what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files from Benjamin Thomas

Email addressben at linuxsecurity.com
First Active2000-05-22
Last Active2000-09-14
linux-security.1-19n.txt
Posted Sep 14, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

LinuxSecurity.com Weekly Newsletter for September 11, 2000. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. This weeks issue contains How to perform a secure remote backup, Introduction to Unix permissions, Using Postfix: A basic guide on configuring and installing, Booting without all the extras, Firewalls - Common Configuration Problems, Amateur Fortress Building in Linux, Authentication: Patterns of Trust, Solar Designer's 2.2.17 Kernel Patch, Network ICE Releases Open-source Carnivore, Researchers refuse Carnivore review, and more.

tags | remote, kernel
systems | linux, unix
SHA-256 | 405dc01a9e4a17a465e19d9459e3373c2f2007a278f549111db49660b981ce83
linux-advisory.1-19a.txt
Posted Sep 8, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Advisory Watch for September 8th, 2000. Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for glibc, screen, apache, and suidperl from Caldera, Conectiva, Debian, Mandrake, Slackware, SuSE, and Trustix.

tags | vulnerability
systems | linux, suse, slackware, debian, mandrake
SHA-256 | 58e4fa5accfb242abf0994a96a96bd8ca1fa2451c8d22c4f82165eca1089d646
linux-security.1-18.txt
Posted Sep 6, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week September 4 - In this issue: Our feature this week, "Setting up a Linux Log Server to enhance System Security," provides clear step-by-step information on how to setup a log server. Also includes papers on Intrusion Detection Level Analysis of Nmap and Queso, PAM - Pluggable Authentication Modules, Anyone with a Screwdriver Can Break In (physical linux security), Inexpensive measures to solve security problems, Attacking Linux, Firewalls - Placement, The Emotional Side of Cryptography, Ain't no network strong enough, Encryption Could Starve Carnivore, The next era for Internet security, Review of Debian 2.2 Security, Justice shops for Carnivore review, Interview with Lance Spitzner, and much more.

systems | linux, debian
SHA-256 | aefdff8aa8f24da5bd0762cdef4f41253f50fc7ba00b9c7809ec4771ee7a0b13
linux-security.1-15.txt
Posted Aug 7, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week August 7 - In this issue: Advisories for mailman, netscape, cvsweb, kon2, and pam_console. Of these, remote root vulnerabilities are present in cvsweb and kon2. Also includes a feature article on the US and UK governments wanting to install a device on public networks to monitor traffic for suspected criminal activity, Interivew with Jasta: coder of Gnapster, Discussion of "Linux Sux Redux" Issue, How Do I Tighten Security on My System?, Bruce Schneier, "It doesn't look good.", Will Crypto Feast on Carnivore?, An Old Spy with a New Vision of Encryption, The Coroner's Toolkit, Running logcheck, the logfile auditing software for Unix, Tools of the Trade: nmap, and more.

tags | remote, root, cryptography, vulnerability
systems | linux, unix
SHA-256 | bf97af94972bb92cba5531ed28482ba88123a064e99f846d6a1dee8d69777140
linux-security.1-14.txt
Posted Aug 7, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 31 - In this issue: Advisories for gpm, man, dhcp-client, Zope, openldap, BitchX, pam, and nfs-utils were released. DHCP-client and nfs-utils vulnerabilities can both theoretically be used to gain remote root access. Also includes stories on Forensics, Full Disclosure, Apache Guide: Apache Authentication, Linux Networking: Using Ipchains, and more.

tags | remote, root, vulnerability
systems | linux
SHA-256 | 53a3ce522ea0cc51a50378cf56e30c25844d0a1a4498b216d2c3d13c0ae71780
linux-security.1-13.txt
Posted Jul 25, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 24 - In this issue: Deploying Portsentry, How Buffer Overflow attacks work, Maximizing Apache Server Security, Secure Directory Services for E-Business, IPSec update, RedHat PAM updates available, NFS-utils rpc.statd remote vulnerability, Mandrake usermode vulnerability, LISTSERV web archive remote overflow, Stalker CommuniGate Pro read any file vulnerability, and SuSE Nkitb (ftp) vulnerability.

tags | remote, web, overflow
systems | linux, redhat, suse, mandrake
SHA-256 | 1c45fd9d5af9418bd4bddfa5bf221ac7287916786a10a0e4fb8921ca55a31796
linux-security.1-12.txt
Posted Jul 18, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 17 - In this issue: Advisories were released on cvsweb, FreeBSD ip-options, popper, canna, wu-ftpd, dump, dhclient, tnef, Big Brother, ftpd setproctitle, and Apache::ASP. The feature article this week is "Jay Beale and the Bastille Linux Project". Also contains articles on Buffer Overflows, Securing Sendmail on four types of systems, Tripwire / AIDE, Installing djbdns (DNScache) for Name Service, SSH Tutorial, OpenSSH, Making an Unbreakable Code, E-signatures can be easily forged, and more.

tags | overflow, asp
systems | linux, freebsd
SHA-256 | 3d9e8653af3e06043bbc68e1407563828783838c308899fc17267a6998ad378d
linux-security.1-11.txt
Posted Jul 12, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 10 - In this issue: Securing Sendmail, Understanding the Diffie-Hellman Key Exchange, PGP patch, BitchX dos vulnerability, man vulnerability (makewhatis /tmp bug), multiple freebsd patches, OpenSSH uselogin vulnerability, weekly security news, and much more.

tags | denial of service
systems | linux, freebsd
SHA-256 | 5bf9f698ffac215b3b0414186453110003cc34c633afda3c9caa8af9944d10af
linux-security.1-10.txt
Posted Jul 3, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week july 3 - In this issue: Securing your pages in Apache, Simple commands for Intrusion Detection, Interview with Brian Gemberling of PullThePlug, WU-FTPD remote root vulnerability, DHCP remote root exploit, and much more.

tags | remote, root
systems | linux
SHA-256 | 462806e81f045f739ee597be8679297b537d9773eb0bfd6d756c91b8ba6ef7ca
linux-security.1-9.txt
Posted Jun 26, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week June 26 - In this issue: The default configuration of wu-ftpd is vulnerable to remote users gaining root access, Simple Object Access Protocol (SOAP), Network Intrusion Detection Using Snort, Updates for Mandrake bind, cdrecord, dump, fdutils, kdesu, xemacs, and xlockmore, Remote users can cause a FreeBSD system to panic and reboot via bugs in the processing of IP options in the FreeBSD IP stack, Remote vulnerabilities exist with all Zope-2.0 releases, NetBSD: libdes vulnerability, RedHat: 2.2.16 Kernel Released, Bastille Linux Review, and Intel admits wireless security concerns.

tags | remote, kernel, root, vulnerability, protocol
systems | linux, redhat, netbsd, freebsd, mandrake
SHA-256 | c0d7ad7845e4e90d9f4129a48230f19515b41a6a9486eb4dafc7447bd62eed0c
linux-security.1-8.txt
Posted Jun 19, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week June 12 - In this issue: Updates are available for the Document Template package, BRU Backup Utility, Kerberos 5, and a bug on FreeBSD/Alpha systems that weakens its encryption. OpenBSD 2.7 is annunced and and the U.S. House gives its "OK" to the digital signature bill.

systems | linux, freebsd, openbsd
SHA-256 | d3af4c437f7224ecb592716f7973e2c5f6eeb9545d977a4490847348ca8cf0e6
linux-security.1-7.txt
Posted Jun 12, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week June 12 - In this issue: A very serious Linux kernel security bug was recently discovered that allows local users to gain root access, SuSE 6.x: qpop vulnerability, Conectiva: gpm Remote buffer overflow, BRU: local root exploit vulnerability, Solar Designer's OpenWall Kernel Patch, BSD Based Operating Systems: IPCS, RedHat 6.x: kdelibs vulnerability, Debian: mailx local exploit, Linux 101: Basic network security, Bastille Linux: A Walkthrough, OpenSSH 2.2.1 Released, and more.

tags | remote, overflow, kernel, local, root
systems | linux, redhat, suse, bsd, debian
SHA-256 | 58e4d65d069ee0c9790083443a819679b23f181c9a9c60da9e29a3506ff1ab83
linux-security.1-6.txt
Posted Jun 7, 2000
Authored by Benjamin Thomas, Dave Wreski | Site linuxsecurity.com

Linux Security Magazine June 5, 2000. In this issue - Articles: An Introduction to IP Masquerading - Part 2, Firewall placement, Cracked! Part 4: The Sniffer, Who's Sniffing Your Network?, Update: Blocking "Killer Resume", Buffer Overrun Vulnerabilities in Kerberos, popa3d v0.4 contributed Kerberos, Linux Deleted File Recovery Tool, Mission Critical Linux, and Domain Hijacking Raises Security Issue. Advisories: RedHat Majordomo, Turbolinux users can view shadowed password file, PGP 5.0 Key generation weakness, SuSE kmulti local root compromise, Mandrake kdesu vulnerability, NetBSD Local "cpu-hog" denial of service, NetBSD SysV semaphore denial-of-service, NetBSD /etc/ftpchroot parsing broken, NetBSD Exploitable Vulnerability in Xlockmore, OpenBSD Xlockmore vulnerability, OpenBSD ipf vulnerability.

tags | denial of service, overflow, local, root, vulnerability
systems | linux, redhat, netbsd, suse, openbsd, mandrake
SHA-256 | f0f51e6bebaced28e0897a3a32124913bf3c6f78a6cd621e702bf62b3c0902bf
linux-security.1-5.txt
Posted May 30, 2000
Authored by Benjamin Thomas, Dave Wreski | Site linuxsecurity.com

Linux Security Magazine May 29. In this issue - Articles: The Top 10 Security Risks, Intrusion Detection on Linux, Analyzing Future Computer Trends and Threats, Always-on Internet Security, Mini-FAQ: "antivirus software for Linux". New Advisories this week: FreeBSD process and krb5 vubnerabilities, TurboLinux gpm, SuSE gdm, Slackware fdmount, XFree86 Multiple distribution vulnerability, Red Hat Secure Web Server 3.0-3.2: mailmail, Qpopper Vulnerability, Mandrake 7 dump vulnerability, Mandrake xemacs vulnerability, Mandrake fdmount buffer overflow, Caldera buffer overflow in kdm, and Caldera DoS attack against X server.

tags | web, overflow
systems | linux, redhat, freebsd, suse, slackware, mandrake
SHA-256 | 7dfd070ef058e716f57228524f1de6980dc09e772cf2b571688d4489cf6a21e4
linux-security.1-4.txt
Posted May 22, 2000
Authored by Benjamin Thomas, Dave Wreski | Site linuxsecurity.com

Linux Security Magazine May 22 - In this issue: Slackware users, upgrade lynx!, Netscape 4.73 fixes SSL bugs, Many buffer overruns in Kerberos, Several problems in xemacs, gnapster/knapster - remote users to view local files, Lynx ports contain numerous buffer overflows, SUSE Kernel Vulnerability in the udp and ftp masquerading code, OpenLDAP 1.2.9 and earlier Vulnerability, An Introduction to IP Masquerading, Watching Your Logs by Lance Spitzner, Security Scanners for Linux, New DDoS tools developed, and much more.

tags | remote, overflow, kernel, local, udp
systems | linux, suse, slackware
SHA-256 | b40de288e76e74e1d413613ac66dc1aa8ff276cc6af1c95bc09702d89772afa7
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close