lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030729152917.Y10748-100000@vapid.ath.cx>
From: lwc at vapid.ath.cx (Larry W. Cashdollar)
Subject: Avoiding being a good admin - was DCOM RPC
 exploit (dcom.c) 


On Tue, 29 Jul 2003, Scott M. Algatt wrote:

> There are other methods of doing patches as well.  I know of one company,
> PatchLink, that does a deployment.  You simply install the client software
> on a system and then it checks into the master server.

You could also look at ximiam.org's Red Carpet Product.  This does the
same thing.

-- Larry C$


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ