* [EMAIL PROTECTED] [EMAIL PROTECTED] [2006-05-02 20:07]:
yea. i'll keep that in mind. too bad it doesnt work in an audit.
(Ahem) horseshit. If you as your regular business practice
set up a procedure that the admins keep notes on a system and documents
whenever fixes are applied (try
On 5/2/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
I brought up a 3.9 server and have patched it with the sendmail patch. My
question is how does one prove that the box has been patched in 2,3 or 4 months?
TIA
Mike
Keep notes?
Nick Guenther [EMAIL PROTECTED] 03/05/2006 09:07:35 am
On 5/2/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
I brought up a 3.9 server and have patched it with the sendmail
patch. My question is how does one prove that the box has been patched
in 2,3 or 4 months?
TIA
Mike
Keep notes?
You
On Tue, May 02, 2006, [EMAIL PROTECTED] wrote:
I brought up a 3.9 server and have patched it with the sendmail
patch. My question is how does one prove that the box has been
patched in 2,3 or 4 months?
Check the version:
-char Version[] = 8.13.4;
+char Version[] = 8.13.5.20060308;
[EMAIL PROTECTED] wrote:
Keep notes?
yea. i'll keep that in mind. too bad it doesnt work in an audit.
Come on... official change logs are a good thing to keep for all servers.
But, you didn't give any information about how the patch was applied.
Assuming from local source... when you go to
[EMAIL PROTECTED] wrote:
yea. i'll keep that in mind. too bad it doesnt work in an audit.
seriously, is there anything that
a) can be queried against?
sometimes
b) compared against?
sometimes
c) hashs of files?
don't count on it.
d) etc?
yes.
Seriously, tell us what your criteria is
On 5/2/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
yea. i'll keep that in mind. too bad it doesnt work in an audit.
Since you didn't state the requirements of the audit, it's not
surprising that the answers don't satisfy that.
seriously, is there anything that
a) can be queried
--- [EMAIL PROTECTED] wrote:
yea. i'll keep that in mind. too bad it doesnt work
in an audit.
seriously, is there anything that
a) can be queried against?
b) compared against?
c) hashs of files?
d) etc?
is it something others have concerns about?
M
Ioan Nemes [EMAIL
8 matches
Mail list logo