lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <018001c36198$c74161e0$0100a8c0@p3600> From: chows at ozemail.com.au (gregh) Subject: what to do > ----- Original Message ----- > From: Arian J. Evans > To: 'akbara' ; 'Gabe Arnold' > Cc: full-disclosure@...ts.netsys.com ; bugtraq@...urityfocus.com ; arian.evans@...hnetsecurity.com > Sent: Tuesday, August 12, 2003 4:04 PM > Subject: RE: [Full-Disclosure] what to do > et al, > # has she tried booting into safe mode ? > # then removing the msblast or what not program ? > If everyone hasn't seen it by now, the problem is endless > rebooting; we've seen it with a number of clients...good > luck updating before the system goes down again... Isnt it dead easy enough just to change the RPC service to restart instead of reboot or am I missing something important?
Powered by blists - more mailing lists