Linux is for okes who have time to sit and play nice with their machines, I'm not knocking it but I don't have time to bugger around trying to make things work all the time.
everyone is a "guru" these days - re
Mario Geldenhuys
Smallstream fanatic, plus I do some other things that I can't tell you about
"All the tips or magical insights in the world can't replace devotion, dedication, commitment, and gumption - and there is not secret in that" - Glenn Brackett
Last edited by Byron; 27-08-08 at 04:35 PM.
everyone is a "guru" these days - re
He probably hasn't seen this message as he's a Linuxvirus..
(My first ever attempt at a computer joke..)
The more you know, the less you need (Aboriginal Australian proverb)
Only dead fish swim with the stream (Malcolm Muggeridge)
Mario Geldenhuys
Smallstream fanatic, plus I do some other things that I can't tell you about
"All the tips or magical insights in the world can't replace devotion, dedication, commitment, and gumption - and there is not secret in that" - Glenn Brackett
Chris this is why windows works, becuase if you where using linux would you know how to fix this...
Windows would just fix it with an update and you'd be back on track.
Linux under 'active attack'
The US Computer Emergency Readiness Team (CERT) US-CERT is warning that Linux-based systems are under "active attack" using compromised SSH keys.
The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed.
Phalanx2 appears to be a derivative of an older rootkit and is likely to be based on the Debian Random number generator flaw that appeared earlier this year.
The reduce the risks, US-CERT suggests administrators:
# Proactively identify and examine systems where SSH keys are used as part of automated processes. These keys will typically not have passphrases or passwords.
# Encourage users to use the keys with passphrase or passwords to reduce the risk if a key is compromised.
# Review access paths to Internet facing systems and ensure that systems are fully patched.
For systems already compromised by this, US-CERT recommends that administrators:
# Disable key-based SSH authentication on the affected systems, where possible.
# Perform an audit of all SSH keys on the affected systems.
# Notify all key owners of the potential compromise of their keys.
Source: Iol
... anyway enough of the OS p!ssing war, I don't do these.
Use whatever works for you that's what I do. Even some of the hardcore geeks I know have gone back to windows, and mac.
everyone is a "guru" these days - re
Mario Geldenhuys
Smallstream fanatic, plus I do some other things that I can't tell you about
"All the tips or magical insights in the world can't replace devotion, dedication, commitment, and gumption - and there is not secret in that" - Glenn Brackett
PS... sorrry about the thread hijack, I take full responsiblity (the rods are gone so it's open season in this thread IMHO)
everyone is a "guru" these days - re
Mario Geldenhuys
Smallstream fanatic, plus I do some other things that I can't tell you about
"All the tips or magical insights in the world can't replace devotion, dedication, commitment, and gumption - and there is not secret in that" - Glenn Brackett
Bookmarks