Displaying 20 results from an estimated 33 matches for "aoy".
Did you mean:
any
1997 May 29
1
Vulnerability of suid/sgid programs using libXt
...s first.
Vendor fixes
* Red Hat Linux from Red Hat Software
o Red Hat Linux/Alpha 4.1, 4.2
ftp://ftp.redhat.com/updates/4.2/alpha/XFree86-devel-3.2-10.alpha.rpm
ftp://ftp.redhat.com/updates/4.2/alpha/XFree86-libs-3.2-10.alpha.rpm
ftp://ftp.aoy.com/pub/Linux/security/DISTRIBUTION-FIXES/RedHat/XFree86-devel-3.2-10.alpha.rpm
ftp://ftp.aoy.com/pub/Linux/security/DISTRIBUTION-FIXES/RedHat/XFree86-libs-3.2-10.alpha.rpm
o Red Hat Linux/Intel 4.0, 4.1, 4.2
ftp://ftp.redhat.com/updates/4.2/i386/XFree86-deve...
2016 Nov 28
0
gnucash 2.4.15 - both help and tutor drop out when attempting to read
greetings all.
GnuCash 2.4.15 - both help and tutor drop out when attempting to read
within a few seconds of opening. submitted bug report.
system:
centos 6.8 current
toshiba satellite l455d-s5976 w/
amd sempron si-42, 2GB ddr2
aoy, have not search centos or web for problem. thought i might try
quick and easy first.
has anyone seen such problem?
would installing latest version possibly be best answer?
tia.
--
The important thing is not to stop questioning.
- Albert Einstein
CentOS GNU/Linux 6.8
KDE 4.3.4
peace out....
1997 Sep 18
0
[MOD] About "Security concern"
...t installation does not require the clearance, does it?
Please do not ask to post re-runs of old exploits - they are available and
easily accessible on the Web. Search engines do wonderful things. Links to
archives of this list as well as information about LSF updates is available
under http://www.aoy.com/Linux/Security/
[Moderator''s hat off]
Best wishes,
Alex
-----------------------------------------------------------------------------
Alex "Mr. Worf" Yuriev Nationwide ISP Bandwidth: [www.netaxs.net ]
Net Access Outsourced News Reading:...
1997 Mar 07
0
Linux Security WWW has moved
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
The new externally accessible URL for Linux Security WWW is
http://www.aoy.net/Linux/Security/. Please update your pointers.
Bach.cis.temple.edu/linux/linux-security/ will have a pointer to a new site.
Red Hat''s mirror (http://www.redhat.com/linux-info/security/) should be
pointing to a new address in a couple of days.
-----BEGIN PGP SIGNATURE-----
Version: 2.6...
1999 Jan 05
2
Re: Tripwire mess
Actually I just looked at my RH 5.2 dist and it looks as if Tripwire 1.3 is
shipped with it.
1998 May 12
1
Trying to recover erased logs
Hi,
I''ve had several people ask me about a comment I made in a previous post;
<quote>
Dan, firstly, if you haven''t touched the compromised system much, do a
"dd" across the raw disk and grep it for log fragments. I have seen vital
erased logs recovered this way before!
</quote>
I shall try and explain a bit more!
If an attacker erases, or truncates a
1998 Jul 15
0
Re: RedHat 5.X Security Book
...FAX 904 947-5358 |
> +--------------------------------------------------+
>
>--
>----------------------------------------------------------------------
>Please refer to the information about this list as well as general
>information about Linux security at http://www.aoy.com/Linux/Security.
>----------------------------------------------------------------------
>
>To unsubscribe:
> mail -s unsubscribe linux-security-request@redhat.com < /dev/null
>
1999 Nov 26
4
Programming ....
Hi,
I am building my own TCP daemon for easing some routine admin stuff... I am
no expert on security,. I would really appreciate it if someone sent me some
pointers to writing TCP daemons that are hacker-proof( i know there is
nothing like that...but I do not want to be making mistakes in coding that
are well known.. ;)
The daemon runs as root....so that is why I am woried....
Thx,
Arni
1998 Jun 21
3
Question.
For someone that wants to begin securing his or her network. What would be
the starting point ? I guess in sort of a check list format. I mean as of
now Im not administering a network. But in the old company I used to work
for. Security was a big problem there were no polices in place. And in what
ways can one reduce the amount of work it take to keep up with securing and
monitoring a diversed
1998 Mar 09
1
*sigh* another RH5 /tmp problem
RedHat 5, when using dhcp to configure the interface calls a script
called "ifdhcpc-done" to be executed after a dhcp interface is
configured. At the end of the process it updates resolv.conf:
if [ -f /etc/dhcpc/resolv.conf ]; then
echo "setting up resolv.conf" >> /tmp/dhcplog
cp /etc/dhcpc/resolv.conf /etc
fi
There is no protection against the dhcplog
1998 May 12
25
Checking remote servers
I''d like to hear some suggestions about securely administering a
system remotely. Here''s the application: a project is going to
scatter some server machines around the US. The server machines will
be running Linux, with the only network servers being a custom
application.
Ignoring the separate question of physical security, how can I
remotely check the system''s
1999 May 08
1
OpenLinux 2.2: LISA install leaves root access without password
Hello,
I believe I''ve found a bug in the installation process of OpenLinux 2.2
when using the LISA boot disk. During the installation a temporary passwd
file is put on the new file system containing the user "help" set uid=0
gid=0 and no password. Once you are prompted to set the root password and
default user password a new passwd and shadow file is created yet the help
user
1998 Jun 16
2
masquerading
Following Situation:
Having an intranet-application that needs to know the ip-Address of the
clients before running.
Clients anywere in the Internet with any ip-address.
So I thought about using masquerading the opposite way than normal.
But then anybody could use this application.
Dos anybody know how to make it a little bit more secure, like proofing
the mac-address of the client, or something
2000 Jul 26
0
[RHSA-2000:045-01] gpm security flaws have been addressed
...00-06-15&msg=Pine.LNX.4.10.10006201453090.1812-200000@apollo.aci.com.pl
Copyright(c) 2000 Red Hat, Inc.
--
----------------------------------------------------------------------
Please refer to the information about this list as well as general
information about Linux security at http://www.aoy.com/Linux/Security.
----------------------------------------------------------------------
To unsubscribe:
mail -s unsubscribe linux-security-request@redhat.com < /dev/null
1999 Jun 09
3
Port 7 scan
Over the last several day, we''ve been getting pretty regular scans from a
non-existant host on our port 7. Any idea what they are looking for/what are
some of vulnerabilites with echo?
Thanks
Coral Cook
1999 Oct 23
2
How can I Authenticate via MySQL ?
Hi ,
I want to set up my Redhat 6.0 Linux machine to Authenticate username and
password and other information for user that received from /etc/passwd &
/etc/shadow from MySQL server . How Can I do that ?
any Refrences or Manual for this is helpfull :)
Thanx
Hamid Hashemi
1998 Jul 01
4
tcpd anomaly
Salve,
I''m protecting hades with the tcpd wrappers and had no problems so far,
at least none that I noticed.
Today happend something strange. An attacker got a connect on a
protected port from a not allowed IP:
> Unusual System Events
> =-=-=-=-=-=-=-=-=-=-=
BTW, thanks for that tool.
> Jul 1 03:34:56 hades in.null[18321]: twist
> slip139-92-93-124.hol.ch.ibm.net to
1999 Aug 26
2
[RHSA-1999:030-01] Buffer overflow in cron daemon
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in cron daemon
Advisory ID: RHSA-1999:030-01
Issue date: 1999-08-25
Updated on:
Keywords: vixie-cron crond MAILTO
Cross references:
---------------------------------------------------------------------
1. Topic:
A buffer overflow exists in crond, the cron
1997 Dec 05
3
New Program: Abacus Sentry - Port Scan Detector
Hello,
I just made available a beta version of a port scan detector that I''ve
been working on. The program, called Abacus Sentry, is a port scan/probe
detector that offers what I think are a number of unique and useful
features:
- Runs on TCP or UDP sockets. Configurable by the user to bind to
multiples of sockets for increased detection coverage.
- Adjustable scan detection value with
1999 Jul 28
6
You got some 'splaininn to do Lucy ;-)
We just had a security application vendor come in. We asked about Linux
support and he said that putting a security application on top of an
insecure OS was useless. When I asked what he meant by insecure he replied
that Linux does not have a true Auditing capability - as opposed to HP-UX &
Solaris which they do support. Can anyone explain to me what he was talking
about?
Thanks,
Marty