Displaying 20 results from an estimated 700 matches similar to: "AW: Scanner for mail"
1999 Nov 12
1
[RHSA-1999:054-01] Security problems in bind (fwd)
Woops... this didn't show up here but it did on BugTraq. Questions answered!
--
Chuck Mead, CTO, MoonGroup Consulting, Inc. <http://moongroup.com>
Mail problems? Send "s-u-b-s-c-r-i-b-e mailhelp" (no quotes and no
hyphens) in the body of a message to mailhelp-request@moongroup.com.
Public key available at: wwwkeys.us.pgp.net
----------
1999 Nov 23
0
DoS with sysklogd, glibc (Caldera) (fwd)
Hi,
This advisory has a bit more than the Red Hat one....
Roger.
----- Forwarded message from Alfred Huger -----
>>From owner-bugtraq@SECURITYFOCUS.COM Mon Nov 22 18:49:41 1999
Approved-By: aleph1@SECURITYFOCUS.COM
Message-ID: <Pine.GSO.4.10.9911220906250.11753-100000@www.securityfocus.com>
Date: Mon, 22 Nov 1999 09:08:08 -0800
X-Reply-To: Alfred Huger
1999 May 07
3
php3 module and security
Hi,
When php3 module is compiled in apache, files in any directory will
be interpreted by the parser and executed. This is a security breach.
There is a way to correct this? Any comments?
Thanks,
lacj
---
<levy@null.net>
Levy Carneiro Jr.
Linux & Network Admin
From mail@mail.redhat.com Sat May 8 02:32:02 1999
Received: (qmail 28372 invoked from network); 8 May 1999 07:05:57
1998 Dec 03
2
interactions between OPIE-ftpd and RH5.2
Ran into a weird problem, and this seemed a good forum to toss it out into
-- if I've gaffed, please let me know.
Just upgraded my RH5.0 box to RH5.2. Went well, worked nearly seamlessly.
When running 5.0, though, I'd installed the opie-fied ftpd that comes with
the most recent opie package (ftp://ftp.inner.net/pub/opie/opie-2.32.tar.gz)
and had it work without a hitch. I'd also
1998 Oct 29
0
Digest.
Hi,
There have been a bunch of useful submissions for the compare /contrast
thread.
To reduce the load on your mailbox, they are gathered here in one go...
Roger.
Date: Wed, 28 Oct 1998 15:11:37 +0000
From: "David L. Sifry" <dsifry@linuxcare.com>
To: "Matthew S. Crocker" <matthew@crocker.com>
CC: Rob Bringman <rob@trion.com>,
2001 Apr 15
2
data manipulation in R
Dear List:
I have a data manipulation problem that I was unable
to solve in R. I did it in SQL, and it may be that
the solution in R is to do it in SQL, but I wondered
if people could imagine a vector-based solution.
Imagine a list A[i] of observers who observe some set
of events B[j]. Each observer i may observe one or
more events, and each event j may have been observed
by one or more
2008 Mar 27
1
functions
I wrote some functions for multiway CANDECOMP, i.e. for least
squares fitting of
a_{i_1\cdots i_m}\approx\sum_{s=1}^p x^1_{i_1s}x^1_{i_1s}\cdots
x^m_{i_ms}
with arrays of arbitrary dimension. Reminded me of the good old APL
days. I could not find this in the archives, but if it's already there,
I would appreciate if someone let me know.
1998 Jun 30
1
Patched Qpopper2.5 release Notification. (fwd)
Hi,
well, swift response!
Qualcomm has a patched qpopper (2.5)
Greetings,
Jan-Philip Velders
<jpv@jvelders.tn.tudelft.nl>
---------- Forwarded message ----------
Date: Mon, 29 Jun 1998 21:43:18 -0700
From: Praveen Yaramada <pyaramad@QUALCOMM.COM>
To: BUGTRAQ@NETSPACE.ORG
Subject: Patched Qpopper2.5 release Notification.
Hello Folks,
As you are already aware that qpopper
1998 Aug 02
0
ipportfw - security
Hi
Are there any known security holes or necessary precautions in using port
forwarding with ipportfw?
I'm planning on forwarding ports from an outer firewall/router (connected
to the Internet) to a host in the DMZ, then on from the DMZ host to the
inner firewall, and finally from the inner firewall to some host on the
inside.
Thanks,
Jens
jph@strengur.is
From mail@mail.redhat.com Wed
1999 Dec 01
0
Security Patches for Slackware 7.0 Available (fwd)
---------- Forwarded message ----------
Date: Tue, 30 Nov 1999 12:14:09 -0800 (PST)
From: David Cantrell <david@slackware.com>
To: slackware-security@slackware.com
Subject: Security Patches for Slackware 7.0 Available
There are several security updates available for Slackware 7.0. We will
always post bug fixes and security fixes to the /patches subdirectory on
the ftp site:
1999 Jan 04
0
Tripwire mess..
This may be, or may not be a security issue, however, since alot of people
still use tripwire-1.2 or lesser versions(this is what shipped with R.H.
Linux 5.2 at least), they might be interested in following detail:
Chuck Campbell (campbell@neosoft.com) pointed me out that tripwire dies with
coredump on R.H. linux, if it hits a filename containing 128-255 characters.
Playing a bit with debugger I
1999 Jun 04
0
Forw: 2.2.x kernel vulnerability
below.
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Sep 02
0
SECURITY: RHSA-1999:033 Buffer overflow problem in the inews program
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow problem in the inews program
Advisory ID: RHSA-1999:033-01
Issue date: 1999-09-01
Keywords: inn inews buffer overflow
- ---------------------------------------------------------------------
1. Topic:
New packages for INN
1998 Jun 25
1
Re: syslogd communication
Hi,
There have been several replies on the syslogd question. All 2 to 4
lines long. I therefore gathered them here.
Roger.
-----------------------------------------------------------------
From: Paul Kenyon <pkenyon@loctech.com>
Date: Wed, 24 Jun 1998 11:37:01 -0500
I believe it is possible to pipe anything through SSH. I''ll find the URL to
the info and post it. I
1998 May 25
0
Circumventing write protect on ZIPDISKS.
Felix von Leitner told me:
> The [zip disk] security can be circumvented by putting a read-write
> disk in the drive, then using a needle to do the eject and inserting
> the read-only disk. Done.
> AFAIK there hasn''t been a published way to hack the protection in
> software, but I see no reason to trust them.
Regards,
Roger.
--
If it''s there and you can
1998 Sep 10
0
Authentification required again.
Hi,
I have the following problem. Users login into their NT machine and
that gets them a bunch of network drives. However the first time they
access them, they get asked for their username/password again,
although the one they gave when logging in was perfectly valid.
How did they get NT to forget the password they used to login?
Does this have anything to do with the encrypted passwords?
2000 Aug 18
0
[RHSA-2000:052-04] Zope update
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Zope update
Advisory ID: RHSA-2000:052-04
Issue date: 2000-08-11
Updated on: 2000-08-18
Product: Red Hat Powertools
Keywords: Zope
Cross references: N/A
2006 Apr 16
1
NAT problem
I want to use shorewall to setup my school network
(because using the watchguard firewall has some problem),
in school has one TrendMicro Interscan-VirusWall and one
Linux server that inculde sendmail and apache service,
the Interscan-VirusWall will receiving e-mail through
watchguard firewall and then auto scan virus if no
virus problem that will send to Linux sendmail service.
Our
1999 Oct 04
0
SuSE Security Announcement - mirror
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: mirror-2.8.f4
Date: Fri Oct 01 22:21:15 MEST 1999
Affected: all Linux distributions using mirror <= 2.8.f4
_____________________________________________________________________________
A
2004 Jul 20
4
Some users cannot read mail: assertion failed
Hi all!
I am a recent user of dovecot. First of all, the migration from UW-IMAP was definitely
worth it. But now I've run into some troubles. Two of my users complain that they
can't read their Inboxes, but other folders work fine. The error message I get in the
logs look like:
lynx imap(gheorghe.bancos): file buffer.c: line 357 (buffer_set_start_pos): assertion
failed: (abs_pos