similar to: icecast security

Displaying 20 results from an estimated 1200 matches similar to: "icecast security"

2004 Aug 06
0
How do I unsubscribe!
HiGuys I have been trying to unsubscribe from this list for 2 weeks nw - at least 20 requests using the right email addy etc - please, remove me from the list, I realise this is not suppsed to be the place to ask BUT nothing else has worked. phr33k@i4free.co.nz is the emal addy. Zac <p>----- Original Message ----- From: "udo noll" <un@aporee.org> To: <icecast@xiph.org>
2004 Aug 06
1
The best way to DVD
At 02:44 PM 1/21/2002 +1300, "i4free" <phr33k@i4free.co.nz> wrote: >FUCK OFF <snip> You do realize that the spammer didn't see that, and that it only went out to the list eh? What with them not being subscribed and it being a bogus email addy etc, etc. So spare us next time. Thanks -Mark <p><p>--- >8 ---- List archives:
2004 Aug 06
2
The best way to DVD
COPY YOUR DVD's!! Why Spend upwards of $4000 on a DVD Burner when we will show you an alternative that will do the exact same thing for only $19.95? You heard us right - for the price of just 1 DVD's, we'll show you how to back up and/or create Your Own DVD's! Just upgraded to a DVD and still have a ton of VHS tapes lying around? With this program, not only can you burn &
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest patched proftpd distribution. -- Jez http://www.munk.nu/ -------------- next part -------------- An embedded message was scrubbed... From: Dave Ahmad <da@securityfocus.com> Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd) Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT) Size: 4588 Url:
1999 Dec 04
2
confusion over RSAref vul w/OpenSS[HL]
Howdy, The string of notices on BugTraq about RSAref being vulnerable to overflows has me concerned. After trying to sort through all the messages, I can't figure out whether I need to update OpenSSL (a check of their website indicates no new patches), OpenSSH, both, or neither. I am aware there is no known exploit for it yet. I could be a bad boy and just run all
2004 Jun 28
2
Security Vulnerability in Asterisk
The following is pasted from SecurityFocus Newsletter #254: ------------------------- Asterisk PBX Multiple Logging Format String Vulnerabilities BugTraq ID: 10569 Remote: Yes Date Published: Jun 18 2004 Relevant URL: http://www.securityfocus.com/bid/10569 Summary: It is reported that Asterisk is susceptible to format string vulnerabilities in its logging functions. An attacker may use these
2005 Mar 17
1
no patch, is there a problem
http://www.securityfocus.com/bid/12825/info/ no patch or anything, is there any action on this?
2007 Jan 10
1
Recent vulnerabilities in xorg-server
Colin, good day! Spotted two patches for x11-servers/xorg-server port: see entries for x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html Seems like they are not applied to the xorg-server-6.9.0_5. May be it should be added to the VuXML document? There is a ports/107733 issue that incorporates these patches. May be you
2003 Mar 31
8
what was that?
What does mean this bizarre msgid? maillog: Mar 31 19:31:15 cu sm-mta[5352]: h2VFVEGS005352: from=<nb@sindbad.ru>, size=1737, class=0, nrcpts=1, msgid=<!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAfp4Fa2ShPE2u4pP/QpPDIMKAAAAQAAAAj+zb4Isbuk+tYEPVF9Vf, proto=ESMTP, daemon=MTA, relay=wg.pu.ru [193.124.85.219] -- Nikolaj I. Potanin, SA http://www.drweb.ru ID
2003 Jul 11
2
Cisco 7960s
Cisco should really be ashamed of this product... While it is physically well constructed, and has excellent sound quality along with a very pleasant user interface, the device has SERIOUS stability issues, unless you run your network with an iron fist... Quite by accident, while configuring my Asterisk system to connect to a Cisco 7960 via SIP in a standard office PBX type arrangement, I
2001 Jun 02
3
Recent breakins / SSHD root hole?
The trojaned ssh client is nothing new to the hacker community, and the statement in the previous thread claiming "This type of man-in-the-middle attack (trojaned ssh) is not theoretical anymore, and password authentication is broken." is an example of how many poeple still think "hacking" is something very difficult and nothing short of a genius is required to make the
1999 Nov 18
2
md5,des etc..
Hoping that this is not OT.. Hi I want to write a simple perl script to see if my system supports des or md5 as the password encryption scheme..what is the easiest way.. one of course is to look at the /etc/shadow file and then parsing the passwd field, any better way..?? Thx, Arni
2007 Sep 28
2
OpenSSL bufffer overflow
I did not see any commits to the OpenSSL code, recently; is anybody going to commit the fix? See http://www.securityfocus.com/archive/1/480855/30/0 for details ... Regards, STefan
2002 Jun 24
2
Upcoming OpenSSH vulnerability
On Mon, Jun 24, 2002 at 03:00:10PM -0600, Theo de Raadt wrote: > Date: Mon, 24 Jun 2002 15:00:10 -0600 > From: Theo de Raadt <deraadt at cvs.openbsd.org> > Subject: Upcoming OpenSSH vulnerability > To: bugtraq at securityfocus.com > Cc: announce at openbsd.org > Cc: dsi at iss.net > Cc: misc at openbsd.org > > There is an upcoming OpenSSH vulnerability that
2002 Jun 24
2
Upcoming OpenSSH vulnerability
On Mon, Jun 24, 2002 at 03:00:10PM -0600, Theo de Raadt wrote: > Date: Mon, 24 Jun 2002 15:00:10 -0600 > From: Theo de Raadt <deraadt at cvs.openbsd.org> > Subject: Upcoming OpenSSH vulnerability > To: bugtraq at securityfocus.com > Cc: announce at openbsd.org > Cc: dsi at iss.net > Cc: misc at openbsd.org > > There is an upcoming OpenSSH vulnerability that
2002 Mar 25
1
Rsync ownership/group/permission on Windows and Linux question
Hi, all, I'd like to know if there is a way to set the ownership/group/permission when you are transfering files from a Windows clients to a Linux rsync server. I've tried following configurations, and none of them work. rsync -av --owner=test -g MyFolder 192.168.100.1::backup/test rsync -av --owner=500 -g MyFolder --numeric-ids 192.168.100.1::backup/test (500 is numeric id for user
2000 Feb 28
3
SSH & xauth (fwd)
YO All! Have you guys been following the SSH discussion on Bugtraq lately? I like their idea the X forwarding should be OFF by default on the client. RGDS GARY --------------------------------------------------------------------------- Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701 gem at rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676 ---------- Forwarded message
2020 Nov 03
2
Group with RWX acl cannot delete as file/dir owned by user with RWX
Thank you for any help with this: Using xattr so that I can manage a domain joined Samba server share with AD permissions. The underlying OS file perms are 777 and I have set the share with -R a+w to make sure that permissions for owner and group are the same. Getfacl returns: # file: deleteme.txt # owner: root # group: group_access user::rwx group::rwx group:group_access:rwx mask::rwx
2003 Apr 30
4
Portable OpenSSH: Dangerous AIX linker behavior (aixgcc.adv)
1. Systems affected: Users of Portable OpenSSH prior to 3.6.1p2 on AIX are affected if OpenSSH was compiled using a non-AIX compiler (e.g. gcc). Please note that the IBM-supplied OpenSSH packages[1] are not vulnerable. 2. Description: The default behavior of the runtime linker on AIX is to search the current directory for dynamic libraries before searching system paths. This is done
2003 Apr 30
4
Portable OpenSSH: Dangerous AIX linker behavior (aixgcc.adv)
1. Systems affected: Users of Portable OpenSSH prior to 3.6.1p2 on AIX are affected if OpenSSH was compiled using a non-AIX compiler (e.g. gcc). Please note that the IBM-supplied OpenSSH packages[1] are not vulnerable. 2. Description: The default behavior of the runtime linker on AIX is to search the current directory for dynamic libraries before searching system paths. This is done