Re: Sendmail security holes..
Article: 7453 of alt.hackers From: email@example.com (Noone) Newsgroups: alt.hackers Subject: Re: Sendmail security holes.. Date: Mon, 27 Feb 95 07:16:21 GMT Organization: A nice UNIX site near you Lines: 18 Approved: A Denise at UCSC, sure do. Message-ID: firstname.lastname@example.org NNTP-Posting-Host: osf1.gmu.edu Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Newsreader: News Xpress Version 1.0 Beta #3 Status: RO
In article <email@example.com>, firstname.lastname@example.org (Sam Trenholme) wrote: >soda.CSUA.berkeley.edu is not a Sparcstation. It is a Sequent Symmetry >machine, running, I believe, 20 386-dx16 processors in paralell. Hmmm... I thought they were 20's... but I think you're right. >ObNetJunkieHack: >I then typed "cat > /dev/ttyd00" and typed in "AT s0=1" multiple times, Generally it means that the xyplex is just overloaded... But that works for me. You might try sending the modems thier full init strings too. UNIXer *+* Yep... thier it goes again, whaddya thing SIGEV - Core Dump means?