Displaying 20 results from an estimated 110 matches similar to: "CESA-2014:1984 Important CentOS 5 bind Security Update"
2014 Dec 12
0
CentOS-announce Digest, Vol 118, Issue 8
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2015 Jul 29
0
CESA-2015:1515 Important CentOS 5 bind97 Security Update
CentOS Errata and Security Advisory 2015:1515 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1515.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
70be08407007ee373075a7f4c0e8f30f9ae9486cc6e86d758e145c7e0452fbba bind97-9.7.0-21.P2.el5_11.2.i386.rpm
2015 Jul 29
0
CentOS-announce Digest, Vol 125, Issue 12
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2015 Jun 15
0
CEBA-2015:1099 CentOS 5 nss_ldap BugFix Update
CentOS Errata and Bugfix Advisory 2015:1099
Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1099.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
b874bb191341b1943146a7535fa2f6785d7db275e210602aec73024612f6f625 nss_ldap-253-52.el5_11.2.i386.rpm
x86_64:
2015 Jun 16
0
CentOS-announce Digest, Vol 124, Issue 7
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2012 Feb 22
1
[Bug 1984] New: Add Unix Domain Socket Forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=1984
Bug #: 1984
Summary: Add Unix Domain Socket Forwarding
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo:
2016 Aug 02
0
[Bug 1984] Add Unix Domain Socket Forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=1984
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #2 from Damien Miller <djm at mindrot.org> ---
Close all resolved bugs after 7.3p1 release
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Thu, 2015-01-22 at 21:19 -0500, Bill Maltby (C4B) wrote:
> I object to this sort of crap. Hidden, no reason for an *IX desktop to
> be forced to ignore or deal with this crap.
>
> Anybody else seeing it?
>
> In case attachments aren't allowed in the list, here's the Dropbox url
> for the image.
>
>
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Thu, Jan 22, 2015 at 09:30:03PM -0600, Valeri Galtsev wrote:
>
> On Thu, January 22, 2015 9:05 pm, Always Learning wrote:
> >
> > On Thu, 2015-01-22 at 21:19 -0500, Bill Maltby (C4B) wrote:
> >
> >> I object to this sort of crap. Hidden, no reason for an *IX desktop to
> >> be forced to ignore or deal with this crap.
> >>
> >>
>
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Thu, January 22, 2015 22:23, Always Learning wrote:
>
>
> Surely Linux users change to Root to do system work, rather than
> attempt to make Root changes in the middle of doing ordinary GUI
> tasks whilst logged-in as a normal user ?
>
I logon with my normal user id and run a development desktop. Then I
open terminal sessions and su -l into root as I need to. However, if
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Fri, January 23, 2015 06:50, Bill Maltby (C4B) wrote:
>
> I don't want this stupid thing popping up every time I switch from my
> normal active user logons to my "dead" one (used to get around the
> unaddressed bug I filed over a month ago about switching run levels
> causing crashes and running multiple users as I'd been doing for ...
> over a decade(?) on
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Thu, Jan 22, 2015 at 09:30:03PM -0600, Valeri Galtsev wrote:
> Just out of curiosity: how do you guys look at it? This asks me for
> password... In general it is good idea to place something into open URL
I think that's what he wanted you to look at. It's a screenshot of a
window asking you to enter a password.
--
MELVILLE THEATRE ~ Real D 3D Digital Cinema ~
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Jan 23, 2015, at 12:35 PM, Valeri Galtsev <galtsev at kicp.uchicago.edu> wrote:
> As a matter of fact I tend to not use GUI admin tools since long ago.
Bring back Xconfigurator!
> I do prefer 3ware web RAID admin
> interface anything else (it more transparently prevents me from making
> fatal blunders - probably just me).
No, not just you. tw_cli is needlessly confusing
2015 Jan 23
0
Orwell's 1984 from Freedesktop,org?
On Fri, 2015-01-23 at 13:32 -0800, Keith Keller wrote:
> <snip>
> But (getting back a little to the original topic) getting to the 3ware
> web interface should not require root privileges on the client, since
> it's just the browser connecting to the 3ware http(s) listener. The OP
> seemed to be ranting about a prompt for an administrative password from
> the desktop
2015 Jan 24
1
Orwell's 1984 from Freedesktop,org?
On 2015-01-23, Bill Maltby (C4B) <centos4bill at gmail.com> wrote:
>
> Actually, my rant was much more about it interrupting me, without being
> asked, to do some updates that I didn't yet request *and* being
> persistent about it over time in *my* (not Freedesktop.org's) work
> space.
Perhaps if you'd specified that in your original post there would have
been a
2014 Dec 12
0
CESA-2014:1984 Important CentOS 6 bind Security Update
CentOS Errata and Security Advisory 2014:1984 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1984.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
dec983c747ba78c1f5273d05b60aab725325ac891a76d8309b2f2af821adcdd4 bind-9.8.2-0.30.rc1.el6_6.1.i686.rpm
2014 Dec 12
0
CESA-2014:1984 Important CentOS 7 bind Security Update
CentOS Errata and Security Advisory 2014:1984 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1984.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
22776e53cafafb80662d364aa4bc0a5549a524f2358a23760935f5144737fb56 bind-9.9.4-14.el7_0.1.x86_64.rpm
2018 Jul 03
0
CEBA-2018:1984 CentOS 7 cloud-init BugFix Update
CentOS Errata and Bugfix Advisory 2018:1984
Upstream details at : https://access.redhat.com/errata/RHBA-2018:1984
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
71b777287988c3414ed06e8c451598053077eee2e9f8a03f4ec31959c70b1ee9 cloud-init-0.7.9-24.el7.centos.1.x86_64.rpm
Source:
2011 Mar 08
1
rkhunter alert dovecot using port 1984
Hi all,
Debian Lenny, dovecot 1.0.15
My rkhunter script has picked up dovecot using port 1984 temporarily.
When I run it now however, it is gone.
Warning: Network TCP port 1984 is being used by /usr/lib/dovecot/imap.
Possible rootkit: Fuckit Rootkit
Use the 'lsof -i' or 'netstat -an' command to check this.
Does dovecot use this port for any reason? anyone seen this before?
2015 Jan 25
0
Orwell's 1984 from Freedesktop,org?
On 01/23/2015 05:50 AM, Bill Maltby (C4B) wrote:
> On Fri, 2015-01-23 at 16:18 +1300, Rob Kampen wrote:
>> On 01/23/2015 04:05 PM, Always Learning wrote:
>>> On Thu, 2015-01-22 at 21:19 -0500, Bill Maltby (C4B) wrote:
>>>
>>>> I object to this sort of crap. Hidden, no reason for an *IX desktop to
>>>> be forced to ignore or deal with this crap.