So, I believe I solved the problem:
# Hey maybe this will fix my stack? WTH is Ubuntu doing anyway?
net.ipv4.tcp_wmem = 4096 16384 131072
net.ipv4.tcp_rmem = 4096 87380 174760
...
Type: Posts; User: todb; Keyword(s):
So, I believe I solved the problem:
# Hey maybe this will fix my stack? WTH is Ubuntu doing anyway?
net.ipv4.tcp_wmem = 4096 16384 131072
net.ipv4.tcp_rmem = 4096 87380 174760
...
I would. There are some reasons to have multiple partitions, but unless you are supernaturally organized with your data (or have different permissions needs) I wouldn't bother.
Does GParted...
A) Okay, I do know how to spell "rendered"
B) Man, I wish I had a decent plan for troubleshooting this. The IRC drops are annoying to other people, so really, I don't care all that much. However,...
Hi all. I just cannot figure this out. About two or three times a day, I will briefly loose an IRC connection, only to reconnect a second or two later. Also, web pages have a tendency to only...
For what it's worth, I don't believe IPv6 is to blame. I'm running wireshark, and I'm not seeing any IPv6 DNS requests originating from my workstation --- after disabling IPv6 for Firefox...
First off, thanks for the uncheck "Expand" tip. That totally works. It's still only half a solution, though -- I use a couple scripts to switch between laptop-only and external monitor configs:
...
Not having tried it, I would assume so. Of course, there may be different defaults in 9.04 that obviate the need for the ownership change.
I see no reason why not, but you are encouraged to try...
I was running low on disk space on my Ubuntu laptop, so I purchased a 1TB Western Digital "My Book" external USB 2.0 hard drive (for the Googlers, it's part # WDH1U10000 ). It comes with a bunch of...
If you expect anyone to get it, you absolutely need a header.
Argument by RFC:
At any rate, re-reading the original response:
The above is patently false, assuming one is using a network to send e-mail and not doing something complicated like writing directly to the local spool.
I agree with the prior sentiment that your...
Right, because then only the TOR operators can spy on you, since TOR == The Opt-in Reconnaissance network. :)
I've long vacillated between Windows and Debian Linux, and the deal breaking for long-term Linux use, for me, was the lack of a decent GUI-fied text/hex/anything editor akin to UltraEdit.
I use...
If someone had a bitchin cool Ubuntu-only attack, it would be easier to simply scan the Internet for open Ubuntu machines running the affected service than it would be to troll ubuntuforums for IP +...
Looks like Adobe will be fixing it in the next verison
http://blogs.zdnet.com/security/?p=1948
Which means it'll be fixed in Ubuntu in a few years, undoubtedly.
-tod
I'm sure it will persist until Adobe figures out some method to control Flash's clipboard access (maybe only write to it once per X events or something).
This seems like case closed -- doesn't...
Yes.
This thread looks like a good candidate for an explination for your problem, Dandelion:
http://ubuntuforums.org/showthread.php?t=894752
If so, could you mark this thread as [SOLVED] ?
I don't suppose you saved off the triggering html/js? None of the reports of the behavior ("hacked hta," "built-in link to Google," etc) are making any sense, absent sample code.
Hmm, I don't think so. According to the OP:
Reading this, it sounds like there's some mechanism that the evil site is using to create new windows in Firefox without (obvious) user interaction....
1) Because there are plenty of other forums where people can participate in the endless "run anti-spyware Brand X and post the results" threads, if they want.
2) Because the question was really...
As of mid-2007, it was possible to write to the clipboard via Flash. This is as-designed behavior (at least, it was then). See this tutorial:
http://ajaxian.com/archives/auto-copy-to-clipboard
...
This is the typical way to accomplish what you want. It will also get you jeered by security dorks when they catch you running as root for doing normal non-root things (personal experience).
:)
You could look at the touch times on your old logs to see if they've been modified. Of course, if an attacker is being so careful as to excise his own (and others') login attempts, he'll...
OWASP has a bit on Web Application Fingerprinting, which sounds like what you're after. Since you admin the machines in question, it's perfectly reasonable to want to keep a close eye on the 50...
Well, that is a fantastically interesting resolution, since I'm a Civ dork as well (http://val-hell-yeah.blogspot.com), and I've been meaning to get around to figuring out the wire protocols involved...