Displaying 4 results from an estimated 4 matches for "9f52".
Did you mean:
952
2004 Jul 01
1
Two possible vulnerabilities?
...at is used in FreeBSD. According to the gzip page:
http://www.gzip.org - new official version will be posted soon....
Are there any plan to go forward gzip 1.3 ?
Best Regards,
Janos Mohacsi
Network Engineer, Research Associate
NIIF/HUNGARNET, HUNGARY
Key 00F9AF98: 8645 1312 D249 471B DBAE 21A2 9F52 0D1F 00F9 AF98
2003 Nov 20
11
Problem running SSH on IBM PPC440 processor, help appreciated
...1864 8b6c d5c4 1ad8 819e 59b5
6331 ee5f 4814 cfb6 c439 dd42 edc0 a9f8
99fd 1969 0000 0003 705b 27e1
incoming packet length= 5
read_poll plain: a425 9ac0 a3f9 8a22
stored_cheksum = a3f98a22
calculated_cheksum = ec45aa79
Disconnecting: Corrupted check bytes on input.
packet_send plain: 1a03 bc22 1896 9f52 0100 0000 1f43 6f72
7275 7074 6564 2063 6865 636b 2062 7974
6573 206f 6e20 696e 7075 742e 1f61 9863
encrypted: 0000 0028 f66c 265c b9d8 734d a622 507a
0ca2 1c47 37d5 6b23 d1e0 1bdd ed09 6461
3b87 df96 14...
2004 Aug 18
6
Report of collision-generation with MD5
Just got a pointer to this via ACM "TechNews Alert" for today:
http://www.acm.org/technews/articles/2004-6/0818w.html#item2
Seems that "... French computer scientist Antoine Joux reported on
Aug. 12 his discovery of a flaw in the MD5 algorithm, which is often
used with digital signatures...."
There's more in the article cited above.
Peace,
david
--
David H. Wolfskill
2004 Aug 13
6
sequences in the auth.log
Hi all,
I found similar sequences in the
/var/auth.log files of freebsd boxes, I supervise.:
Aug 13 13:56:08 www sshd[26091]: Illegal user test from 165.21.103.20
Aug 13 13:56:11 www sshd[26093]: Illegal user guest from 165.21.103.20
Aug 13 13:56:15 www sshd[26096]: Illegal user admin from 165.21.103.20
Aug 13 13:56:18 www sshd[26103]: Illegal user admin from 165.21.103.20
Aug 13 13:56:21 www