2009/7/8-16 [Computer/SW/OS/Linux, Computer/SW/Unix] UID:53124 Activity:nil | 7/7 what happened to our web presence? http://www.csua.berkeley.edu
not working
\_ That would be because we've yet to set them up afaik. Steven *does* have
a job after all. The idea is that we want a separate computer mounting the
web directories, so that if an exploit compromises the webserver, the shell
server (soda) itself will be insulated from the attack.
...
|
2009/3/8-17 [Computer/SW/Unix] UID:52685 Activity:kinda low | 3/8 I'm reading about an old exploit where someone used a buffer overflow
in a printer daemon to get "daemon privileges," which allowed them
to use another exploit on the mail delivery program to get root. I'm
not sure what daemon privileges are. Is there some set of priveleges
that most daemons run on that is higher than user but lower than root?
What are they? I've never heard this before.
...
|
2008/12/10-16 [Computer/HW/CPU, Computer/HW/Drives] UID:52220 Activity:moderate | 12/9 Another idea for the CSUA that lets you spend money and maybe get some
cool toys. Instead of buying a beefy server (like say, a massive server
with 20 386DX processors), buy a few cheap machines (like the ones
mentioned below) that have good disks and work on failover / load
balancing. A netscaler or other piece of hardware is complete overkill,
but maybe hacking an OpenBSD box could do the trick. The idea is that
...
|
|