hey Lug, can you guys give me the local average price
estimates for website design and maintenance? 

--- [EMAIL PROTECTED] wrote:

> Send LUG mailing list submissions to
>       [email protected]
> 
> To subscribe or unsubscribe via the World Wide Web,
> visit
>       http://kym.net/mailman/listinfo/lug
> or, via email, send a message with subject or body
> 'help' to
>       [EMAIL PROTECTED]
> 
> You can reach the person managing the list at
>       [EMAIL PROTECTED]
> 
> When replying, please edit your Subject line so it
> is more specific
> than "Re: Contents of LUG digest..."
> > Today's Topics:
> 
>    1. Re: Mail admins wanted @yahoo! (McTim)
>    2. Re: [LUG]Ndugu Linux (Robert K Lutaaya)
>    3. Fwd: [c-nsp] Cisco Security Advisory: IOS HTTP
> Server Command
>       Injection Vulnerability (Mark Tinka)
>    4. Re: [LUG]Ndugu Linux (Ernest Byaruhanga)
> > From: McTim <[EMAIL PROTECTED]>
> To: Linux Users Group Uganda <[email protected]>
> Date: Thu, 1 Dec 2005 12:09:18 +0300
> Subject: Re: [LUG] Mail admins wanted @yahoo!
> 
> On 12/1/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]>
> wrote:
> > Sorbs is one of the most annoying Black lists I
> have had the displeasure of
> > encountering. You need to make some sort of
> "donation" of $50 to get off the
> > blacklist and you can get on it for no apparent
> reason.
> 
> It is not a blacklist but more like blackmail (pun
> intended)
> 
> I long ago made the
> > conclusion that anyone who uses Sorbs has no
> business getting mail from me
> > anyway!
> 
> unfortunately, you can be Sorbed withut "using
> Sorbs" ;-(
> 
> --
> Cheers,
> 
> McTim
> $ whois -h whois.afrinic.net mctim
> 
> > From: "Robert K Lutaaya" <[EMAIL PROTECTED]>
> To: "Linux Users Group Uganda" <[email protected]>
> Date: Thu, 1 Dec 2005 21:48:03 +0300 (EAT)
> Subject: Re: [LUG]Ndugu Linux
> 
> 
> Chris Kasangaki of EACOSS is setting up Customised
> Debian Kernel for
> Schools, Small Buisnesses, Civil Society
> Organizations.
> 
> You are all welcome to join the project.
> 
> Robert
> 
> 
> 
> 
> On Thu, December 1, 2005 11:41 am, Ronny said:
> > At least 90% of families in Ug if not Africa have
> lost a member to the
> > pandemic.Can't forget this day.Good talent has
> been lost thank God we
> > still living but pray /"the deadly cron will be
> killed" hope you do get
> > that.
> > /Amazingly as usual Linux is in the fight against
> it :-\
> >
>
---------------------------------------------------------------------------------
> > Researchers at the University at Buffalo, the
> State University of New
> > York, have fired up a 2,000-node, 4,000 processor
> Linux cluster and hope
> > the cluster's help in studying the human genome
> will lead to
> > breakthroughs in the treatment of cancer,
> Alzheimer's and AIDS.
> >
>
http://os.newsforge.com/article.pl?sid=02/09/10/1516202&tid=2&tid=60&tid=16&tid=31
> >
> > Yos
> > Ronny
> >
> > --
> >
>
*******************************************************************
> > PGP Fingerprint: 6695 794A B84E D922 88FB 73CC
> 6CBD 8036 B3CD 7304
> > We can't become what we need to be by remaining
> what we are
> >
>
*******************************************************************
> >
> >
> >
> > _______________________________________________
> > LUG mailing list
> > [email protected]
> > http://kym.net/mailman/listinfo/lug
> > %LUG is generously hosted by INFOCOM
> http://www.infocom.co.ug/
> >
> > The above comments and data are owned by whoever
> posted them (including
> > attachments if any). The List's Host is not
> responsible for them in any
> > way.
> > ---------------------------------------
> >
> >
> 
> 
> Robert K Lutaaya
> 075-808889
> 041-223 802
> EACOSS
> 
> 
> 
> > From: Mark Tinka <[EMAIL PROTECTED]>
> To: "Linux Users Group Uganda" <[email protected]>
> Date: Thu, 1 Dec 2005 23:59:27 -0500
> Subject: [LUG] Fwd: [c-nsp] Cisco Security Advisory:
> IOS HTTP Server Command
>       Injection Vulnerability
> 
> FYI.
> 
> Mark.
> 
> ----------  Forwarded Message  ----------
> 
> Subject: [c-nsp] Cisco Security Advisory: IOS HTTP
> Server 
> Command Injection Vulnerability
> Date: Friday 02 December 2005 00:43
> From: Cisco Systems Product Security Incident
> Response 
> Team <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> Cisco Security Advisory: IOS HTTP Server Command
>  Injection Vulnerability
> 
>
========================================================
> ================
> 
> Document ID: 68322
> 
> Advisory ID: cisco-sa-20051201-http
> 
>
http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht
> tp.shtml
> 
> Revision 1.0
> 
> For Public Release 2005 December 01 2100 UTC (GMT)
> 
> -
> 
>
--------------------------------------------------------
> ---------------
> 
> Contents
> ========
> 
>     Summary
>     Affected Products
>     Details
>     Impact
>     Software Versions and Fixes
>     Workarounds
>     Obtaining Fixed Software
>     Exploitation and Public Announcements
>     Status of This Notice: INTERIM
>     Distribution
>     Revision History
>     Cisco Security Procedures
> 
> -
> 
>
--------------------------------------------------------
> ---------------
> 
> Summary
> =======
> 
> A vulnerability exists in the IOS HTTP server in
> which
>  HTML code inserted into dynamically generated
> output,
>  such as the output from a "show buffers" command,
> will
>  be passed to the browser requesting the page. This
> HTML
>  code could be interpreted by the client browser and
>  potentially execute malicious commands against the
>  device or other possible cross-site scripting
> attacks.
>  Successful exploitation of this vulnerability
> requires
>  that a user browse a page containing dynamic
> content in
>  which HTML commands have been injected.
> 
> Cisco will be making free software available to
> address
>  this vulnerability for affected customers. There
> are
>  workarounds available to mitigate the effects of
> the
>  vulnerability.
> 
> This advisory is posted at
>
http://www.cisco.com/warp/public/707/cisco-sa-20051201-ht
> tp.shtml.
> 
> Affected Products
> =================
> 
> This security advisory applies to all Cisco products
> that
>  run Cisco IOS Software versions 11.0 through 12.4
> with
>  the HTTP server enabled. A system which contains
> the IOS
>  HTTP server or HTTP secure server, but does not
> have it
>  enabled, is not affected.
> 
> To determine if the HTTP server is running on your
>  device, issue the "show ip http server status" and
> "show
>  ip http server secure status" commands at the
> prompt and
>  look for output similar to:
> 
>     Router>show ip http server status
>     HTTP server status: Enabled
> 
> 
> If the device is not running the HTTP server, you
> should
>  see output similar to:
> 
>     Router>show ip http server status
>     HTTP server status: Disabled
> 
> 
> Any version of Cisco IOS prior to the versions which
> will
>  be listed in the Fixed Software section below may
> be
>  vulnerable.
> 
> Cisco IOS XR is not affected.
> 
> To determine the software running on a Cisco
> product, log
>  in to the device and issue the "show version"
> command to
>  display the system banner. Cisco IOS Software will
>  identify itself as "Internetwork Operating System
>  Software" or simply "IOS". On the next line of
> output,
>  the image name will be displayed between
> parentheses,
>  followed by "Version" and the IOS release name.
> Other
>  Cisco devices will not have the "show version"
> command
>  or will give different output.
> 
> The following example identifies a Cisco product
> running
>  IOS release 12.3(6) with an installed image name of
>  C3640-I-M:
> 
>     Cisco Internetwork Operating System Software
>     IOS (tm) 3600 Software (C3640-I-M), Version
> 12.3(6),
>  RELEASE SOFTWARE (fc3)
> 
> 
> The next example shows a product running IOS release
>  12.3(11)T3 with an image name of
>  C3845-ADVIPSERVICESK9-M:
> 
>     Cisco IOS Software, 3800 Software
>  (C3845-ADVIPSERVICESK9-M), Version 12.3(11)T3,
> RELEASE
>  SOFTWARE (fc4) Technical Support:
>  http://www.cisco.com/techsupport Copyright (c)
> 1986-2005
>  by Cisco Systems, Inc.
> 
> 
> Additional information about Cisco IOS release
> naming can
>  be found at
> http://www.cisco.com/warp/public/620/1.html.
> 
> No other Cisco products are currently known to be
>  affected by the vulnerability addressed in this
>  advisory.
> 
> Details
> =======
> 
> The Cisco IOS Web browser interface (which enables
> the
>  device to perform as an HTTP server) allows
>  configuration and monitoring of a router or access
>  server using any web browser. This feature was
>  introduced in IOS 11.0.
> 
> A vulnerability exists in the IOS HTTP server in
> which
>  HTML code inserted into dynamically generated
> output,
>  such as the output from a "show buffers" command,
> will
> 
=== message truncated ===> From: Ernest Byaruhanga
<[EMAIL PROTECTED]>
> CC: 
> To: [EMAIL PROTECTED], Linux Users Group Uganda
> <[email protected]>
> Date: Fri, 02 Dec 2005 08:42:09 +0200
> Subject: Re: [LUG]Ndugu Linux
> 
> 
> 
> Robert K Lutaaya wrote the following on 12/01/2005
> 08:48 PM:
> > Chris Kasangaki of EACOSS is setting up Customised
> Debian Kernel for
> > Schools, Small Buisnesses, Civil Society
> Organizations.
> 
> what 'customizations' is he particulary putting in
> the kernel?
> 
> ernest
> 
> > _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> 



                
__________________________________ 
Start your day with Yahoo! - Make it your home page! 
http://www.yahoo.com/r/hs
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to