Displaying 7 results from an estimated 7 matches for "andregg".
Did you mean:
andreg
2006 Feb 21
0
OT Proftpd stopped authenication for users
...on
User cslv
Group cslv
#DefaultChdir /var/ftp/pub/
RequireValidShell off
<Limit STOR>
AllowAll
</Limit>
<Limit WRITE>
AllowAll
</Limit>
</Anonymous>
<Anonymous /var/ftp/gps/andregg>
AnonRequirePassword on
User andregg
Group andregg
#DefaultChdir /var/ftp/pub/
RequireValidShell off
<Limit STOR>
AllowAll
</Limit>
<Limit WRITE>
AllowAll
</Limit>
</A...
1997 Jan 15
0
SECURITY: Important bug fix for /sbin/login
...to have been sent by Erik himself... -- REW]
- -----------------------------------------------------------------------------
--
| I told you I''m not very bright -- Sugar in "Some Like It Hot" |
| "RPM is the greatest thing since swap-space" - Bryan C. Andregg
| |
| Erik Troan = ewt@redhat.com = ewt@sunsite.unc.edu |
1999 Mar 21
0
USENIX Annual Conference, June 6-11, Monterey, Calif
....org/events/usenix99
-----------------------------------------------------------------
Sponsored by USENIX, the Advanced Computing Systems Association
"Meeting peers face-to-face for the first time, in a beautiful city
while learning great things makes this a wonderful conference."
Bryan Andregg, Red Hat Software, 1998 Attendee
"I learn as much talking in the halls as in the great talks and tutorials.
An excellent way to get up-to-date with the state of affairs in the UNIX
world."
David C. Todd, BBN Technologies, 1998 Attendee
TRAINING AT A SERIOUS LEVEL
Choose from 24 tutorial...
1998 Jul 14
3
Qpop CERT advisory?
Hello,
Anyone have information on whether RedHat-5.0+ is affected by the
recent (today's) CERT advisory regarding QPOP?
thanks,
-bp
--
B. James Phillippe <bryan@terran.org>
Linux Software Engineer, WGT Inc.
http://earth.terran.org/~bryan
1998 May 09
4
Apparent SNMP remote-root vulnerability.
I just had a remote root break-in on my machine (x86 running Red Hat Linux
5.0 with all the updates except for kernel-2.0.32-3) this morning at
06:03:28 EDT. From what I''ve been able to gather, it appears to have been
through snmpd, which I missed when I was weeding out unused daemons.
Sorry for the feeble message, but all I know (or at least strongly
suspect) is that there''s a
1998 Jun 06
21
Named update for RH 4.2 exploitable?
Someone I was speaking with this evening claimed they have installed the
latest named rpms yet they are still getting exploited daily and being
hacked. Do the latest rpm''s for the named 4.9.x stuff fix all the root
exploits or is this person just an idiot who probably has holes elsewhere in
the system?
1998 May 12
25
Checking remote servers
I''d like to hear some suggestions about securely administering a
system remotely. Here''s the application: a project is going to
scatter some server machines around the US. The server machines will
be running Linux, with the only network servers being a custom
application.
Ignoring the separate question of physical security, how can I
remotely check the system''s