Sridhar Dhanapalan [EMAIL PROTECTED] writes:
We're trying to deploy a Linux server into an all-Windows company. Our
client is actually quite happy with this solution, but we were
informed a couple of days ago that they have a Citrix Access Gateway
VPN server that we must go through in order
(sorry Sridhar, replied to you directly instead of the list)
On Sat, May 31, 2008 at 11:55 PM, Sridhar Dhanapalan [EMAIL PROTECTED]
wrote:
We're trying to deploy a Linux server into an all-Windows company. Our
client
is actually quite happy with this solution, but we were informed a couple
Reviving an old thread, I just found this site:
http://gplmedicine.org/
--
The thing he [Bill Gates] realised about the windows was this: because they
had been converted into openable windows after they had first been designed
to be impregnable, they were, in fact, much less secure than if
On 01/06/2008, at 4:09 PM, Daniel Pittman wrote:
Sridhar Dhanapalan [EMAIL PROTECTED] writes:
We're trying to deploy a Linux server into an all-Windows company.
Our
client is actually quite happy with this solution, but we were
informed a couple of days ago that they have a Citrix Access
Daniel Pittman wrote:
Without that commitment you well, eventually, get to join the legions of
poorly maintained, compromised Linux boxes out there. This hurts
everyone, but especially you -- potentially legally, certainly in terms
of a lot of work when your ISP (or the police) call up about
Sridhar Dhanapalan wrote:
We're trying to deploy a Linux server into an all-Windows company. Our client
is actually quite happy with this solution, but we were informed a couple of
days ago that they have a Citrix Access Gateway VPN server that we must go
through in order to interact with
Sridhar,
Not sure exactly which version of the CAG your customer has - but it sounds
like an older version. The newer Citrix Access Gateway Enterprise Edition
(version 8.0 and up) is built on the Netscaler platform (which is BSD
based). This does have a Java client which will run under Linux to
Rick Welykochy [EMAIL PROTECTED] writes:
Daniel Pittman wrote:
Without that commitment you well, eventually, get to join the legions of
poorly maintained, compromised Linux boxes out there. This hurts
everyone, but especially you -- potentially legally, certainly in terms
of a lot of work
On Sun, 2008-06-01 at 03:51 -0300, Gonzalo Servat wrote:
I don't know much about Citrix so I could be suggesting something silly, but
I searched a bit of Google and found references to some Linux ICA Client
that apparently connects to the Citrix Access Gateway. Have you used it? Is
this the
Hi all
Linux courses at Granville TAFE. Are they still happening?
Normal website is down it seems.
www.gonzo.edu.au/moodle/
Has it moved somewhere else?
Anyone know!
Thx Roger
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs:
The following is the output of my MOUNT command:
[EMAIL PROTECTED]:~$ mount
/dev/sda3 on / type ext3 (rw,relatime,errors=remount-ro)
proc on /proc type proc (rw,noexec,nosuid,nodev)
/sys on /sys type sysfs (rw,noexec,nosuid,nodev)
varrun on /var/run type tmpfs
As far as I know yes, but Geoffreys server and name servers are down
yesterday and today, so no details, and I cant find his number.
cheers
Ken
R.G.Salisbury(default) wrote:
Hi all
Linux courses at Granville TAFE. Are they still happening?
Normal website is down it seems.
On Sunday 01 June 2008 21:35:38 [EMAIL PROTECTED] wrote:
We're trying to deploy a Linux server into an all-Windows company. Our
client is actually quite happy with this solution, but we were
informed a couple of days ago that they have a Citrix Access Gateway
VPN server that we must go
On Sunday 01 June 2008 21:35:38 [EMAIL PROTECTED] wrote:
Without that commitment you well, eventually, get to join the legions of
poorly maintained, compromised Linux boxes out there. This hurts
everyone, but especially you -- potentially legally, certainly in terms
of a lot of work when
jam [EMAIL PROTECTED] writes:
On Sunday 01 June 2008 21:35:38 [EMAIL PROTECTED] wrote:
Without that commitment you well, eventually, get to join the legions of
poorly maintained, compromised Linux boxes out there. This hurts
everyone, but especially you -- potentially legally, certainly in
I've managed to avoid taking part in this thread to date, mostly because
enough people have been beating the FOR THE LOVE OF GOD USE YOUR
DISTRIBUTION'S PACKAGES drum. And I'm not entirely sure this even
dignifies a response but hey, why not.
On Mon, 2008-06-02 at 10:06 +0800, jam wrote:
Clarke
jam wrote:
Frankly, no one I know, has ever had, or knows someone who has ever had a
compromised linux box. Frankly I doubt if all of SLUG ever has ...
Here's someone asking on this mailing list for help on cleaning up
a compromised RedHat 7 system:
I suspect a bunch of people are going to jump into this thread, but to
get in early, some stories:
- a Red Hat 5 box left to rot (this was some time ago now!), became a
host for warez and ended up comprising something like half of its
very substantial network's total traffic.
- a
This one time, at band camp, Mary Gardiner wrote:
I suspect attacks through web apps like WordPress are pretty common
causes of comprise of machines run by essentially knowledgable people at
the moment, because there doesn't seem yet to be a good set of best
practices for packaging and
Mary Gardiner wrote:
I suspect attacks through web apps like WordPress are pretty common
causes of comprise of machines run by essentially knowledgable people at
the moment, because there doesn't seem yet to be a good set of best
practices for packaging and updating them (upstream tends to aims
Not wishing to start an OS war, but I rarely if ever have seen a BSD
or Sun box compromised. Is this due to sheer numbers of Linux and Doze?
there are a lot of people out there setting up linux machines who really
havent got the skills to do so.
not listing any names...
ausgamers.com
Not wishing to start an OS war, but I rarely if ever have seen a BSD
or Sun box compromised. Is this due to sheer numbers of Linux and
Doze?
More than likely.
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs:
Rick Welykochy [EMAIL PROTECTED] writes:
Mary Gardiner wrote:
I suspect attacks through web apps like WordPress are pretty common
causes of comprise of machines run by essentially knowledgable people
at the moment, because there doesn't seem yet to be a good set of
best practices for
This one time, at band camp, Daniel Pittman wrote:
[2] formmail. I say no more.
Matt's Script Archive, anyone?
--
Rev Simon Rumble [EMAIL PROTECTED]
www.rumble.net
The Tourist Engineer
Just because you're on holiday, doesn't mean you're not a geek.
http://engineer.openguides.org/
A
Daniel Pittman wrote:
[2] formmail. I say no more.
The perl language has been pretty bullet proof. I do recall
one string-based exploit in the many many years I have been using
it.
That said, yup, scripts like formmail are written by monkeys
in the 11th level hell and sent to torment sys
On Mon, Jun 02, 2008, Rick Welykochy wrote:
Daniel Pittman wrote:
[2] formmail. I say no more.
The perl language has been pretty bullet proof. I do recall
one string-based exploit in the many many years I have been using
it.
Shit code can be written on all platforms.
That said, yup,
Adrian Chadd wrote:
The trouble is that the entry barrier for coding is so low, you can
code without any clue.
This very issue gave rise to some heated debate over on the LINK
mailing list, which some of you attend.
Many of us computer professionals were peeved by this low
barrier to entry
27 matches
Mail list logo