2014-09-23 21:08 GMT+02:00 Jordi Boixader (Idroj) id...@bergueda.org:
Hola,
Des de fa unes setmanes, que els navegadors Google Chrome i Chromium em
donen l'error Shockwave Flash has crashed.
tinc la Debian 7.6 Wheezy x86_64
M'ho fa a diferents pagines, Facebook, algun video de YouTube (no
Aggiungi mn...@sender.permission-dem.it alla tua rubrica
[Versione
web](http://sender.permission-dem.it/nl/link?c=27b4rd=4cih=28bkj5oap6djikbbpt98bkk76qi=4l1n=4cjp=T301800627s=wvsn=4cj)
Le 25/09/2014 22:24, andre_deb...@numericable.fr a écrit :
La vulnérabilité pourrait constituer une plus grande menace que Heartbleed
Le Fri, Sep 26, 2014 at 07:56:06AM +0200, JUPIN Alain a écrit :
Non ce n'est pas un hoax !
Sur wheezy, la mise à jour a été publiée (bash a été mis à jour lors
de l'update/upgrade)
Par contre, pas de mise à jour pour squeeze (oui je sais elle est obsolète)
Bonne nouvelle:
bash
Le 26/09/2014 08:11, Charles Plessy a écrit :
Le Fri, Sep 26, 2014 at 07:56:06AM +0200, JUPIN Alain a écrit :
Non ce n'est pas un hoax !
Sur wheezy, la mise à jour a été publiée (bash a été mis à jour lors
de l'update/upgrade)
Par contre, pas de mise à jour pour squeeze (oui je sais elle est
Le 26/09/2014 10:03, Daniel Huhardeaux a écrit :
Le 26/09/2014 08:11, Charles Plessy a écrit :
Le Fri, Sep 26, 2014 at 07:56:06AM +0200, JUPIN Alain a écrit :
Non ce n'est pas un hoax !
Sur wheezy, la mise à jour a été publiée (bash a été mis à jour lors
de l'update/upgrade)
Par contre, pas de
Bonjour,
Le 25/09/2014 22:24, andre_deb...@numericable.fr a écrit :
La vulnérabilité pourrait constituer une plus grande menace que Heartbleed
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote:
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
J'ai upgradé bash et relancé, tapé la commande ci-dessus
et j'ai ce message de warning :
bash: warning: x: ignoring function definition attempt
bash: erreur lors de l'import de la
Bonjour, tout le monde.
Ce message d'erreur signifie, à mon sens, que Bash a détecté ta
tentative de création de fonction par une variable d'environnement et
l'a rejetée. Ça prouve que le correctif est appliqué chez toi.
Cordialement.
Le vendredi 26 septembre 2014 à 11:16 +0200,
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit :
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote:
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
J'ai upgradé bash et relancé, tapé la commande ci-dessus
et j'ai ce message de warning :
bash: warning: x: ignoring
Bonjour,
Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit :
Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash
empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ?
Si tous les CGI utilisent « /bin/sh », alors pas de problème. En revanche,
bonjour,
Le 26 sept. 2014 11:25, admini adm...@freeatome.com a écrit :
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit :
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote:
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
J'ai upgradé bash et relancé, tapé la commande
bonjour,
la nouvelle mise à jour bash 4.2+dfsg-0.1+deb7u3 a vue le jour hier soir
vers 23h30
Le 26 sept. 2014 11:25, admini adm...@freeatome.com a écrit :
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit :
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote:
env x='() { :;}; echo
Le 26/09/2014 11:44, Sébastien NOBILI a écrit :
Bonjour,
Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit :
Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash
empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ?
Si tous les CGI utilisent
On Fri, Sep 26, 2014 at 11:10:53AM +0200, Francois Lafont wrote:
Perso, même si c'est vraiment une grosse faille, ça me semble moins
grave que Heartbleed.
Ça se discute, les effets n'étant pas le même...
Par exemple, ici il va falloir mettre à jour les serveurs:
c'est lourd, mais on sait
Le fix du CVE-2014-6272 n'est pas complet. Faut attendre le fix complet...
--
ovd valentin@live.fr
De : Frédéric MASSOTmailto:frede...@juliana-multimedia.com
Envoyé : 26/09/2014 12:17
À :
Le 26/09/2014 12:26, valentin OVD a écrit :
Le fix du CVE-2014-6272 n'est pas complet. Faut attendre le fix complet...
C'est le CVE-2014-6271
Le second est sorti depuis plus de 12h, c'est le CVE-2014-7169
--
ovd valentin@live.fr
On 2014-09-26 11:10:53 +0200, Francois Lafont wrote:
Perso, même si c'est vraiment une grosse faille, ça me semble moins
grave que Heartbleed.
Je suis d'accord.
Je vais peut-être dire des bêtises (auquel cas
je serais ravi d'avoir des explications) mais il me semble que si
l'on prend
On 2014-09-26 11:44:05 +0200, Sébastien NOBILI wrote:
Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit :
Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh vers dash
empêche ce type d'attaque ou limite l'attaque à certain CGI mal écrit ?
Si tous les CGI utilisent
On 2014-09-26 11:33:50 +0200, Yves Rutschle wrote:
On Fri, Sep 26, 2014 at 11:10:53AM +0200, Francois Lafont wrote:
Perso, même si c'est vraiment une grosse faille, ça me semble moins
grave que Heartbleed.
Ça se discute, les effets n'étant pas le même...
Par exemple, ici il va falloir
Le vendredi 26 septembre 2014 à 12:45, Vincent Lefevre a écrit :
Ou ceux qui exécutent un programme menant indirectement à l'exécution
de bash, puisque l'environnement est hérité.
grep /bin/bash /bin/* /usr/bin/*
peut donner une idée de ce qui ne doit pas être exécuté (directement
ou
Le 26 sept. 14 à 11:44, Sébastien NOBILI a écrit :
Bonjour,
Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit :
Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh
vers dash
empêche ce type d'attaque ou limite l'attaque à certain CGI mal
écrit ?
Si tous les CGI
Merci pour vos réponses.
Effectivement je me trompais. Si j'ai bien compris, le problème
n'est pas le fait qu'un attaquant (via le web, je me plaçais dans
cette hypothèse) puisse *créer* une variable d'environnement
particulière qu'un processus local bash utilisera ensuite. Le
problème n'est pas
Le 26/09/2014 15:12, Philippe Gras a écrit :
Le 26 sept. 14 à 11:44, Sébastien NOBILI a écrit :
Bonjour,
Le vendredi 26 septembre 2014 à 11:03, Frédéric MASSOT a écrit :
Sur un serveur web, est-ce que le fait d'avoir le lien /bin/sh
vers dash
empêche ce type d'attaque ou limite l'attaque à
Le vendredi 26 septembre 2014 à 16:38 +0200, daniel huhardeaux a
écrit :
Ah ? Si tu gères des serveurs web je te propose de faire un simple cat
fichier log serveur web|grep () { et de compter le nombre de
tentatives d'accès comme par exemple
89.207.135.125 - - [25/Sep/2014:12:06:47 +0200]
Le 26 sept. 14 à 16:45, David Guyot a écrit :
Le vendredi 26 septembre 2014 à 16:38 +0200, daniel huhardeaux a
écrit :
Ah ? Si tu gères des serveurs web je te propose de faire un simple
cat
fichier log serveur web|grep () { et de compter le nombre de
tentatives d'accès comme par exemple
Philippe Gras wrote on Fri, Sep 26, 2014 at 05:32:58PM +0200
Le 26 sept. 14 à 16:45, David Guyot a écrit :
Le vendredi 26 septembre 2014 à 16:38 +0200, daniel huhardeaux a
écrit :
Ah ? Si tu gères des serveurs web je te propose de faire un
simple cat
fichier log serveur web|grep () { et
Bonjour,
Voici le schema logique de mon installation (pour une résidence hôtelière):
Modem xDSL --- xN --- Routeur Wheezy ---xM--- Points d'accès WiFi
---xP--- PC, Smartphones
J'ai 5 à 7 modems ADSL (soit 50Mb/s de download théorique), 20 à 30
points d'accès WiFi et 100 utilisateurs instantanés.
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit :
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote:
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
J'ai upgradé bash et relancé, tapé la commande ci-dessus
et j'ai ce message de warning :
bash: warning: x: ignoring
Le 26/09/2014 20:34:42, David Pinson a écrit :
C'est parfait car c'est patché !
J’ai mis à jour ce matin et pas redémarré mes sessions.
J’ai la même sortie.
nicolas patrois : pts noir asocial
--
RÉALISME
M : Qu'est-ce qu'il nous faudrait pour qu'on nous considère comme des
humains ? Un
pendant ce temps ca scanne sévère:
() { :;}; /bin/bash -c \echo testing9123123\; /bin/uname -a
je vois ça sur mon site de production.
--
Lisez la FAQ de la liste avant de poser une question :
http://wiki.debian.org/fr/FrenchLists
Pour vous DESABONNER, envoyez un message avec comme objet
Zut !
~# env X=() { :;} ; echo busted /bin/sh -c echo completed
busted
completed
~# env X=() { :;} ; echo busted `which bash` -c echo completed
busted
completed
Par contre dans mes logs, je n'ai que des trucs comme ça :
142.4.195.183 - - [26/Sep/2014:00:59:39 +0200] POST /cgi-bin/php/%63%
Après un upgrage de Wheezy, suite au correctif de bash,
Iceweasel ne se lance plus :
$ iceweasel
Error: Platform version '17.0.10' is not compatible with
minVersion = 17.0.9
maxVersion = 17.0.9
La version 17.0.10 ne semble pas acceptée.
Merci d'un conseil.
André
--
Lisez la FAQ de la liste
On 2014-09-26 16:38:00 +0200, daniel huhardeaux wrote:
Ah ? Si tu gères des serveurs web je te propose de faire un simple
cat fichier log serveur web|grep () { et de compter le nombre de
tentatives d'accès comme par exemple
Et même: grep '() *{'
J'en ai eu 3 le 25 septembre. Et comme j'ai
Le 26/09/2014 20:34, David Pinson a écrit :
Le 26/09/2014 11:16, andre_deb...@numericable.fr a écrit :
On Friday 26 September 2014 07:56:06 JUPIN Alain wrote:
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
J'ai upgradé bash et relancé, tapé la commande ci-dessus
et j'ai ce message de
Hola, es la primera vez que escribo en la lista, aunque la leo desde
hace tiempo.
Estoy configurando un servidor de correo y tengo varias dudas con
Dovecot. He seguido esta guia:
https://www.digitalocean.com/community/tutorials/how-to-set-up-a-postfix-e-mail-server-with-dovecot
Esta es la
El jue, 25-09-2014 a las 16:24 -0400, Ariel Alvarez escribió:
hola lista alguien sabe de algun sitio donde pueda descargar alguna
utilidad para calcular subredes? se que existen muchos sitios donde
aparece esta utilidad online pero me hace falta tener alguna utilidad
para utilizarla en
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
El 25/09/14 22:04, Francisco Del Roio escribió:
Hola,
El 24/09/2014 a las 11:27 a.m., Camaleón escribió:
El Tue, 23 Sep 2014 22:22:47 -0300, Francisco Del Roio escribió:
(...)
No tengo mucha experiencia con la generación de estos sistemas
Hola te recomiendo mirar lihuen.linti.unlp.edu.ar
y ver su repo que ya han estado trabajando con lives customizados.
slds.
El 26 de septiembre de 2014, 7:43, oseargent...@gmail.com
oseargent...@gmail.com escribió:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
El 25/09/14 22:04, Francisco
El Thu, 25 Sep 2014 20:01:02 +0200, Angel Vicente escribió:
El Thu, 25 Sep 2014 14:33:57 + (UTC)
Camaleón noela...@gmail.com escribió:
El Thu, 25 Sep 2014 16:28:34 +0200, Gerardo Diez García escribió:
Sí. Su referencia es: CVE-2014-6271 Hablan de ella por ejemplo en
Hispasec [1] o
El Thu, 25 Sep 2014 16:24:01 -0400, Ariel Alvarez escribió:
hola lista alguien sabe de algun sitio donde pueda descargar alguna
utilidad para calcular subredes? se que existen muchos sitios donde
aparece esta utilidad online pero me hace falta tener alguna utilidad
para utilizarla en entornos
El Fri, 26 Sep 2014 10:39:20 +0200, Josu Lazkano escribió:
Hola, es la primera vez que escribo en la lista, aunque la leo desde
hace tiempo.
Pues bienvenido :-)
Estoy configurando un servidor de correo y tengo varias dudas con
Dovecot. He seguido esta guia:
https://github.com/gurumelo/postfixdovecotmariadbdebian7
apt-get update apt-get install git
git clone https://github.com/gurumelo/postfixdovecotmariadbdebian7.git
cd postfixdovecotmariadbdebian7
bash correo.sh
El 26/09/14 10:39, Josu Lazkano escribió:
Hola, es la primera vez que escribo en la
Buenos dias:
Tengo squid3 y uso para generar los reportes de navegación
el Sarg, el problema es que de momento dejaron de rotar los log del squid, por
ejemplo, en las mañanas el sarg me genera el reporte pero el acces.log
desaparece
y todo el que navega no deja trazas y para que aparezca este
El Fri, 26 Sep 2014 16:08:48 +0100, Lietzan Mota Rosabales escribió:
Buenos dias:
Mejores hubieran sido si el correo hubiera salido sin ese formato html
que ha generado tu cliente de correo :-(
Tengo squid3 y uso para generar los reportes de navegación el Sarg, el
problema es que de momento
El 26/09/14 a las 15:32, Camaleón escribió:
El Thu, 25 Sep 2014 20:01:02 +0200, Angel Vicente escribió:
En Debian hay un parche desde ayer:
https://www.debian.org/security/2014/dsa-3032
Para testing todavía no hay ¿no?
0
A testing y sid no les afecta ese parche.
CVE-2014-6271
hola lista tengo una duda y quisiera saber si es posible hacer lo que
les expongo a continuación:
Como pudiera lograr que en las zonas de mi dns tanto directa como
inverza se auto generen las entradas de las estaciones de trabajo?
es decir no tener que entrarlas manualmente.
gracias de
uso logrotate
El Viernes 26 de septiembre de 2014 11:27, Camaleón noela...@gmail.com
escribió:
El Fri, 26 Sep 2014 16:08:48 +0100, Lietzan Mota Rosabales escribió:
Buenos dias:
Mejores hubieran sido si el correo hubiera salido sin ese formato html
que ha generado tu cliente de correo
Aggiungi mn...@sender.permission-dem.it alla tua rubrica
[Versione
web](http://sender.permission-dem.it/nl/link?c=25nkid=4cih=3gn5v1tu068p6pfupnn9vl8ojhi=4l1n=4cjp=T301800627s=wvsn=4cj)
Srs,
Como atualizo o bash em servidores Debian version 5.0.10 e 6.0.10 ?
Obrigado,
Marcelo
--
To UNSUBSCRIBE, email to debian-user-portuguese-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
5.0.qualquer coisa o Sr. não atualiza !
A versão 5 do Debian já não é mantida a algum tempo
No 6 ou 7 :
apt-get update
apt-get upgrade
A versão corrigida o Bash já está no repositório desde ontém .
Fábio Rabelo
2014-09-26 8:59 GMT-03:00 Marcelo msala...@gmail.com:
Srs,
Como
On Fri, 26 Sep 2014, Marcelo wrote:
Como atualizo o bash em servidores Debian version 5.0.10 e 6.0.10 ?
6.0: Ative o uso do squeeze-lts:
https://wiki.debian.org/LTS/Using
https://wiki.debian.org/LTS/Development
https://wiki.debian.org/LTS
Não sei se a segunda atualização de segurança já está
Le 25/09/2014 23:11, Andrei POPESCU a écrit :
On Jo, 25 sep 14, 21:38:07, James Allsopp wrote:
Hi,
I'm really cynical about the Systemd concept, but if it looks like it's
happening anyway, could we start making a list of recommended tutorials on
using it. It would help if people recommending
First: I hope you are correct. Indeed, it doesn't have solely to do with
init, but this init change to systemd is the straw that brings everything
to the fore.
There is the disregard of the users of debian (who are not just users but
programmers in various free software projects), a betrayal of
Club or not, common law criminal fraud applies.
On Thu, Sep 25, 2014 at 9:01 PM, Ric Moore wayward4...@gmail.com wrote:
On 09/25/2014 02:25 PM, Joel Roth wrote:
I would say that systemd takeover of major Linux distributions
and of Debian in particular would be a perfect subject
for
The mailing list operator has threatened to ban me from the mailing list
because I posted systemd critical opinions which explain precisely what has
occured in debian. This is the debian coup's modus operandi. They see
criticism and then silence it. People keep sending mails to the list but
they
Debian was not created as a doacracy of package maintainers,
that is a falsehood that the coupists keep repeating. Debian
was created as a universal operating system for the users.
Just as the Free Software movement itself was created NOT
for the developers and package maintainers of the software
On Friday 26 September 2014 07:27:42 Gregory Smith wrote:
The mailing list operator has threatened to ban me from the mailing list
Good
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
On Friday 26 September 2014 07:24:14 Gregory Smith wrote:
Club or not, common law criminal fraud applies.
Which jurisdiction?
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
From what I've read, some have set up such a system on a Raspberry Pi
running a version of Debian called Raspbian. An RPi can be had in
the US for $30-40 and a camera which plugs into a dedicated port on the
card for about $50 (though I haven't checked prices for months). The
Raspberry Pi
On 09/25/2014 11:03 PM Scott Ferguson wrote:
On 26/09/14 01:48, Rob Owens wrote:
- Original Message -
From: Scott Fergusonscott.ferguson.debian.u...@gmail.com
I've been using motion for a few years and highly recommend it.
Lightweight[*1], simple, and reliable.
Minimal configuration
On Jo, 25 sep 14, 15:15:36, koanhead wrote:
On 09/25/2014 03:30 AM, martin f krafft wrote:
...
the Universal Operating System should also cater to non-desktops.
And not only to other-than-desktop, but also to ports and architectures
other than i386/amd64.
I don't have a problem with
On Vi, 26 sep 14, 01:58:44, lee wrote:
Again, I consider it to be totally futile to try to convince the makers
of systemd to fix the issues it brings about. They cannot be unaware of
them, so obviously they don't want to fix them. I've seen for myself
that they don't want to fix even
On 26/09/14 08:28:02, ken wrote:
From what I've read, some have set up such a system on a Raspberry
Pi
running a version of Debian called Raspbian. An RPi can be had in
the US for $30-40 and a camera which plugs into a dedicated port on
the
card for about $50 (though I haven't
On Vi, 26 sep 14, 09:05:32, Paul Lewis wrote:
In this case I have a Trendnet IP camera which will write to an NFS
share. I was looking for a server device that would be quieter and
consume less power than a conventional machine that I might be able to
run in a headless configuration. The
On Jo, 25 sep 14, 16:04:11, agronomo wrote:
Do you have the link to TC vote Andrei? Please.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727708
The vote itself starts here:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727708#6236
(yes, that's message 6236, out of 7620)
If you
A lot of fact-free noise, fury and nonsense.
On 26/09/14 16:14, Gregory Smith wrote:
First: I hope you are correct. Indeed, it doesn't have solely to do
with init, but this init change to systemd is
the straw that brings everything to the fore.
English please.
There is the disregard
Am Freitag, 26. September 2014, 01:58:44 schrieb lee:
Or to *help*. Make a logind that does not depend on systemd. Offer it
to
the upstreams that need it.
I'm sure it would be ignored or rejected --- even if I had the knowledge
to make anything like that and was able to keep up
On Thu, 25 Sep 2014 17:39:39 -0400 (EDT), Nate Bargmann wrote:
Good tips all around. Only thing is that I stopped using screen in
favor of tmux a few years ago. The biggest aggravation is the loss of
translation of keys, such as Ctl-left, Ctl-right, etc. (connecting from
another Debian
Hi!
Am Donnerstag, 25. September 2014, 22:53:09 schrieb The Wanderer:
On 09/25/2014 at 06:09 AM, martin f krafft wrote:
But dependency creep is unfortunately nothing new ever since we
declared next year the Year of Linux of the Desktop and forgot
that the Universal Operating System should
Am Freitag, 26. September 2014, 10:43:14 schrieb Andrei POPESCU:
On Vi, 26 sep 14, 01:58:44, lee wrote:
Again, I consider it to be totally futile to try to convince the makers
of systemd to fix the issues it brings about. They cannot be unaware of
them, so obviously they don't want to fix
On 26/09/14 17:44, ken wrote:
On 09/25/2014 11:03 PM Scott Ferguson wrote:
On 26/09/14 01:48, Rob Owens wrote:
- Original Message -
From: Scott Fergusonscott.ferguson.debian.u...@gmail.com
I've been using motion for a few years and highly recommend it.
Lightweight[*1], simple, and
Checkout HFS + Wine.
http://www.rejetto.com/hfs/
signature.asc
Description: OpenPGP digital signature
On 25/09/14 18:16, Martin Steigerwald wrote:
The KDE project has spent *years* of development to reduce dependency creep.
I don't think KDE is the problem here. I don't remember ever having run
into a situation where installing a non-DE package resulted in KDE
components being pulled in. But
Well Lighttpd is pretty easy to use : http://www.lighttpd.net/
2014-09-26 12:47 GMT+02:00 softwatt softw...@gmx.com:
Checkout HFS + Wine.
http://www.rejetto.com/hfs/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 09/25/2014 at 11:16 AM, The Wanderer wrote:
On 09/24/2014 at 04:52 PM, Steve Litt wrote:
Hi everyone,
Bash Code Injection Vulnerability via Specially Crafted
Environment Variables (CVE-2014-6271)
On 09/24/2014 03:53 PM, Ron Leach wrote:
List, good afternoon,
What package would list members suggest for a small webserver that
would enable co-workers to upload files to us?
We exchange files with people we work with through email and
attachments - that normally works well. During a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 09/26/2014 at 02:27 AM, Gregory Smith wrote:
The mailing list operator has threatened to ban me from the
mailing list because I posted systemd critical opinions which
explain precisely what has occured in debian. This is the debian
coup's
hello all,
i have several debian server and they are up 24/7. even i have a server
which is up for 1.5 years. without restart.
now i know when ever i restart this for the maintenance it will run the
fsck to check the disk. which is fine and i have heard that it is very
important to run on boot
On Fri, Sep 26, 2014 at 05:51:50PM +0500, Muhammad Yousuf Khan wrote:
i have several debian server and they are up 24/7. even i have a server
which is up for 1.5 years. without restart.
snip
or i can cron job the task once every moth or two is this a good idea.
You generally can't fsck
Hello, there.
If you run fsck on a mounted filesystem, fsck will not do anything,
except if you ask it to run without correcting anything — in fact, if my
memory serves me well, even a read-only check will likely fail because
of the filesystem changes made by processes as fsck works on it. The
On 26/09/14 08:51 AM, Muhammad Yousuf Khan wrote:
hello all,
i have several debian server and they are up 24/7. even i have a
server which is up for 1.5 years. without restart.
now i know when ever i restart this for the maintenance it will run
the fsck to check the disk. which is fine and
On 2014-09-22 18:05:00 +, Eduardo M KALINOWSKI wrote:
I've used this one (mostly for copying files):
https://play.google.com/store/apps/details?id=berserker.android.apps.sshdroid
The last time I tried SSHDroid, it automatically started a server
with the default root password admin! So,
Thanks for your mail. Please keep on listening to Love Guru, only on Radio City
91.1FM, Monday to Saturday - 9pm to 1am. You can listen to Love Guru, from any
part of the world through, Radio City Tamil web radio. The link is available in
www.planetradiocity.com.
Love the Love...
with loads
Hi Stephen,
I've enjoyed reading your well-written and thoroughly researched posts. Have
you considered putting them somewhere else, e.g. the Debian wiki?
One point:
On Wed, Sep 24, 2014 at 10:11:41PM -0400, Stephen Powell wrote:
One of the things I recommended was setting the terminal type
On 09/26/2014 03:24 PM, Alex Mestiashvili wrote:
It sounds to me like a good use case for retroshare or owncloud.
The last one is available in debian as package and has a good community
as far as i know.
Yes, those do the job. But if only some simple file sharing is needed,
both are
On 26/09/14 22:51, Muhammad Yousuf Khan wrote:
hello all,
i have several debian server and they are up 24/7. even i have a server
which is up for 1.5 years. without restart.
now i know when ever i restart this for the maintenance it will run the
fsck to check the disk. which is fine and
On Monday, September 22, 2014 1:50:02 AM UTC+5:30, Paul van der Vlis wrote:
op 21-09-14 14:33, lee schreef:
Hi,
what's the Debian or Linux equivalent to MS Windows terminal server
sessions through the remote desktop thing they have?
I would like to be able to let a user work remotely in
On 26/09/14 23:55, softwatt wrote:
On 09/26/2014 03:24 PM, Alex Mestiashvili wrote:
It sounds to me like a good use case for retroshare or owncloud.
The last one is available in debian as package and has a good community
as far as i know.
Yes, those do the job. But if only some simple file
On 26/09/2014 16:24, Vincent Lefevre wrote:
On 2014-09-22 18:05:00 +, Eduardo M KALINOWSKI wrote:
I've used this one (mostly for copying files):
https://play.google.com/store/apps/details?id=berserker.android.apps.sshdroid
The last time I tried SSHDroid, it automatically started a server
Mark Kamichoff a écrit :
If the change is in libc, it appears to be between 2.19-4 and 2.19-7.
http://metadata.ftp-master.debian.org/changelogs//main/g/glibc/glibc_2.19-11_changelog
.. doesn't seem to indicate any resolver / DNS changes between those
versions, though. I'll continue to
* Darac Marjal mailingl...@darac.org.uk [140924 07:37]:
On Tue, Sep 23, 2014 at 05:55:22PM -0700, John Magolske wrote:
After a recent `aptitude dist-upgrade` I'm getting syslog messages
flooding the console, pages pages of Asset Found stuff like:
Message from syslogd@mymachine at Sep 23
Joel Roth wrote:
On Thu, Sep 25, 2014 at 05:01:03PM -0400, Ric Moore wrote:
On 09/25/2014 02:25 PM, Joel Roth wrote:
I would say that systemd takeover of major Linux distributions
and of Debian in particular would be a perfect subject
for Groklaw.
How so?? Legally, Debian has the legal
Martin Steigerwald wrote:
Am Donnerstag, 25. September 2014, 01:45:50 schrieb lee:
Martin Steigerwald mar...@lichtvoll.de writes:
Am Montag, 22. September 2014, 23:50:46 schrieb lee:
Martin Steigerwald mar...@lichtvoll.de writes:
Do you really think they will be able to prevent all the other
Martin Read wrote:
On 25/09/14 15:42, Rob Owens wrote:
I agree that let's wait until we have a good init to move to should
have been more seriously considered, but for some reason people were
in a big hurry to make a move.
The vote held was What should the default init system *in jessie*
- Original Message -
From: Scott Ferguson scott.ferguson.debian.u...@gmail.com
On 26/09/14 00:12, Rob Owens wrote:
One thing that may be a factor in my case is that my test webcam is
very slow. I am only getting one picture every 2 or 3 seconds when
motion is detected. I have
On 09/26/2014 09:13 AM, Rajavel wrote:
Thanks for your mail. Please keep on listening to Love Guru, only on Radio
City 91.1FM, Monday to Saturday - 9pm to 1am. You can listen to Love Guru,
from any part of the world through, Radio City Tamil web radio. The link is
available in
After an `aptitude full-upgrade' this morning. I still get the
`VULNERABLE' answer to `x='() { :;}; echo VULNERABLE' bash -c :'
I hope that is the correct string... (extracted while googling on
vulnerability)
I did ssh to my user from the same shell I ran aptitude in to make
sure I had a new
On Friday 26 September 2014 16:53:56 Doug wrote:
On 09/26/2014 09:13 AM, Rajavel wrote:
I wouldn't listen to that garbage if it was the only radio station in the
world!
Must you reply to spam. :-( It makes life harder for the filters.
Lisi
--
To UNSUBSCRIBE, email to
On Friday 26 September 2014 16:56:05 Harry Putnam wrote:
After an `aptitude full-upgrade' this morning. I still get the
`VULNERABLE' answer to `x='() { :;}; echo VULNERABLE' bash -c :'
I hope that is the correct string... (extracted while googling on
vulnerability)
I did ssh to my user
1 - 100 of 190 matches
Mail list logo