search for: ef36

Displaying 5 results from an estimated 5 matches for "ef36".

Did you mean: 4f36
2013 Jul 03
1
curl and CVE-2013-2174
Dear members, It may sound a silly question. I have curl installed: # pkg_info |grep curl curl-7.24.0_3 Non-interactive tool to get files from FTP, GOPHER, HTTP(S) Today portsnap updated the ftp/curl port, and patch-CVE-2013-2174 appeared in files/, but the port version remained such that portaudit, and portupgrade still complain about curl's version. What is the recommended way to
2010 May 26
1
Xen guest does not autostart
...36:4f:d6:11,bridge=xenbr1,script=vif-bridge" ] ~ The next one does not autostart (but starts ok with "xm create name2"). This is the only guest that has two bridges. There is only 500M RAM, but a third guest starts fine with 500M): name = "name2" uuid = "68e33ec6-ef36-9eac-27d7-65a709684551" maxmem = 500 memory = 500 vcpus = 1 bootloader = "/usr/bin/pygrub" # kernel = "/var/lib/xen/boot_kernel.5g5MLq" # ramdisk = "/var/lib/xen/boot_ramdisk.1pSOoP" # extra = "ro root=LABEL=/ console=xvc0" on_poweroff = "destroy&qu...
2007 Nov 19
1
testing wireless security
I have been playing around with 3 ath based FreeBSD boxes and seem to have got everything going via WPA and a common PSK for 802.11x auth. However, I want to have a bit more certainty about things working properly. What tools do people recommend for sniffing and checking a wireless network ? In terms of IDS, is there any way to see if people are trying to bruteforce the network ? I see
2010 Oct 30
2
Xen guest not starting automatically
...t -> ../dawit lrwxrwxrwx 1 root root 8 May 5 21:10 mail2 -> ../mail2 lrwxrwxrwx 1 root root 8 Nov 26 2009 mail3 -> ../mail3 lrwxrwxrwx 1 root root 6 Oct 29 2009 ns2 -> ../ns2 Here is my config for the problem guest: cat /etc /xen/mail2 name = "mail2" uuid = "68e33ec6-ef36-9eac-27d7-65a709684551" maxmem = 500 memory = 500 vcpus = 1 bootloader = "/usr/bin/pygrub" # kernel = "/var/lib/xen/boot_kernel.5g5MLq" # ramdisk = "/var/lib/xen/boot_ramdisk.1pSOoP" # extra = "ro root=LABEL=/ console=xvc0" on_poweroff = "destroy&qu...
2007 Dec 02
6
MD5 Collisions...
Hi everyone, Not sure if you've read http://www.win.tue.nl/hashclash/SoftIntCodeSign/ . should some kind of advisory be sent to advise people not to rely solely on MD5 checksums? Maybe an update to the man page is due ? : " MD5 has not yet (2001-09-03) been broken, but sufficient attacks have been made that its security is in some doubt. The attacks on MD5 are in the