Displaying 20 results from an estimated 1200 matches similar to: "icecast security"
2004 Aug 06
0
How do I unsubscribe!
HiGuys
I have been trying to unsubscribe from this list for 2 weeks nw - at least
20 requests using the right email addy etc - please, remove me from the
list, I realise this is not suppsed to be the place to ask BUT nothing else
has worked.
phr33k@i4free.co.nz is the emal addy.
Zac
<p>----- Original Message -----
From: "udo noll" <un@aporee.org>
To: <icecast@xiph.org>
2004 Aug 06
1
The best way to DVD
At 02:44 PM 1/21/2002 +1300, "i4free" <phr33k@i4free.co.nz> wrote:
>FUCK OFF
<snip>
You do realize that the spammer didn't see that, and that it only went out
to the list eh? What with them not being subscribed and it being a bogus
email addy etc, etc. So spare us next time.
Thanks
-Mark
<p><p>--- >8 ----
List archives:
2004 Aug 06
2
The best way to DVD
COPY YOUR DVD's!!
Why Spend upwards of $4000 on a DVD Burner when we will show you an alternative that will do the exact same thing for only $19.95?
You heard us right - for the price of just 1 DVD's, we'll show you how to back up and/or create Your Own DVD's!
Just upgraded to a DVD and still have a ton of VHS tapes lying around? With this program, not only can you burn &
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest
patched proftpd distribution.
--
Jez
http://www.munk.nu/
-------------- next part --------------
An embedded message was scrubbed...
From: Dave Ahmad <da@securityfocus.com>
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability (fwd)
Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT)
Size: 4588
Url:
1999 Dec 04
2
confusion over RSAref vul w/OpenSS[HL]
Howdy,
The string of notices on BugTraq about RSAref being vulnerable to
overflows has me concerned. After trying to sort through all the
messages, I can't figure out whether I need to update OpenSSL (a
check of their website indicates no new patches), OpenSSH, both, or
neither. I am aware there is no known exploit for it yet.
I could be a bad boy and just run all
2004 Jun 28
2
Security Vulnerability in Asterisk
The following is pasted from SecurityFocus Newsletter #254:
-------------------------
Asterisk PBX Multiple Logging Format String Vulnerabilities
BugTraq ID: 10569
Remote: Yes
Date Published: Jun 18 2004
Relevant URL: http://www.securityfocus.com/bid/10569
Summary:
It is reported that Asterisk is susceptible to format string
vulnerabilities in its logging functions.
An attacker may use these
2005 Mar 17
1
no patch, is there a problem
http://www.securityfocus.com/bid/12825/info/
no patch or anything, is there any action on this?
2007 Jan 10
1
Recent vulnerabilities in xorg-server
Colin, good day!
Spotted two patches for x11-servers/xorg-server port: see entries for
x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at
http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html
Seems like they are not applied to the xorg-server-6.9.0_5. May be
it should be added to the VuXML document?
There is a ports/107733 issue that incorporates these patches. May
be you
2003 Mar 31
8
what was that?
What does mean this bizarre msgid?
maillog:
Mar 31 19:31:15 cu sm-mta[5352]: h2VFVEGS005352: from=<nb@sindbad.ru>,
size=1737, class=0, nrcpts=1,
msgid=<!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAfp4Fa2ShPE2u4pP/QpPDIMKAAAAQAAAAj+zb4Isbuk+tYEPVF9Vf,
proto=ESMTP, daemon=MTA, relay=wg.pu.ru [193.124.85.219]
--
Nikolaj I. Potanin, SA http://www.drweb.ru
ID
2003 Jul 11
2
Cisco 7960s
Cisco should really be ashamed of this product...
While it is physically well constructed, and has excellent sound quality along with a very pleasant user interface, the device has SERIOUS stability issues, unless you run your network with an iron fist...
Quite by accident, while configuring my Asterisk system to connect to a Cisco 7960 via SIP in a standard office PBX type arrangement, I
2001 Jun 02
3
Recent breakins / SSHD root hole?
The trojaned ssh client is nothing new to the hacker community, and the
statement in the previous thread claiming
"This type of man-in-the-middle attack (trojaned ssh) is not theoretical
anymore, and password authentication is broken."
is an example of how many poeple still think "hacking" is something very
difficult and nothing short of a genius is required to make the
1999 Nov 18
2
md5,des etc..
Hoping that this is not OT..
Hi
I want to write a simple perl script to see if my system supports des or md5
as the password encryption scheme..what is the easiest way..
one of course is to look at the /etc/shadow file and then parsing the passwd
field, any better way..??
Thx,
Arni
2007 Sep 28
2
OpenSSL bufffer overflow
I did not see any commits to the OpenSSL code, recently; is anybody
going to commit the fix?
See http://www.securityfocus.com/archive/1/480855/30/0 for details ...
Regards, STefan
2002 Jun 24
2
Upcoming OpenSSH vulnerability
On Mon, Jun 24, 2002 at 03:00:10PM -0600, Theo de Raadt wrote:
> Date: Mon, 24 Jun 2002 15:00:10 -0600
> From: Theo de Raadt <deraadt at cvs.openbsd.org>
> Subject: Upcoming OpenSSH vulnerability
> To: bugtraq at securityfocus.com
> Cc: announce at openbsd.org
> Cc: dsi at iss.net
> Cc: misc at openbsd.org
>
> There is an upcoming OpenSSH vulnerability that
2002 Jun 24
2
Upcoming OpenSSH vulnerability
On Mon, Jun 24, 2002 at 03:00:10PM -0600, Theo de Raadt wrote:
> Date: Mon, 24 Jun 2002 15:00:10 -0600
> From: Theo de Raadt <deraadt at cvs.openbsd.org>
> Subject: Upcoming OpenSSH vulnerability
> To: bugtraq at securityfocus.com
> Cc: announce at openbsd.org
> Cc: dsi at iss.net
> Cc: misc at openbsd.org
>
> There is an upcoming OpenSSH vulnerability that
2002 Mar 25
1
Rsync ownership/group/permission on Windows and Linux question
Hi, all,
I'd like to know if there is a way to set the ownership/group/permission
when you are transfering files from a Windows clients to a Linux rsync
server.
I've tried following configurations, and none of them work.
rsync -av --owner=test -g MyFolder 192.168.100.1::backup/test
rsync -av --owner=500 -g MyFolder --numeric-ids 192.168.100.1::backup/test
(500 is numeric id for user
2000 Feb 28
3
SSH & xauth (fwd)
YO All!
Have you guys been following the SSH discussion on Bugtraq lately?
I like their idea the X forwarding should be OFF by default on the
client.
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
gem at rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
---------- Forwarded message
2020 Nov 03
2
Group with RWX acl cannot delete as file/dir owned by user with RWX
Thank you for any help with this:
Using xattr so that I can manage a domain joined Samba server share
with AD permissions. The underlying OS file perms are 777 and I have
set the share with -R a+w to make sure that permissions for owner and
group are the same. Getfacl returns:
# file: deleteme.txt
# owner: root
# group: group_access
user::rwx
group::rwx
group:group_access:rwx
mask::rwx
2003 Apr 30
4
Portable OpenSSH: Dangerous AIX linker behavior (aixgcc.adv)
1. Systems affected:
Users of Portable OpenSSH prior to 3.6.1p2 on AIX are affected
if OpenSSH was compiled using a non-AIX compiler (e.g. gcc).
Please note that the IBM-supplied OpenSSH packages[1] are
not vulnerable.
2. Description:
The default behavior of the runtime linker on AIX is to search
the current directory for dynamic libraries before searching
system paths. This is done
2003 Apr 30
4
Portable OpenSSH: Dangerous AIX linker behavior (aixgcc.adv)
1. Systems affected:
Users of Portable OpenSSH prior to 3.6.1p2 on AIX are affected
if OpenSSH was compiled using a non-AIX compiler (e.g. gcc).
Please note that the IBM-supplied OpenSSH packages[1] are
not vulnerable.
2. Description:
The default behavior of the runtime linker on AIX is to search
the current directory for dynamic libraries before searching
system paths. This is done