Displaying 15 results from an estimated 15 matches for "winnuk".
Did you mean:
winnut
1997 Oct 30
1
necessary to bind TCP/IP to Microsoft network client?
Having some strange difficulties with samba...
it compiled fine and seems to be running ok but none
of my win95 client machines can see the samba server.
They can't even see the samba server when the server
is configured as a WINS server and the client is
configured to look at the server as its WINS server.
anyways, my clients all have the following...
microsoft network client
IPX protocol
1999 May 07
1
Re: Redhat Linux 6.0 Problem
...pd to work for anonymous FTP includes what seems to be a
copy of /bin/ash as /home/ftp/bin/sh. Why the heck would they include a
bourne shell in the anon bin directory?
----don''t waste your cpu, crack rc5...www.distributed.net team enzo---
Jon Lewis *jlewis@lewis.org*| Spammers will be winnuked or
System Administrator | nestea''d...whatever it takes
Atlantic Net | to get the job done.
_________http://www.lewis.org/~jlewis/pgp for PGP public key__________
1997 Jul 25
1
Security concerns
Hi all,
I'm new to this list, so you've probably answered this
question before but....
What are the security issues raised by using Samba?
What I mean by this is can someone break into
my UNIX box through use of samba, SMB, etc.
Can someone write to/mount a shared drive without
permission?
These questions are asked given that I use
security = user
and that I place all NT clients in the
1997 Dec 19
1
Accessing a Samba server over the Internet
Hi,
I want to connect to Samba volumes on a SCO Open Server 5 over the Internet
from my NT 4 workstation. My workstation is in a local domain and gets a
dynamic IP address when it connects to my ISP; the Internet hostname is also
dynamic and can't be predicted.
I can determine my ISP's B class subnet which I have put into the smb.conf
file in the 'hosts allow' entry.
However,
1998 Jul 14
2
Re: Chrooting bind 8.1.2 under debian 2.0
On Tue, 14 Jul 1998, cfb wrote:
> The main problem seems to be with the way that debian starts bind using
> the script /etc/init.d/bind. I thought it would be really neat to just
> change the #!/bin/sh at the top of the script to something like :
> #!/usr/sbin/chroot /chroot-dns/ /bin/sh
> or
> #!/usr/sbin/chroot /chroot-dns/ /chroot-dns/bin/sh
try changing
1997 Sep 21
1
Active X versus Java, Linux versus NT
Having recently read about the lack of security
of Active X controls, I was wondering if I could
get some specifics about its lack of security
versus the security of JAVA. Also about the
security of JAVA under Linux. I understand that
MS''s concept of security is a) investigate the
vendor, b) issue a certificate of authority, 3)
vendor is now trused to do anything (fox guarding
the hen
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of
> > the trojan''s that were inserted into the compromised system - does anybody know
> > what is in these trojans?
>
> Check the Linux RootKit ... (LRK)..
>
> Typically LRK to use config-files.. (and typically LRK-users to place
> files in /dev.. find /dev -type f | grep -v
1998 Jul 01
4
Serious Linux 2.0.34 security problem (fwd)
---------- Forwarded message ----------
Date: Tue, 30 Jun 1998 15:10:47 +0800
From: David Luyer <luyer@UCS.UWA.EDU.AU>
To: BUGTRAQ@NETSPACE.ORG
Subject: Serious Linux 2.0.34 security problem
I just saw this mentioned on linux-kernel and confirmed it;
#include <fcntl.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
int main(int
1998 Jun 16
7
Ethernet card addr <-> IP
-----BEGIN PGP SIGNED MESSAGE-----
Hi everyone -
Someone I''m working with has a requirement to map ethernet card addresses
to unique IP addresses, and then have a Linux IP masquerade server know of
this mapping list and not allow any data to pass from any ethernet card
that a) it doesn''t know about, or b) isn''t assigned the right IP. Ideally
it would also log this
1998 Jun 19
16
WARNING: Break-in attempts
Greetings all,
I''m forwarding a copy of an email I sent reporting attempted
break-ins on my main server, earth.terran.org. I am forwarding this
because I think it is relevant that folks watch for this kind of activity
in their logs to catch people who "try doorknobs" in the middle of the
night. After sending this email, I sent a talk request to the user, who
was still logged
1997 Dec 05
3
New Program: Abacus Sentry - Port Scan Detector
...9; symbols with a backslash
# to prevent problems writing out (i.e. \%c \%h )
#
#KILL_HOSTS_DENY="ALL: $TARGET$ : DENY"
###################
# External Command#
###################
# This is a command that is run when a host connects, it can be whatever
# you want it to be (ping of death, winnuke, death threat, etc.), but
# use this with caution. This command is executed before the route is
# dropped to ensure that your "package" is delivered whatever that may
# be. It is disabled by default.
#
#KILL_RUN_CMD="/some/path/here/ping_of_death $TARGET$"
###################...
1999 May 07
3
php3 module and security
...wu-ftpd to work for anonymous FTP includes what seems to be a
copy of /bin/ash as /home/ftp/bin/sh. Why the heck would they include a
bourne shell in the anon bin directory?
----don't waste your cpu, crack rc5...www.distributed.net team enzo---
Jon Lewis *jlewis@lewis.org*| Spammers will be winnuked or
System Administrator | nestea'd...whatever it takes
Atlantic Net | to get the job done.
_________http://www.lewis.org/~jlewis/pgp for PGP public key__________
From mail@mail.redhat.com Sat May 8 02:48:48 1999
Received: (qmail 7548 invoked from network); 8 May 1...
1998 Jun 06
21
Named update for RH 4.2 exploitable?
Someone I was speaking with this evening claimed they have installed the
latest named rpms yet they are still getting exploited daily and being
hacked. Do the latest rpm''s for the named 4.9.x stuff fix all the root
exploits or is this person just an idiot who probably has holes elsewhere in
the system?
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional
CC to linux-security. By the time I got around to do another
"moderation round" this one was the latest. Everyone is keeping good
context, so I think you all will be able to follow the discussion. --REW]
>>>>> <seifried@seifried.org> writes:
>> The only thing I can see coming out
1998 Jun 30
1
Patched Qpopper2.5 release Notification. (fwd)
...here. I let someone else
do that. So if you see something on another mailing list, and think
its relevant, go ahead and forward it.
Regards,
Roger Wolff
Your Moderator. ]
------------------------------------------------------------------
Jon Lewis <jlewis@fdt.net> | Spammers will be winnuked or
Network Administrator | drawn and quartered...whichever
Florida Digital Turnpike | is more convenient.
______http://inorganic5.fdt.net/~jlewis/pgp for PGP public key____
From mail@mail.redhat.com Wed Jul 8 10:27:34 1998
Received: (qmail 20318 invoked from network); 8 Jul 1998 0...