Sam Trenholme's webpage
This article was posted to the Usenet group alt.hackers in 1995; any technical information is probably outdated.

Re: Sendmail security holes..


Article: 7454 of alt.hackers
From: unixer@unix.xite.com (Noone)
Newsgroups: alt.hackers
Subject: Re: Sendmail security holes..
Date: Mon, 27 Feb 95 07:19:14 GMT
Organization: A nice UNIX site near you
Lines: 21
Approved: A Denise at UCSC, sure do.
Message-ID: 3irudi$cj4_012@news.gmu.edu
NNTP-Posting-Host: osf1.gmu.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Newsreader: News Xpress Version 1.0 Beta #3
Status: RO

In article <3irmns$p79@lll-winken.llnl.gov>,
   set@oryx.llnl.gov (Sam Trenholme) wrote:

>soda.CSUA.berkeley.edu is not a Sparcstation. It is a Sequent Symmetry
>machine, running, I believe, 20 386-dx16 processors in paralell.

Hmmm... I thought they were 20's...  but I think you're right.


>ObNetJunkieHack:


>I then typed "cat > /dev/ttyd00" and typed in "AT
s0=1" multiple
times,

Generally it means that the xyplex is just overloaded...  But that
works for
me.  You might try sending the modems thier full init strings too.

UNIXer *+* Yep... thier it goes again, whaddya thing SIGEV - Core Dump
means?



Parent Parent

Child Child Child

Back to index