Displaying 6 results from an estimated 6 matches for "antonomasia".
2000 Jan 14
2
Re: Security problems in bind -- persisting?
...;fs->root,
task[1]->fs->root,
sizeof(struct inode))) {
And what would be the best response to a failure ? I'm logging and
sending a SIGKILL, but I suspect that's not ideal.
--
##############################################################
# Antonomasia ant@notatla.demon.co.uk #
# See http://www.notatla.demon.co.uk/ #
##############################################################
1999 Nov 27
1
Re: Programming ...
...ections so you can make the client
use more computing power than the server. Anybody now trying to DoS your
box by that method . It is used in my (usable but unfinished)
http://www.notatla.demon.co.uk/SOFTWARE/angel.0.5.tar.gz
--
##############################################################
# Antonomasia ant@notatla.demon.co.uk #
# See http://www.notatla.demon.co.uk/ #
##############################################################
1999 Feb 10
1
When a shell says no (clobber) it means maybe.
...redirect->flags, 0666);
2848
2849 if ((fd < 0) && (errno == EEXIST))
2850 {
2851 free (redirectee_word);
2852 return (NOCLOBBER_REDIRECT);
2853 }
2854 }
2855 else
2856 {
--
##############################################################
# Antonomasia ant@notatla.demon.co.uk #
# See http://www.notatla.demon.co.uk/ #
##############################################################
1998 Feb 22
0
resource starvation against passwd(1)
...don''t think setuid programs
should try to sanitize their environment: that will make them more
complex and error-prone. Moreover it won''t help. The disk could be
full after writing the tempfile halfway. -- REW]
--
##############################################################
# Antonomasia ant@notatla.demon.co.uk #
# See http://www.notatla.demon.co.uk/ #
##############################################################
1999 Nov 26
4
Programming ....
Hi,
I am building my own TCP daemon for easing some routine admin stuff... I am
no expert on security,. I would really appreciate it if someone sent me some
pointers to writing TCP daemons that are hacker-proof( i know there is
nothing like that...but I do not want to be making mistakes in coding that
are well known.. ;)
The daemon runs as root....so that is why I am woried....
Thx,
Arni
1999 Dec 01
0
Security Patches for Slackware 7.0 Available (fwd)
...r <linux-security@redhat.com>; Wed, 1 Dec 1999 10:29:34 -0500
Received: from localhost (trevor@localhost)
by blues.jpj.net (right/backatcha) with SMTP id KAA14912;
Wed, 1 Dec 1999 10:29:30 -0500 (EST)
Date: Wed, 1 Dec 1999 10:29:30 -0500 (EST)
From: Trevor Johnson <trevor@jpj.net>
To: Antonomasia <ant@notatla.demon.co.uk>
cc: linux-security@redhat.com
Subject: [linux-security] Re: Programming ....
In-Reply-To: <199911271503.PAA00680@notatla.demon.co.uk>
Message-ID: <Pine.BSI.3.96.991201102657.13146H-100000@blues.jpj.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=...