Displaying 6 results from an estimated 6 matches for "0wned".
Did you mean:
owned
1997 Apr 27
0
Overflow in xlock (fwd)
...ewicz marcus@venus.wis.pk.edu.pl == |-
-| == tel. +048 (0-12) 37-44-99 marcus@krakow.linux.org.pl == |-
-| == Strona Domowa - http://venus.wis.pk.edu.pl/marcus/ == |-
---------- Forwarded message ----------
Date: Sat, 26 Apr 1997 16:16:05 -0400
From: George Staikos <staikos@0WNED.ORG>
Approved: R.E.Wolff@BitWizard.nl
To: BUGTRAQ@NETSPACE.ORG
Subject: Overflow in xlock
There appears to be an exploitable buffer overflow in xlock, the X based
screensaver/locker. Xlock is installed suid root on machines with
shadowed passwords. I have verified this on xlock versions on AI...
2009 Mar 26
6
CentOS VPN server for iPhone
So far, OpenVPN has been working very well for me. Unfortunately, the
iPhone doesn't have (yet?) an OpenVPN client, so I'm forced to work with
what's available.
The options are: L2TP, PPTP and IPSec. If you were to install a VPN
endpoint on CentOS, which protocol would you prefer? The condition is to
avoid shabby VPN servers that make the system less secure. I've seen
some
2004 Nov 16
2
FireWire Security issues
...ocation, esp. public access
systems, should re-evaluate their system security and consider additional
physical security measures if they are equipped with "FireWire" ports.
These ports are also called "iLink" on some Sony models.
Overview:
---------
In the presentation, "0wned by an iPod" which Maximilian Dornseif from
Laboratory for Dependable Distributed Systems at RWTH Aachen University
held at the PacSec.jp/core04 conference in Tokyo on Nov 11/12,
several new techniques involving the IEEE 1394 interface commonly
found on laptops, desktops, and some servers were...
1998 Jun 19
16
WARNING: Break-in attempts
Greetings all,
I''m forwarding a copy of an email I sent reporting attempted
break-ins on my main server, earth.terran.org. I am forwarding this
because I think it is relevant that folks watch for this kind of activity
in their logs to catch people who "try doorknobs" in the middle of the
night. After sending this email, I sent a talk request to the user, who
was still logged
2016 May 03
9
[Bug 95251] New: vdpau decoder capabilities: not supported
https://bugs.freedesktop.org/show_bug.cgi?id=95251
Bug ID: 95251
Summary: vdpau decoder capabilities: not supported
Product: Mesa
Version: 11.2
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: medium
Component: Drivers/DRI/nouveau
Assignee: nouveau at
1997 Apr 29
9
Yet Another DIP Exploit?
I seem to have stumbled across another vulnerability in DIP. It
appears to allow any user to gain control of arbitrary devices in /dev.
For instance, I have successfully stolen keystrokes from a root login as
follows... (I could also dump characters to the root console)
$ whoami
cesaro
$ cat < /dev/tty1 <------ root login here
bash: /dev/tty1: Permission denied