Displaying 11 results from an estimated 11 matches for "exploter".
Did you mean:
explorer
2005 Dec 03
0
exploting kernel --thanks
Thanks to all of you who support me in this topic.
regards,
iwan
1999 Aug 27
0
2.0.38 fixes a glitch
Freshmeat says:
Following up to yesterday's Linux 2.0.38 release, Alan Cox sent out a
security notice about a remote network DoS vulnerability which is
present in all Linux 2.0.x systems. Linux 2.2.x is not affected by
this bug. Causing this requires a great deal of skill and probably a
reasonably local network access as it is extremely timing
dependant. Nevertheless everyone is advised to
1999 Aug 30
0
SECURITY: RHSA-1999:032 Buffer overflows in amd
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overrun in amd
Advisory ID: RHSA-1999:032-01
Issue date: 1999-08-30
Keywords: amd am-utils buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
New packages of am-utils
2006 Apr 06
2
DOS/Windows Archive bits, and file ownership
...m here...)
This will allow the owner to change the archive bits, but no-one else.
I believe I've tested, albeit a while back, the "dos filemode" parameter too.
IIRC, it would allow you to manually change the archive bits, by going
and setting the properties directly - say via Windows Exploter.
It wouldn't, however, allow for the applications, at least for those
that I tested, to change the archive bits on files unless the user
doing the modifications was also the owner.
---
I have ways around this, by using "force user" for the whole share,
but this really seems like a b...
2007 May 22
0
Speex bit allocation
Ops i meant:
---------------------------------------------------------------------------
Wideband bit|Mode ID|LSP|OL pitch|OL Exc gain|
---------------------------------------------------------------------------
Fine pitch1|
---------------------------------------------------------------------------
Pitch gain1|
---------------------------------------------------------------------------
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in proftpd
Advisory ID: RHSA-1999:034-01
Issue date: 1999-08-31
Keywords: proftpd buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
proftpd is a ftp server
2005 Aug 31
1
improving vorbis compression with arithmetic coding and by exploiting temporal redundancies
Hi!
If you were looking foe a paper about improving vorbis compression by using
arithmetic coding and exploiting temporal redundancies (i.e. repeating sound)
you might have a look here:
http://web.interware.hu/rudas
Three ogg vorbis files were compressed losslessly, with compression ratios
between 2 - 8 % and compression time about 1/500 realtime (i.e. slow).
Theoretical upper bound of the
2007 May 20
1
Speex bit allocation
I would like to know if my vision of things is correct about frame structure.
--------------------------------------------------------
Frame header
--------------------------------------------------------
Subframe1 header|Subframe1 content|
--------------------------------------------------------
Subframe2 header|Subframe2 content|
--------------------------------------------------------
1999 Apr 23
0
Forw: new procmail package
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1998 Jun 16
2
masquerading
Following Situation:
Having an intranet-application that needs to know the ip-Address of the
clients before running.
Clients anywere in the Internet with any ip-address.
So I thought about using masquerading the opposite way than normal.
But then anybody could use this application.
Dos anybody know how to make it a little bit more secure, like proofing
the mac-address of the client, or something
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This
is also a reason why Rogier, myself, Alan Cox and others really do not want
to have completely open lists that deal with security related aspects of
running a system as way too many people just jump to conclusions and give
suggestions without doing any reasearch on a subject. -- alex (co-moderator
of