search for: winnuk

Displaying 15 results from an estimated 15 matches for "winnuk".

Did you mean: winnut
1997 Oct 30
1
necessary to bind TCP/IP to Microsoft network client?
Having some strange difficulties with samba... it compiled fine and seems to be running ok but none of my win95 client machines can see the samba server. They can't even see the samba server when the server is configured as a WINS server and the client is configured to look at the server as its WINS server. anyways, my clients all have the following... microsoft network client IPX protocol
1999 May 07
1
Re: Redhat Linux 6.0 Problem
...pd to work for anonymous FTP includes what seems to be a copy of /bin/ash as /home/ftp/bin/sh. Why the heck would they include a bourne shell in the anon bin directory? ----don''t waste your cpu, crack rc5...www.distributed.net team enzo--- Jon Lewis *jlewis@lewis.org*| Spammers will be winnuked or System Administrator | nestea''d...whatever it takes Atlantic Net | to get the job done. _________http://www.lewis.org/~jlewis/pgp for PGP public key__________
1997 Jul 25
1
Security concerns
Hi all, I'm new to this list, so you've probably answered this question before but.... What are the security issues raised by using Samba? What I mean by this is can someone break into my UNIX box through use of samba, SMB, etc. Can someone write to/mount a shared drive without permission? These questions are asked given that I use security = user and that I place all NT clients in the
1997 Dec 19
1
Accessing a Samba server over the Internet
Hi, I want to connect to Samba volumes on a SCO Open Server 5 over the Internet from my NT 4 workstation. My workstation is in a local domain and gets a dynamic IP address when it connects to my ISP; the Internet hostname is also dynamic and can't be predicted. I can determine my ISP's B class subnet which I have put into the smb.conf file in the 'hosts allow' entry. However,
1998 Jul 14
2
Re: Chrooting bind 8.1.2 under debian 2.0
On Tue, 14 Jul 1998, cfb wrote: > The main problem seems to be with the way that debian starts bind using > the script /etc/init.d/bind. I thought it would be really neat to just > change the #!/bin/sh at the top of the script to something like : > #!/usr/sbin/chroot /chroot-dns/ /bin/sh > or > #!/usr/sbin/chroot /chroot-dns/ /chroot-dns/bin/sh try changing
1997 Sep 21
1
Active X versus Java, Linux versus NT
Having recently read about the lack of security of Active X controls, I was wondering if I could get some specifics about its lack of security versus the security of JAVA. Also about the security of JAVA under Linux. I understand that MS''s concept of security is a) investigate the vendor, b) issue a certificate of authority, 3) vendor is now trused to do anything (fox guarding the hen
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of > > the trojan''s that were inserted into the compromised system - does anybody know > > what is in these trojans? > > Check the Linux RootKit ... (LRK).. > > Typically LRK to use config-files.. (and typically LRK-users to place > files in /dev.. find /dev -type f | grep -v
1998 Jul 01
4
Serious Linux 2.0.34 security problem (fwd)
---------- Forwarded message ---------- Date: Tue, 30 Jun 1998 15:10:47 +0800 From: David Luyer <luyer@UCS.UWA.EDU.AU> To: BUGTRAQ@NETSPACE.ORG Subject: Serious Linux 2.0.34 security problem I just saw this mentioned on linux-kernel and confirmed it; #include <fcntl.h> #include <errno.h> #include <stdio.h> #include <stdlib.h> #include <unistd.h> int main(int
1998 Jun 16
7
Ethernet card addr <-> IP
-----BEGIN PGP SIGNED MESSAGE----- Hi everyone - Someone I''m working with has a requirement to map ethernet card addresses to unique IP addresses, and then have a Linux IP masquerade server know of this mapping list and not allow any data to pass from any ethernet card that a) it doesn''t know about, or b) isn''t assigned the right IP. Ideally it would also log this
1998 Jun 19
16
WARNING: Break-in attempts
Greetings all, I''m forwarding a copy of an email I sent reporting attempted break-ins on my main server, earth.terran.org. I am forwarding this because I think it is relevant that folks watch for this kind of activity in their logs to catch people who "try doorknobs" in the middle of the night. After sending this email, I sent a talk request to the user, who was still logged
1997 Dec 05
3
New Program: Abacus Sentry - Port Scan Detector
...9; symbols with a backslash # to prevent problems writing out (i.e. \%c \%h ) # #KILL_HOSTS_DENY="ALL: $TARGET$ : DENY" ################### # External Command# ################### # This is a command that is run when a host connects, it can be whatever # you want it to be (ping of death, winnuke, death threat, etc.), but # use this with caution. This command is executed before the route is # dropped to ensure that your "package" is delivered whatever that may # be. It is disabled by default. # #KILL_RUN_CMD="/some/path/here/ping_of_death $TARGET$" ###################...
1999 May 07
3
php3 module and security
...wu-ftpd to work for anonymous FTP includes what seems to be a copy of /bin/ash as /home/ftp/bin/sh. Why the heck would they include a bourne shell in the anon bin directory? ----don't waste your cpu, crack rc5...www.distributed.net team enzo--- Jon Lewis *jlewis@lewis.org*| Spammers will be winnuked or System Administrator | nestea'd...whatever it takes Atlantic Net | to get the job done. _________http://www.lewis.org/~jlewis/pgp for PGP public key__________ From mail@mail.redhat.com Sat May 8 02:48:48 1999 Received: (qmail 7548 invoked from network); 8 May 1...
1998 Jun 06
21
Named update for RH 4.2 exploitable?
Someone I was speaking with this evening claimed they have installed the latest named rpms yet they are still getting exploited daily and being hacked. Do the latest rpm''s for the named 4.9.x stuff fix all the root exploits or is this person just an idiot who probably has holes elsewhere in the system?
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional CC to linux-security. By the time I got around to do another "moderation round" this one was the latest. Everyone is keeping good context, so I think you all will be able to follow the discussion. --REW] >>>>> <seifried@seifried.org> writes: >> The only thing I can see coming out
1998 Jun 30
1
Patched Qpopper2.5 release Notification. (fwd)
...here. I let someone else do that. So if you see something on another mailing list, and think its relevant, go ahead and forward it. Regards, Roger Wolff Your Moderator. ] ------------------------------------------------------------------ Jon Lewis <jlewis@fdt.net> | Spammers will be winnuked or Network Administrator | drawn and quartered...whichever Florida Digital Turnpike | is more convenient. ______http://inorganic5.fdt.net/~jlewis/pgp for PGP public key____ From mail@mail.redhat.com Wed Jul 8 10:27:34 1998 Received: (qmail 20318 invoked from network); 8 Jul 1998 0...