Hello,
Recently a friend of mine was kind enough to hit refresh 700 times after
requesting a depth 5 recursive validation from the validator on my web
server. It's load levels went to above 150, hehe. Took me a couple of
minutes to log in, and a couple to su to root, and more than 5 minutes
Andrew Tait wrote:
The entries you are seeing are caused by the army of infected MS IIS server
(Codered, Nimda, etc) try to hack into other IIS servers at random. I see
these on every web server I manage that aren't behind a firewall (ie,
blocking port 80).
Yes, Andrew...the web server
Hi,
I have a potato system which, suspiciously, has some lines missing
from syslog, and possibly from the lastlog too. I know chkrootkit will
check for this kind of thing, but it requires a later version of
libc6.
Is there any way of detecting rootkits on potato?
Many thanks in advance,
Hi Simon,
http://www.chkrootkit.org/ worked fine for me...
Patrick
Simon Young (Tuesday 26 March 2002 17:15):
| Hi,
|
| I have a potato system which, suspiciously, has some lines missing
| from syslog, and possibly from the lastlog too. I know chkrootkit will
| check for this kind of thing,
On Tue, 26 Mar 2002 16:15:05 +
Simon Young [EMAIL PROTECTED] wrote:
Hi,
[...]
Is there any way of detecting rootkits on potato?
See: http://packages.debian.org/chkrootkit
Try apt pin and get chkrootkit from sid.
bye,
--
_
Hello!
It is possible to make virtual web hosting (apache) in chroot jail?
There is a little problem with about 1500 domains/clients.
How can I set it up (with perl/php/ssi/ssl/cgi/ftp/mysql etc.) ?
I think it have to be all in the chrooted directory, so will it be
apache/perl/mysql/libs for
On Tue, 26 Mar 2002 15:49, Michal Novotny wrote:
It is possible to make virtual web hosting (apache) in chroot jail?
Yes. Just install complete copies of Debian in the chroot jails.
There is a little problem with about 1500 domains/clients.
How can I set it up (with
Andrew Tait wrote:
The entries you are seeing are caused by the army of infected MS IIS
server
(Codered, Nimda, etc) try to hack into other IIS servers at random. I
see
these on every web server I manage that aren't behind a firewall (ie,
blocking port 80).
Yes, Andrew...the web
In article [EMAIL PROTECTED]
[EMAIL PROTECTED] writes:
Is there any way of detecting rootkits on potato?
See: http://packages.debian.org/chkrootkit
Try apt pin and get chkrootkit from sid.
I could made potato package easily from sid's source. It requires
build-essential and debhelper to
I'm impressed. Even here in Tokyo, where a cop on ever street corner is not just an
Orwellian slur, the only people who get that kind of service are the ones who directly
pay their salaries.
Seriously, the only person you can rely on is you. You're the one on the scene, be it
a mugging or a
Hello,
Recently a friend of mine was kind enough to hit refresh 700 times after
requesting a depth 5 recursive validation from the validator on my web
server. It's load levels went to above 150, hehe. Took me a couple of
minutes to log in, and a couple to su to root, and more than 5 minutes
Andrew Tait wrote:
The entries you are seeing are caused by the army of infected MS IIS server
(Codered, Nimda, etc) try to hack into other IIS servers at random. I see
these on every web server I manage that aren't behind a firewall (ie,
blocking port 80).
Yes, Andrew...the web server was
Hello!
It is possible to make virtual web hosting (apache) in chroot jail?
There is a little problem with about 1500 domains/clients.
How can I set it up (with perl/php/ssi/ssl/cgi/ftp/mysql etc.) ?
I think it have to be all in the chrooted directory, so will it be
apache/perl/mysql/libs for each
On Tue, 26 Mar 2002 15:49, Michal Novotny wrote:
It is possible to make virtual web hosting (apache) in chroot jail?
Yes. Just install complete copies of Debian in the chroot jails.
There is a little problem with about 1500 domains/clients.
How can I set it up (with
Hi,
I have a potato system which, suspiciously, has some lines missing
from syslog, and possibly from the lastlog too. I know chkrootkit will
check for this kind of thing, but it requires a later version of
libc6.
Is there any way of detecting rootkits on potato?
Many thanks in advance,
Hi Simon,
http://www.chkrootkit.org/ worked fine for me...
Patrick
Simon Young (Tuesday 26 March 2002 17:15):
| Hi,
|
| I have a potato system which, suspiciously, has some lines missing
| from syslog, and possibly from the lastlog too. I know chkrootkit will
| check for this kind of thing, but
On Tue, 26 Mar 2002 16:15:05 +
Simon Young [EMAIL PROTECTED] wrote:
Hi,
[...]
Is there any way of detecting rootkits on potato?
See: http://packages.debian.org/chkrootkit
Try apt pin and get chkrootkit from sid.
bye,
--
_
On Mon, Mar 25, 2002 at 04:54:37PM +0100, Beno?t Sibaud wrote:
I think I found a security problem in PHP3+postgres+apache shipped with
Potato.
Correct me if I'm wrong, but the following code should support any $var.
If you uncomment the client_encoding line, I'm able to execute any
Ich werde ab 26.03.2002 nicht im Büro sein. Ich kehre zurück am 23.12.2024.
Ich werde Ihre Nachricht überhaupt nicht mehr beantworten.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Andrew Tait wrote:
The entries you are seeing are caused by the army of infected MS IIS
server
(Codered, Nimda, etc) try to hack into other IIS servers at random. I
see
these on every web server I manage that aren't behind a firewall (ie,
blocking port 80).
Yes, Andrew...the web
Ich werde ab 26.03.2002 nicht im Büro sein. Ich kehre zurück am 23.12.2024.
Ich werde Ihre Nachricht überhaupt nicht mehr beantworten.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Hi all !
As computer science students, a friend and I have just ended a study on buffer
overflows and the existing protections a Linux system may use against them.
This study deals with the various kinds of overflows (heap, stack) to
understand how they work and how they may be used to execute
also sprach Joe Dollard [EMAIL PROTECTED] [2002.03.25.2114 +0100]:
The version of proftp that is in debian potato (1.2.0pre10 as
reported by running 'proftpd -v ') is vulnerable to a glob DoS
attack, as discovered on the 15th March 2001. You can verify this
bug by
In article [EMAIL PROTECTED]
[EMAIL PROTECTED] writes:
Is there any way of detecting rootkits on potato?
See: http://packages.debian.org/chkrootkit
Try apt pin and get chkrootkit from sid.
I could made potato package easily from sid's source. It requires
build-essential and debhelper to
I'm impressed. Even here in Tokyo, where a cop on ever street corner is not
just an Orwellian slur, the only people who get that kind of service are the
ones who directly pay their salaries.
Seriously, the only person you can rely on is you. You're the one on the scene,
be it a mugging or a
Ciao tutti
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
28 matches
Mail list logo