Marius Strobl wrote:
On Fri, Aug 22, 2008 at 01:44:25PM +0200, Kris Kennaway wrote:
Peter Jeremy wrote:
[Replies re-directed to freebsd-sun4v]
On 2008-Aug-21 14:42:55 -0700, Kip Macy [EMAIL PROTECTED] wrote:
I believe that there is a general expectation by freebsd users and
developers
Ruslan Ermilov [EMAIL PROTECTED] writes:
There's no possibility to easily make what you want, i.e., disable
SSP for some parts of the tree. Doing it for particular makefiles
OTOH should be pretty easy, by starting a makefile with the
following two lines:
That's not what Jeremie wants, that's
Hello Dag-Erling,
On Mon, Sep 08, 2008 at 01:16:16PM +0200, Dag-Erling Smørgrav wrote:
Ruslan Ermilov [EMAIL PROTECTED] writes:
There's no possibility to easily make what you want, i.e., disable
SSP for some parts of the tree. Doing it for particular makefiles
OTOH should be pretty easy,
Jeremy Chadwick wrote:
On Fri, Sep 05, 2008 at 03:12:53AM -0700, Jeremy Chadwick wrote:
Also, some folks on #bsdports asked why I was bothering with this in the
first place: mutt supports backticks to run shell commands inside of
a muttrc file. See Building a list of mailboxes on the
Joshua Piccari wrote:
I am setting up a few jails and I want them all to use the same /etc files
(with the exception of the files related to the password files and
databases), so I mounted a shared /etc folder as a nullfs with read-only
permissions. The problem is that using utilities like
Hey all,
I have the following rule set up in ipfw to limit the exposure of bad php
scripts and trojans that try to send mail directly.
allow tcp from any to any dst-port 25 uid root
deny log tcp from any to any dst-port 25 out
However, the log messages I get look like this:
Sep 8 13:21:11
In the last episode (Sep 08), Dan Mahoney, System Admin said:
I have the following rule set up in ipfw to limit the exposure of bad
php scripts and trojans that try to send mail directly.
allow tcp from any to any dst-port 25 uid root
deny log tcp from any to any dst-port 25 out
However,
[cc list trimmed]
On 2008-Sep-08 01:14:39 -0700, Darren Reed [EMAIL PROTECTED] wrote:
The critical issue for freebsd (and any operating system for
that matter) on rock is how well does the kernel scale to a
system with that many concurrent threads?
Right now it doesn't. And based on some
On Mon, 8 Sep 2008, Dan Nelson wrote:
In the last episode (Sep 08), Dan Mahoney, System Admin said:
I have the following rule set up in ipfw to limit the exposure of bad
php scripts and trojans that try to send mail directly.
allow tcp from any to any dst-port 25 uid root
deny log tcp from
Hello hackers,
I sent a patch some time ago, allowing modules to extend the ddb
command set. I just realized the link I provided then was in French so
that might have discouraged people from going any further. I have
therefore posted it here. Also, since I would like this patch to be
committed at
I've been trying to install FreeBSD 7.0-RELEASE amd64 on
a Dell M600 Blade but it hangs just after initialising
the isa bus.
I've tried a number of things and the only thing that I
can get to work is the i386 build which boots into the
installer without issue.
Has anyone had any experience
On Mon, Sep 08, 2008 at 04:03:29PM -0400, Dan Mahoney, System Admin wrote:
On Mon, 8 Sep 2008, Dan Nelson wrote:
In the last episode (Sep 08), Dan Mahoney, System Admin said:
I have the following rule set up in ipfw to limit the exposure of bad
php scripts and trojans that try to send mail
Hi Dan, Dan and the list,
On Monday 08 September 2008 22:03:29 Dan Mahoney, System Admin wrote:
On Mon, 8 Sep 2008, Dan Nelson wrote:
In the last episode (Sep 08), Dan Mahoney, System Admin said:
I have the following rule set up in ipfw to limit the exposure of bad
php scripts and trojans
In the last episode (Sep 09), Daan Vreeken said:
On Monday 08 September 2008 22:03:29 Dan Mahoney, System Admin wrote:
On Mon, 8 Sep 2008, Dan Nelson wrote:
In the last episode (Sep 08), Dan Mahoney, System Admin said:
I have the following rule set up in ipfw to limit the exposure
of
14 matches
Mail list logo