Hello ,
Is there is any software to bypass http proxy
Win Client --- HTTP Proxy --{Inet} -Some Linux Software
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
Best regards,
Antmailto:[EMAIL PROTECTED]
www.htthost.com
Citeren Ant [EMAIL PROTECTED]:
Hello ,
Is there is any software to bypass http proxy
Win Client --- HTTP Proxy --{Inet} -Some Linux Software
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
Best
hey there
On Monday 03 March 2003 3:30 pm, Ant wrote:
Hello ,
Is there is any software to bypass http proxy
Win Client --- HTTP Proxy --{Inet} -Some Linux Software
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
if the
Is there is any software to bypass http proxy
Some kind of pptp via http $-).
try doing ppp-over-ssh
you launch ppp on the first end, tunel it through ssh and launch another
ppp on the other end.
Afair mini/VPN-HOWTO is about this...
BIGHard
--
() ascii |GIT d--- s: a--- C UL P+ L+++ E---
Try this: http://www.htthost.com/ , but use it on your own risk. It is a
real security hole. Better is to ask system administrator open some
rules on firewall for you.
Regards,
Martynas
Pr, 2003-03-03 17:30, Ant ra:
Hello ,
Is there is any software to bypass http proxy
Win Client ---
On Mon, 03 Mar 2003 at 06:30:05PM +0300, Ant wrote:
Hello ,
Is there is any software to bypass http proxy
I think a combination of squid, sshd, putty and a modification to your
browsers proxy setting (to proxy through 127.0.0.1 on forwardedport) i
what you are looking for.
Port 22 not
Hi,
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said ...RedHat and OpenBSD have already issued
patches.links to an update from SuSE, too.
What about Debian? I
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list (debian-security) have any ties
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on issues
arelady being dealt
On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said ...RedHat and OpenBSD have already issued
patches.links to an
Quoting Bernard Lheureux [EMAIL PROTECTED]:
On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said ...RedHat and OpenBSD
Debian co-ordinates between quite a few hardware types, that takes time. If
at the end of the day you believe Mandrake is better go install Mandrake.
Before you do take a look at how many bugs/patches Mandrake has announced v
Debian over say the last year. I wouldnt be surprised if 1) Debian is on
Jeremy T. Bouse wrote:
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
Hello ,
Is there is any software to bypass http proxy
Win Client --- HTTP Proxy --{Inet} -Some Linux Software
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
Best regards,
Antmailto:[EMAIL PROTECTED]
www.htthost.com
Citeren Ant [EMAIL PROTECTED]:
Hello ,
Is there is any software to bypass http proxy
Win Client --- HTTP Proxy --{Inet} -Some Linux Software
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
Best
hey there
On Monday 03 March 2003 3:30 pm, Ant wrote:
Hello ,
Is there is any software to bypass http proxy
Win Client --- HTTP Proxy --{Inet} -Some Linux Software
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
if the
Is there is any software to bypass http proxy
Some kind of pptp via http $-).
try doing ppp-over-ssh
you launch ppp on the first end, tunel it through ssh and launch another
ppp on the other end.
Afair mini/VPN-HOWTO is about this...
BIGHard
--
() ascii |GIT d--- s: a--- C UL P+ L+++
Try this: http://www.htthost.com/ , but use it on your own risk. It is a
real security hole. Better is to ask system administrator open some
rules on firewall for you.
Regards,
Martynas
Pr, 2003-03-03 17:30, Ant rašė:
Hello ,
Is there is any software to bypass http proxy
Win Client
On Mon, 03 Mar 2003 at 06:30:05PM +0300, Ant wrote:
Hello ,
Is there is any software to bypass http proxy
I think a combination of squid, sshd, putty and a modification to your
browsers proxy setting (to proxy through 127.0.0.1 on forwardedport) i
what you are looking for.
Port 22 not
HI,
I don't see Debian listed in the notification list at the bottom of the
CERT Advisory. Is there any estimate on the release of patched sendmail
packages?
Ramon Kagan
York University, Computing and Network Services
Unix Team - Intermediate System Administrator
(416)736-2100 #20263
[EMAIL
Hi,
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said ...RedHat and OpenBSD have already issued
patches.links to an update from SuSE, too.
What about Debian? I
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list (debian-security) have any ties
Debian systems tend to use Exim by default? my installs certainly do. Mind
you I remove it and install Sendmail usually as its our standard. So Im a
we bit concerned. No updates from security.debian as of 2:00AM NZT. Im not
blaming Debian ppl here of being slow or anything, they do a fine job of
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on issues
arelady being dealt
On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said ...RedHat and OpenBSD have already issued
patches.links to an
Quoting Bernard Lheureux [EMAIL PROTECTED]:
On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said ...RedHat and OpenBSD
Debian co-ordinates between quite a few hardware types, that takes time. If
at the end of the day you believe Mandrake is better go install Mandrake.
Before you do take a look at how many bugs/patches Mandrake has announced v
Debian over say the last year. I wouldnt be surprised if 1) Debian is on
Jeremy T. Bouse wrote:
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on
Vassilii Khachaturov wrote:
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
33 matches
Mail list logo