Displaying 5 results from an estimated 5 matches for "ef36".
Did you mean:
4f36
2013 Jul 03
1
curl and CVE-2013-2174
Dear members,
It may sound a silly question. I have curl installed:
# pkg_info |grep curl
curl-7.24.0_3 Non-interactive tool to get files from FTP, GOPHER, HTTP(S)
Today portsnap updated the ftp/curl port, and patch-CVE-2013-2174 appeared
in files/, but the port version remained such that portaudit, and
portupgrade still complain about curl's version. What is the recommended
way to
2010 May 26
1
Xen guest does not autostart
...36:4f:d6:11,bridge=xenbr1,script=vif-bridge" ]
~
The next one does not autostart (but starts ok with "xm create name2").
This is the only guest that has two bridges. There is only 500M RAM, but
a third guest starts fine with 500M):
name = "name2"
uuid = "68e33ec6-ef36-9eac-27d7-65a709684551"
maxmem = 500
memory = 500
vcpus = 1
bootloader = "/usr/bin/pygrub"
# kernel = "/var/lib/xen/boot_kernel.5g5MLq"
# ramdisk = "/var/lib/xen/boot_ramdisk.1pSOoP"
# extra = "ro root=LABEL=/ console=xvc0"
on_poweroff = "destroy&qu...
2007 Nov 19
1
testing wireless security
I have been playing around with 3 ath based FreeBSD boxes and seem to
have got everything going via WPA and a common PSK for 802.11x
auth. However, I want to have a bit more certainty about things
working properly.
What tools do people recommend for sniffing and checking a wireless network ?
In terms of IDS, is there any way to see if people are trying to
bruteforce the network ? I see
2010 Oct 30
2
Xen guest not starting automatically
...t -> ../dawit
lrwxrwxrwx 1 root root 8 May 5 21:10 mail2 -> ../mail2
lrwxrwxrwx 1 root root 8 Nov 26 2009 mail3 -> ../mail3
lrwxrwxrwx 1 root root 6 Oct 29 2009 ns2 -> ../ns2
Here is my config for the problem guest:
cat /etc /xen/mail2
name = "mail2"
uuid = "68e33ec6-ef36-9eac-27d7-65a709684551"
maxmem = 500
memory = 500
vcpus = 1
bootloader = "/usr/bin/pygrub"
# kernel = "/var/lib/xen/boot_kernel.5g5MLq"
# ramdisk = "/var/lib/xen/boot_ramdisk.1pSOoP"
# extra = "ro root=LABEL=/ console=xvc0"
on_poweroff = "destroy&qu...
2007 Dec 02
6
MD5 Collisions...
Hi everyone,
Not sure if you've read http://www.win.tue.nl/hashclash/SoftIntCodeSign/ .
should some kind of advisory be sent to advise people not to rely solely on MD5 checksums? Maybe an update to the man page is due ? :
"
MD5 has not yet (2001-09-03) been broken, but sufficient attacks have
been made that its security is in some doubt. The attacks on MD5 are in
the