Displaying 11 results from an estimated 11 matches for "explots".
Did you mean:
exploits
2005 Dec 03
0
exploting kernel --thanks
Thanks to all of you who support me in this topic.
regards,
iwan
1999 Aug 27
0
2.0.38 fixes a glitch
Freshmeat says:
Following up to yesterday's Linux 2.0.38 release, Alan Cox sent out a
security notice about a remote network DoS vulnerability which is
present in all Linux 2.0.x systems. Linux 2.2.x is not affected by
this bug. Causing this requires a great deal of skill and probably a
reasonably local network access as it is extremely timing
dependant. Nevertheless everyone is advised to
1999 Aug 30
0
SECURITY: RHSA-1999:032 Buffer overflows in amd
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overrun in amd
Advisory ID: RHSA-1999:032-01
Issue date: 1999-08-30
Keywords: amd am-utils buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
New packages of am-utils
2006 Apr 06
2
DOS/Windows Archive bits, and file ownership
Preamble:
I've done a lot of looking round news-group archives etc, and I haven't found a definitive answer on this question:
My environment:
Clients are all Windows boxes.
Assume backup of the "share" is a Windows based client. It relies on
the DOS Archive bit to determine Diff/Incr backup selections. (User
Execute bit in Linux)
Goal: Allow users to "own" their files
2007 May 22
0
Speex bit allocation
Ops i meant:
---------------------------------------------------------------------------
Wideband bit|Mode ID|LSP|OL pitch|OL Exc gain|
---------------------------------------------------------------------------
Fine pitch1|
---------------------------------------------------------------------------
Pitch gain1|
---------------------------------------------------------------------------
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in proftpd
Advisory ID: RHSA-1999:034-01
Issue date: 1999-08-31
Keywords: proftpd buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
proftpd is a ftp server
2005 Aug 31
1
improving vorbis compression with arithmetic coding and by exploiting temporal redundancies
Hi!
If you were looking foe a paper about improving vorbis compression by using
arithmetic coding and exploiting temporal redundancies (i.e. repeating sound)
you might have a look here:
http://web.interware.hu/rudas
Three ogg vorbis files were compressed losslessly, with compression ratios
between 2 - 8 % and compression time about 1/500 realtime (i.e. slow).
Theoretical upper bound of the
2007 May 20
1
Speex bit allocation
I would like to know if my vision of things is correct about frame structure.
--------------------------------------------------------
Frame header
--------------------------------------------------------
Subframe1 header|Subframe1 content|
--------------------------------------------------------
Subframe2 header|Subframe2 content|
--------------------------------------------------------
1999 Apr 23
0
Forw: new procmail package
...; archive/latest/18
X-Loop: redhat-watch-list@redhat.com
Precedence: list
Resent-Sender: redhat-watch-list-request@redhat.com
X-URL: http://www.redhat.com
Potential security problems have been identified in all the procmail
packages shipped with Red Hat Linux. Currently Red Hat is not aware of any
explots built on these vulnerabilities.
Red Hat would like to thank the members of the Bugtraq list for reporting
these problems and the authors of procmail for quickly providing an update.
Users of Red Hat Linux are recommended to upgrade to the new packages
available under updates directory on our ftp...
1998 Jun 16
2
masquerading
Following Situation:
Having an intranet-application that needs to know the ip-Address of the
clients before running.
Clients anywere in the Internet with any ip-address.
So I thought about using masquerading the opposite way than normal.
But then anybody could use this application.
Dos anybody know how to make it a little bit more secure, like proofing
the mac-address of the client, or something
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This
is also a reason why Rogier, myself, Alan Cox and others really do not want
to have completely open lists that deal with security related aspects of
running a system as way too many people just jump to conclusions and give
suggestions without doing any reasearch on a subject. -- alex (co-moderator
of