Re: Where should I start from ?

2001-11-28 Thread John DOE
--- Wade Richards [EMAIL PROTECTED] wrote: Hello Mr. Bacteria/John Doe: Translation: Homework is hard, and plagiarism is so much easier. Can someone please do my homework for me? Wrong translation. First of all I did not ask anybody to do my work for me I just asked if anyone had

Re: Where should I start from ?

2001-11-28 Thread John DOE
--- Malcolm Ferguson [EMAIL PROTECTED] wrote: John DOE wrote: Have to code the application in C ( I would prefer visual basic since it is sometimes hard to tell a professor that this code does it in C especially if you are in Turkey ) or C++ and of course on GNU Debian Linux. I'm a bit

Re: Where should I start from ?

2001-11-28 Thread John DOE
--- Wade Richards [EMAIL PROTECTED] wrote: Hello Mr. Bacteria/John Doe: Translation: Homework is hard, and plagiarism is so much easier. Can someone please do my homework for me? Wrong translation. First of all I did not ask anybody to do my work for me I just asked if anyone had

Re: Where should I start from ?

2001-11-28 Thread John DOE
--- Malcolm Ferguson [EMAIL PROTECTED] wrote: John DOE wrote: Have to code the application in C ( I would prefer visual basic since it is sometimes hard to tell a professor that this code does it in C especially if you are in Turkey ) or C++ and of course on GNU Debian Linux. I'm a bit

Where should I start from ?

2001-11-27 Thread John DOE
I have to find a library that will make me able to use public-key and symmetric-key crypto functions like RSA or ElGamal algorithm and IDEA or AES ( formerly known as Rijndael ). And also I have to have a MAC function like SHA but prefer any collision resistant keyed hash function if it is

Where should I start from ?

2001-11-27 Thread John DOE
I have to find a library that will make me able to use public-key and symmetric-key crypto functions like RSA or ElGamal algorithm and IDEA or AES ( formerly known as Rijndael ). And also I have to have a MAC function like SHA but prefer any collision resistant keyed hash function if it is

Crypto

2001-08-28 Thread John DOE
Hello everybody, I want to have some information about what kind of cryptological benefits does my linux server offer to me . I searched linuxdoc.org but could not find a howo about linux cryptology. Could you please guide me to a web site or to a documentation site where I can start from the

Re: Unidentified subject!

2001-08-08 Thread John DOE
Have a look at RFC 1034-RFC 1035 that gives more information about dns servers and dns logic. Btw this is a security list, if you have serious questions about bind or any other dns d's you should use another mailing list instead of that one, if you have security problems about bind we will be

Re: Unidentified subject!

2001-08-08 Thread John DOE
Have a look at RFC 1034-RFC 1035 that gives more information about dns servers and dns logic. Btw this is a security list, if you have serious questions about bind or any other dns d's you should use another mailing list instead of that one, if you have security problems about bind we will be

Re: Unidentified subject!

2001-07-25 Thread John DOE
hi, I got a similar problem on a machine running IPCHAINS. after an upredictable time period the machine suddenly forgets the ethernet card and results 100% packet loss even ifconfig shows the interface is there and then crashes. I can see the card starts blinking and packets are coming but

Re: Unidentified subject!

2001-07-25 Thread John DOE
hi, I got a similar problem on a machine running IPCHAINS. after an upredictable time period the machine suddenly forgets the ethernet card and results 100% packet loss even ifconfig shows the interface is there and then crashes. I can see the card starts blinking and packets are coming but

Re: Unidentified subject!

2001-07-25 Thread John DOE
too many dots too many numbers and confusion ;) you are rigth :). --- kath [EMAIL PROTECTED] wrote: I think you mean 2.4.2 not 2.2.4 =) - k On Wednesday 25 July 2001 07:59 am, John DOE wrote: hi, I got a similar problem on a machine running IPCHAINS. after an upredictable time period

Re: signatures and keyservers (was Re: Apache, mod_auth_pam, pam_krb4, and you)

2001-07-11 Thread John DOE
Well I am not a guru on this subject and did not want to put my nose into that ( well this is my MsD project at the moment ) but as far as I know impersonation is not the only thing we try to achieve when we are using such things. We also use one way hash functions to get a value out of our

Re: signatures and keyservers (was Re: Apache, mod_auth_pam, pam_krb4, and you)

2001-07-11 Thread John DOE
Well I am not a guru on this subject and did not want to put my nose into that ( well this is my MsD project at the moment ) but as far as I know impersonation is not the only thing we try to achieve when we are using such things. We also use one way hash functions to get a value out of our

Unidentified subject!

2001-07-06 Thread John DOE
Hello, I am a new debian user and someone still learning linux. I have a small problem. In my company ( which is a microsoft developer ) I insisted on using a firewall created with Ipchains of 3 zones ( dmz - local - internet ) on a Intel Pentium Pro processor machine running Debian 2.2r3

Unidentified subject!

2001-07-06 Thread John DOE
Hello, I am a new debian user and someone still learning linux. I have a small problem. In my company ( which is a microsoft developer ) I insisted on using a firewall created with Ipchains of 3 zones ( dmz - local - internet ) on a Intel Pentium Pro processor machine running Debian 2.2r3 on