Displaying 20 results from an estimated 600 matches similar to: "Re: Mail Delivery (failure security-alert@hp.com)"
2004 Aug 16
0
Re: Re: Secure delivery
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is an automated response to e-mail sent to
security-alert@hp.com.
All potential security issues submitted will be
carefully reviewed by the HP Software Security
Response Team (SSRT).
A follow-up message will be returned to confirm that
we are investigating and if necessary to request
additional information.
Any non-security issue or
2004 Oct 24
0
Re: Re: information
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is an automated response to e-mail sent to
security-alert@hp.com.
All potential security issues submitted will be
carefully reviewed by the HP Software Security
Response Team (SSRT).
A follow-up message will be returned to confirm that
we are investigating and if necessary to request
additional information.
Any non-security issue or
2005 Jan 03
1
Re: Re: Your bill
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is an automated response to e-mail sent to
security-alert@hp.com.
All potential security issues submitted will be
carefully reviewed by the HP Software Security
Response Team (SSRT).
A follow-up message will be returned to confirm that
we are investigating and if necessary to request
additional information.
Any non-security issue or
2006 Jun 20
0
RE Network UPS Tools - ID string
Hi John,
I've forwarded your info to the nut development list, and to Carlos who's
in charge of the megatec driver.
This one, which is only available in the subversion development tree,
and soon in 2.0.4, will replace the fentonups driver.
So you're encouraged to test it and report back.
Arnaud Quette
--
Linux / Unix Expert - MGE UPS SYSTEMS - R&D Dpt
Network UPS Tools (NUT)
2011 Mar 17
0
Asterisk not logging originating IP of a brute force attack
Why do attacks from the Internet get shown in the Asterisk logs with
myAsteriskServerIP instead of the attacker's IP?! Really useful for
blocking them, that is... Example:
[Mar 6 00:00:00] NOTICE[1926] chan_sip.c: Failed to authenticate user
5550000<sip:5550000 at myAsteriskServerIP>;tag=ab8537ae
(I replaced our IP address with myAsteriskServerIP. The attacks are not
coming from
2012 Jul 15
0
[Freenas-announce] FreeNAS 8.2.0-RC1
Opensolaris this ain''t, but zfs-related nevertheless.
----- Forwarded message from Josh Paetzel <josh at ixsystems.com> -----
From: Josh Paetzel <josh at ixsystems.com>
Date: Fri, 13 Jul 2012 12:01:24 -0700
To: freenas-announce at lists.sourceforge.net
Subject: [Freenas-announce] FreeNAS 8.2.0-RC1
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64;
rv:12.0) Gecko/20120506
2007 Apr 30
1
centos 5 - iintruder alert, intruder alert
CentOS 5 - Intruder alert
Somebody that uses windows has infiltrated the upstream.
Alert, alert, weeeeep weeeeeeeeepppp bweeeeeeeeeepppppp screeeeeccchhhhhh
:-)
[root at tstream11 ~]# ls -axl /bin/tracert
lrwxrwxrwx 1 root root 10 Apr 20 17:56 /bin/tracert -> traceroute
- rh
--
Abba Communications Internet
Spokane, WA
www.abbacomm.net
2008 Nov 29
1
Re: Red Alert / Red Alert II / Tiberium Sun: Overriding wsock32.
Using posix file capabilties you can give wine only root permissions for creating raw sockets. A lot of distributions are doing something similar these days for ping which also required complete root permissions before.
2008 Dec 01
0
Re: Red Alert / Red Alert II / Tiberium Sun: Overriding wsock32.
When I worked on Wine's ipx code for Red Alert and friends posix file capabilities weren't around yet. I haven't used them yet. You can find info about it on http://www.ibm.com/developerworks/library/l-posixcap.html
I think that you need to set the property on wineserver.
2017 Jan 31
0
tlsv1 alert unknown ca: SSL alert number 48
> Jan 28 22:42:44 dovecot: imap-login: Disconnected (no auth attempts in 0
> secs): user=<>, rip=192.168.1.16, lip=192.168.1.3, TLS: SSL_read()
> failed: error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown
> ca: SSL alert number 48, session=
> ...
> # SSL/TLS support: yes, no, required. <doc/wiki/SSL.txt>
> ssl = yes
> ssl_cert =
2016 Jun 18
3
tlsv1 alert unknown ca: SSL alert number 48
The version of Roundcube I am using is 0.9.5+dfsg1-4.1
2016 Jun 15
2
tlsv1 alert unknown ca: SSL alert number 48
Hi,
I have set up a mail server with postfix+dovecot 2.2.13 on my raspberry pi
running Raspbian Jassie OS.
Now I would like to add an on-line e-mail client like Squirrelmail or
Roundcube. I was able to start up these two clients but when I try to login
I get this error message in the dovecot log:
tlsv1 alert unknown ca: SSL alert number 48
But I have inserted the self-signed certificate and
2008 Nov 28
1
Red Alert / Red Alert II / Tiberium Sun: Overriding wsock32.dll to avoid IPX
Background:
Red Alert / Red Alert II / C&C / Tiberium Sun uses IPX for LAN play.
According to AppDB, this works, at least for Red Alert II (Orginal RA
is not on the first page of Google results...), but it requires Wine
to be run as root.
Since I do not have IPX installed and I'm not normally in a mood to
recompile my kernel, and the Windows users that I want to play against
do want to
2016 Jun 18
2
tlsv1 alert unknown ca: SSL alert number 48
I've tried to install the new version of Roundcube but I've got an error
message:
Unpacking roundcube (1.1.5+dfsg.1-1~bpo8+1) ...
Errors were encountered while processing:
/var/cache/apt/archives/roundcube-core_1.1.5+dfsg.1-1~bpo8+1_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
If anybody can give me instructions on how to correct this, perhaps I should
1998 May 28
0
ALERT: Tiresome security hole in "xosview", RedHat5.1?
Hi,
I am bemused.
After some security auditing on RH5.0, I was curious as to what new suid
binaries and daemons shipped with RH5.1. The first one I noticed was
"xosview". God knows why it needs to be SUID; it probably doesn''t but the
makefile just makes the binary suid by default. Linux has /proc which has
enough information that ferreting around in /dev/kmem using root privs
1997 Mar 24
0
Re: [linux-alert] More sendmail problems... Partition your disks!
[Mod: redirected to linux-security --alex]
On Mon, 24 Mar 1997, Alexander O. Yuriev wrote:
>This is yet-another reason to _partition_ your disks. Of course hard links
>do not work accross filesystems. Even thought it is a pain in the neck to do
>when installing your operating system, think about separating critical
>system files from non-critical and non-system files from system
1997 Mar 24
0
Re: Re: [linux-alert] More sendmail problems...
[Mod: trimmed -- alex]
> > /tmp (nosuid,noexec,nodev)
> > /var (nosuid,noexec,nodev)
>
> Red Hat Linux, at least, won''t like this, as the Red Hat Package Manager,
> "rpm", builds scripts in and attempts to execute scripts out of /tmp. =(
By default. You can configure the temp directory used with /etc/rpmrc.
-Marc
1996 Nov 18
0
New moderator, linux-alert lists'' consolidation.
-----BEGIN PGP SIGNED MESSAGE-----
The linux-alert-digest list has now been consolidated with the
linux-alert list.
There wasn''t nearly enough traffic on the linux-alert list to justify
its having a separate digest list; subscribers to linux-alert-digest
tended to receive the same number of e-mail messages as subscribers to
linux-alert, only with an additional time lag of up to a
2004 Jan 28
0
InterScan NT Alert
Attenzione: un virus e'' stato rilevato come allegato alla Sua e-mail
Date: Wed, 28 Jan 2004 19:44:48 +0100
Method: Mail
From: <shorewall-devel@lists.shorewall.net>
To: info.ps@marche.fip.it
File: document.zip
Action: deleted
Virus: WORM_MIMAIL.R
2005 Mar 30
0
This is an alert from eSafe
*** eSafe detected hostile content in this email. ***
Time: 30 Mar 2005 09:44:48
Scan result: Mail modified to remove malicious content
Protocol: SMTP in
File Name\Mail Subject: mail_1111940701: Hello
Source: samba@samba.org
Destination: info@vis.gr
Details: Notice.zip\Notice.txt