<?xml version="1.0"?>
<!DOCTYPE rss SYSTEM "http://my.netscape.com/publish/formats/rss-0.91.dtd">
<rss version="0.91">
<channel>
	<title>spurious.biz IT Department</title>
	<link>https://spurious.biz/it/</link>
	<description>Get beyond what reality is with spurious.biz!</description>
	<language>en-us</language>
	<image>
		<title>spurious.biz IT department</title>
		<url>http://spurious.biz/share/images/wlong.gif</url>
		<link>https://spurious.biz/it/</link>
	</image>
<pubDate>Sat, 22 Oct 2005 00:00:00 +0200</pubDate>
<item><title>Webmail preferences accidentally deleted</title>
<link>https://spurious.biz/it/news_item.php?id=134</link>
<description>All preference files of the webmail interface have been accidentally deleted. They will be restored by 14:00 o&#039;clock this afternoon. We apologize seriously for this mistake!
Update: all preferences have been successfully restored.</description>
</item>
<item><title>majimoto.net RSS feed</title>
<link>https://spurious.biz/it/news_item.php?id=133</link>
<description>our new IT child got a new RSS feed. Check out the &lt;a href=&quot;http://www.majimoto.net/&quot;&gt;majimoto.net&lt;/a&gt; website!</description>
</item>
<item><title>Cracker attack on spurious.biz network</title>
<link>https://spurious.biz/it/news_item.php?id=132</link>
<description>spurious.biz was subject to a major cracker attack. A malicious intruder exploited a system weakness to gain access to the system. Several parts of the system were damaged. The intruder installed several programs which made the system unstable and caused a system failure on late tuesday night.

System recovery took longer than expected as it involved a complete reinstallation of the whole system and data recovery from the backup system. However, no data should be lost and the system should be fully functional soon again. Also, one harddisk crashed during the recovery and the backup system got compromised too...

As the intruder had full access to the system, he might have gathered delicate information as passwords. We therefore urge you to change any password you used with your account on spurious.biz. As a precautionary measure some accounts/logins will be disabled during the next few days. We strongly recommend you to change also email passwords and database passwords.

In order to ensure that a similar event will not happen again, we decided to make security requirements more stringent. In particular, this will affect cgi scripts and to some extent php applications. Most customers will not be affected by these changes. To those who will be affected, we would like to express that we are sorry about any inconvenience this will cause, but we think it is in everybodys if we rate securty a higher priority than convenience. If you encounter problems please do not hesitate to ask us for support.

Please be patient while we recover the system...

Best regards</description>
</item>
<item><title>phpMyAdmin update</title>
<link>https://spurious.biz/it/news_item.php?id=131</link>
<description>version 2.6.1</description>
</item>
<item><title>Webmail update</title>
<link>https://spurious.biz/it/news_item.php?id=130</link>
<description>squirrelmail was updated to version 1.4.4</description>
</item>
<item><title>Updated Apache and PHP</title>
<link>https://spurious.biz/it/news_item.php?id=129</link>
<description>to version 2.0.53 and 4.3.10 respectively</description>
</item>
<item><title>added new Spam lookups</title>
<link>https://spurious.biz/it/news_item.php?id=128</link>
<description>from sorbs.net</description>
</item>
<item><title>Web scripting issue escalation</title>
<link>https://spurious.biz/it/news_item.php?id=127</link>
<description>An unknown script was executed with the privileges of our webserver and led to the NOC-admin closing the switch port. </description>
</item>
<item><title>UserDir's relocated</title>
<link>https://spurious.biz/it/news_item.php?id=126</link>
<description>All users owning a public_html folder with an URL using a tilde ~ are now relocated on partisans.spurious.biz, which is an proper virtualhost serving only homes. The old URL will stay available at least till 2006.</description>
</item>
<item><title>Webmail security enhancement!</title>
<link>https://spurious.biz/it/news_item.php?id=125</link>
<description>ALL requests to the webmail are finally automatically forced to be encrypted!
If your browser cannot handle self-signed/created certificates, choose Firefox for example...</description>
</item>
<item><title>SSL certificates renewed</title>
<link>https://spurious.biz/it/news_item.php?id=124</link>
<description>All the SSL certificates used for encrypting spurious.biz services had expired on January 17th. All have been replaced with new certificates valid until 2015. You might need to re-import the certificates from the IT/certificates website.</description>
</item>
<item><title>Perl and libtiff security fixes</title>
<link>https://spurious.biz/it/news_item.php?id=123</link>
<description>See http://www.debian.org/security/2004/dsa-620 and http://www.debian.org/security/2004/dsa-617 for more information</description>
</item>
<item><title>Small webmail security fix</title>
<link>https://spurious.biz/it/news_item.php?id=121</link>
<description>See here for more information: http://article.gmane.org/gmane.mail.squirrelmail.user/21169</description>
</item>
<item><title>Stability fixes in email system</title>
<link>https://spurious.biz/it/news_item.php?id=122</link>
<description></description>
</item>
<item><title>PHP maintenance update</title>
<link>https://spurious.biz/it/news_item.php?id=120</link>
<description>PHP was upgraded to version 4.3.9. See http://www.php.net/ChangeLog-4.php#4.3.9 for more information</description>
</item>
<item><title>Apache security fix</title>
<link>https://spurious.biz/it/news_item.php?id=119</link>
<description>Upgrade to Apache HTTP Server 2.0.52 from http://httpd.apache.org/download.cgi?update=200409150645

Please see the CHANGES_2.0 file, linked from the above page, for a full list of changes.</description>
</item>
<item><title>Vpopmail and Courier updates</title>
<link>https://spurious.biz/it/news_item.php?id=118</link>
<description>See the respective changelogs for more information.</description>
</item>
<item><title>PureFTPd security fix</title>
<link>https://spurious.biz/it/news_item.php?id=117</link>
<description>The client socket switches to non-blocking mode before forking in accept_client()</description>
</item>
<item><title>Several security fixes</title>
<link>https://spurious.biz/it/news_item.php?id=116</link>
<description>imagemagick (4:5.4.4.5-1woody3) stable-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * coders/bmp.c: Fix buffer overflow in DecodeImage().
  * coders/avi.c, coders/dib.c: Apply same fixes to local copies of
    DecodeImage(), and bring back in sync with version in bmp.c.

 -- Daniel Kobras &lt;kobras@debian.org&gt;  Fri, 27 Aug 2004 19:15:04 +0200

imagemagick (4:5.4.4.5-1woody2) stable; urgency=high

  * Non-maintainer upload.
  * debian/rules: Apply patch from Adrian Bunk that explicitly sets X11
    include and library paths. This fixes libdps detection and cures a
    dependency bug uncovered by the previous security update. Unbreaks
    all applications depending on libmagick5. Closes: #207016, #237663

 -- Daniel Kobras &lt;kobras@debian.org&gt;  Sat, 27 Mar 2004 16:16:19 +0100
</description>
</item>
<item><title>Apache update</title>
<link>https://spurious.biz/it/news_item.php?id=115</link>
<description>Apache was upgraded to version 2.0.51</description>
</item>

</channel>
</rss>
