monitor this directory and find out if anyone is doing a cp
> or mv or.
> Any idea?
> Thank you very much
>
There is
On Mon, Aug 13, 2018 at 08:52:35PM +0200, Ilyass Kaouam wrote:
>Hi,
>I have a database server in which I save the database (dump)
>let say /home/backup directory.
>I would like to monitor this directory and find out if anyone is doing a
>cp or mv or.
>Any idea?
>
On Mon, Aug 13, 2018 at 08:52:35PM +0200, Ilyass Kaouam wrote:
> I have a database server in which I save the database (dump)
> let say
> /home/backup directory.
> I would like to monitor this directory and find out if anyone is doing a cp
> or mv or.
1) Set the permissions correctly, so you
Hi,
I have a database server in which I save the database (dump)
let say
/home/backup directory.
I would like to monitor this directory and find out if anyone is doing a cp
or mv or.
Any idea?
Thank you very much
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/04/2018 07:39 PM, David Christensen wrote:
> I do keep optical drives in the older machines because their BIOS can be
> incompatible with bootable USB flash drives.
these machines need to be trashed, they are generaly not so efficient
question
i may have to put up with security update
It is best to keep your systems up-to-date with respect to security patches.
hopefully this time debian 9.5 will not cause trouble
(debian 9.4 with security update has problem)
i'm not interested in spending any more energy on such trivial iss
501 - 600 of 5050 matches
Mail list logo