search for: explots

Displaying 11 results from an estimated 11 matches for "explots".

Did you mean: exploits
2005 Dec 03
0
exploting kernel --thanks
Thanks to all of you who support me in this topic. regards, iwan
1999 Aug 27
0
2.0.38 fixes a glitch
Freshmeat says: Following up to yesterday's Linux 2.0.38 release, Alan Cox sent out a security notice about a remote network DoS vulnerability which is present in all Linux 2.0.x systems. Linux 2.2.x is not affected by this bug. Causing this requires a great deal of skill and probably a reasonably local network access as it is extremely timing dependant. Nevertheless everyone is advised to
1999 Aug 30
0
SECURITY: RHSA-1999:032 Buffer overflows in amd
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overrun in amd Advisory ID: RHSA-1999:032-01 Issue date: 1999-08-30 Keywords: amd am-utils buffer overflow remote exploit - --------------------------------------------------------------------- 1. Topic: New packages of am-utils
2006 Apr 06
2
DOS/Windows Archive bits, and file ownership
Preamble: I've done a lot of looking round news-group archives etc, and I haven't found a definitive answer on this question: My environment: Clients are all Windows boxes. Assume backup of the "share" is a Windows based client. It relies on the DOS Archive bit to determine Diff/Incr backup selections. (User Execute bit in Linux) Goal: Allow users to "own" their files
2007 May 22
0
Speex bit allocation
Ops i meant: --------------------------------------------------------------------------- Wideband bit|Mode ID|LSP|OL pitch|OL Exc gain| --------------------------------------------------------------------------- Fine pitch1| --------------------------------------------------------------------------- Pitch gain1| ---------------------------------------------------------------------------
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overflow in proftpd Advisory ID: RHSA-1999:034-01 Issue date: 1999-08-31 Keywords: proftpd buffer overflow remote exploit - --------------------------------------------------------------------- 1. Topic: proftpd is a ftp server
2005 Aug 31
1
improving vorbis compression with arithmetic coding and by exploiting temporal redundancies
Hi! If you were looking foe a paper about improving vorbis compression by using arithmetic coding and exploiting temporal redundancies (i.e. repeating sound) you might have a look here: http://web.interware.hu/rudas Three ogg vorbis files were compressed losslessly, with compression ratios between 2 - 8 % and compression time about 1/500 realtime (i.e. slow). Theoretical upper bound of the
2007 May 20
1
Speex bit allocation
I would like to know if my vision of things is correct about frame structure. -------------------------------------------------------- Frame header -------------------------------------------------------- Subframe1 header|Subframe1 content| -------------------------------------------------------- Subframe2 header|Subframe2 content| --------------------------------------------------------
1999 Apr 23
0
Forw: new procmail package
...; archive/latest/18 X-Loop: redhat-watch-list@redhat.com Precedence: list Resent-Sender: redhat-watch-list-request@redhat.com X-URL: http://www.redhat.com Potential security problems have been identified in all the procmail packages shipped with Red Hat Linux. Currently Red Hat is not aware of any explots built on these vulnerabilities. Red Hat would like to thank the members of the Bugtraq list for reporting these problems and the authors of procmail for quickly providing an update. Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp...
1998 Jun 16
2
masquerading
Following Situation: Having an intranet-application that needs to know the ip-Address of the clients before running. Clients anywere in the Internet with any ip-address. So I thought about using masquerading the opposite way than normal. But then anybody could use this application. Dos anybody know how to make it a little bit more secure, like proofing the mac-address of the client, or something
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This is also a reason why Rogier, myself, Alan Cox and others really do not want to have completely open lists that deal with security related aspects of running a system as way too many people just jump to conclusions and give suggestions without doing any reasearch on a subject. -- alex (co-moderator of