Displaying 13 results from an estimated 13 matches for "uphoff".
Did you mean:
  phoff
  
1996 Nov 18
0
New moderator, linux-alert lists'' consolidation.
...also been the
author of the numerous "Linux Security FAQ Updates" and has contributed
to a number of other (e.g. CERT, AUSCERT) advisories.
I''m still hanging on "in the background" as both lists'' administrator
for the time being, however.
- --Up.
- -- 
Jeff Uphoff - systems/network admin.  |  juphoff@nrao.edu
National Radio Astronomy Observatory  |  juphoff@bofh.org.uk
Charlottesville, VA, USA              |  jeff.uphoff@linux.org
    PGP key available at: http://www.cv.nrao.edu/~juphoff/
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Ma...
1996 Nov 20
0
Bug in initscripts-2.77-1.i386.rpm''s boot-up random # handler.
...andom-seed count=1
Looks like a partial (and thus incorrect) modification was done to Ted''s
instructions when putting together the initscripts.  This means that
/dev/urandom is not being re-seeded at boot as expected.  If you depend
on /dev/*random, the impact is obvious.
--Up.
-- 
Jeff Uphoff - Scientific Programming Analyst  |  juphoff@nrao.edu
National Radio Astronomy Observatory          |  juphoff@bofh.org.uk
Charlottesville, VA, USA                      |  jeff.uphoff@linux.org
        PGP key available at: http://www.cv.nrao.edu/~juphoff/
From mail@mail.redhat.com redhat.com  (l...
1997 Apr 07
2
amd 920824upl102 ignores the nodev option
amd from the amd-920824upl102-6.i386.rpm file distributed with RedHat
Linux 4.1 does not honor the nodev option for NFS filesystems and probably
other mount types, allowing any user access to the device files in /dev on
a system, provided that they have root access to another linux box on the
network. In addition, the default amd.conf from RH 4.1 maps /net/* to NFS
mounting, which makes the bug in
2006 Mar 11
0
nfsclient process stucks in nfsaio [SOLVED]
Hi all,
I believe that this behavior is caused by the ``intr'' (-i) option to
mount_nfs(8). As noted by Stephan Uphoff in PR/79700, he does
not recommend use intr option. After remove the option, the dd
works well.
Sorry for the noisy :-)
However, I think some warnings can be added to mount_nfs(8)
about the usage of intr and its consequence. So this won't be
happened again.
Regards,
Rong-En Fan
1997 Mar 31
5
UK Encryption ban legislation {from: [comp.risks] RISKS DIGEST 18.95}
I think this is an issue of serious interest to many of the subscribers
of these lists; it would effectively ban a lot of security-related tools
that many of use now find indispensable, e.g. ssh, pgp.
------- Start of forwarded message -------
Date: 21 Mar 1997 10:11:57 GMT
From: rja14@cl.cam.ac.uk (Ross Anderson)
Approved: R.E.Wolff@BitWizard.nl
Subject: DTI proposals on key escrow
The British
2004 May 26
0
FreeBSD Security Advisory FreeBSD-SA-04:11.msync
...11.msync                                      Security Advisory
                                                          The FreeBSD Project
Topic:          buffer cache invalidation implementation issues
Category:       core
Module:         sys
Announced:      2004-05-26
Credits:        Stephan Uphoff <ups@tree.com>
                Matt Dillon <dillon@apollo.backplane.com>
Affects:        All FreeBSD versions prior to the correction date
Corrected:      2004-05-25 22:46:38 UTC (RELENG_4, 4.10-STABLE)
                2004-05-25 23:07:55 UTC (RELENG_5_2, 5.2.1-RELEASE-p8)...
2004 May 26
0
FreeBSD Security Advisory FreeBSD-SA-04:11.msync
...11.msync                                      Security Advisory
                                                          The FreeBSD Project
Topic:          buffer cache invalidation implementation issues
Category:       core
Module:         sys
Announced:      2004-05-26
Credits:        Stephan Uphoff <ups@tree.com>
                Matt Dillon <dillon@apollo.backplane.com>
Affects:        All FreeBSD versions prior to the correction date
Corrected:      2004-05-25 22:46:38 UTC (RELENG_4, 4.10-STABLE)
                2004-05-25 23:07:55 UTC (RELENG_5_2, 5.2.1-RELEASE-p8)...
1997 Jan 29
5
evidence/timelines that show linux is "more secure"
I''m looking for some evidence, backup up with dates and references,
that shows that the Linux community responds to security problems
more quickly than other OS vendors, and thus might be considered
"more secure".  A number of fairly high profile corporations are
starting to look for such information as they consider Linux as an
alternative solution to other UNIXes.
Something
1997 Feb 05
0
bliss version 0.4.0
[mod: Forwarded by Jeff Uphoff. I tried to mangle the headers that
it appears as the original post: with an invalid return address. -- REW]
A few months back, a very alpha version of bliss got posted. That shouldn''t
have happened, but, it was pretty much ignored so I didn''t worry about it.
But now it seems the...
1998 Feb 25
0
Quake 2 Linux 3.13 (and lower) allow users to read arbitrary files [Forwarded e-mail from kevingeo@CRUZIO.COM]
------- start of forwarded message (RFC 934 encapsulation) -------
From: kevingeo@CRUZIO.COM
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
To: BUGTRAQ@NETSPACE.ORG
Subject:      Quake 2 Linux 3.13 (and lower) allow users to read arbitrary files
Date: 	Wed, 25 Feb 1998 05:49:58 -0500
Reply-To: kevingeo@CRUZIO.COM
Vulnerable:
Everyone who followed the installation instructions and made Quake2
2012 May 28
0
GLMNET AUC vs. MSE
Hello -
I am using glmnet to generate a model for multiple cohorts i. For each i, I
run 5 separate models, each with a different x variable. I want to compare
the fit statistic for each i and x combination.
When I use auc, the output is in some cases is < .5 (.49). In addition, if
I compare mean MSE (with upper and lower bounds) ... there is no difference
across my various x variables, but
1996 Dec 23
2
Buffer overflow in Linux''s login program [Forwarded e-mail from Joe Zbiciak]
------- start of forwarded message (RFC 934 encapsulation) -------
From: Joe Zbiciak <im14u2c@cegt201.bradley.edu>
Approved: alex@bach.cis.temple.edu
Sender: Bugtraq List <BUGTRAQ@netspace.org>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
Subject:      Buffer overflow in Linux''s login program
Date: 	Sun, 22 Dec 1996 09:27:24 -0600
Reply-To: Joe Zbiciak
1997 Nov 13
0
Linux F00F Patch [Forwarded e-mail from Aleph One]
[mod: The first message would''ve been rejected on the grounds "no
security related information", but it gives ME a warm feeling too, so
I''m allowing it to piggyback on the announcement of the "fix". Note
that Linux-2.1.63 simply implements a fix for the problem, instead of
applying this fix, upgrading to 2.1.63 might be an option for you.
Linus indicated that