Search the Community

Showing results for tags 'bsd' in content posted in Operating Systems.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Temporary category
    • Temporary forum
  • Community
    • Announcements
    • Feedback
  • Metin2
    • General
    • Questions and Answers
    • Frequently Asked Questions
    • Guides & HowTo
    • Design
    • Private Servers
    • Services
    • Videos
  • Releases
    • General
    • Tools
    • Programming / Scripts
    • Quests
    • Binaries & Clients / Serverfiles
    • 3D Models
    • 2D Graphics
    • Operating Systems
  • Safe Zone
    • Offtopic
    • Games Talk
    • Music / Videos / Art
  • M2 Project's Help & Questions
  • M2 Project's M2P
  • M2 Project's Ideas


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL






Found 5 results

  1. scorpion1453


    Hi everyone! There is a simple renewal for qc file:
  2. Hey guys, A few weeks ago a very dangerous vulnerability has been released. A vulnerability was found in libssh's serverside state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication with injects a "SSH2_MSG_USERAUTH_SUCCESS" packet during any authentication (pubkey, keyboard interactive, gss api) resulting in unauthorized access. So you should update libssh or simple switch to openssh(which isn't affected by exploit)
  3. Hi devs, I'm not a person who discovered this issue but I would like to share this with you. According to source: „On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the "Bash Bug", was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable assignments. Because of Bash's ubiquitous status amongst Linux, BSD, and Mac OS X distributions, many computers are vulnerable to Shellshock; all unpatched Bash versions between 1.14 through 4.3 (i.e. all releases until now) are at risk.“ How to check if my machine is in a risk? All you have to do is execute this code: env 'VAR=() { :;}; echo Bash is vulnerable!' 'FUNCTION()=() { :;}; echo Bash is vulnerable!' bash -c "echo Bash Test" If your output is „Bash Test“, then you are safe and you can continue without any troubles. In oposite case you have to be worried, because your input is „Bash is vulnerable!“ and your machine is not safe. How do I become safe? You should update version of bash ASAP. You can do it easily by executing this command: pkg upgrade bash Attention: Now execute test program again and you should be safe, because it will give you correct output. Sources:
  4. sheinfeld


    cc1plus: error: unrecognized command line option "-Wno-invalid-source-encoding" Hey guys! While trying to compile my source I get this annoying error. I tried everything but I cant find any solutions. Can any one help?
  5. Hello everyone, today I'll show you how to enable acces to root login via Putty. Yes, I know SSH accesing is better, but there is tut how to enable root login in FreeBSD 10. So first log in to your FreeBSD 10. And write this: vi /etc/ssh/sshd_config Then you should search line like this: #PermitRootLogin no Remove # and replace no to yes, like this: PermitRootLogin yes Final step is to restart your sshd /etc/rc.d/sshd restart And that's it. It's really simply and this tutorial is for real amateur in this biz. But I think it can be useful. Peace, TyWin