Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <uuf35f$2m58i$1@dont-email.me>
Deutsch   English   Français   Italiano  
<uuf35f$2m58i$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
Newsgroups: comp.os.linux.advocacy
Subject: Re: Check If Your Distro Is Vulnerable To XZ Backdoor
Date: Mon, 1 Apr 2024 19:50:07 -0000 (UTC)
Organization: the-candyden-of-code
Lines: 53
Message-ID: <uuf35f$2m58i$1@dont-email.me>
References: <17c1daf1b743b4f8$156268$3716115$802601b3@news.usenetexpress.com>
 <uuc40a$22uoo$1@solani.org> <uuehj4$2htpk$2@dont-email.me>
 <uues7i$o69$2@solani.org> <uuev29$2l6ri$2@dont-email.me>
 <uuevej$o69$5@solani.org> <uuf07o$2lfi5$1@dont-email.me>
 <uuf0er$o69$6@solani.org> <uuf0sp$o69$7@solani.org>
 <uuf17d$o69$8@solani.org> <uuf1vv$2lse9$1@dont-email.me>
 <uuf23m$o69$10@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 01 Apr 2024 19:50:07 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4442aefb2186058a1695ec6e7ff07da1";
	logging-data="2823442"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18V83Ghwt9gflJ39ZEncmKI6+zX1WSyOzeGU9CVSdO1HQ=="
User-Agent: slrn/pre1.0.4-9 (Linux)
Cancel-Lock: sha1:SWG4QtJlRl9tyahQ69NFFdbbI/8=
X-Face: b{dPmN&%4|lEo,wUO\"KLEOu5N_br(N2Yuc5/qcR5i>9-!^e\.Tw9?/m0}/~:UOM:Zf]%
 b+ V4R8q|QiU/R8\|G\WpC`-s?=)\fbtNc&=/a3a)r7xbRI]Vl)r<%PTriJ3pGpl_/B6!8pe\btzx
 `~R! r3.0#lHRE+^Gro0[cjsban'vZ#j7,?I/tHk{s=TFJ:H?~=]`O*~3ZX`qik`b:.gVIc-[$t/e
 ZrQsWJ >|l^I_[pbsIqwoz.WGA]<D
Bytes: 3246

Physfitfreak <physfitfreak@gmail.com> wrote at 19:32 this Monday (GMT):
> On 4/1/24 14:30, candycanearter07 wrote:
>> Physfitfreak <physfitfreak@gmail.com> wrote at 19:17 this Monday (GMT):
>>> On 4/1/24 14:11, Physfitfreak wrote:
>>>> On 4/1/24 14:03, Physfitfreak wrote:
>>>>> On 4/1/24 14:00, candycanearter07 wrote:
>>>>>> Physfitfreak <physfitfreak@gmail.com> wrote at 18:46 this Monday (GMT):
>>>>>>> On 4/1/24 13:40, candycanearter07 wrote:
>>>>>>>> which sshd
>>>>>>>
>>>>>>> I get:
>>>>>>>
>>>>>>> hydrogen@hydrogen-OptiPlex-7050:~$ which sshd
>>>>>>> hydrogen@hydrogen-OptiPlex-7050:~$
>>>>>>>
>>>>>>> as if it just ignored it.
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>> Weird, probably means it's not installed..
>>>>>
>>>>> I get the same result with command,
>>>>>
>>>>> which
>>>>>
>>>>> by itself. So it is something about the command, not sshd.
>>>>
>>>>
>>>> No, the command: which exists of course but requires an argument or
>>>> file. I don't know why running it by itself doesn't give error saying it
>>>> requires a file or argument.
>>>>
>>>> It responds to command: which ls   as it's supposed to. So sshd,
>>>> whatever it is, is certainly not on my system.
>>>>
>>>>
>>>
>>>
>>> Does sshd need to be on the system for security? Or is it the sshd
>>> itself that has provided a backdoor?
>> 
>> 
>> Unless you need to remote into your computer, sshd isnt /neccesary/.
>
>
> Oh, ok. I'll uninstall the two packages then. Thanks.


No problem. I have it installed as a backup, but leave the server off
unless I need it.
-- 
user <candycane> is generated from /dev/urandom