TIP: Click on subject to list as thread! ANSI
echo: tech
to: DAVID DRUMMOND
from: CHARLES ANGELICH
date: 2003-12-10 22:25:00
subject: Re: Knoppix

1237e12b73d7
tech



Hello David - 

CA>>>> I was referring to the necessity to un-mount devices
CA>>>> etc. rather than the automated way that Windows (and
CA>>>> other OS) do it.

DD>>> Try the automounter daemon. 

CA>> September 29, 1999 22:00 GMT                      Number J-071
CA>> ______________________________________________________________
CA>> PROBLEM: There is a buffer overflow vulnerability in the
CA>> amd daemon that could allow remote users to execute
CA>> arbitrary code as root. PLATFORM: Systems running amd, the
CA>> Berkeley Automounter Daemon DAMAGE: If exploited, a remote
CA>> intruder can cause a buffer overflow leading to a root
CA>> compromise. SOLUTION: Apply available vendor patch. 

DD> Get and install the later version. 

I thought of that but this is one problem with websites. They
don't get back to update information and just leave these old
pages out there floating around. :-\ 

There is little to no 'followup' even at SourceForge and others
where you might expect links to updated information. :-\ 

>
>        ,                          ,
>      o/      Charles.Angelich      \o       ,
>       __o/
>     / >          USA, MI           < \   __\__
 

--- * ATP/16bit 2.31 * 
... DOS the Ghost in the Machine! http://www.undercoverdesign.com/dosghost/
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.