Heartbleed... Anybody running an OpenSSL server has compromised passwords
for anybody using the system at least from when the vulnerability was
revealed until it was repaired should consider every password on the
system is compromised. They should ALL be changed, pronto. And you should
make sure it is the right person changing the passwords.
{^_^}
On 2014/04/20 12:43, Sam Varshavchik wrote:
Dan Thurman writes:
for some reason, spammers are getting through TLS
and are bypassing/ignoring access database? I poured
over the Internet but have yet to figure it out...
The most common way is by hacking the client's PC, and authenticating to the
mail server using the stolen loginid and password.
Change all your passwords.
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org