The dutch version of the RN 6.1 should be finished:
http://wiki.centos.org/Manuals/ReleaseNotes/CentOS6.1/Dutch
___
CentOS-docs mailing list
CentOS-docs@centos.org
http://lists.centos.org/mailman/listinfo/centos-docs
On Wed, Dec 7, 2011 at 9:14 AM, Joshua Thijssen wrote:
The dutch version of the RN 6.1 should be finished:
http://wiki.centos.org/Manuals/ReleaseNotes/CentOS6.1/Dutch
___
CentOS-docs mailing list
CentOS-docs@centos.org
CentOS Errata and Enhancement Advisory 2011:1792
Upstream details at : https://rhn.redhat.com/errata/RHEA-2011-1792.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
272a5533abed3f43a05c37c61d8dc36a
CentOS Errata and Enhancement Advisory 2011:1792
Upstream details at : https://rhn.redhat.com/errata/RHEA-2011-1792.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
8d7f04d6f5766bf86fbdf0d4d9256cc7
Buenas, les cuento que estoy tratando de configurar un proxy en cascada de
la siguiente forma:
Tengo una squid que autentica por ntlm, mi idea es que segun el grupo en el
que se encuentre el usuario que intenta salir a internet, salga por un
cache diferente.
auth_param ntlm program
yo controlaria el acceso a esos recursos con ACL'S. (Así aunque el recurso
este visible no lo podra acceder y menos modificar).
Carlos R.
El 22 de noviembre de 2011 11:33, Guitart Francesc
francesc.guit...@enise.fr escribió:
Hola,
Soy nuevo en la lista y también en CentOS aunque hace años
Señores estoy tratando de hacer jalar snort en su ultima version
para centos 5.7 X64 , lo he configurado siguiendo un howto del mero
site snort.org para centos 5 , a la hora de ver registros de intento
de sospechas con base no muestra nada , ejecuto el comando desde el
terminal snort -c
On Mon, 5 Dec 2011, Ljubomir Ljubojevic wrote:
Vreme: 12/05/2011 12:00 PM, John R Pierce piše:
On 12/05/11 2:57 AM, Ljubomir Ljubojevic wrote:
Download Hiren's BootCD and use bundled Memory Test if your way is
complicated.
that won't do much to detect soft ECC errors, will it?
They are
On Tue, 6 Dec 2011, Karanbir Singh wrote:
On 12/05/2011 07:00 PM, m.r...@5-cent.us wrote:
I thought CentOS6 didn't come with a non-PAE kernel, more specifically,
the standard 32bit kernel requires PAE even if it doesnt have PAE in its
name.
I hadn't followed that development. *sigh*
I
On 12/07/11 12:55 AM, John Hodrien wrote:
In my limited experience, if you can disable ECC in your BIOS, memtest
is just
as good at spotting errors on ECC as non-ECC. With ECC enabled,
you'll need
seriously messed up ECC before it'll be detected.
except with ECC disabled, the extra 8 ECC
On Mon, 5 Dec 2011, Lamar Owen wrote:
On Monday, December 05, 2011 11:11:45 AM Akemi Yagi wrote:
FYI, the ELRepo project now provides kernel-ml for EL6 [1] that
includes a non-PAE kernel [2] (thanks to Alan Bartlett). However, one
has to create an install disk/image with that kernel to
On Wed, Dec 7, 2011 at 1:08 AM, John Hodrien j.h.hodr...@leeds.ac.uk wrote:
On Mon, 5 Dec 2011, Lamar Owen wrote:
On Monday, December 05, 2011 11:11:45 AM Akemi Yagi wrote:
FYI, the ELRepo project now provides kernel-ml for EL6 [1] that
includes a non-PAE kernel [2] (thanks to Alan Bartlett).
On Wed, Dec 7, 2011 at 1:03 AM, John Hodrien j.h.hodr...@leeds.ac.uk wrote:
On Tue, 6 Dec 2011, Karanbir Singh wrote:
On 12/05/2011 07:00 PM, m.r...@5-cent.us wrote:
I thought CentOS6 didn't come with a non-PAE kernel, more specifically,
the standard 32bit kernel requires PAE even if it
Lamar Owen wrote:
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote:
I happen to have a copy of an older brute-forcer dictionary here (somewhere)
and it's very large and has lots of very secure-seeming passwords in it.
I ran down the copy I have; here's an excerpt of one of the
On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote:
Lamar Owen wrote:
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote:
I happen to have a copy of an older brute-forcer dictionary here
(somewhere) and it's very large and has lots of very secure-seeming
passwords in it.
I ran
Vreme: 12/07/2011 11:12 AM, Johnny Hughes piše:
On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote:
Lamar Owen wrote:
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote:
I happen to have a copy of an older brute-forcer dictionary here
(somewhere) and it's very large and has lots of
On Wed, 2011-11-30 at 13:05 -0500, m.r...@5-cent.us wrote:
There's an article on slashdot about the Duqu team wiping all their
intermediary cc servers on 20 Oct. Interestingly, the report says that
they were all (?) not only linux, but CentOS. There's a suggestion of a
zero-day exploit in
Vreme: 12/07/2011 10:40 AM, Akemi Yagi piše:
On Wed, Dec 7, 2011 at 1:08 AM, John Hodrienj.h.hodr...@leeds.ac.uk wrote:
On Mon, 5 Dec 2011, Lamar Owen wrote:
On Monday, December 05, 2011 11:11:45 AM Akemi Yagi wrote:
FYI, the ELRepo project now provides kernel-ml for EL6 [1] that
includes a
On Tue, 2011-12-06 at 16:58 -0500, Lamar Owen wrote:
On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote:
1.) Keep up to date as much as possible (and a 24 hour window is quite short,
honestly, compared to the timeframes this attack appears to have occupied);
2.) Keep up with your
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote:
Vreme: 12/07/2011 11:12 AM, Johnny Hughes piše:
On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote:
Lamar Owen wrote:
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote:
I happen to have a copy of an older brute-forcer dictionary here
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking IP's (default
is every 30 min) so you are automatically protected from known
attacking IP's. Any downside on this
On Wednesday, December 07, 2011 05:48:24 AM Adam Tauno Williams wrote:
*DISABLE* password authentication on public-facing [and preferably all]
servers. Isn't that securing a server rule#1?
Interestingly enough, there are vulnerability scanning tools out there that
will flag the lack of a
Vreme: 12/07/2011 12:53 PM, Always Learning piše:
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking IP's (default
is every 30 min) so you are automatically protected from
On Wed, 2011-12-07 at 12:59 +0100, Ljubomir Ljubojevic wrote:
Vreme: 12/07/2011 12:53 PM, Always Learning piše:
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
[Changing the port #] is completely and utterly retarded. You have done
*NOTHING* to secure SSH by doing this. You have instead made it only
slightly, and I mean ever so slightly, more secure. A simple port scan of
your
On Wednesday, December 07, 2011 04:59:52 AM Nicolas Thierry-Mieg wrote:
alphanumeric only isn't so secure-seeming is it? Is this for admins who
log in with a cell phone instead of a real keyboard? ;-)
seriously: I thought the consensus was that a secure password should
contain at least one
On 12/07/2011 10:50 AM, Ljubomir Ljubojevic wrote:
http://lists.centos.org/pipermail/centos/2011-August/116804.html
Akemi, there is src.rpm also:
http://repos.fedorapeople.org/repos/lkundrak/kernel-nonpae/epel-6/SRPMS/kernel-2.6.32-71.7.1.el6.nonpae.src.rpm
How complicated and time
On 12/07/2011 09:45 AM, Akemi Yagi wrote:
I believe that is true of CentOS-5 as well.
As in the latest C5 kernels require PAE?
C5 kernels still come in two flavours, standard (kernel) and PAE (kernel-PAE).
right, and the Xen kernel is built with PAE as well.
- KB
On Wed, 2011-12-07 at 07:07 -0500, Lamar Owen wrote:
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
A basic qualification to operate a computer would also be nice. Sad
thing is, there is no such thing.
Microsoft has proposed such... of course, the prerequisites would
On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking IP's (default is
every 30 min) so you are automatically protected from known attacking
IP's. Any
On Wednesday, December 07, 2011 07:37:34 AM Always Learning wrote:
...
The essential aspect of this suggestion is such a web site must be Linux
non-denominational. Centos fans working with Ubuntu fans working with
other flavours too including Red Hat et al. A genuine community
Enterprise
I have run into several pdf documents that request a password
with evince; but not with Adobe.
[rey@reylinux docs]$ rpm -qa |grep evince
evince-0.6.0-13.el5
[rey@reylinux docs]$ evince Mir*
Error: Unsupported version/revision (4/4) of Standard security handler
Error: Incorrect password
Any
On Wed, Dec 07, 2011 at 07:07:33AM -0500, Lamar Owen wrote:
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
[Changing the port #] is completely and utterly retarded. You have
done *NOTHING* to secure SSH by doing this. You have instead made it
only slightly, and I mean
On 7 December 2011 14:03, Reynolds McClatchey r...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to use windows.
http://lmgtfy.com/?q=evince+password
___
CentOS mailing list
CentOS@centos.org
On 12/7/2011 7:07 AM, Lamar Owen wrote:
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
[Changing the port #] is completely and utterly retarded. You have done
*NOTHING* to secure SSH by doing this. You have instead made it only
slightly, and I mean ever so slightly, more
Hello,
While yum is configured to use a proxy, like this :
[base]
name=CentOS-$releasever - Base
mirrorlist=http://mirrorlist.centos.org/?release=$releaseverarch=$basearchrepo=os
#baseurl=http://mirror.centos.org/centos/$releasever/os/$basearch/
gpgcheck=1
On 12/07/2011 08:17 AM, Stephen Harris wrote:
On Wed, Dec 07, 2011 at 07:07:33AM -0500, Lamar Owen wrote:
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
[Changing the port #] is completely and utterly retarded. You have
done *NOTHING* to secure SSH by doing this. You have
Lucian wrote:
On 7 December 2011 14:03, Reynolds McClatchey r...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to use windows.
http://lmgtfy.com/?q=evince+password
Or, least best answer, acroread runs jes' fine on Linux.
mark
On 12/07/2011 09:03 AM, Philippe Naudin wrote:
Hello,
While yum is configured to use a proxy, like this :
[base]
name=CentOS-$releasever - Base
mirrorlist=http://mirrorlist.centos.org/?release=$releaseverarch=$basearchrepo=os
On 12/07/2011 09:09 AM, m.r...@5-cent.us wrote:
Lucian wrote:
On 7 December 2011 14:03, Reynolds McClatchey r...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to use windows.
http://lmgtfy.com/?q=evince+password
Or, least best answer, acroread
Le mer 07 déc 2011 09:12:24 CET, Johnny Hughes a écrit:
On 12/07/2011 09:03 AM, Philippe Naudin wrote:
Hello,
While yum is configured to use a proxy, like this :
[base]
name=CentOS-$releasever - Base
On 7 December 2011 12:46, Lamar Owen lo...@pari.edu wrote:
On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking IP's (default is
every 30 min) so you are
Vreme: 12/07/2011 03:37 PM, Bowie Bailey piše:
On 12/7/2011 7:07 AM, Lamar Owen wrote:
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote:
[Changing the port #] is completely and utterly retarded. You have done
*NOTHING* to secure SSH by doing this. You have instead made it
On Wed, Dec 7, 2011 at 10:12 AM, Ljubomir Ljubojevic off...@plnet.rs wrote:
Better yet. sshd could be upgraded to have dummy daemon on port 22. He
will accept connections, ask for password but will not be able to
resolve any usernames. Now THAT would be something.
Or, it could simply
Vreme: 12/07/2011 01:35 PM, Karanbir Singh piše:
On 12/07/2011 10:50 AM, Ljubomir Ljubojevic wrote:
http://lists.centos.org/pipermail/centos/2011-August/116804.html
Akemi, there is src.rpm also:
Em 07-12-2011 13:38, Philippe Naudin escreveu:
Thanks for your answer : indeed, adding enabled=0 to fastestmirror.conf
solves the problem.
If you want or need to use yum via proxy, you can put these lines in
/etc/yum.conf:
proxy=http://IP_or_NAME:PORT/
proxy_username=username
Hello,
I am instaling Horde on my CentOS 6, and when I do webmail-install I
have a lots of this warnings:
Warning: date(): It is not safe to rely on the system's timezone
settings. You are *required* to use the date.timezone setting or the
date_default_timezone_set() function. In case
Johnny Hughes wrote:
On 12/07/2011 09:09 AM, m.r...@5-cent.us wrote:
Lucian wrote:
On 7 December 2011 14:03, Reynolds McClatchey r...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to use windows.
http://lmgtfy.com/?q=evince+password
Or, least
On Wed, 07 Dec 2011 09:03:49 -0500
Reynolds McClatchey wrote:
I have run into several pdf documents that request a password
with evince; but not with Adobe.
Try xpdf. Some files that won't open with anything else will open with xpdf.
--
MELVILLE THEATRE ~ Real D 3D Digital Cinema ~
Em 07-12-2011 14:31, Weplica escreveu:
Hello,
I am instaling Horde on my CentOS 6, and when I do webmail-install I
have a lots of this warnings:
Warning: date(): It is not safe to rely on the system's timezone
settings. You are *required* to use the date.timezone setting or the
Thanks you, but the warning are on the shell while I am trying install
Horde (I have more problems wiht the install) but do I need to fix
this problems or I can install Horde and later fix the problem in
php.ini if I have it?
Quoting Marcelo Beckmann marcelo.beckm...@webers.com.br:
Em
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
On Dec 7, 2011, at 4:49 AM, Johnny Hughes wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking IP's (default is
every 30 min) so you are automatically protected from known attacking
IP's. Any downside on this
On Tue, 06 Dec 2011 15:45:04 -0600
Johnny Hughes joh...@centos.org wrote:
On 12/06/2011 02:36 PM, Les Mikesell wrote:
On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh
mail-li...@karan.org wrote:
On 12/06/2011 08:09 PM, Les Mikesell wrote:
Any luck on the specific attack path yet? The
Em 07-12-2011 14:55, Weplica escreveu:
Thanks you, but the warning are on the shell while I am trying install
Horde (I have more problems wiht the install) but do I need to fix
this problems or I can install Horde and later fix the problem in
php.ini if I have it?
In my case I saw these
Vreme: 12/07/2011 06:29 PM, Craig White piše:
On Dec 7, 2011, at 4:49 AM, Johnny Hughes wrote:
There is also use of denyhosts and fail2ban. They allow only few
attempts from one IP, and all users can share attacking IP's (default is
every 30 min) so you are automatically protected from known
On 12/08/2011 12:14 AM, Johnny Hughes wrote:
On 12/07/2011 09:09 AM, m.r...@5-cent.us wrote:
Lucian wrote:
On 7 December 2011 14:03, Reynolds McClatcheyr...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to use windows.
Hi,
How can I define static routes to be created at boot time with a specific
metric? I have two NICs that ultimately end up at the same peer, but
literally go through two completely different networks. IOW, each NIC
connects to a different layer 3 device.
Also, note that the machine actually
On 12/07/2011 11:49 AM, 夜神 岩男 wrote:
On 12/08/2011 12:14 AM, Johnny Hughes wrote:
On 12/07/2011 09:09 AM, m.r...@5-cent.us wrote:
Lucian wrote:
On 7 December 2011 14:03, Reynolds McClatcheyr...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to
On 12/7/2011 10:03 AM, Matt Garman wrote:
Hi,
[...]
What I basically need to be able to do is this:
route add -host h1 gw g1 metric 0
route add -host h1 gw g2 metric 10
Notice that everything is the same except the gateway and metric. I could
put this in /etc/rc.local, but was wondering
Anyone? Anyone? Buehler?
Fortunately in one instance I am having the problem on an Oracle/Sun system
that I have under support, and so I logged a call with them. They told me
to ensure I am running JRE 1.5 or better, and of course I had not been.
So I installed JR 1.7 (latest) from their
Vreme: 12/07/2011 07:29 PM, Alan McKay piše:
Anyone? Anyone? Buehler?
Fortunately in one instance I am having the problem on an Oracle/Sun system
that I have under support, and so I logged a call with them. They told me
to ensure I am running JRE 1.5 or better, and of course I had not
Here is another howto on fixing JNLP in Firefox:
http://stuffivelearned.org/doku.php?id=apps:firefox:jnlpfix
--
Ljubomir Ljubojevic
(Love is in the Air)
PL Computers
Serbia, Europe
Google is the Mother, Google is the Father, and traceroute is your
trusty Spiderman...
StarOS, Mikrotik and
On 12/07/11 8:12 AM, Ljubomir Ljubojevic wrote:
Better yet. sshd could be upgraded to have dummy daemon on port 22. He
will accept connections, ask for password but will not be able to
resolve any usernames. Now THAT would be something.
heh. connect port 22 to a honeypot running in a VM that
On 12/07/2011 06:59 PM, John R Pierce wrote:
anyways, this is getting very far afield for a centos specific list, and
should instead be discussed on a security list or forum somewhere.
I've said this in the past as well - we have some super talent on this
list when it comes to admin /
That did the trick - thanks so much!
--
“Don't eat anything you've ever seen advertised on TV”
- Michael Pollan, author of In Defense of Food
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
Um, um, er... I didn't have java on my machine (CentOS 6, 64-bit). I went
to install openjdk; not sure of the correct package name, I did a yum list
\*jdk\*... and among the things I saw was java-1.6.0-openjdk-plugin. I did
a yum install, and it installed openjdk, and a few other packages.
I
On Wednesday, December 07, 2011 12:30:27 PM Rui Miguel Silva Seabra wrote:
The fact that they immediately (first thing, actually) did was to
upgrade OpenSSH does suggest that there is a Zero Day bug around.
While at first blush that would appear to be so, it may be that the openssh was
On Wednesday, December 07, 2011 10:44:10 AM Michael Simpson wrote:
SELinux is great but didn't save Russell Coker from having his play
machine owned with the vmsplice exploit.
http://etbe.coker.com.au/2008/04/03/trust-and-play-machine/
http://www.coker.com.au/selinux/play.html
In this
Hello,
I have install Horde rpm with webmin:
Instalando paquete(s) con el comando yum -y install yun grouinstall horde ...
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: centos.intergenia.de
* epel: ftp-stud.hs-esslingen.de
* extras: centos.intergenia.de
On 12/07/2011 04:46 PM, Weplica wrote:
Hello,
I have install Horde rpm with webmin:
Instalando paquete(s) con el comando yum -y install yun grouinstall horde ...
That would be: yum -y groupinstall horde
___
CentOS mailing list
CentOS@centos.org
Weplica wrote:
Hello,
I have install Horde rpm with webmin:
Instalando paquete(s) con el comando yum -y install yun grouinstall horde
...
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: centos.intergenia.de
* epel: ftp-stud.hs-esslingen.de
*
And I need to uninstal first, before to do yum -y groupinstall horde?
Quoting Tim Evans tkev...@tkevans.com:
On 12/07/2011 04:46 PM, Weplica wrote:
Hello,
I have install Horde rpm with webmin:
Instalando paquete(s) con el comando yum -y install yun grouinstall
horde ...
That would
On 12/07/2011 04:59 PM, Weplica wrote:
And I need to uninstal first, before to do yum -y groupinstall horde?
I can't say. I merely pointed out your command line had a couple of
typographical errors. (yun and grouinstall) and was wrong syntax.
___
m.r...@5-cent.us wrote:
snip
firefox -no-remote
snip
Now, this is aggravating: I went to test it, and all our servers just got
the current update last Friday, to either 5.7 or 6.x, and on *both* 5.7
and 6, when I try to run firefox (with i Weplica wrote:
Hello,
I have install Horde rpm with
Tim Evans wrote:
On 12/07/2011 04:59 PM, Weplica wrote:
And I need to uninstal first, before to do yum -y groupinstall horde?
I can't say. I merely pointed out your command line had a couple of
typographical errors. (yun and grouinstall) and was wrong syntax.
I shouldn't think so - it'll
On 12/07/11 1:58 PM, m.r...@5-cent.us wrote:
ssh -X yourserver
firefox -no-remote
*Then* http://127.0.0.1/horde, orhttp://localhost/horde, whatever.
if that doesn't work, `yum install xauth`, then log out and log in again
with ssh -X ...
--
john r pierceN 37,
On Wed, Dec 07, 2011, John R Pierce wrote:
On 12/07/11 1:58 PM, m.r...@5-cent.us wrote:
ssh -X yourserver
firefox -no-remote
*Then* http://127.0.0.1/horde, orhttp://localhost/horde, whatever.
if that doesn't work, `yum install xauth`, then log out and log in again
with ssh -X ...
This may
On 12/7/11 1:46 PM, Weplica i...@weplica.com wrote:
[...]
And I do that:
If Apache is running, you must now configure this installation of
Horde by visiting:
http://127.0.0.1/horde/
and then navigating to Administration Setup Horde
Documentation on configuring Horde can be found at:
On Dec 7, 2011, at 2:46 PM, Weplica wrote:
Hello,
I have install Horde rpm with webmin:
Instalando paquete(s) con el comando yum -y install yun grouinstall horde ...
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: centos.intergenia.de
* epel:
Hi all,
Who takes care of cronjob in /etc/cron.d ?
Should we tell crond to run it?
/etc/crontab only mentions hourly, daily, weekly, monthly
--
Thanks
Fajar
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
81 matches
Mail list logo