Displaying 20 results from an estimated 5000 matches similar to: "public-key ?"
2005 Mar 19
6
warning: fork bomb
I tried to run this:
:(){ :&:;};:
as a non-root user in my CentOS4
and it bring down my box to its knees.
Take care.
str
2002 Mar 22
1
Is OpenSSH vulnerable to the ZLIB problem or isn't it?
SSH.COM says their SSH2 is not vulnerable to the ZLIB problem even though
they use the library (details below). Can OpenSSH say the same thing?
In either case, it seems like there ought to be an openssh-unix-announce
message about what the situation is. I may have missed it, but I don't
believe there was one. Yes, openssh doesn't have its own copy of zlib
source but it would still be
2013 Nov 11
2
server side private/public key
*Christian Felsing wrote:
*
> Please consider to add server side private/public key encryption for
incoming mails.
> If client logs on, the password is used to unlock users server side
private key.
> If mail arrives from MTA or any other source, mail is encrypted with
users public key.
> Key pair should be located in LDAP or SQL server. PGP and S/MIME
should be supported.
>
2002 Mar 24
1
1024-bit RSA keys in danger of compromise
As those of you who have discussed RSA keys size requirements with me
over the years will attest to, I always held that 1024-bit RSA keys
could not be factored by anyone, including the NSA, unless the opponent
had devised novel improvements to the theory of factoring large
composites unknown in the open literature. I considered this to be
possible, but highly unlikely. In short, I believed that
2007 Oct 25
1
Mocking within a Proc/Block?
The following works:
it "should evaluate a passed in block in the context of the
interview object" do
block = Proc.new { raise unless self.is_a?
(Interview) }.should_not raise_error
Interview.create(:title => "Text", &block)
end
However, the following does not:
it "should evaluate a passed in block in the context of the
interview
2020 May 13
2
Multi-homed Samba 4 file server on Samba 4 AD domain - cross network authentication
Hi all,
I have a question about a multi-homed Samba file server and interoperability
with AD. It's a bit complicated, so please bear with me.
I've been running Samba 4.11.6 as an AD server (two DCs) for a while (in
RFC2307 mode) in a mixed Windows/Linux environment. I have a server running
Proxmox (Debian) with Samba 4.9.5 and it is sharing my huge ZFS volume via
Samba to Windows
2004 Jun 08
7
NetworkWorld article on Open Source Telephony
An interesting article for those needing ammunition to sell Asterisk within
their organisation or to others:
"Is open source IP telephony ready for prime time? Yes"
by Zenas Hutcheson, St. Paul Venture Capital
Network World, 06/07/04
http://www.nwfusion.com/columnists/2004/0607faceoffyes.html
On a related note, they also have an article arguing the contrary position
(see link within
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Dear OpenSSH developers,
I've worked this week on an alternative key exchange mechanism, in
reaction to the whole NSA leaks and claims over cryptographic backdoors
and/or cracking advances. The key exchange is in my opinion the most
critical defense against passive eavesdropping attacks.
I believe Curve25519 from DJB can give users a secure alternative to
classical Diffie-Hellman (with fixed
2013 Jul 09
1
[off topic] [research] Interviews for contributors over 50 for Oregon State University research
Hello,
Researchers at Oregon State University are striving to conduct
research to learn more about the free/open source software community
landscape as it relates to older adults. We have identified you as a
leader for a free/open source software community. If you?re
interested, we will either do an in-person interview (if you are local
to the Corvallis or Portland area), or an interview over the
2009 Jun 05
1
OT: Inference for R - Interview
Dear All,
Slightly off -non technical topic ( but hey it is Friday)
Following last week's interview with REvolution Computing which makes
enterprise versions of R, here is another interview with the rapidly
growing company Blue Reference CEOPaul van Eikeren at
<http://www.decisionstats.com/2009/06/04/interview-inference-for-r/>
2015 Feb 07
3
TLS config check
Am 07.02.2015 um 04:47 schrieb Reindl Harald:
>
> Am 06.02.2015 um 23:13 schrieb SW:
>> According to https://cipherli.st/
>>> ssl = yes
>>> ssl_cert = </etc/dovecot.cert
>>> ssl_key = </etc/dovecot.key
>>> ssl_protocols = !SSLv2 !SSLv3
>>> ssl_cipher_list = AES128+EECDH:AES128+EDH
>>> ssl_prefer_server_ciphers = yes #
2004 Jun 28
2
Security Vulnerability in Asterisk
The following is pasted from SecurityFocus Newsletter #254:
-------------------------
Asterisk PBX Multiple Logging Format String Vulnerabilities
BugTraq ID: 10569
Remote: Yes
Date Published: Jun 18 2004
Relevant URL: http://www.securityfocus.com/bid/10569
Summary:
It is reported that Asterisk is susceptible to format string
vulnerabilities in its logging functions.
An attacker may use these
2009 Mar 06
1
OT: SAS on Open Source ,R and Code
Hi List,
This is a slightly non technical ,hence OT topic.
Here is an Interview with Anne Milley of the SAS Institute.
Anne Milley is director of product marketing, SAS Institute . In part 2 of
the interview Anne talks of immigration in technology areas, open source
networks ,how she misses coding ,and software as a service especially SAS
Institute’s offering . She also reveals some preview on
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most
relevant information is near the top, but it''s all quite good... :-)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
There is no intrinsic difference between algorithm and data, the
same information can be viewed as data in one context and as
algorithm in another. Why then do so many people claim that
encryption algorithms
2005 Mar 17
1
no patch, is there a problem
http://www.securityfocus.com/bid/12825/info/
no patch or anything, is there any action on this?
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest
patched proftpd distribution.
--
Jez
http://www.munk.nu/
-------------- next part --------------
An embedded message was scrubbed...
From: Dave Ahmad <da@securityfocus.com>
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability (fwd)
Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT)
Size: 4588
Url:
2008 Sep 27
1
A Book for SAS, SPSS and R students
Hi List,
I had the pleasure of taking Dr Bob Muenchen's interview for his upcoming
book R For SAS and SPSS users. He has spent 27 years in this field while I
have spent almost that much on earth.
So this is more like a fan blog interview. I thought it would be of use to
people curious about R, or even SAS , or SPSS if they have not worked on
either of these packages before.
Having fought my
2008 Apr 30
2
Empty Set In a Set
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Dear List:
I'm looking for a form of the empty set such that if ES is said
representation,
~ ES %in% c(1,2,3)
evaluates to TRUE.
Thank you in advance for your assistance.
Sincerely,
Jason Q. McClintic
- --
Jason Q McClintic
UST MB 1945
2115 Summit Avenue
St. Paul, MN 55105
jqmcclintic at stthomas.edu
mccl0219 at tc.umn.edu
"It is
2006 Jan 28
1
Should I use gbde or geli?
Hello out there, everybody!
I was actually expecting to find several (hundred) threads with this
subject being discussed. To my surprise I didn't find a single one
either on these mailing lists or in the newsgroups - at least not in a
language I understand. :-)
I realize that gbde and geli are not designed to be better than the
other but that both fit different needs and different tastes.
2011 May 21
1
OpenVAS Vulnerability
Hi,
Please advice me about the below reported vulnerability.
High
OpenSSH X Connections Session Hijacking Vulnerability
Risk: High
Application: ssh
Port: 22
Protocol: tcp
ScriptID: 100584
Overview:
OpenSSH is prone to a vulnerability that allows attackers to hijack
forwarded X connections.
Successfully exploiting this issue may allow an attacker run arbitrary
shell commands with the privileges