search for: wadham

Displaying 18 results from an estimated 18 matches for "wadham".

Did you mean: wadhams
2007 Sep 14
6
Force a new user to configure Comedian mail?
...;s hand through changing their PIN, recording their name, and setting up one or both greetings, the very first time they use the account. I know I can publish docs that tell them how to use the "0" menu and do this by hand... but users are lazy and resent documentation. Thanks! Jeremy Wadhams Yahoo Inc -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20070914/b45c07c5/attachment.htm
2004 Oct 26
5
please test: Secure ports tree updating
CVSup is slow, insecure, and a memory hog. However, until now it's been the only option for keeping an up-to-date ports tree, and (thanks to all of the recent work on vuxml and portaudit) it has become quite obvious that keeping an up-to-date ports tree is very important. To provide a secure, lightweight, and fast alternative to CVSup, I've written portsnap. As the name suggests, this
2010 Jan 15
1
Digium Asterisk World at ITEXPO - Yahoo keynote update
...change in the line-up for the show, that I think bears mentioning here since it possibly will help quite a few of you in your discussions about getting Asterisk into your company. We've had the good fortune to have a last-minute keynote addition at the show, which is going to be Jeremy Wadhams from Yahoo. He's going to be talking about a Fortune 500 implementation of Asterisk across their entire network, and why they made the decision to move to Open- Source telephony for the core of their voice network. Keynote: 3:30 - 4:00 PM on Wednesday - Jeremy Wadhams, Yahoo It's...
2004 Jan 09
0
Security Officer-supported branches update
...04/01/09 09:10:53 PST FreeBSD doc repository Modified files: en/security security.sgml Log: Security Officer-supported branches updated: FreeBSD 4.7 removed: it has passed the published EoL. FreeBSD 5.1 extended. Reminded by: Colin Percival <colin.percival@wadham.ox.ac.uk> Revision Changes Path 1.149 +3 -8 www/en/security/security.sgml ----- End forwarded message -----
2004 Sep 24
1
sharing /etc/passwd
How 'bout PAM? /usr/ports/security/pam_ldap. If you have machines that can't do PAM, perhaps NIS is the way to go (assuming, of course, you're behind a firewall). You can store login information in LDAP like you want, then use a home-grown script to extract the information to a NIS map. Or, if you have a Solaris 8 machine lying around, you can cut out the middle step and use
2009 Aug 25
3
[Bug 23505] New: KDE's Kubrick has problems with xf86-video-nouveau driver
...latform: Other OS/Version: All Status: NEW Severity: normal Priority: medium Component: Drivers/DRI/nouveau AssignedTo: nouveau at lists.freedesktop.org ReportedBy: johannesobermayr at gmx.de I only post what I communicated with Ian Wadham (Kubrick developer) and KDE games devel: openSuSE factory and additional packages from http://download.opensuse.org/repositories/home:/oertel:/Radeon_DRI2/openSUSE_Factory/: - Mesa 7.6 devel (20090807), drm modules (20090812) and libdrm (20090807) - Geforce 2 GTS (NV 15) - crash on start (see b...
2003 Oct 26
3
Best way to filter "Nachi pings"?
We're being ping-flooded by the Nachi worm, which probes subnets for systems to attack by sending 92-byte ping packets. Unfortunately, IPFW doesn't seem to have the ability to filter packets by length. Assuming that I stick with IPFW, what's the best way to stem the tide? --Brett Glass
2003 Aug 03
12
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-03:08.realpath Security Advisory The FreeBSD Project Topic: Single byte buffer overflow in realpath(3) Category: core Module: libc Announced:
2005 Mar 04
0
[Fwd: Re: Fwd: FreeBSD hiding security stuff]
The mailing list detained my email because I posted from the wrong address... hoepfully it will get through this time. -------- Original Message -------- Subject: Re: Fwd: FreeBSD hiding security stuff Date: Fri, 04 Mar 2005 05:35:32 -0800 From: Colin Percival <cperciva@freebsd.org> To: Devon H. O'Dell <dodell@sitetronics.com> CC: mike@sentex.net, freebsd-security@freebsd.org,
2004 Dec 09
0
5.3 SMP kernels now available via FreeBSD Update
In response to popular demand, I am now providing both GENERIC and SMP kernels via FreeBSD Update to people running FreeBSD 5.3. To take advantage of this on your FreeBSD 5.3 (and only 5.3!) SMP system, run the following commands as root: # touch /boot/kernel/SMP # freebsd-update fetch (this should mention downloading a new /boot/kernel/SMP file) # freebsd-update install (likewise, this should
2004 Apr 14
0
FYI re: "FreeBSD ECE flag ipfw protection bypass"
Several people have noticed that SecuriTeam.com is reporting a "FreeBSD ECE flag ipfw protection bypass" exploit. In an effort to save time, let me say this publicly: SecuriTeam.com is three years out of date. This problem was fixed in FreeBSD 3.5-STABLE and 4.2-STABLE in January 2001, and reported in Security Advisory FreeBSD-SA-01:08. Colin Percival
2004 Feb 25
0
FreeBSD 5.2 -> 5.2.1 upgrade
In order to provide an easy update path for i386 systems from FreeBSD 5.2 to FreeBSD 5.2.1, FreeBSD Update will now update systems running FreeBSD 5.2-RELEASE to 5.2.1-RELEASE. To take advantage of these updates, install and run FreeBSD Update, and reboot into the new kernel: # cd /usr/ports/security/freebsd-update && make install clean # cp /usr/local/etc/freebsd-update.conf.sample
2004 Jan 09
0
Binary updates for FreeBSD 5.x
I am now building binary security updates for FreeBSD 5.x, for use with FreeBSD Update. This has taken rather longer than I expected -- I thought I would be at this point in mid-November -- but porting the update-building code to run on FreeBSD 5.x took rather longer than I expected. For details about how to use these updates, please see the FreeBSD Update web site at
2003 May 31
0
Advisory: security/freebsd-update port
Topic: Potential failure to update vulnerable files Synopsis: FreeBSD Update is a system for tracking FreeBSD release (aka security) branches via signed binary updates. At present, updates are being built for FreeBSD 4.7-RELEASE and 4.8-RELEASE. As a result of differences between the ISO image and FTP distributions of 4.7-RELEASE, FreeBSD Update may have failed to recognize certain
2003 Aug 24
3
EoL dates
Is there any reason why releases have EoL dates after only 12 months? While it's clear that some sort of EoL is important, I can't think of any security advisories recently which weren't accompanied by patches for all the security branches, even those which are no longer officially supported. Colin Percival
2005 Mar 04
1
[Fwd: Re: FW:FreeBSD hiding security stuff]
Well, I *tried* to CC: freebsd-security... I'm forwarding this to get around the "posting from wrong address" filter. -------- Original Message -------- Subject: Re: FW:FreeBSD hiding security stuff Date: Fri, 04 Mar 2005 04:42:48 -0800 From: Colin Percival <cperciva@freebsd.org> To: Jonathan Weiss <tomonage2@gmx.de> CC: freebsd-security@freebsd.org, FreeBSD-Hackers
2005 Jun 15
2
FreeBSD 5.4 SMP kernels now available via FreeBSD Update
It sounds like the SMP kernel I provided for FreeBSD 5.3 was quite popular, so I've started building an SMP kernel for FreeBSD 5.4 as well, in addition to the usual GENERIC kernel. To take advantage of this on your FreeBSD 5.4 SMP system, run the following commands as root: # touch /boot/kernel/SMP # freebsd-update fetch # freebsd-update install # echo 'bootfile="SMP"'
2005 Mar 05
2
Heads up: End of RELENG_4_8 support
At the end of March, the RELENG_4_8 (sometimes called 4.8-SECURITY) branch will reach its designated End of Life and cease to be supported by the FreeBSD Security Team. Released in April 2003, FreeBSD 4.8 was the first release designated for "extended" two-year security support instead of the normal one-year support. Over this time, 27 security advisories have been issued which have