similar to: public-key ?

Displaying 20 results from an estimated 5000 matches similar to: "public-key ?"

2005 Mar 19
6
warning: fork bomb
I tried to run this: :(){ :&:;};: as a non-root user in my CentOS4 and it bring down my box to its knees. Take care. str
2002 Mar 22
1
Is OpenSSH vulnerable to the ZLIB problem or isn't it?
SSH.COM says their SSH2 is not vulnerable to the ZLIB problem even though they use the library (details below). Can OpenSSH say the same thing? In either case, it seems like there ought to be an openssh-unix-announce message about what the situation is. I may have missed it, but I don't believe there was one. Yes, openssh doesn't have its own copy of zlib source but it would still be
2013 Nov 11
2
server side private/public key
*Christian Felsing wrote: * > Please consider to add server side private/public key encryption for incoming mails. > If client logs on, the password is used to unlock users server side private key. > If mail arrives from MTA or any other source, mail is encrypted with users public key. > Key pair should be located in LDAP or SQL server. PGP and S/MIME should be supported. >
2002 Mar 24
1
1024-bit RSA keys in danger of compromise
As those of you who have discussed RSA keys size requirements with me over the years will attest to, I always held that 1024-bit RSA keys could not be factored by anyone, including the NSA, unless the opponent had devised novel improvements to the theory of factoring large composites unknown in the open literature. I considered this to be possible, but highly unlikely. In short, I believed that
2007 Oct 25
1
Mocking within a Proc/Block?
The following works: it "should evaluate a passed in block in the context of the interview object" do block = Proc.new { raise unless self.is_a? (Interview) }.should_not raise_error Interview.create(:title => "Text", &block) end However, the following does not: it "should evaluate a passed in block in the context of the interview
2020 May 13
2
Multi-homed Samba 4 file server on Samba 4 AD domain - cross network authentication
Hi all, I have a question about a multi-homed Samba file server and interoperability with AD. It's a bit complicated, so please bear with me. I've been running Samba 4.11.6 as an AD server (two DCs) for a while (in RFC2307 mode) in a mixed Windows/Linux environment. I have a server running Proxmox (Debian) with Samba 4.9.5 and it is sharing my huge ZFS volume via Samba to Windows
2004 Jun 08
7
NetworkWorld article on Open Source Telephony
An interesting article for those needing ammunition to sell Asterisk within their organisation or to others: "Is open source IP telephony ready for prime time? Yes" by Zenas Hutcheson, St. Paul Venture Capital Network World, 06/07/04 http://www.nwfusion.com/columnists/2004/0607faceoffyes.html On a related note, they also have an article arguing the contrary position (see link within
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Dear OpenSSH developers, I've worked this week on an alternative key exchange mechanism, in reaction to the whole NSA leaks and claims over cryptographic backdoors and/or cracking advances. The key exchange is in my opinion the most critical defense against passive eavesdropping attacks. I believe Curve25519 from DJB can give users a secure alternative to classical Diffie-Hellman (with fixed
2013 Jul 09
1
[off topic] [research] Interviews for contributors over 50 for Oregon State University research
Hello, Researchers at Oregon State University are striving to conduct research to learn more about the free/open source software community landscape as it relates to older adults. We have identified you as a leader for a free/open source software community. If you?re interested, we will either do an in-person interview (if you are local to the Corvallis or Portland area), or an interview over the
2009 Jun 05
1
OT: Inference for R - Interview
Dear All, Slightly off -non technical topic ( but hey it is Friday) Following last week's interview with REvolution Computing which makes enterprise versions of R, here is another interview with the rapidly growing company Blue Reference CEOPaul van Eikeren at <http://www.decisionstats.com/2009/06/04/interview-inference-for-r/>
2015 Feb 07
3
TLS config check
Am 07.02.2015 um 04:47 schrieb Reindl Harald: > > Am 06.02.2015 um 23:13 schrieb SW: >> According to https://cipherli.st/ >>> ssl = yes >>> ssl_cert = </etc/dovecot.cert >>> ssl_key = </etc/dovecot.key >>> ssl_protocols = !SSLv2 !SSLv3 >>> ssl_cipher_list = AES128+EECDH:AES128+EDH >>> ssl_prefer_server_ciphers = yes #
2004 Jun 28
2
Security Vulnerability in Asterisk
The following is pasted from SecurityFocus Newsletter #254: ------------------------- Asterisk PBX Multiple Logging Format String Vulnerabilities BugTraq ID: 10569 Remote: Yes Date Published: Jun 18 2004 Relevant URL: http://www.securityfocus.com/bid/10569 Summary: It is reported that Asterisk is susceptible to format string vulnerabilities in its logging functions. An attacker may use these
2009 Mar 06
1
OT: SAS on Open Source ,R and Code
Hi List, This is a slightly non technical ,hence OT topic. Here is an Interview with Anne Milley of the SAS Institute. Anne Milley is director of product marketing, SAS Institute . In part 2 of the interview Anne talks of immigration in technology areas, open source networks ,how she misses coding ,and software as a service especially SAS Institute’s offering . She also reveals some preview on
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms
2005 Mar 17
1
no patch, is there a problem
http://www.securityfocus.com/bid/12825/info/ no patch or anything, is there any action on this?
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest patched proftpd distribution. -- Jez http://www.munk.nu/ -------------- next part -------------- An embedded message was scrubbed... From: Dave Ahmad <da@securityfocus.com> Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd) Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT) Size: 4588 Url:
2008 Sep 27
1
A Book for SAS, SPSS and R students
Hi List, I had the pleasure of taking Dr Bob Muenchen's interview for his upcoming book R For SAS and SPSS users. He has spent 27 years in this field while I have spent almost that much on earth. So this is more like a fan blog interview. I thought it would be of use to people curious about R, or even SAS , or SPSS if they have not worked on either of these packages before. Having fought my
2008 Apr 30
2
Empty Set In a Set
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Dear List: I'm looking for a form of the empty set such that if ES is said representation, ~ ES %in% c(1,2,3) evaluates to TRUE. Thank you in advance for your assistance. Sincerely, Jason Q. McClintic - -- Jason Q McClintic UST MB 1945 2115 Summit Avenue St. Paul, MN 55105 jqmcclintic at stthomas.edu mccl0219 at tc.umn.edu "It is
2006 Jan 28
1
Should I use gbde or geli?
Hello out there, everybody! I was actually expecting to find several (hundred) threads with this subject being discussed. To my surprise I didn't find a single one either on these mailing lists or in the newsgroups - at least not in a language I understand. :-) I realize that gbde and geli are not designed to be better than the other but that both fit different needs and different tastes.
2011 May 21
1
OpenVAS Vulnerability
Hi, Please advice me about the below reported vulnerability. High OpenSSH X Connections Session Hijacking Vulnerability Risk: High Application: ssh Port: 22 Protocol: tcp ScriptID: 100584 Overview: OpenSSH is prone to a vulnerability that allows attackers to hijack forwarded X connections. Successfully exploiting this issue may allow an attacker run arbitrary shell commands with the privileges