Berkeley CSUA MOTD:Entry 31307
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

1993/5/8 [Computer/SW/Unix] UID:31307 Activity:nil
5/7     NN NEWS: nn's database got moved and the daemon didn't know about it.
        It's currently running a consistency check and will likely complete
        by 6am, Saturday.  Problems to dwallach, flames to tom.
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2009/3/8-17 [Computer/SW/Unix] UID:52685 Activity:kinda low
3/8     I'm reading about an old exploit where someone used a buffer overflow
        in a printer daemon to get "daemon privileges," which allowed them
        to use another exploit on the mail delivery program to get root.  I'm
        not sure what daemon privileges are.  Is there some set of priveleges
        that most daemons run on that is higher than user but lower than root?
        What are they?  I've never heard this before.
	...
2009/1/12-15 [Computer/SW/OS/FreeBSD] UID:52366 Activity:nil
1/12    new soda to run FreeBSD, we have taken it back!
        \_ Daemon worshippers.
        \_ there goes the linux holy land
           \_ "But Stallman and Linus between them would make a better world."
              \_ "If it lives only for a while, Tiberias, it still has lived."
        \_ well at least the new logo is cooler
	...
2007/3/11-12 [Computer/SW/Unix] UID:45929 Activity:moderate
3/10    How does the unix cron implementation deal with daylight savings?
        Officially we need to change the time at exactly 2:00am. So let's say
        we have a cron job at 1:30am that has been executed, and at 2:00am
        we turn it back to 1:00am. Will that particular job get executed
        again? Conversely, let's say a cronjob at 2:30am was suppose to be
        executed but when we spring forward to 3:00am, will that job be
	...
2006/6/6-9 [Computer/SW/Unix] UID:43293 Activity:nil
6/6/6   Daemon is here.
        \_ ^Daemon^Penguin.  We're running Linux now!
	...
2006/5/31 [Computer/SW/SpamAssassin] UID:43239 Activity:nil
5/31    I just got a bunch of returned emails which appear to be caused by
        someone using my email for spam.  Is this caused by someone spoofing
        my address, or has my account been comprimised?  Anyone else have this
        problem recently?  -scottyg
        \_ Everyone else.  It's been mentioned in the motd a couple of
           times.
	...
2006/5/9-10 [Computer/SW/SpamAssassin] UID:42997 Activity:nil
5/9     Today I got a huge bunch of "mailer-daemon" failure messages due to someone
        sending spam with my email in the from:. What's the best way to deal with
        that? If I procmail them all to /dev/null then I'd miss real delivery
        notifications that are occasionally useful.
        \_ I got that too last week for one or two days.  Bounce was from
           some Italian server, I think.  I thought it was just virus spam
	...
2006/4/18-22 [Computer/SW/Security] UID:42773 Activity:nil
4/18    I'm interested in doing some traffic analysis to see if
        the sshd trojan can be detected by looking at traffic patterns.
        I seem to remember people's inbound sshd connections
        being dropped now fairly frequently [but soda stayed up].
        Can anybody authoritatively speak to whether just some
        sshds were dropped or when one was dropped all were dropped.
	...
2006/4/18-20 [Computer/SW/Security, Computer/SW/Unix] UID:42775 Activity:moderate
4/18    Some thoughts about securing a machine.  Feel free to add your
        expert opinions. --ricky
        * Securing a machine that allows interactive logins by users
          is _very_ hard.
        * Reduce suid binary to absolute bare minimum.
        * Perform automatic _remote_ checksums from a machine that is
	...