-Original Message-
From: Marcelo Drudi Miranda [mailto:[EMAIL PROTECTED]]
Sent: 26. svibanj 2001 4:49
To: [EMAIL PROTECTED]
Subject: Re: proftpd exploit??
Em Thu, 24 May 2001 20:34:56 +0200
Matthias Richter [EMAIL PROTECTED] escreveu:
Andres Herrera wrote on Thu May 24, 2001
Hello Debian Users!
On niedziela, 27 maj 2001, 13:06:33 -0500 Dana J . Laude wrote:
The easy way to do it is instead of using "startx" use
"startx -- -nolisten tcp".
Yes, I know this :) The problem is that I need that option to be set by
default, independently from the method an user chooses
Hello Debian Users!
On niedziela, 27 maj 2001, 17:00:37 + Jim Breton wrote:
Yep... actually this _is_ the correct way to deal with this.
But I want to make the "-nolisten tcp" option always active. If an user
creates his own $HOME/.xserverrc, it overrides the system wide
xserverrc.
Jim Breton [EMAIL PROTECTED] writes:
On Mon, May 28, 2001 at 01:46:07PM +0200, Tomasz Olszewski wrote:
If an user
creates his own $HOME/.xserverrc, it overrides the system wide
xserverrc.
So make /usr/bin/X11/X a wrapper for the real X.
Problem with this is, if you upgrade or
how, can i see the tcp port 4350 that states to be opened useing nmap
what is his proccess and which file is it's owned ? doing ps with many
different parameters doesn't saw me any unusual. maybe guys you can help
me. Also after connecting with netcat to that port, seems closed and
when
i am
killah writes:
how, can i see the tcp port 4350 that states to be opened useing nmap
what is his proccess and which file is it's owned ?
You can use the lsof command to see what processes is bound to a given
port. As I recall, it would be lsof -i TCP:4350 and lsof -i UDP:4350,
but don't
Hello,
On Tue, May 29, 2001 at 03:05:52AM +0300, killah wrote:
how, can i see the tcp port 4350 that states to be opened useing nmap
As root, you can do:
fuser -v -n tcp 4350
and:
lsof -i tcp:4350
The lsof command, if it finds anything, will return a PID as part of it's
startx -- -nolisten tcp
Obviously this would do the trick, but see below as to why it is not
a good option.
only as part of the perennially-discussed task-harden. Doesn't even
effect remote xsessions, as you should be using ssh to tunnel your
sessions anyway.
There is no way of ssh
-Original Message-
From: Marcelo Drudi Miranda [mailto:[EMAIL PROTECTED]
Sent: 26. svibanj 2001 4:49
To: debian-security@lists.debian.org
Subject: Re: proftpd exploit??
Em Thu, 24 May 2001 20:34:56 +0200
Matthias Richter [EMAIL PROTECTED] escreveu:
Andres Herrera wrote on Thu
Hello Debian Users!
On niedziela, 27 maj 2001, 13:06:33 -0500 Dana J . Laude wrote:
The easy way to do it is instead of using startx use
startx -- -nolisten tcp.
Yes, I know this :) The problem is that I need that option to be set by
default, independently from the method an user chooses to
Hello Debian Users!
On niedziela, 27 maj 2001, 17:00:37 + Jim Breton wrote:
Yep... actually this _is_ the correct way to deal with this.
But I want to make the -nolisten tcp option always active. If an user
creates his own $HOME/.xserverrc, it overrides the system wide
xserverrc. Besides,
On Mon, May 28, 2001 at 01:46:07PM +0200, Tomasz Olszewski wrote:
If an user
creates his own $HOME/.xserverrc, it overrides the system wide
xserverrc.
So make /usr/bin/X11/X a wrapper for the real X.
Problem with this is, if you upgrade or re-install the package
containing it, it will get
Jim Breton [EMAIL PROTECTED] writes:
On Mon, May 28, 2001 at 01:46:07PM +0200, Tomasz Olszewski wrote:
If an user
creates his own $HOME/.xserverrc, it overrides the system wide
xserverrc.
So make /usr/bin/X11/X a wrapper for the real X.
Problem with this is, if you upgrade or
how, can i see the tcp port 4350 that states to be opened useing nmap
what is his proccess and which file is it's owned ? doing ps with many
different parameters doesn't saw me any unusual. maybe guys you can help
me. Also after connecting with netcat to that port, seems closed and
when
i am
killah writes:
how, can i see the tcp port 4350 that states to be opened useing nmap
what is his proccess and which file is it's owned ?
You can use the lsof command to see what processes is bound to a given
port. As I recall, it would be lsof -i TCP:4350 and lsof -i UDP:4350,
but don't
Hello,
On Tue, May 29, 2001 at 03:05:52AM +0300, killah wrote:
how, can i see the tcp port 4350 that states to be opened useing nmap
As root, you can do:
fuser -v -n tcp 4350
and:
lsof -i tcp:4350
The lsof command, if it finds anything, will return a PID as part of it's
Hi, I have been playing around with loop back file
systems recently (mostly playing with Linux-care's bootable buisness card mini
CD-ROM linux system...which uses a compressed ext2 file system image) and
realized that the -e (encryption) option provides a perfect mechanism for a
different
On Mon, May 28, 2001 at 11:09:29PM -0400, S. Kraig wrote:
the 'international kernel' and after enabling that form of encryption...
so where do I start in doing this?
http://www.kerneli.org/
18 matches
Mail list logo