Hello to all :)
I've got a little question or may I say problem, for you; if you can
help me. Today I had started creating a mirror using apt-mirror of a
http://ftp.uevora.pt for the apt-get process, because my ISP give
unlimited traffic in the portuguese network, but outside portugal I had
only
From where can I get latest etch ISO image with latest security updates?
--
L.V.Gandhi
http://lvgandhi.tripod.com/
linux user No.205042
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Hi.
L.V.Gandhi, 18.07.2007 15:54:
From where can I get latest etch ISO image with latest security updates?
From the official website[0]
Regards, Mathias
[0] http://www.us.debian.org/CD/http-ftp/#stable
--
debian/rules
signature.asc
Description: OpenPGP digital signature
On Wed July 18 2007 06:54, L.V.Gandhi wrote:
From where can I get latest etch ISO image with latest security updates?
I haven't seen any updates to the etch iso's yet. They are updated
periodically, maybe once or twice a year. It's only been three months since
etch was released so I think
On 7/18/07, Mathias Brodala [EMAIL PROTECTED] wrote:
Hi.
L.V.Gandhi, 18.07.2007 15:54:
From where can I get latest etch ISO image with latest security updates?
From the official website[0]
Regards, Mathias
Thanks. But are these isos with latest security updates.
--
L.V.Gandhi
http
Hi.
L.V.Gandhi, 18.07.2007 16:51:
On 7/18/07, Mathias Brodala [EMAIL PROTECTED] wrote:
L.V.Gandhi, 18.07.2007 15:54:
From where can I get latest etch ISO image with latest security
updates?
From the official website[0]
Regards, Mathias
Thanks. But are these isos with latest security
Le Wednesday 18 July 2007 16:34:37 Alan Ianson, vous avez écrit :
On Wed July 18 2007 06:54, L.V.Gandhi wrote:
From where can I get latest etch ISO image with latest security updates?
I haven't seen any updates to the etch iso's yet. They are updated
periodically, maybe once or twice a year
Is this targeted at systems running testing/unstable? I ask because
on stable, running cron-apt is effectively what you are describing.
Thanks for the pointer. It looks like the difference is that dsc.py
is able to send a summary of the advisory in the notification, while
cron-apt has much
(Sorry if you see this twice, but I never saw the first copy come
through)
Hello,
I'm announcing a program I've written for notifying the administrator
about necessary security updates on a Debian box. It's called Debian
Security Check (dsc.py).
Often it's not obvious that a security advisory
On Sun July 1 2007 11:22:40 pm Adam Hupp wrote:
(Sorry if you see this twice, but I never saw the first copy come
through)
Hello,
I'm announcing a program I've written for notifying the administrator
about necessary security updates on a Debian box. It's called Debian
Security Check
On Mon, Jul 02, 2007 at 01:22:40AM -0500, Adam Hupp wrote:
dsc.py compares the set of currently upgradable packages with the
security advisories RSS feed. Any matches are written to stdout along
with a description of the issue. When run via cron this will send the
warning to the
Hello
Im trying to create a preseed file to network install some machines
using a FTP local mirror of debian debian-security(mirrored on
192.168.2.1 and available via FTP only).
How do i choose the protocol for updates as being ftp?
I've tried
apt-setup/uri_type select ftp
On Mon, Apr 23, 2007 at 11:10:55AM -0400, Jan Sneep [EMAIL PROTECTED] was
heard to say:
I'm a total newbie ... downloaded and successfully installed my very first
Debian OS a month of so ago and thought I should try and make sure I have
all the latest updates ... my preference is for using a
On Mon, Apr 23, 2007 at 11:45:51AM -0400, Douglas Allan Tutty [EMAIL
PROTECTED] was heard to say:
Yes, aptitude is the tool to use. However, if you read all the recent
threads on aptitude you'll see that the _first_ time you use it, you
need to get your options set (e.g. not including
the
current security updates are in place? As I have never seen an asterisk in
three months, of any color on the tool bar, I'm assuming that something
hasn't been working properly?
I have ALWAYS done the standard stable install, NEVER complied or added even
so much as one simple package and that's my
Found it !!!
Desktop - Administation - Update Manager
and yes the check shows that all is good ... :O)
-Original Message-
From: Jan Sneep [mailto:[EMAIL PROTECTED]
Sent: April 24, 2007 8:15 AM
To: debian-user@lists.debian.org
Subject: RE: Newbie Aptitude Question about Security Updates
Estaba viendo que hay algunos paquetes en el security updates de etch,
pero que no se instalan en mi sistema, como es el caso de dovecot.
Ahora, cual es realmente el paquete mas actualizado: rc15 o beta2?
# apt-cache policy dovecot-imapd
dovecot-imapd:
Instalados: 1.0.rc15-2
Candidato: 1.0
On Mon, Apr 23, 2007 at 08:41:16AM -0300, Martin Marques wrote:
Estaba viendo que hay algunos paquetes en el security updates de etch,
pero que no se instalan en mi sistema, como es el caso de dovecot.
Ahora, cual es realmente el paquete mas actualizado: rc15 o beta2?
$ dpkg --compare
Luis Rodrigo Gallardo Cruz escribió:
On Mon, Apr 23, 2007 at 08:41:16AM -0300, Martin Marques wrote:
Estaba viendo que hay algunos paquetes en el security updates de etch,
pero que no se instalan en mi sistema, como es el caso de dovecot.
Ahora, cual es realmente el paquete mas actualizado
On Mon, 23 Apr 2007, Martin Marques wrote:
Entonces porque en los updates de seguridad hay una version de dovecot mas
antigua (anterior) que en el stable de etch?
Porque aparentemente los ftpmasters no se han preocupado de borrarla
de ahí, cosa que en mi opinión deberían haber hecho al mismo
On Mon, Apr 23, 2007 at 11:39:38AM -0300, Martin Marques wrote:
Luis Rodrigo Gallardo Cruz escribió:
Es decir, según dpkg rc15 es más nuevo que beta2.
Entonces porque en los updates de seguridad hay una version de dovecot
mas antigua (anterior) que en el stable de etch?
Ah, eso sí quien
to make sure I had the latest list of available updates ... made
sure the cursor was on Security Updates then hit g to install the
updates ... it showed me a list of updates and I hit g again to install
the updates ... after it download many many many things and asked me many
questions and gave some
On Mon, Apr 23, 2007 at 11:10:55AM -0400, Jan Sneep wrote:
Wanted to make sure I had all the latest Security installed
applications updates. Based on some recent threads on this list it looked
like Aptitude was the tool to use.
I'm a total newbie ... downloaded and successfully installed
@lists.debian.org
Subject: Re: Newbie Aptitude Question about Security Updates
On Mon, Apr 23, 2007 at 11:10:55AM -0400, Jan Sneep wrote:
Wanted to make sure I had all the latest Security installed
applications updates. Based on some recent threads on this list it looked
like Aptitude was the tool to use
On Mon, Apr 23, 2007 at 12:22:57PM -0400, Jan Sneep wrote:
I could log in, but every command I could think of to try failed ... the
only command that worked was help and it didn't really provide any helpful
advice ... so I've started to re-install the OS, this will be the 7th or 8th
time I've
[mailto:[EMAIL PROTECTED]
Sent: April 23, 2007 11:46 AM
To: debian-user@lists.debian.org
Subject: Re: Newbie Aptitude Question about Security Updates
On Mon, Apr 23, 2007 at 11:10:55AM -0400, Jan Sneep wrote:
Wanted to make sure I had all the latest Security installed
applications�updates
@lists.debian.org
Subject: Re: Newbie Aptitude Question about Security Updates
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jan Sneep wrote:
I could log in, but every command I could think of to try failed ... the
only command that worked was help and it didn't really provide any helpful
advice
Jan Sneep wrote:
It is just SOOO frustrating ... like now I can't get the OS to re-install ... have to use FDISK to delete the partitions, but it seems to remember the old info ... so have to first format the hard drive with a DOS partition and then try to re-install ... and it takes hours to
)
-Original Message-
From: Sam Leon [mailto:[EMAIL PROTECTED]
Sent: April 23, 2007 1:51 PM
To: debian-user@lists.debian.org
Cc: debian-user@lists.debian.org
Subject: Re: Newbie Aptitude Question about Security Updates
Jan Sneep wrote:
It is just SOOO frustrating ... like now I can't get the OS
checking for security updates.
Try this:
Install but don't select _any_ tasks, not even standard.
If that doesn't give you aptitude then do apt-get install
aptitude aptitude-doc.
Read the aptitude manual and learn aptitude. Get aptitude set up to do
what you want/need
Thanks Doug,
But with all due respect ... it should be easier ... a lot easier! ...
simple basic stuff, like getting the latest Security Updates, IMHO should be
a no-brainer for the average user and not require a System Administrator to
do ... :O(
I started out using PCs before Windows was even
On Apr 23, 5:00 pm, Jan Sneep [EMAIL PROTECTED] wrote:
Thanks Doug,
But with all due respect ... it should be easier ... a lot easier! ...
simple basic stuff, like getting the latest Security Updates, IMHO should be
a no-brainer for the average user and not require a System Administrator
Hi
Is there any way to bypass the security repo retrival during install
as i did not have an internet connection when i installed Etch and apt
sat forever waiting going through the differnet security update urls ?
Mark
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
On 4/10/07, Mark Panen [EMAIL PROTECTED] wrote:
Hi
Is there any way to bypass the security repo retrival during install
as i did not have an internet connection when i installed Etch and apt
sat forever waiting going through the differnet security update urls ?
When installing on such a
Failed to fetch ftp://ftp.us.debian.org/debian/dists/stable/Release.gpg Data
socket timed out [IP: 128.101.240.212 21]
Reading package lists... Done
W: Conflicting distribution: http://security.debian.org stable/updates Release
(expected stable but got etch)
W: You may want to run apt-get
On Mon, 2007-04-09 at 08:49 -0400, Tom Allison wrote:
Failed to fetch ftp://ftp.us.debian.org/debian/dists/stable/Release.gpg Data
socket timed out [IP: 128.101.240.212 21]
Reading package lists... Done
W: Conflicting distribution: http://security.debian.org stable/updates
Release
On Tue, Feb 13, 2007 at 12:55:11PM -0800, onlineviewer wrote:
Hello All,
Is there a way to download and save all of the sarge security updates.
I need to burn them to cd. I have a few machines which have no
internet access, so i can not grab them with apt. Suggestions?
Sorry I can't be more
Hello All,
Is there a way to download and save all of the sarge security updates.
I need to burn them to cd. I have a few machines which have no
internet access, so i can not grab them with apt. Suggestions?
Thank you,
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
On 13 Feb 2007 12:55:11 -0800, onlineviewer [EMAIL PROTECTED] wrote:
Hello All,
Is there a way to download and save all of the sarge security updates.
I need to burn them to cd. I have a few machines which have no
internet access, so i can not grab them with apt. Suggestions?
apt-zip can
are getting out-of-date and security
updates are no longer available.
Updates were finished around June from the official announcment:
http://www.debian.org/News/2006/20060601
Fedora solves this problem with the unoffical Fedora Legacy project;
when official support ends, I change my update
Hello,
I have several Debian Woody systems that, for various reasons, are
inconvenient to update. I somehow misread Debian's support policy,
and though I had another year before support ended, but now I'm
finding that these systems are getting out-of-date and security
updates are no longer
On Tue, Oct 24, 2006 at 12:30:06PM +0100, Ken Walker wrote:
I'm getting a little confused about security updates
I'm using Debian stable and daily do the apt-get update/upgrade.
But when a package has a security update, do i have to start/stop specific
applications.
The pre/post scripts
I'm getting a little confused about security updates
I'm using Debian stable and daily do the apt-get update/upgrade.
But when a package has a security update, do i have to start/stop specific
applications.
Like today, Python was updated due to a security fix.
Is there any application i have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/24/06 06:30, Ken Walker wrote:
I'm getting a little confused about security updates
I'm using Debian stable and daily do the apt-get update/upgrade.
But when a package has a security update, do i have to start/stop specific
applications
On Tue, 24 Oct 2006 12:30:06 +0100
Ken Walker [EMAIL PROTECTED] wrote:
I'm getting a little confused about security updates
I'm using Debian stable and daily do the apt-get update/upgrade.
But when a package has a security update, do i have to start/stop
specific applications.
Like
Hi,
How can I pin security updates?
For the following sources.list:
deb http://security.debian.org/ sarge/updates main contrib non-free
I gave the following in /etc/apt/preferences, which doesn't seem to work.
// debian sarge security updates:
Package: *
Pin: release a=sarge/updates
Pin
://lists.alioth.debian.org/pipermail/secure-testing-announce/2006-May/29.html
security updates debian testing/etch, Sicherheitsupdates für Debian
Testing/Etch:
We also invite you to add the following lines to your apt sources.list file,
and run apt-get update apt-get upgrade to make the security updates
On 6/10/06, Dimitar Vukman [EMAIL PROTECTED] wrote:
On Sat, 10 Jun 2006 15:34:33 +0200
Philippe De Ryck [EMAIL PROTECTED] wrote:
Maybe you can put together a little script to check for updates and
notify you when there are updates pending. I don't know if something
like this already exists?
Hello!
I use a stable ditribution on my servers, and periodically I make
apt-get update and apt-get upgrade using security.debian.org in
sources.list
I think (as I know) that this operation updates the critical packages
installed in my systems.
If I add a line in sources.list like
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Michele Della Marina wrote:
Hello!
I use a stable ditribution on my servers, and periodically I make
apt-get update and apt-get upgrade using security.debian.org in
sources.list
I think (as I know) that this operation updates the critical
Hello,
currently, whereas everything was fine,
I have some trouble with secure-testing.debian.net :
deselect/update `Could not connect ... (connection timed out)'
May be you have a similar issue:
in this case I guess it is better to just report in a few days
the operation.
hth,
Jerome
Ron
I've added both repositories in sources.list, then apt-get update
apt-get upgrade. All work fine, my doubt is how packages are
updated... are there problems or likely dependencies conflicts using
both repositories? Maybe is more desirable using only security
updates? I've installed apache,mysql
?
I've added both repositories in sources.list, then apt-get update
apt-get upgrade. All work fine, my doubt is how packages are
updated... are there problems or likely dependencies conflicts using
both repositories? Maybe is more desirable using only security
updates? I've installed apache,mysql
only security
updates? I've installed apache,mysql,postfix and hylafax on some
servers, I'm afraid of upgrading because are little but production
servers.
Then, apt-get upgrade or apt-get dist-upgrade... what differences?
security.debian.org *supplements* ftp.debian.org. BOTH are needed
to keep
Very good!
I will schedule upgrades with crontab plan.
i think this is not very good idea. from time to time,
apt/aptitude/dselect/whatever you will use needs human intervention
during update/upgrade. an error can occur, or other problems. imho, you
should perform the update/upgrade
On Sat, 10 Jun 2006 12:35:01 +0100
Jerome BENOIT [EMAIL PROTECTED] wrote:
Hello,
currently, whereas everything was fine,
I have some trouble with secure-testing.debian.net :
deselect/update `Could not connect ... (connection timed out)'
May be you have a similar issue:
in this case I
, or other
problems. imho, you should perform the update/upgrade personally.
With stable security updates, I'm not so worried. Still, Lubos has
a point. This is what should be in crontab:
#apt-get update apt-get -y -d upgrade
This only *downloads* the necessary files. Then, you manually
upgrade
On Sat, 2006-06-10 at 15:18 +0200, Lubos Vrbka wrote:
Very good!
I will schedule upgrades with crontab plan.
i think this is not very good idea. from time to time,
apt/aptitude/dselect/whatever you will use needs human intervention
during update/upgrade. an error can occur, or other
On Sat, 10 Jun 2006 15:34:33 +0200
Philippe De Ryck [EMAIL PROTECTED] wrote:
Maybe you can put together a little script to check for updates and
notify you when there are updates pending. I don't know if something
like this already exists?
I believe cron-apt does this:
On Mon, 8 May 2006, Piotr A. Dybczy?ski wrote:
It seems something is going wrong with DNS.
security.debian.org points to 0.0.0.0 !!
Saw this yesterday, appears to be working properly today.
Mike
Mike Dresser wrote:
On Mon, 8 May 2006, Piotr A. Dybczyñski wrote:
It seems something is going wrong with DNS.
security.debian.org points to 0.0.0.0 !!
Saw this yesterday, appears to be working properly today.
Nah, I tried to update an installation of Woody today; two packages
should
It seems something is going wrong with DNS.
security.debian.org points to 0.0.0.0 !!
Regards
Piotr
--
/
Dr Piotr A. Dybczynski, Astronomical Observatory, A.Mickiewicz University
Sloneczna 36,60-286
On Mon, 2006-05-08 at 16:20 +0200, Piotr A. Dybczyński wrote:
It seems something is going wrong with DNS.
security.debian.org points to 0.0.0.0 !!
$ nslookup security.debian.org
Server: 131.212.174.193
Address:131.212.174.193#53
Name: security.debian.org
Address:
Piotr A. Dybczyński wrote:
It seems something is going wrong with DNS.
security.debian.org points to 0.0.0.0 !!
Regards
Piotr
I don't know if it points to 0.0.0.0, but it sure's taking a while to
connect to this server. For the last few days, it is taking from
anywhere between 5 to 60
Andreas Pakulat wrote:
On 12.01.06 21:27:23, Martin Loewer wrote:
Andreas Pakulat wrote:
...
Aehm, was machst du bei Firewalls die nur HTTP durchlassen und kein SSH?
Davon abgesehen: Was hast du fuer Firewalls die kein HTTP zulassen? Im
schlimmsten Fall laesst du den apt-proxy auf Port 80
- Amavis + Virenscanner (gehen auch mehrere Virenscanner?)
Jup. Über Amavisd-new kann man mehrere Einbinden z.B. Clamav,
und weitere z. B. (Nach Registrierung für priv. kostenlosen von HBEDV).
Stichwort: volatile (clamav)
btw: Security-Updates des volatile-archives:
clamav clamav-base clamav
Hallo,
ich habe noch eine woody machine mit einem apt-proxy am laufen,
von dieser update ich meine sarge machinen.
Aber manchmal passiert es, dass die machinen updates nicht stattfinden.
Z.B:
Obwohl ich kernel-image-2.4.27-1-686-smp installiert habe und laut
On 12.01.06 15:15:00, Martin Loewer wrote:
ich habe noch eine woody machine mit einem apt-proxy am laufen,
von dieser update ich meine sarge machinen.
Noe hast du nicht, jedenfalls wenn das alles so stimmt was du so
erzaehlst :-)
Aber manchmal passiert es, dass die machinen updates nicht
Andreas Pakulat wrote:
On 12.01.06 15:15:00, Martin Loewer wrote:
ich habe noch eine woody machine mit einem apt-proxy am laufen,
von dieser update ich meine sarge machinen.
Noe hast du nicht, jedenfalls wenn das alles so stimmt was du so
erzaehlst :-)
OK, ich habe ein paar Details
On 12.01.06 21:27:23, Martin Loewer wrote:
Andreas Pakulat wrote:
On 12.01.06 15:15:00, Martin Loewer wrote:
ich habe noch eine woody machine mit einem apt-proxy am laufen,
von dieser update ich meine sarge machinen.
Noe hast du nicht, jedenfalls wenn das alles so stimmt was du so
erzaehlst
Server wurde gehackt.
Ich soll nun herausfinden, wann auf diesem Server die letzten
Security-Updates
eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
In der sources.list ist sowohl woody als auch sarge mit security.debian.org
Hallo
Ein Server wurde gehackt.
Ich soll nun herausfinden, wann auf diesem Server die letzten Security-Updates
eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
In der sources.list ist sowohl woody als auch sarge mit security.debian.org
* Sven Eichler wrote:
Ich soll nun herausfinden, wann auf diesem Server die letzten
Security-Updates eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
Kram die Mails raus die von apt-listchanges verschickt wurden.
Norbert
--
Haeufig
Hello Sven!
Ein Server wurde gehackt.
Ich soll nun herausfinden, wann auf diesem Server die letzten
Security-Updates
eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
In der sources.list ist sowohl woody als auch sarge mit
* Michael Ott wrote:
Hello Sven!
Ein Server wurde gehackt. Ich soll nun herausfinden, wann auf
diesem Server die letzten Security-Updates eingespielt wurden und
welche Packete das waren. Gibt es eine Möglichkeit an diese
Informationen zu kommen?
In der sources.list ist sowohl woody
Ich soll nun herausfinden, wann auf diesem Server die letzten
Security-Updates eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
Kram die Mails raus die von apt-listchanges verschickt wurden.
apt-listchanges ist nicht installiert
In der sources.list ist sowohl woody als auch sarge mit
security.debian.org vermerkt.
ls -lt /var/cache/apt/archives | less
Da sieht man die Daten der zu letzt heruntergeladenen Packages
Nicht aussagekraeftig, 'apt-get clean' raeumt da wieder auf.
Der Hacker war zwar nicht der
Am Freitag, 23. Dezember 2005 13:23 schrieb Norbert Tretkowski:
ls -lt /var/cache/apt/archives | less
Da sieht man die Daten der zu letzt heruntergeladenen Packages
Nicht aussagekraeftig, 'apt-get clean' raeumt da wieder auf.
Stimmt, aber wenn es aufräumt, dann räumt es richtig auf. Das
* Sven Eichler wrote:
ls -lt /var/cache/apt/archives | less
Da sieht man die Daten der zu letzt heruntergeladenen Packages
Nicht aussagekraeftig, 'apt-get clean' raeumt da wieder auf.
Der Hacker war zwar nicht der schlaueste und hat noch reichlich Spuren
hinterlassen, aber den Befehl
* Sven Eichler wrote:
Ich soll nun herausfinden, wann auf diesem Server die letzten
Security-Updates eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
Kram die Mails raus die von apt-listchanges verschickt wurden.
apt
Sven Eichler:
Ein Server wurde gehackt.
Ich soll nun herausfinden, wann auf diesem Server die letzten
Security-Updates
eingespielt wurden und welche Packete das waren.
Gibt es eine Möglichkeit an diese Informationen zu kommen?
Abgesehen davon, dass alle Informationen auf diesem Rechner
Der Hacker war zwar nicht der schlaueste und hat noch reichlich Spuren
hinterlassen, aber den Befehl kannte er wohl dann doch noch /-:
Woher weisst du, wer 'apt-get clean' hat laufen lassen?
Weil man anhand der Shell-History nachvollziehen kann, was auf dem Server
gemacht wurde. Und das
* Sven Eichler wrote:
Der Hacker war zwar nicht der schlaueste und hat noch reichlich
Spuren hinterlassen, aber den Befehl kannte er wohl dann doch
noch /-:
Woher weisst du, wer 'apt-get clean' hat laufen lassen?
Weil man anhand der Shell-History nachvollziehen kann, was auf dem
Einen Anhaltspunt koennte 'ls -lt /usr/share/doc' liefern. Die Files
da drin werden an sich nur bei Paketupdates angepackt.
Das wäre dann der 1. März 2005 gewesen.
An dem Tag gab es ziehmlich viele Änderungen (unter anderem Apache und PHP
betreffend).
Dann kommt 14. Juni 2004 und danach der
* Sven Eichler wrote:
Einen Anhaltspunt koennte 'ls -lt /usr/share/doc' liefern. Die
Files da drin werden an sich nur bei Paketupdates angepackt.
Das wäre dann der 1. März 2005 gewesen. An dem Tag gab es ziehmlich
viele Änderungen (unter anderem Apache und PHP betreffend). Dann
kommt 14.
Der Hacker war zwar nicht der schlaueste und hat noch reichlich
Spuren hinterlassen, aber den Befehl kannte er wohl dann doch
noch /-:
Woher weisst du, wer 'apt-get clean' hat laufen lassen?
Weil man anhand der Shell-History nachvollziehen kann, was auf dem
Server gemacht wurde.
Sven Eichler [EMAIL PROTECTED] wrote:
Einen Anhaltspunt koennte 'ls -lt /usr/share/doc' liefern. Die Files
da drin werden an sich nur bei Paketupdates angepackt.
Das wäre dann der 1. März 2005 gewesen.
An dem Tag gab es ziehmlich viele Änderungen (unter anderem Apache und PHP
betreffend).
Am Freitag, 23. Dezember 2005 13:23 schrieb Norbert Tretkowski:
ls -lt /var/cache/apt/archives | less
Nicht aussagekraeftig, 'apt-get clean' raeumt da wieder auf.
Hab ich vergessen vorhin zu erwähnen: /var/cache/apt/pkgcache.bin
scheint die Datei zu sein, in die Paketlisten beim
gespeichert werden. Zumindest hat sich der Timestamp beim Update eben
geändert. Das alter dieser Datei scheint, zumindest bei dselect, den
Zeitpunkt der letzten Paketlistenaktualisierung anzuzeigen, und nach
diesem Zeitpunkt können dann keine Updates mehr eingespielt worden
sein.
Bringt in
Das wäre dann der 1. März 2005 gewesen.
An dem Tag gab es ziehmlich viele Änderungen (unter anderem Apache und
PHP betreffend).
Dann kommt 14. Juni 2004 und danach der 16. juni 2003.
Oh.
Ja, so in etwa hat mein Auftraggeber dazu auch reagiert (-:
Du solltest dir das Archiv der Liste
Hi,
Has anybody heard of Sarge cd's *with* the security updates being sold
by someone?
Thanks!
H
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Thu, Nov 10, 2005 at 04:51:40PM -0600, Hugo Vanwoerkom wrote:
Has anybody heard of Sarge cd's *with* the security updates being sold
by someone?
I'm not sure, but it won't be long until there is a sarge 3.1 r1
avaialble. Woody went up to r7 or so. I'm looking forward to
that myself
During aptitude update; what's this mean and what do I do about it?
W: GPG error: http://secure-testing.debian.net \
etch-proposed-updates/security-updates Release: The following \
signatures couldn't be verified because the public key is not \
available: NO_PUBKEY 946AA6E18722E71E
W
s. keeling schrieb:
During aptitude update; what's this mean and what do I do about it?
W: GPG error: http://secure-testing.debian.net \
etch-proposed-updates/security-updates Release: The following \
signatures couldn't be verified because the public key is not \
available: NO_PUBKEY
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323365
Why is this grave security bugfix not in Sarge security updates, more
than a month later? I know there's a good reason, but in my few years
of using Debian I have always run unstable.
What's the policy/urgency for getting grave security
On Sun, 2005-09-25 at 18:06 -0400, William Ballard wrote:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323365
Why is this grave security bugfix not in Sarge security updates, more
than a month later? I know there's a good reason, but in my few years
of using Debian I have always run
On Sun, Sep 25, 2005 at 11:22:11PM +0100, Edd Dumbill wrote:
On Sun, 2005-09-25 at 18:06 -0400, William Ballard wrote:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323365
Why is this grave security bugfix not in Sarge security updates, more
than a month later? I know there's a good
Quick question. What security update has caused a whole wack of X
libraries to be updated? I have cron-apt running and this morning at
4:00am nothing needed updating, but now when I do an update on the same
system it wants to update a bunch of xlibs. Yet on debian.org/security/
nothing seems to
Hello *,
On Tue, Sep 20, 2005 at 10:33:58AM -0400, Derek The Monkey Wueppelmann wrote:
Quick question. What security update has caused a whole wack of X
libraries to be updated? I have cron-apt running and this morning at
This is DSA-816 (not yet announced, currently pending).
4:00am nothing
On Sun, Sep 18, 2005 at 11:27:24AM +0100, Clive Menzies wrote:
dpkg -l | grep ii
also, dpkg --get-selections
--
Tom Vier [EMAIL PROTECTED]
DSA Key ID 0x15741ECE
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
301 - 400 of 583 matches
Mail list logo