A Windows-worm in the debian-security list? Great :D
BM - Original message follows -
BM Microsoft Consumer
BM this is the latest version of security update, the
BM June 2003, Cumulative Patch update which eliminates all
BM known security vulnerabilities affecting Internet Explorer,
BM
A Windows-worm in the debian-security list? Great :D
BM - Original message follows -
BM Microsoft Consumer
BM this is the latest version of security update, the
BM June 2003, Cumulative Patch update which eliminates all
BM known security vulnerabilities affecting Internet Explorer,
BM
did you consider just to blockother mac-addresses through iptables?
but... i don't know, what you are doing there, but are you sure you
want to grant every user ssh access?
i assume you need to be root for this? how are you going to solve it
over ssh? and how do you prevent users from just
DDC using mac addresses for client authentication seems to me as an extremely
DDC risky business as a mac address can easily be copied/cloned/spoofed...
DDC imho, it does not offer any authentication at all...
i under stood it as additional security to certificates or passwords (more like
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Hi,
I'm running a small router and firewall at home.
eth0 - LAN
eth1 - access point - WLAN
eth2 - WAN
On a client im running a donkeyclient, so I had to forward port (it
works without, but then you get a so called low id with result in
worse download
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
I've search for something like this, but did not find anything. How do
I flush it?
RK It would have been the NAT table anyway (my
RK mistake). You flush it with iptables -F -t nat.
RK The reboot done the job, so it must be something
RK else. You
is what what? i cannot see anything, only an unloadable and linked
image...
is this a spam mail?
if not, please do not send such mails but plaintext
AW Erase your email record here.
AW --
AW To UNSUBSCRIBE, email to [EMAIL PROTECTED]
AW with a subject of unsubscribe. Trouble? Contact [EMAIL
AE Sorry, I see now. This case, the proper solution would be fixing
AE the program which emits the incorrect warning, isn't it?
the program is chrootkit, isn't it?
--
Public Key erhältlich auf den PGP-Keyservern, sowie mit weiteren Informationen
auf http:\\www.voits.net.
Fingerprint:
IRvD PS I would really like to see you perlscript, if you could send it to me
personallyI would really apriciate it.
place me on the list, too, please.
IRvD On Thu, 24 Apr 2003 14:17:48 +0200, [EMAIL PROTECTED] wrote:
On Thu, Apr 24, 2003 at 11:43:06AM +0200, I.R. van Dongen wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Hi,
I'm just setting up my first webserver in a productive environment.
Now I wonder how I could use chkrootkit.
My first idea was to run a cronjob, butI have two problems with this
solution:
1) An attacker could just change the chkrootkit binaries.
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
DCE for (1) I guess you can put the binaries in a read-only medium and run
DCE them from there, like a CD-ROM or a write-protected floppy/flash-medium.
Well, the attacker could just stop the cronjob... but great idea
though.
My server is a remote
Hi,
how do you suggest dealing with firewall logs from a computer which is
connected through a dialup connection?
For I receive a new IP every 24h hours, my logs are full of P2P
connection attempts.
How can I log iptables LOG outputs somewherer different from the
standard output? And is there any
12 matches
Mail list logo