fse shell: The shell that is constantly updated with a listing of adult websites and can do nothing but deliver the content to the user environment VIEWER binary as argument in loop..
Might be pretty popular.
The lesson here is:
* Don't run stuff you don't know.
* Don't run things you don't monitor.
* Don't trust an internal monitor.
* Keep up to date on software you use.
* Audit software you use.
* Know what software you use.
* Always doubt.
All of this points to the long argued admin
assertion of...
~ 98 I had a similar experience which can be compared unfavorably to the OP's doctrine.
I inherited a k12 network with personally marginal
unix skills that was utilizing ancient RH installations
for a potpourri of services , FTP, mail,DNS, etc..
The students that had put the network together...
...all.
Unlike ftp which was created with the idea of access control based on file system traversal, ssh is a replacement for the old r services (*login and *sh) which did host based filtration (.rhosts, etc) and did not attempt to limit relatively low-level user operations once logged in to a...
Line oriented searches are going to be best accomplished
using stdio friendly functions as Salem suggested except
in very special cases.
Otherwise if all you need is an offset you could read
blocks of data using fread or read and record an offset counter. Might be faster, who knows...
Dictionary attacks are painful but not prohibitively so.
A couple of pointers.
* Root cannot login via ssh.
* Users must use keys (no password based auth) and policy
regarding strong passwords and key safety are enforced.
* Limit connects to port 22 in kernelspace via netfilter
and plug in a...
The 'I'm rooted three step'.
Remove this machine from any network.
Boot from knoppix or some purpose built forensics
bootable.
Do forensics analysis and follow up.
HTH
Okay. There are three logical layers to LVM: physical, volume,
and logical. If you use pvscan,vgscan,and lv? to decipher your problem and then have questions, please let us know. Please post error messages and other errata.
In the meantine:
http://www.tldp.org/HOWTO/LVM-HOWTO/
Try without the IPPROTO_TCP 3d arg. Try 0.
Try (ks?)trace and look for the socket return
via your kernel tracing mechanism rather than
trying to step through with gdb.
Off the top of my head...
OMG.
Whatever happened to:
Get library, including header files, locate header file
in filesystem at the 'right place'(tm), insert header file
in source at the, 'right place'(tm), compile library,
and then do the time honored $cc $myprogram -o progname $libname. ????
Sorry for the flame but...
There are benefits to the OO or 'highlevel', opaque
and "YOU don't need to know", maybe/possibly
garbage collected model, with functionality added
in everywhere.
Coding in C is going to hurt coming from there.
sizeof() doesn't even do what you might expect in
most cases.
I really love C and...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.