14.1 C
London
Thursday, November 23, 2017
Home Authors Posts by cyberparse

cyberparse

39637 POSTS 0 COMMENTS
Our purpose is to provide the right information to our readers. For obvious reasons, our information journey will of couse be ever changing, but from the outset we plan on the following: Break down and communicate knowledge relating to Cyber Crime, Cyber Security, Information Security and Computer Security. Use Risk Management practices to help in translating the technical aspects of the Risks, Threats and Vulnerabilities into business language. Communicate the appropriate Controls necessary to reduce the Impact and Probability. We will do this by: Identifying, collating and providing relevant information. Highlighting relevant News articles. Investigating trends and providing Analysis. Providing How-to tips and tricks to reduce the Threats and Vulnerabilities. Offering Products and Solutions designed to mitigate or defend against the risks. ------ Joe Woods, Editor and CTO

RHEA-2014:1105-1: libvpx enhancement update

Red Hat Enterprise Linux Desktop (v. 6) SRPMS: gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm     MD5: 3bad1ad0c401d1097110877c4f989076SHA-256: bff23180d1e406eed1ae70264a5443a3685189be6ace99c86b6c86fef9d9d633 libvpx-1.3.0-5.el6_5.src.rpm     MD5: c9dab030f914f86a304a2bfcbe9f6f9aSHA-256: d27bec64b5a426a6c28a552c3385283ff5b4245ac0d8a69a92b9aa7439334d0d   IA-32: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.i686.rpm     MD5: fa547b25f455106e8f558832224dba2cSHA-256: c3da5f4dbd601b969f33f18fa21fa1d51534caa2534998e1baf8d37eba7ab61c gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-utils-1.3.0-5.el6_5.i686.rpm     MD5: 7016883d804bb85aa8852ee220d09542SHA-256: 0b96a9464cb890174e0876890a91bb249f378d1fa5bf854b1d0f5c6cb733cf87   x86_64: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-0.10.19-3.el6_5.x86_64.rpm     MD5: 2846e3556f84036af8479ac78a24972eSHA-256: ea2426a577bf6a26f9aa5d163eee2a860c8582af93588a9140e1b113f6af9882 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.x86_64.rpm     MD5: f2879c97ac23e8767167037609602398SHA-256: 5505cd3a4bad49e8ce89c426b2e4c9abc591fff6ac66024ff49bcff116bd6e17 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm     MD5: d74a0c64d071c2399d54e92fe7325c80SHA-256: 32e3465370a48c95521f3dc02ada26d0c8450f6e1a3b85da4ef5e183f2e27038 gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.x86_64.rpm     MD5: 99e96135c386892c9b1d104354ef5505SHA-256: 334cb7b6a154f14ffe72d2bd66def81afe755dcd742ded0f1744eef21dabeb03 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.x86_64.rpm     MD5: 49654cde2dfacb1b262dbb5da61eb1e9SHA-256: ff42b779b58b6e7fcadb69a59c188efdd8d319ded3d8269abb9aeb85b3724d27 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-1.3.0-5.el6_5.x86_64.rpm     MD5: 076e1e3a3edfd12937379e03e585c95eSHA-256: 4bd8bd83e24cc60667998b2ae14b42dc7ee0076f9f92723a4e646dde50922b16 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-debuginfo-1.3.0-5.el6_5.x86_64.rpm     MD5: a67cd35364f864f13f78fe60d6c28b9aSHA-256: 560d508aa63ee285ee37480fd480e1a5aebdfa6cb4d9905a1431428a4748680e libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-devel-1.3.0-5.el6_5.x86_64.rpm     MD5: c2e3cf797e46b605ac79136261e227e6SHA-256: 8a7a592b94067191fe0316e2e789970ab2bf03336c29558333ee799448d888df libvpx-utils-1.3.0-5.el6_5.x86_64.rpm     MD5: d3d54d929d4f5545ee1c61f1a6d24844SHA-256: 8ea86bb6890f3f8b975a26ff2f51b636408fbadf1a435a08a8a4f2adb118b982   Red Hat Enterprise Linux Server (v. 6) SRPMS: gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm     MD5: 3bad1ad0c401d1097110877c4f989076SHA-256: bff23180d1e406eed1ae70264a5443a3685189be6ace99c86b6c86fef9d9d633 libvpx-1.3.0-5.el6_5.src.rpm     MD5: c9dab030f914f86a304a2bfcbe9f6f9aSHA-256: d27bec64b5a426a6c28a552c3385283ff5b4245ac0d8a69a92b9aa7439334d0d   IA-32: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.i686.rpm     MD5: fa547b25f455106e8f558832224dba2cSHA-256: c3da5f4dbd601b969f33f18fa21fa1d51534caa2534998e1baf8d37eba7ab61c gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-utils-1.3.0-5.el6_5.i686.rpm     MD5: 7016883d804bb85aa8852ee220d09542SHA-256: 0b96a9464cb890174e0876890a91bb249f378d1fa5bf854b1d0f5c6cb733cf87   PPC: gstreamer-plugins-bad-free-0.10.19-3.el6_5.ppc.rpm     MD5: 6f593ed094c2948fb650e4722a5f658aSHA-256: 4bcaf572a8f29a60000559cfcab9fb3cc89e54019b1a86bdf82276aa18d65369 gstreamer-plugins-bad-free-0.10.19-3.el6_5.ppc64.rpm     MD5: 0fe1a278f6fc5cc63785916ee9d96a2aSHA-256: 7a4e27796539d38fa24aebed4e4d6f1a8b291582f0337b39ada3c53ac8dd6334 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.ppc.rpm     MD5: 4e19438dbd5e243a497620811c67f348SHA-256: 93511c387885617f549d49d9e5cd6c2da575fee0e6313a65f3a308b706875ba7 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.ppc64.rpm     MD5: b96a0c18c085bcd818fd1e0d47bbbbbfSHA-256: ef06b61381454f00f1c30c0da67a262c6036969c6fc8d34aa4f84b6623cd7fc0 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.ppc.rpm     MD5: 44e8c3701ff5b4c67e913067a7d665acSHA-256: 385bcdb1c6fb6d4ee9f2263a3f5d1b941e61e6ba9c2393dfd230d6c6821d93f4 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.ppc64.rpm     MD5: 64e4cfb6ffc399927290c11aabc20ad5SHA-256: ed9914d7a4bb5ecb41b72e49097da9b408499e160125f3f5264e5c2092e57bae gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.ppc64.rpm     MD5: c3c9a7375ac18757e5e57e90d9613fc6SHA-256: 00427289999953e3d6a0bf0b8732c5ac67040b5c986784db0c7e1d397679a3a9 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.ppc.rpm     MD5: 5aa8cc0d3a9f30faf80b34eef2cc0ee7SHA-256: b59770dc5e3e37b5dca94c9696006bf72d6bcbe818313a624afa3b56da6071df gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.ppc64.rpm     MD5: c9b0081342ceadc37b9d0cecbaddfdb0SHA-256: d1d10a29dd66eee053658beebba0b18ac8293494b4c2319bc015aadc1ca20556 libvpx-1.3.0-5.el6_5.ppc.rpm     MD5: dddae21808b20d10c981e681e9cfb839SHA-256: 131ccee5d52c06ab8951ce5e6d2d216626bffe5e6a54868c98a4b3537ba48701 libvpx-1.3.0-5.el6_5.ppc64.rpm     MD5: c5d33a2ded81030f49bc4abc134e36bdSHA-256: 21f5db89c904fee3315ff7b206683c08cc3d37c0167c5ea1ff630f588d45d6ad libvpx-debuginfo-1.3.0-5.el6_5.ppc.rpm     MD5: cea68cfe16b8f9ae856664b272e64f05SHA-256: 8a3fea906ed47878ed9717afe4c7b3a6eb89a12a1de869e6f7dc6d74f932a900 libvpx-debuginfo-1.3.0-5.el6_5.ppc64.rpm     MD5: 78c93cf0cb1d3dbe28e85a8b125cf6b7SHA-256: cf9f003c85030309538b902ab40af7b145077ec776d617c17c4ec72fd8bd2541 libvpx-devel-1.3.0-5.el6_5.ppc.rpm     MD5: 2d176cfc70e96050986dfc4d0441a522SHA-256: 581d413f26f458402a26530ed62d649da57904c7d691db6c78871cff6260e70c libvpx-devel-1.3.0-5.el6_5.ppc64.rpm     MD5: dd450bc7a1c0299f221812a0fa0db567SHA-256: b91f660ec0a2591f641a61ef5ae61c9f4e0e3da14f1ac0e9db22a0117d564040 libvpx-utils-1.3.0-5.el6_5.ppc64.rpm     MD5: 98ae2374c622f37b305cc68c9f85c179SHA-256: ca390e25aebfb2d983d1a40bbc01e513c837c323f7092a6cd50e4b8483b8cee5   s390x: gstreamer-plugins-bad-free-0.10.19-3.el6_5.s390.rpm     MD5: 405444ab170793393b056d3449cb66ccSHA-256: 2d6316355ad3cd169771829c808846ea64b6e4edf2148310223f41ca4461ab5f gstreamer-plugins-bad-free-0.10.19-3.el6_5.s390x.rpm     MD5: 2a1613e02be939e3dd5a82710891150aSHA-256: b28369e2ee4cad5b5fb16e6c6760a9a1d5e95b4738f6bcd5801fd302c2062c52 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.s390.rpm     MD5: baae5269c6e057c33239ad0b68857bb4SHA-256: 1d577d63c4afc618bb1d7db0e4e65dc16dfe26d1a83f82ab889ccf2854a832dd gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.s390x.rpm     MD5: e9f30b22c8577d7b25b559a14bed337eSHA-256: 8acae2f4bea1f17de969c238d7383a09faff978c09e33d2fdc040a44b9b0c902 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.s390.rpm     MD5: 581fad1db1431a6c9a296cd30e776adcSHA-256: 211c7bef03332c6d4944204c86d5527209bdabeacc7522c7471e2f3eb9e35fa3 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.s390x.rpm     MD5: a1934aa2ea5688edd23e56832b8ae3ceSHA-256: 0427b0242afa01709a267d60270d2381e5dc9880e398c9c0bcbd4ec8f0f2b42f gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.s390x.rpm     MD5: 8127432ac5eab91d10267c2321088b9eSHA-256: a86a7871672bc6cceb6b55f0cf06b8a59dec45e593c31d84d3de94bd737cf217 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.s390.rpm     MD5: 80b07fb54ed17def8138989c4875cd77SHA-256: 569610c7458a269f525f1037b8928cdff738bd87ca2005117306e299aa325e9d gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.s390x.rpm     MD5: b8a0e05c0bb71bfdaf56102f48c7b1a2SHA-256: 4f432d7c7cb5dbc5283b042d2278cb1cecc9e99f8e3bba5d14065b2af9d9913d libvpx-1.3.0-5.el6_5.s390.rpm     MD5: f9f2a432895326d174fface59ec5dc68SHA-256: f48cfb914f727860e293f06c8d57f03b86e9d8ff4fedc1c2d26d308c5b0b7996 libvpx-1.3.0-5.el6_5.s390x.rpm     MD5: 9e888f88792343742e884e6f03c1e37eSHA-256: c4e0ab4e004492589ca1037764a13202eeb04a4098feaec6bf3386ce739343fc libvpx-debuginfo-1.3.0-5.el6_5.s390.rpm     MD5: 0ffcc7bbfc9347392f72c0fd9998cdc0SHA-256: 32bb2cd2ee869e3208f41d08f18db353694f94f52f58320883d7a17843a2d018 libvpx-debuginfo-1.3.0-5.el6_5.s390x.rpm     MD5: 9b22ccba2fbef31364bf52f794ac4117SHA-256: 9373d6faa4042d3a21e2a85c5c7be2fe6963cd63c3dc6a6621b22121be60891f libvpx-devel-1.3.0-5.el6_5.s390.rpm     MD5: b344a885dd39cdadabffe42d8b5a86a0SHA-256: c4cdca6c5eb394b1b40bec0a69fc19e97fc3c19f6e21d6b7c453a69bc789f638 libvpx-devel-1.3.0-5.el6_5.s390x.rpm     MD5: 6e60e130eddb670e61f8a51a1d5bcb3bSHA-256: 40f17b09977f753911eb6d3747bf5222d59136c98dee3724b45aa3a5c166bd4e libvpx-utils-1.3.0-5.el6_5.s390x.rpm     MD5: 2cd24da75f9637145ccb50ffd16f2de1SHA-256: df81c80087327dac0cf5e761af2290c11354bfe4db388699b30003724b3611f1   x86_64: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-0.10.19-3.el6_5.x86_64.rpm     MD5: 2846e3556f84036af8479ac78a24972eSHA-256: ea2426a577bf6a26f9aa5d163eee2a860c8582af93588a9140e1b113f6af9882 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.x86_64.rpm     MD5: f2879c97ac23e8767167037609602398SHA-256: 5505cd3a4bad49e8ce89c426b2e4c9abc591fff6ac66024ff49bcff116bd6e17 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm     MD5: d74a0c64d071c2399d54e92fe7325c80SHA-256: 32e3465370a48c95521f3dc02ada26d0c8450f6e1a3b85da4ef5e183f2e27038 gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.x86_64.rpm     MD5: 99e96135c386892c9b1d104354ef5505SHA-256: 334cb7b6a154f14ffe72d2bd66def81afe755dcd742ded0f1744eef21dabeb03 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.x86_64.rpm     MD5: 49654cde2dfacb1b262dbb5da61eb1e9SHA-256: ff42b779b58b6e7fcadb69a59c188efdd8d319ded3d8269abb9aeb85b3724d27 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-1.3.0-5.el6_5.x86_64.rpm     MD5: 076e1e3a3edfd12937379e03e585c95eSHA-256: 4bd8bd83e24cc60667998b2ae14b42dc7ee0076f9f92723a4e646dde50922b16 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-debuginfo-1.3.0-5.el6_5.x86_64.rpm     MD5: a67cd35364f864f13f78fe60d6c28b9aSHA-256: 560d508aa63ee285ee37480fd480e1a5aebdfa6cb4d9905a1431428a4748680e libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-devel-1.3.0-5.el6_5.x86_64.rpm     MD5: c2e3cf797e46b605ac79136261e227e6SHA-256: 8a7a592b94067191fe0316e2e789970ab2bf03336c29558333ee799448d888df libvpx-utils-1.3.0-5.el6_5.x86_64.rpm     MD5: d3d54d929d4f5545ee1c61f1a6d24844SHA-256: 8ea86bb6890f3f8b975a26ff2f51b636408fbadf1a435a08a8a4f2adb118b982   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm     MD5: 3bad1ad0c401d1097110877c4f989076SHA-256: bff23180d1e406eed1ae70264a5443a3685189be6ace99c86b6c86fef9d9d633 libvpx-1.3.0-5.el6_5.src.rpm     MD5: c9dab030f914f86a304a2bfcbe9f6f9aSHA-256: d27bec64b5a426a6c28a552c3385283ff5b4245ac0d8a69a92b9aa7439334d0d   x86_64: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-0.10.19-3.el6_5.x86_64.rpm     MD5: 2846e3556f84036af8479ac78a24972eSHA-256: ea2426a577bf6a26f9aa5d163eee2a860c8582af93588a9140e1b113f6af9882 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.x86_64.rpm     MD5: f2879c97ac23e8767167037609602398SHA-256: 5505cd3a4bad49e8ce89c426b2e4c9abc591fff6ac66024ff49bcff116bd6e17 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm     MD5: d74a0c64d071c2399d54e92fe7325c80SHA-256: 32e3465370a48c95521f3dc02ada26d0c8450f6e1a3b85da4ef5e183f2e27038 gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.x86_64.rpm     MD5: 99e96135c386892c9b1d104354ef5505SHA-256: 334cb7b6a154f14ffe72d2bd66def81afe755dcd742ded0f1744eef21dabeb03 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.x86_64.rpm     MD5: 49654cde2dfacb1b262dbb5da61eb1e9SHA-256: ff42b779b58b6e7fcadb69a59c188efdd8d319ded3d8269abb9aeb85b3724d27 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-1.3.0-5.el6_5.x86_64.rpm     MD5: 076e1e3a3edfd12937379e03e585c95eSHA-256: 4bd8bd83e24cc60667998b2ae14b42dc7ee0076f9f92723a4e646dde50922b16 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-debuginfo-1.3.0-5.el6_5.x86_64.rpm     MD5: a67cd35364f864f13f78fe60d6c28b9aSHA-256: 560d508aa63ee285ee37480fd480e1a5aebdfa6cb4d9905a1431428a4748680e libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-devel-1.3.0-5.el6_5.x86_64.rpm     MD5: c2e3cf797e46b605ac79136261e227e6SHA-256: 8a7a592b94067191fe0316e2e789970ab2bf03336c29558333ee799448d888df libvpx-utils-1.3.0-5.el6_5.x86_64.rpm     MD5: d3d54d929d4f5545ee1c61f1a6d24844SHA-256: 8ea86bb6890f3f8b975a26ff2f51b636408fbadf1a435a08a8a4f2adb118b982   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm     MD5: 3bad1ad0c401d1097110877c4f989076SHA-256: bff23180d1e406eed1ae70264a5443a3685189be6ace99c86b6c86fef9d9d633 libvpx-1.3.0-5.el6_5.src.rpm     MD5: c9dab030f914f86a304a2bfcbe9f6f9aSHA-256: d27bec64b5a426a6c28a552c3385283ff5b4245ac0d8a69a92b9aa7439334d0d   IA-32: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.i686.rpm     MD5: fa547b25f455106e8f558832224dba2cSHA-256: c3da5f4dbd601b969f33f18fa21fa1d51534caa2534998e1baf8d37eba7ab61c gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-utils-1.3.0-5.el6_5.i686.rpm     MD5: 7016883d804bb85aa8852ee220d09542SHA-256: 0b96a9464cb890174e0876890a91bb249f378d1fa5bf854b1d0f5c6cb733cf87   PPC: gstreamer-plugins-bad-free-0.10.19-3.el6_5.ppc.rpm     MD5: 6f593ed094c2948fb650e4722a5f658aSHA-256: 4bcaf572a8f29a60000559cfcab9fb3cc89e54019b1a86bdf82276aa18d65369 gstreamer-plugins-bad-free-0.10.19-3.el6_5.ppc64.rpm     MD5: 0fe1a278f6fc5cc63785916ee9d96a2aSHA-256: 7a4e27796539d38fa24aebed4e4d6f1a8b291582f0337b39ada3c53ac8dd6334 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.ppc.rpm     MD5: 4e19438dbd5e243a497620811c67f348SHA-256: 93511c387885617f549d49d9e5cd6c2da575fee0e6313a65f3a308b706875ba7 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.ppc64.rpm     MD5: b96a0c18c085bcd818fd1e0d47bbbbbfSHA-256: ef06b61381454f00f1c30c0da67a262c6036969c6fc8d34aa4f84b6623cd7fc0 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.ppc.rpm     MD5: 44e8c3701ff5b4c67e913067a7d665acSHA-256: 385bcdb1c6fb6d4ee9f2263a3f5d1b941e61e6ba9c2393dfd230d6c6821d93f4 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.ppc64.rpm     MD5: 64e4cfb6ffc399927290c11aabc20ad5SHA-256: ed9914d7a4bb5ecb41b72e49097da9b408499e160125f3f5264e5c2092e57bae gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.ppc64.rpm     MD5: c3c9a7375ac18757e5e57e90d9613fc6SHA-256: 00427289999953e3d6a0bf0b8732c5ac67040b5c986784db0c7e1d397679a3a9 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.ppc.rpm     MD5: 5aa8cc0d3a9f30faf80b34eef2cc0ee7SHA-256: b59770dc5e3e37b5dca94c9696006bf72d6bcbe818313a624afa3b56da6071df gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.ppc64.rpm     MD5: c9b0081342ceadc37b9d0cecbaddfdb0SHA-256: d1d10a29dd66eee053658beebba0b18ac8293494b4c2319bc015aadc1ca20556 libvpx-1.3.0-5.el6_5.ppc.rpm     MD5: dddae21808b20d10c981e681e9cfb839SHA-256: 131ccee5d52c06ab8951ce5e6d2d216626bffe5e6a54868c98a4b3537ba48701 libvpx-1.3.0-5.el6_5.ppc64.rpm     MD5: c5d33a2ded81030f49bc4abc134e36bdSHA-256: 21f5db89c904fee3315ff7b206683c08cc3d37c0167c5ea1ff630f588d45d6ad libvpx-debuginfo-1.3.0-5.el6_5.ppc.rpm     MD5: cea68cfe16b8f9ae856664b272e64f05SHA-256: 8a3fea906ed47878ed9717afe4c7b3a6eb89a12a1de869e6f7dc6d74f932a900 libvpx-debuginfo-1.3.0-5.el6_5.ppc64.rpm     MD5: 78c93cf0cb1d3dbe28e85a8b125cf6b7SHA-256: cf9f003c85030309538b902ab40af7b145077ec776d617c17c4ec72fd8bd2541 libvpx-devel-1.3.0-5.el6_5.ppc.rpm     MD5: 2d176cfc70e96050986dfc4d0441a522SHA-256: 581d413f26f458402a26530ed62d649da57904c7d691db6c78871cff6260e70c libvpx-devel-1.3.0-5.el6_5.ppc64.rpm     MD5: dd450bc7a1c0299f221812a0fa0db567SHA-256: b91f660ec0a2591f641a61ef5ae61c9f4e0e3da14f1ac0e9db22a0117d564040 libvpx-utils-1.3.0-5.el6_5.ppc64.rpm     MD5: 98ae2374c622f37b305cc68c9f85c179SHA-256: ca390e25aebfb2d983d1a40bbc01e513c837c323f7092a6cd50e4b8483b8cee5   s390x: gstreamer-plugins-bad-free-0.10.19-3.el6_5.s390.rpm     MD5: 405444ab170793393b056d3449cb66ccSHA-256: 2d6316355ad3cd169771829c808846ea64b6e4edf2148310223f41ca4461ab5f gstreamer-plugins-bad-free-0.10.19-3.el6_5.s390x.rpm     MD5: 2a1613e02be939e3dd5a82710891150aSHA-256: b28369e2ee4cad5b5fb16e6c6760a9a1d5e95b4738f6bcd5801fd302c2062c52 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.s390.rpm     MD5: baae5269c6e057c33239ad0b68857bb4SHA-256: 1d577d63c4afc618bb1d7db0e4e65dc16dfe26d1a83f82ab889ccf2854a832dd gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.s390x.rpm     MD5: e9f30b22c8577d7b25b559a14bed337eSHA-256: 8acae2f4bea1f17de969c238d7383a09faff978c09e33d2fdc040a44b9b0c902 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.s390.rpm     MD5: 581fad1db1431a6c9a296cd30e776adcSHA-256: 211c7bef03332c6d4944204c86d5527209bdabeacc7522c7471e2f3eb9e35fa3 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.s390x.rpm     MD5: a1934aa2ea5688edd23e56832b8ae3ceSHA-256: 0427b0242afa01709a267d60270d2381e5dc9880e398c9c0bcbd4ec8f0f2b42f gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.s390x.rpm     MD5: 8127432ac5eab91d10267c2321088b9eSHA-256: a86a7871672bc6cceb6b55f0cf06b8a59dec45e593c31d84d3de94bd737cf217 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.s390.rpm     MD5: 80b07fb54ed17def8138989c4875cd77SHA-256: 569610c7458a269f525f1037b8928cdff738bd87ca2005117306e299aa325e9d gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.s390x.rpm     MD5: b8a0e05c0bb71bfdaf56102f48c7b1a2SHA-256: 4f432d7c7cb5dbc5283b042d2278cb1cecc9e99f8e3bba5d14065b2af9d9913d libvpx-1.3.0-5.el6_5.s390.rpm     MD5: f9f2a432895326d174fface59ec5dc68SHA-256: f48cfb914f727860e293f06c8d57f03b86e9d8ff4fedc1c2d26d308c5b0b7996 libvpx-1.3.0-5.el6_5.s390x.rpm     MD5: 9e888f88792343742e884e6f03c1e37eSHA-256: c4e0ab4e004492589ca1037764a13202eeb04a4098feaec6bf3386ce739343fc libvpx-debuginfo-1.3.0-5.el6_5.s390.rpm     MD5: 0ffcc7bbfc9347392f72c0fd9998cdc0SHA-256: 32bb2cd2ee869e3208f41d08f18db353694f94f52f58320883d7a17843a2d018 libvpx-debuginfo-1.3.0-5.el6_5.s390x.rpm     MD5: 9b22ccba2fbef31364bf52f794ac4117SHA-256: 9373d6faa4042d3a21e2a85c5c7be2fe6963cd63c3dc6a6621b22121be60891f libvpx-devel-1.3.0-5.el6_5.s390.rpm     MD5: b344a885dd39cdadabffe42d8b5a86a0SHA-256: c4cdca6c5eb394b1b40bec0a69fc19e97fc3c19f6e21d6b7c453a69bc789f638 libvpx-devel-1.3.0-5.el6_5.s390x.rpm     MD5: 6e60e130eddb670e61f8a51a1d5bcb3bSHA-256: 40f17b09977f753911eb6d3747bf5222d59136c98dee3724b45aa3a5c166bd4e libvpx-utils-1.3.0-5.el6_5.s390x.rpm     MD5: 2cd24da75f9637145ccb50ffd16f2de1SHA-256: df81c80087327dac0cf5e761af2290c11354bfe4db388699b30003724b3611f1   x86_64: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-0.10.19-3.el6_5.x86_64.rpm     MD5: 2846e3556f84036af8479ac78a24972eSHA-256: ea2426a577bf6a26f9aa5d163eee2a860c8582af93588a9140e1b113f6af9882 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.x86_64.rpm     MD5: f2879c97ac23e8767167037609602398SHA-256: 5505cd3a4bad49e8ce89c426b2e4c9abc591fff6ac66024ff49bcff116bd6e17 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm     MD5: d74a0c64d071c2399d54e92fe7325c80SHA-256: 32e3465370a48c95521f3dc02ada26d0c8450f6e1a3b85da4ef5e183f2e27038 gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.x86_64.rpm     MD5: 99e96135c386892c9b1d104354ef5505SHA-256: 334cb7b6a154f14ffe72d2bd66def81afe755dcd742ded0f1744eef21dabeb03 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.x86_64.rpm     MD5: 49654cde2dfacb1b262dbb5da61eb1e9SHA-256: ff42b779b58b6e7fcadb69a59c188efdd8d319ded3d8269abb9aeb85b3724d27 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-1.3.0-5.el6_5.x86_64.rpm     MD5: 076e1e3a3edfd12937379e03e585c95eSHA-256: 4bd8bd83e24cc60667998b2ae14b42dc7ee0076f9f92723a4e646dde50922b16 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-debuginfo-1.3.0-5.el6_5.x86_64.rpm     MD5: a67cd35364f864f13f78fe60d6c28b9aSHA-256: 560d508aa63ee285ee37480fd480e1a5aebdfa6cb4d9905a1431428a4748680e libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-devel-1.3.0-5.el6_5.x86_64.rpm     MD5: c2e3cf797e46b605ac79136261e227e6SHA-256: 8a7a592b94067191fe0316e2e789970ab2bf03336c29558333ee799448d888df libvpx-utils-1.3.0-5.el6_5.x86_64.rpm     MD5: d3d54d929d4f5545ee1c61f1a6d24844SHA-256: 8ea86bb6890f3f8b975a26ff2f51b636408fbadf1a435a08a8a4f2adb118b982   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm     MD5: 3bad1ad0c401d1097110877c4f989076SHA-256: bff23180d1e406eed1ae70264a5443a3685189be6ace99c86b6c86fef9d9d633 libvpx-1.3.0-5.el6_5.src.rpm     MD5: c9dab030f914f86a304a2bfcbe9f6f9aSHA-256: d27bec64b5a426a6c28a552c3385283ff5b4245ac0d8a69a92b9aa7439334d0d   IA-32: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.i686.rpm     MD5: fa547b25f455106e8f558832224dba2cSHA-256: c3da5f4dbd601b969f33f18fa21fa1d51534caa2534998e1baf8d37eba7ab61c gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-utils-1.3.0-5.el6_5.i686.rpm     MD5: 7016883d804bb85aa8852ee220d09542SHA-256: 0b96a9464cb890174e0876890a91bb249f378d1fa5bf854b1d0f5c6cb733cf87   x86_64: gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm     MD5: 856609e7d3b733018e38be48eba42e54SHA-256: 0a4ee1463802fa52b5933c4d3b4a1826fd478902bf8e2c6b52eeb49bc50bafcd gstreamer-plugins-bad-free-0.10.19-3.el6_5.x86_64.rpm     MD5: 2846e3556f84036af8479ac78a24972eSHA-256: ea2426a577bf6a26f9aa5d163eee2a860c8582af93588a9140e1b113f6af9882 gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.i686.rpm     MD5: 8a889885b416769b5510e14de93a4839SHA-256: 44d5ed52a7497f05b434de5267ee176f54c4deb912bd32509602df6ae4a01fcb gstreamer-plugins-bad-free-debuginfo-0.10.19-3.el6_5.x86_64.rpm     MD5: f2879c97ac23e8767167037609602398SHA-256: 5505cd3a4bad49e8ce89c426b2e4c9abc591fff6ac66024ff49bcff116bd6e17 gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm     MD5: 872c377bdc82b5b7823f9d5bb65163a4SHA-256: 2a2b24c06d9c472d1f1a5d2c3fcd030a2aa7ae562dafd70526c5bb9a221227aa gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm     MD5: d74a0c64d071c2399d54e92fe7325c80SHA-256: 32e3465370a48c95521f3dc02ada26d0c8450f6e1a3b85da4ef5e183f2e27038 gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.x86_64.rpm     MD5: 99e96135c386892c9b1d104354ef5505SHA-256: 334cb7b6a154f14ffe72d2bd66def81afe755dcd742ded0f1744eef21dabeb03 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm     MD5: 68c4d4baee82bfda10977e905e12aea8SHA-256: 279487c76c5de5458841eaa4dc282f4bf8361b30ee39370e2a07ef98d0a4ddf1 gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.x86_64.rpm     MD5: 49654cde2dfacb1b262dbb5da61eb1e9SHA-256: ff42b779b58b6e7fcadb69a59c188efdd8d319ded3d8269abb9aeb85b3724d27 libvpx-1.3.0-5.el6_5.i686.rpm     MD5: 3ea05f9dbe112db6210e57e63468192eSHA-256: a0964970cd084e37d4097bf1505bb5c6220339655fe272238aac1480a80ff9b7 libvpx-1.3.0-5.el6_5.x86_64.rpm     MD5: 076e1e3a3edfd12937379e03e585c95eSHA-256: 4bd8bd83e24cc60667998b2ae14b42dc7ee0076f9f92723a4e646dde50922b16 libvpx-debuginfo-1.3.0-5.el6_5.i686.rpm     MD5: 5d6f7762d93b02deb72e49abf0d9d17dSHA-256: 34a6e609bb73be26494cba24e12c151edd0d4b3786dd9d4429d93c7f9034b1e2 libvpx-debuginfo-1.3.0-5.el6_5.x86_64.rpm     MD5: a67cd35364f864f13f78fe60d6c28b9aSHA-256: 560d508aa63ee285ee37480fd480e1a5aebdfa6cb4d9905a1431428a4748680e libvpx-devel-1.3.0-5.el6_5.i686.rpm     MD5: 03dca82e5759eb985c58f7d6b6128d7dSHA-256: 53d575cfb721c76cdda702f4d63bfd693a6aa831a83a8c8b7b726618f654c24d libvpx-devel-1.3.0-5.el6_5.x86_64.rpm     MD5: c2e3cf797e46b605ac79136261e227e6SHA-256: 8a7a592b94067191fe0316e2e789970ab2bf03336c29558333ee799448d888df libvpx-utils-1.3.0-5.el6_5.x86_64.rpm     MD5: d3d54d929d4f5545ee1c61f1a6d24844SHA-256: 8ea86bb6890f3f8b975a26ff2f51b636408fbadf1a435a08a8a4f2adb118b982   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:1109-1: sysstat bug fix update

Updated sysstat packages that fix one bug are now available for Red HatEnterprise Linux 6 Extended Update Support. The sysstat packages provide the sar and iostat commands. These commands enablesystem monitoring of disk, network, and other I/O activity.This update fixes the following bug:* The dynamic ticks kernel feature can currently make the /proc/stat fileunreliable because the stopped CPU cannot provide reliable statistics. Eventhough the kernel is trying to provide the best guess, the statistics are notalways accurate. As a consequence, some sysstat commands could show overflowedvalues. This update detects values going backwards in sysstat, and sysstatcommands no longer show overflowed values. (BZ#1127068)Users of sysstat are advised to upgrade to these updated packages, which fixthis bug. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.4) SRPMS: sysstat-9.0.4-20.el6_4.1.src.rpm     MD5: d7d0b0895e3c67e43f931f37a380fa3eSHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda   x86_64: sysstat-9.0.4-20.el6_4.1.x86_64.rpm     MD5: ca2354ffa71e2ba17e90b33611c92d10SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm     MD5: 40953b8955474a047556f6f88a857fe8SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c   Red Hat Enterprise Linux Server EUS (v. 6.4.z) SRPMS: sysstat-9.0.4-20.el6_4.1.src.rpm     MD5: d7d0b0895e3c67e43f931f37a380fa3eSHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda   IA-32: sysstat-9.0.4-20.el6_4.1.i686.rpm     MD5: 4773de4c7bdff86d0075f5bfe662d310SHA-256: cd1839c4cd969decd59d6e9f4db1e584fb9e7a5245793a0f248ff1dc99f8cb29 sysstat-debuginfo-9.0.4-20.el6_4.1.i686.rpm     MD5: 7647112c47b86a34bde3af8b26567601SHA-256: 3da4ed3f660d6ae51d5ececbaf729500dda7113558ecf89699cedd11b974aa47   PPC: sysstat-9.0.4-20.el6_4.1.ppc64.rpm     MD5: a3802db9dc0f0ae9ebc112dd5adef99dSHA-256: 277f95f076eb050659cb56d1cf47f28f216a63ac9283fdb93dc5e0ee8ff82e1e sysstat-debuginfo-9.0.4-20.el6_4.1.ppc64.rpm     MD5: 8f8f687da45419cef5fdba3cf4569664SHA-256: 35dcbfe3a01da6e3783bc2a45b4f88f58de611c1f6d5ea889cf769c0105cfd65   s390x: sysstat-9.0.4-20.el6_4.1.s390x.rpm     MD5: eec8808fee8c89b3cfb7472babedd2b5SHA-256: df5985262cd0b8facf1059ad9a17caaa9169335d62c24e981dfb15a519f21efa sysstat-debuginfo-9.0.4-20.el6_4.1.s390x.rpm     MD5: 466676877fbfb3d8ac0241277a0ab1d0SHA-256: d6ca38f9d4114bf814ddc1dfe3f51d71466a6ac361454a99f66547fce3f4cd33   x86_64: sysstat-9.0.4-20.el6_4.1.x86_64.rpm     MD5: ca2354ffa71e2ba17e90b33611c92d10SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm     MD5: 40953b8955474a047556f6f88a857fe8SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:1108-1: sysstat bug fix update

Updated sysstat packages that fix one bug are now available for Red HatEnterprise Linux 6. The sysstat packages provide the sar and iostat commands. These commands enablesystem monitoring of disk, network, and other I/O activity.This update fixes the following bug:* The dynamic ticks kernel feature can currently make the /proc/stat fileunreliable because the stopped CPU cannot provide reliable statistics. Eventhough the kernel is trying to provide the best guess, the statistics are notalways accurate. As a consequence, some sysstat commands could show overflowedvalues. This update detects values going backwards in sysstat, and sysstatcommands no longer show overflowed values. (BZ#1127069)Users of sysstat are advised to upgrade to these updated packages, which fixthis bug. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: sysstat-9.0.4-22.el6_5.1.src.rpm     MD5: c9e07e9cf52caefca04437b878445859SHA-256: 96b84903dd5dd6a67987a269805b4cc738a7bcb912eaab03958c2ee4226515c8   IA-32: sysstat-9.0.4-22.el6_5.1.i686.rpm     MD5: f5771c9a7b0294cf10628e52359132b4SHA-256: aa98461ab5e111c30f7bb46286ebcaf9edc2d542d3c0e4adf31cf115eda5789b sysstat-debuginfo-9.0.4-22.el6_5.1.i686.rpm     MD5: 6ad419cb6f50c65a358deee3ae9e6970SHA-256: 2c3cdef3b7d854913ed050d7ed5cff372ed0a0395bae0f15402d3596fd06e75a   x86_64: sysstat-9.0.4-22.el6_5.1.x86_64.rpm     MD5: d1db138e4a778619d7255b86a534768bSHA-256: cba572def3040dcf9b1f7c41d938946bad57226ad70e4f98f35cfcb20a0e432e sysstat-debuginfo-9.0.4-22.el6_5.1.x86_64.rpm     MD5: 506e0456d516eb19e2bd8c11bb619f67SHA-256: 25e2a27e72062f88c1f512082e294e205c63713cecacb73019aedb86e1563252   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: sysstat-9.0.4-22.el6_5.1.src.rpm     MD5: c9e07e9cf52caefca04437b878445859SHA-256: 96b84903dd5dd6a67987a269805b4cc738a7bcb912eaab03958c2ee4226515c8   x86_64: sysstat-9.0.4-22.el6_5.1.x86_64.rpm     MD5: d1db138e4a778619d7255b86a534768bSHA-256: cba572def3040dcf9b1f7c41d938946bad57226ad70e4f98f35cfcb20a0e432e sysstat-debuginfo-9.0.4-22.el6_5.1.x86_64.rpm     MD5: 506e0456d516eb19e2bd8c11bb619f67SHA-256: 25e2a27e72062f88c1f512082e294e205c63713cecacb73019aedb86e1563252   Red Hat Enterprise Linux Server (v. 6) SRPMS: sysstat-9.0.4-22.el6_5.1.src.rpm     MD5: c9e07e9cf52caefca04437b878445859SHA-256: 96b84903dd5dd6a67987a269805b4cc738a7bcb912eaab03958c2ee4226515c8   IA-32: sysstat-9.0.4-22.el6_5.1.i686.rpm     MD5: f5771c9a7b0294cf10628e52359132b4SHA-256: aa98461ab5e111c30f7bb46286ebcaf9edc2d542d3c0e4adf31cf115eda5789b sysstat-debuginfo-9.0.4-22.el6_5.1.i686.rpm     MD5: 6ad419cb6f50c65a358deee3ae9e6970SHA-256: 2c3cdef3b7d854913ed050d7ed5cff372ed0a0395bae0f15402d3596fd06e75a   PPC: sysstat-9.0.4-22.el6_5.1.ppc64.rpm     MD5: 2d93d6c971876e8f102239ac4558c8dbSHA-256: 26cb49c7eaf97f3087878ffa522eb9c3b68fb63c9e26d271f6a69189988fb15d sysstat-debuginfo-9.0.4-22.el6_5.1.ppc64.rpm     MD5: b027ca06ca11af50b8119ee6260e6defSHA-256: 2a8abfef1e903623f8350c3bb6608d054add16cef8d7d8a0368a34efb15d0468   s390x: sysstat-9.0.4-22.el6_5.1.s390x.rpm     MD5: dc04d32ee3a254a898db5097cd895007SHA-256: dbe00909fda815353023123cd16460a1981dfc1a8837261e7cb2bdb35014f652 sysstat-debuginfo-9.0.4-22.el6_5.1.s390x.rpm     MD5: d11b0e9f73720f545bdb428164da739fSHA-256: c4fb03fc084ec7bf44d1dbcc7df9ba3124e3e98ba054b7c3724c22723b1914fb   x86_64: sysstat-9.0.4-22.el6_5.1.x86_64.rpm     MD5: d1db138e4a778619d7255b86a534768bSHA-256: cba572def3040dcf9b1f7c41d938946bad57226ad70e4f98f35cfcb20a0e432e sysstat-debuginfo-9.0.4-22.el6_5.1.x86_64.rpm     MD5: 506e0456d516eb19e2bd8c11bb619f67SHA-256: 25e2a27e72062f88c1f512082e294e205c63713cecacb73019aedb86e1563252   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: sysstat-9.0.4-22.el6_5.1.src.rpm     MD5: c9e07e9cf52caefca04437b878445859SHA-256: 96b84903dd5dd6a67987a269805b4cc738a7bcb912eaab03958c2ee4226515c8   x86_64: sysstat-9.0.4-22.el6_5.1.x86_64.rpm     MD5: d1db138e4a778619d7255b86a534768bSHA-256: cba572def3040dcf9b1f7c41d938946bad57226ad70e4f98f35cfcb20a0e432e sysstat-debuginfo-9.0.4-22.el6_5.1.x86_64.rpm     MD5: 506e0456d516eb19e2bd8c11bb619f67SHA-256: 25e2a27e72062f88c1f512082e294e205c63713cecacb73019aedb86e1563252   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: sysstat-9.0.4-22.el6_5.1.src.rpm     MD5: c9e07e9cf52caefca04437b878445859SHA-256: 96b84903dd5dd6a67987a269805b4cc738a7bcb912eaab03958c2ee4226515c8   IA-32: sysstat-9.0.4-22.el6_5.1.i686.rpm     MD5: f5771c9a7b0294cf10628e52359132b4SHA-256: aa98461ab5e111c30f7bb46286ebcaf9edc2d542d3c0e4adf31cf115eda5789b sysstat-debuginfo-9.0.4-22.el6_5.1.i686.rpm     MD5: 6ad419cb6f50c65a358deee3ae9e6970SHA-256: 2c3cdef3b7d854913ed050d7ed5cff372ed0a0395bae0f15402d3596fd06e75a   PPC: sysstat-9.0.4-22.el6_5.1.ppc64.rpm     MD5: 2d93d6c971876e8f102239ac4558c8dbSHA-256: 26cb49c7eaf97f3087878ffa522eb9c3b68fb63c9e26d271f6a69189988fb15d sysstat-debuginfo-9.0.4-22.el6_5.1.ppc64.rpm     MD5: b027ca06ca11af50b8119ee6260e6defSHA-256: 2a8abfef1e903623f8350c3bb6608d054add16cef8d7d8a0368a34efb15d0468   s390x: sysstat-9.0.4-22.el6_5.1.s390x.rpm     MD5: dc04d32ee3a254a898db5097cd895007SHA-256: dbe00909fda815353023123cd16460a1981dfc1a8837261e7cb2bdb35014f652 sysstat-debuginfo-9.0.4-22.el6_5.1.s390x.rpm     MD5: d11b0e9f73720f545bdb428164da739fSHA-256: c4fb03fc084ec7bf44d1dbcc7df9ba3124e3e98ba054b7c3724c22723b1914fb   x86_64: sysstat-9.0.4-22.el6_5.1.x86_64.rpm     MD5: d1db138e4a778619d7255b86a534768bSHA-256: cba572def3040dcf9b1f7c41d938946bad57226ad70e4f98f35cfcb20a0e432e sysstat-debuginfo-9.0.4-22.el6_5.1.x86_64.rpm     MD5: 506e0456d516eb19e2bd8c11bb619f67SHA-256: 25e2a27e72062f88c1f512082e294e205c63713cecacb73019aedb86e1563252   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: sysstat-9.0.4-22.el6_5.1.src.rpm     MD5: c9e07e9cf52caefca04437b878445859SHA-256: 96b84903dd5dd6a67987a269805b4cc738a7bcb912eaab03958c2ee4226515c8   IA-32: sysstat-9.0.4-22.el6_5.1.i686.rpm     MD5: f5771c9a7b0294cf10628e52359132b4SHA-256: aa98461ab5e111c30f7bb46286ebcaf9edc2d542d3c0e4adf31cf115eda5789b sysstat-debuginfo-9.0.4-22.el6_5.1.i686.rpm     MD5: 6ad419cb6f50c65a358deee3ae9e6970SHA-256: 2c3cdef3b7d854913ed050d7ed5cff372ed0a0395bae0f15402d3596fd06e75a   x86_64: sysstat-9.0.4-22.el6_5.1.x86_64.rpm     MD5: d1db138e4a778619d7255b86a534768bSHA-256: cba572def3040dcf9b1f7c41d938946bad57226ad70e4f98f35cfcb20a0e432e sysstat-debuginfo-9.0.4-22.el6_5.1.x86_64.rpm     MD5: 506e0456d516eb19e2bd8c11bb619f67SHA-256: 25e2a27e72062f88c1f512082e294e205c63713cecacb73019aedb86e1563252   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:1107-1: ksh bug fix update

Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6. KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* When running a command that output a lot of data, and then setting a variablefrom that output, the ksh could become unresponsive. The combination of I/Oredirection and synchronization mechanism has been changed, thus fixing the bug.As a result, commands complete successfully, and the ksh no longer hangs.(BZ#1128585)Users of ksh are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously-released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Server (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   PPC: ksh-20120801-10.el6_5.9.ppc64.rpm     MD5: 05cdb195154d5a0d9fdd9bce2d0d9886SHA-256: 33303d811f3dfc3244179e39e4e43ce6fc1100902970b5be2b532d4fb0d65e51 ksh-debuginfo-20120801-10.el6_5.9.ppc64.rpm     MD5: fdd51487c0903837b9ff66dc22a075f0SHA-256: 12dab2bcb5d2eb643af92853e843d2201045cab4a7a9320143e79c687adf098b   s390x: ksh-20120801-10.el6_5.9.s390x.rpm     MD5: 6023856ae0b6b3af2d3d06d6cb1bb6d6SHA-256: bb980d3495392fd758d7520fe687b04c151f6b978090b4aace4950871c9eb870 ksh-debuginfo-20120801-10.el6_5.9.s390x.rpm     MD5: f4122d2ad0c123cce7f5bb9e9321f95dSHA-256: ef8b991298f4f0fc4f4ae03f1af1950ac9a7293cc57ccaf987dfb01d0e1c82df   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   PPC: ksh-20120801-10.el6_5.9.ppc64.rpm     MD5: 05cdb195154d5a0d9fdd9bce2d0d9886SHA-256: 33303d811f3dfc3244179e39e4e43ce6fc1100902970b5be2b532d4fb0d65e51 ksh-debuginfo-20120801-10.el6_5.9.ppc64.rpm     MD5: fdd51487c0903837b9ff66dc22a075f0SHA-256: 12dab2bcb5d2eb643af92853e843d2201045cab4a7a9320143e79c687adf098b   s390x: ksh-20120801-10.el6_5.9.s390x.rpm     MD5: 6023856ae0b6b3af2d3d06d6cb1bb6d6SHA-256: bb980d3495392fd758d7520fe687b04c151f6b978090b4aace4950871c9eb870 ksh-debuginfo-20120801-10.el6_5.9.s390x.rpm     MD5: f4122d2ad0c123cce7f5bb9e9321f95dSHA-256: ef8b991298f4f0fc4f4ae03f1af1950ac9a7293cc57ccaf987dfb01d0e1c82df   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Industrial cyber attack: a dangerous game

The severity of the cyber attack at a regional water purification plant was not immediately clear. It was only after the third week of taking responsibility for cyber security at the plant that we knew we were in trouble. The business reports indicated that sales and profits were down. By week five, we realised just how much trouble we were in. Thousands of people were without drinking water and company losses were high and mounting. We were all conscious of reports by Symantec that more than 1,000 energy companies in Europe and North America had been compromised by an Eastern European hacking collective. Researchers had found that since 2013, a group known as Dragonfly had been targeting organisations that use industrial control systems (ICS) to manage electrical, water, oil, gas and data systems. One of the group’s latest cyber espionage campaigns was aimed at energy grid operators. This made an attack on our water treatment plants seem all the more likely. We began to realise we had been targeted, but no one on our cyber security team was able to say just where we had gone wrong. The task had seemed straightforward enough. We had done everything by the book, or so we thought, and yet things had gone horribly wrong. From the start, we had all acknowledged that raising awareness of all IT system users around cyber security was essential. We had done everything by the book, or so we thought, and yet things had gone horribly wrong We had planned to take care of training from the start, but we had been forced to delay for two weeks. Our immediate priority had been to patch all systems and carry out a systems audit after warnings of attacks by hacktivist group Anonymous. With the resources available, there was only so much we could do in a week. The easiest approach would have been to cut all connection to the internet, but without links to vital business intelligence systems, we knew the plant would be uncompetitive and fail to meet profit targets. The business would not tolerate any downtime. The internet connection had to remain. The system audit revealed two unknown internet connections into the industrial control system network. We were also alerted to a link with a previously unrecorded engineering workstation. This enabled the installation of firewalls on all internet-connected systems. We also prioritised installing anti-virus protection on all systems. The cyber security team felt confident that all systems were protected, but then we started receiving reports that the water quality was not of the required standard. Chlorine levels in the production line were inconsistent and the water quality was failing to meet customer requirements. The most logical reason was that the programmable logic controller (PLC) for the chlorine dosage in the disinfection tank was malfunctioning.   Our renewed confidence soon turned to dismay when it became clear that the problem had not been fixed But we had implemented a host of controls to ensure that attackers could not introduce any malware designed to alter the PLCs. No one on the team could understand what was wrong. We received reports that other water treatment plants had been hit by malware attacks, but we had taken all measures available to block attacks from the very first. It was at this point that we decided to check and fix all PLC software. But our renewed confidence soon turned to dismay when it became clear that the problem had not been fixed as losses continued to grow. By contrast, some of our competitors in the region were managing to maintain water quality and their businesses were thriving. Fortunately, the greatest damage was to our pride – we were one of six teams taking part in a live interactive session of the Kaspersky Industrial Protection Simulation role-playing game. The game, simulation software and interactive app were developed by security firm Kaspersky Labs to provide first-hand experience to participants of the challenges involved in providing advanced industrial cyber security. So where did we go wrong? It was frustrating to learn that failure to conduct staff training in cyber security awareness meant that several employees targeted by phishing emails had clicked on malicious links. Failure to conduct staff training in cyber security awareness meant that several employees targeted by phishing emails had clicked on malicious links This had allowed attackers to install malware on the network before we had implemented all the control measures that had occupied our initial rounds of the game. Our second crucial mistake was to fail to replace all the PLCs after we had put in all the controls to ensure any malware already on the systems was eradicated. We had spent all our time and money on bolting and barring the entrances and exits to the network, but the malware was already inside. We were doomed from the very start. Our third mistake had been not opting to set up a security information event management system. This meant that when things started going wrong, we did not have a complete picture of what was happening. As a result, we were not able to trace the problem immediately to the disinfection tank, losing time and business. The winners, determined by the fact that they had the largest profits over the time period of the simulation, had found the key to success: educate users, put in controls, and eliminate existing malware. In hindsight, our mistakes were obvious. But even though we had missed the trick of replacing existing PLCs, we had known all along that training was important. The simulation gave us first-hand experience of how easily it is to fail to do the right thing, or to do the right thing at the wrong time or for the wrong reason when faced with time, money and business pressures. The simulation immediately put into context, and made much more meaningful, a presentation earlier in the day on targeted attacks on computer industrial control systems (ICS) as the biggest threat to critical national infrastructure. We have found lots of examples of industrial control systems that are connected to the internet, which means they are hackable Andrey Nikishin, Kaspersky Labs According to Kaspersky Labs, such attacks take place regularly, but are rarely made public. However, a decoy set up by the security firm on an ICS typically used to control national infrastructure saw 1,300 attempts to gain unauthorised access in a single month. “Of these, 400 were successful,” said Andrey Nikishin, special projects director of future technologies at Kaspersky Labs. The successful attacks included 34 connections to integrated [software] development environments (IDEs), seven downloads of PLC firmware, and one case of reprogramming a PLC with the hacker’s software, he said. “This is especially worrying in the light of the fact that we have found lots of examples of industrial control systems that are connected to the internet, which means they are hackable,” said Nikishin. The first stage to any targeted attack, he said, is information gathering and preparation. “Attackers will scour social media for information on ICS operators who can be targeted through well-crafted email phishing attacks to infect control systems,” said Nikishin. This was all the more meaningful after we had experienced the consequences of this type of attack in the simulation. Our experience also made all the more chilling Kaspersky Labs’ prediction that attackers will increasingly target industrial control systems because industrial networks potentially offer an easier way in to the more heavily protected corporate IT systems. The analysis of malware has revealed components for controlling office doors, so attackers could theoretically block access to targeted buildings Andrey Nikishin, Kaspersky Labs Attackers are also expected to target and compromise remote controls systems, where such systems have been introduced to cut costs and for ease of use without due consideration to security. “All sorts of things, including public transport systems and even battleships, are being equipped with remote control systems, which are conceivably open to compromise,” said Nikishin. Kaspersky Labs is also warning of potential attacks on building control systems for CCTV, air-conditioning, lighting and access control. “The analysis of malware has revealed components for controlling office doors, so attackers could theoretically block access to targeted buildings, which could be dangerous,” said Nikishin. “From experience, my feeling is that the situation is likely to go from bad to worse.” Possibly, the lack of this element of experience is responsible for organisations, including suppliers of critical national infrastructure, failing to take the threat seriously enough. The Kaspersky Industrial Protection Simulation was a real eye-opener and should be made mandatory for all security professionals, especially those working for suppliers of national infrastructure. Thanks to the simulation, this security journalist, for one, has a far better understanding of the challenges and pressures involved. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK This was first published in August 2014

RHBA-2014:1106-1: finger bug fix update

Updated finger packages that fix one bug are now available for Red HatEnterprise Linux 7. The finger utility allows users to display information about users on thesystem, including their login names, full names, and the time they logged in tothe system. This update fixes the following bug:* Previously, the finger-server package did not require the main finger packageas a dependency. As a consequence, the finger utility was not installed when theuser installed the finger-server package, and the remote server could notrespond to requests. This update adds the missing dependency on finger to thefinger-server package. As a result, the remote server can run finger to respondto requests as expected. (BZ#1095356)Users of finger are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 7) SRPMS: finger-0.17-52.el7.src.rpm     MD5: d60fed719138ad7ebe5c09523d02e71eSHA-256: 2a568a128c38cfc05b6b3dfdc2d94481cf2f4d16388bda0dee9fdfdf5c6914b4   x86_64: finger-0.17-52.el7.x86_64.rpm     MD5: 48ea3b570fc3657fe5a2a3c8f05b5178SHA-256: f0ae33fbb40f28e6760fec9bba216fe98c1412460cc68831f1526aeead683baa finger-debuginfo-0.17-52.el7.x86_64.rpm     MD5: d5de02354b7b115487d9bf91dfc36395SHA-256: d3418faf8d6cc3b0335920ef60a2e02755205b487a2375daa9117473daea3de3 finger-server-0.17-52.el7.x86_64.rpm     MD5: 8c2e31f2c85900354a049352648d3a59SHA-256: f3bab4e3e5ab7fdbed5e6398210ffc27ab26c91c666b2d45f5b18d93247188ac   Red Hat Enterprise Linux HPC Node FasTrack (v. 7) SRPMS: finger-0.17-52.el7.src.rpm     MD5: d60fed719138ad7ebe5c09523d02e71eSHA-256: 2a568a128c38cfc05b6b3dfdc2d94481cf2f4d16388bda0dee9fdfdf5c6914b4   x86_64: finger-0.17-52.el7.x86_64.rpm     MD5: 48ea3b570fc3657fe5a2a3c8f05b5178SHA-256: f0ae33fbb40f28e6760fec9bba216fe98c1412460cc68831f1526aeead683baa finger-debuginfo-0.17-52.el7.x86_64.rpm     MD5: d5de02354b7b115487d9bf91dfc36395SHA-256: d3418faf8d6cc3b0335920ef60a2e02755205b487a2375daa9117473daea3de3 finger-server-0.17-52.el7.x86_64.rpm     MD5: 8c2e31f2c85900354a049352648d3a59SHA-256: f3bab4e3e5ab7fdbed5e6398210ffc27ab26c91c666b2d45f5b18d93247188ac   Red Hat Enterprise Linux Server FasTrack (v. 7) SRPMS: finger-0.17-52.el7.src.rpm     MD5: d60fed719138ad7ebe5c09523d02e71eSHA-256: 2a568a128c38cfc05b6b3dfdc2d94481cf2f4d16388bda0dee9fdfdf5c6914b4   PPC: finger-0.17-52.el7.ppc64.rpm     MD5: 70dcfa70df95055ce94d201ceb56e878SHA-256: 1007fcb206a5c1bfa69caac31f57c0fea8996167d97e98e5e7cb1799f3921527 finger-debuginfo-0.17-52.el7.ppc64.rpm     MD5: 219ada6a678fbd43b577bf48eb370660SHA-256: 98995fcc8613f23bbcb5e24e4a5ea7706083a45e8a8d9b41bfdc1a462b342467 finger-server-0.17-52.el7.ppc64.rpm     MD5: a23b51c27b5c8b6b561f2e9791bd9e65SHA-256: 589d85af70b8e93a015dfac0a1556aaaaa4c6509bd773792f3481cf19a44c64c   s390x: finger-0.17-52.el7.s390x.rpm     MD5: 1a61ebddea90b0bc1f26074f6c60f7dbSHA-256: 425671592573837b3b0d21032017b9dd10ed31cffb5e4a7096455ede7f87fd14 finger-debuginfo-0.17-52.el7.s390x.rpm     MD5: 3738975f16cd2ce0726f7b0d5446fd65SHA-256: 2d94983672ba59fdc6dd46c4c59dbc15e41a09701c4062cdf7935acb3d88a18d finger-server-0.17-52.el7.s390x.rpm     MD5: e5830c97e35663daa0f75bb8ff4c289fSHA-256: 6bd145acb05700b971254dec6e3acb287fbc24225110e94c083e5dbe6e05194e   x86_64: finger-0.17-52.el7.x86_64.rpm     MD5: 48ea3b570fc3657fe5a2a3c8f05b5178SHA-256: f0ae33fbb40f28e6760fec9bba216fe98c1412460cc68831f1526aeead683baa finger-debuginfo-0.17-52.el7.x86_64.rpm     MD5: d5de02354b7b115487d9bf91dfc36395SHA-256: d3418faf8d6cc3b0335920ef60a2e02755205b487a2375daa9117473daea3de3 finger-server-0.17-52.el7.x86_64.rpm     MD5: 8c2e31f2c85900354a049352648d3a59SHA-256: f3bab4e3e5ab7fdbed5e6398210ffc27ab26c91c666b2d45f5b18d93247188ac   Red Hat Enterprise Linux Workstation FasTrack (v. 7) SRPMS: finger-0.17-52.el7.src.rpm     MD5: d60fed719138ad7ebe5c09523d02e71eSHA-256: 2a568a128c38cfc05b6b3dfdc2d94481cf2f4d16388bda0dee9fdfdf5c6914b4   x86_64: finger-0.17-52.el7.x86_64.rpm     MD5: 48ea3b570fc3657fe5a2a3c8f05b5178SHA-256: f0ae33fbb40f28e6760fec9bba216fe98c1412460cc68831f1526aeead683baa finger-debuginfo-0.17-52.el7.x86_64.rpm     MD5: d5de02354b7b115487d9bf91dfc36395SHA-256: d3418faf8d6cc3b0335920ef60a2e02755205b487a2375daa9117473daea3de3 finger-server-0.17-52.el7.x86_64.rpm     MD5: 8c2e31f2c85900354a049352648d3a59SHA-256: f3bab4e3e5ab7fdbed5e6398210ffc27ab26c91c666b2d45f5b18d93247188ac   (The unlinked packages above are only available from the Red Hat Network) 1095356 - finger-server should require finger These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Apple tightens privacy rules for health apps

Apple has tightened its privacy rules relating to health apps in an attempt to quell privacy concerns over its HealthKit platform. At its Worldwide Developer Conference in June, Apple said the new HealthKit API will enable apps to provide health and fitness services to access shared health-related information in one place. The idea is to store a user’s health information in a centralised and secure location that can be shared with a variety of health-related apps. Apple also announced a standard health app that will collect data on blood pressure, heart rate, diet and exercise. According to the revised privacy rules, developers using the new HealthKit API are not allowed to sell to advertisers, data brokers or information resellers any personal data collected by apps. However, apps are allowed to share data with third parties for medical research purposes, but only with the consent of those whose data is being shared. The rules require apps using the HealthKit API to provide health and/or fitness services and for developers to make the purpose of an app clear in marketing text and the user interface. Apple came under fire in February 2012 for distributing several social media apps through its iTunes store that harvested iPhone contact information without users’ permission. Apple responded by blocking apps from accessing contact lists without explicit consent from users. The latest privacy rules update comes in the run-up to the expected launch of the latest iPhone and new wearable technology in September. This week, Apple sent out invitations for an event on 9 September that is believed to be the launch of the latest iPhone and a range of wearable technology, according to The Guardian. Apple is expected to unveil an iPhone with a larger screen and revamped operating system, iOS8, in an attempt to remain competitive with rivals such as Samsung and Google. In iOS8, Apple has also paid particular attention to privacy concerns by introducing several privacy enhancements that will make it more difficult for advertisers and others to spy on users. Unlike its predecessors, iOS8 will keep private the device's location, past Wi-Fi connections and Media Access Control (MAC) address. There are rumours that at the September product launch, Apple will unveil a smartwatch to compete with similar products from Google, LG and Samsung. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK

Microsoft cuts 1,500 fake apps in Windows Store cleanup

Microsoft has removed 1,500 fake, fraudulent and misleading apps from its Windows and Windows Phone store. The cleanup is part of a review sparked by complaints that Microsoft’s online stores were full of fraudulent apps. As a result of the review, Microsoft has issued revised Windows Store app certification requirements to help ensure that apps are named and described in a way that does not misrepresent their purpose. According to Microsoft, the new rules require app names to reflect the functionality of the app clearly and accurately. Other changes are aimed at ensuring apps are categorised according to function and purpose, and that the icons used are different enough not to be mistaken for others. One of the biggest complaints before the review was that users of Microsoft online stores found it difficult to differentiate between original apps and copycats. Copycat apps included fake versions of Adobe Flash Player, Firefox, Candy Crush Saga, WhatsApp, Minecraft, Spotify and Blender 3D, according to a report by How-To Geek. “These revised policies are being applied to all new app submissions and existing app updates for both the Windows and Windows Phone Store,” said Todd Brix, Windows Store general manager, in a blog post. “We have also been working on titles already in the catalogue, conducting a review of Windows Store to identify titles that do not comply with our modified certification requirements.”  Brix said most of the developers of apps that were found to violate Microsoft’s policies had good intentions and agreed to make the necessary changes when notified. Those that failed to comply had their apps removed from Microsoft’s online stores. “As always, we will gladly refund the cost of an app that is downloaded as a result of an erroneous title or description,” said Brix. Customers can visit Windows Support and Windows Phone Support to contact Microsoft about a refund, he added. According to Brix, the review of Microsoft’s online stores will be ongoing, with the company applying additional resources to speed up the review process and identify problem apps more quickly. He encouraged customers to report any issues they encounter with Windows Store by using the “report concern to Microsoft” link. “For infringement concerns, people can use our online tools or email reportapp@microsoft.com directly,” he added. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK

LTE Asia Awards 2014 Shortlist Announced

Singapore, 29 August 2014 - The organisers of LTE Asia have today announced the shortlist for the first LTE Asia Awards 2014. The 9th Annual LTE Asia event serves as the setting for the awards, which will reward key achievements and advances across the LTE ecosystem in Asia. This year's awards have received a high number of entries with eight categories up for grabs! Taking place at the Marina Bay Sands Hotel, Singapore, this luxurious setting will provide a backdrop to the awards ceremony which will bring together the experts responsible for driving LTE forwards in the region over the past year. Considered a mark of industry excellence, the awards are judged by a panel of senior analysts who have a vast amount of knowledge about the Asian LTE market. This year's judging panel will include Ajay Sunder, Senior Director - Telecom, Frost & Sullivan, Dimitris Mavrakis, Principal Analyst, Ovum, Guang Yang, Senior Analyst - Wireless Operator Strategies, Strategy Analytics and Alan Quayle, Owner, Alan Quayle Business & Service Development.The awards will be presented during a cocktails reception on the evening of 24 September, the final day of the event itself. The reception is open to all attendees of the LTE Asia conference.The awards ensure industry recognition for those shortlisted. Congratulations go to this year's shortlisted companies, seen below:Best Test/Measurement LTE ProductAnite, Network Testing Division -Nemo CEM ObserverGemalto- NxRayJDSU- JDSU CellAdvisor™ Base Station AnalyzerPCTEL- PCTEL's RAN Mobile Testing Suite.Polystar- Solver (for VoLTE - SRVCC testing)Most Significant Development of a Commercial LTE Network (Operators Only)Optus- LTE 700 MHz commercial launchSingtel- Commercial LTESK Telecom- World's First Commercial 225Mbps LTE-Advanced and Pre-5G trialsBest LTE Core Network ProductAlcatel-Lucent- 7750 Service Router Mobile GatewayCisco Systems, Inc. - ASR5000 SeriesDialogic, Inc. - Dialogic® BorderNet™ Diameter Services HelixHuawei Technology- Huawei SingleEPC MSE SolutionMavenir Systems- Mavenir's Converged Evolved Packet Core (EPC) and Session Border ControllerBest Traffic Management ProductAscom Network Testing- TEMSTM Capacity ManagerGigamon- GigaVUE-HC2 Multi-Purpose Visibility Fabric NodePolystar- Network and Customer Insight SolutionsBest LTE Roaming ProductMavenir Systems- Interconnect Session Border Controller I-SBC)Polystar- Network and Customer Insight SolutionsSAP Mobile Services, a division of SAP- SAP IPX 365Telstra Corporation- Telstra Internet Package ExchangeBest VoLTE InnovationHKT Limited- Voice over LTE ServiceLG Uplus.- LG Uplus.Mavenir Systems- Mavenir's Multi-Device, Multi-Access network Service Ubiquity SolutionSamsung Electronics- Smart VoLTE with InteractiVSingtel- VoLTEInnovation in HetNet DevelopmentCisco Systems,Inc- Small Cell Design and Technology InnovationHuawei Technologies Co., Ltd.- Huawei LampSite SolutionSamsung Electronics- Samsung Advanced HetNetNFV Innovation of the YearCisco Systems, Inc- Cisco Quantum Virtualized Packet Core - OrchestratedMavenir Systems- Virtualized RCS based on NFVENDSAbout LTE AsiaLTE Asia provides an opportunity to meet and network with leaders in the Asian LTE community and is recognised by the entire industry as the place to learn from and meet key decision-makers and thought-leaders. This leading 4G event attracts 1000+ high level attendees from across the APAC region, bringing together the ecosystem to discuss a wide range of issues including monetising LTE, hetnets, network optimisation, LTE evolution, 5G.About Informa Telecoms & MediaInforma Telecoms and Media (http://www.informatandm.com/) organises 125 global annual events, attended by more than 70,000 executives worldwide. With a focus on quality content, Informa Telecoms and Media deliver a key audience of decision-makers from the mobile, fixed, alternative, wholesale, MVNO, broadband and satellite operator communities. Informa Telecoms and Media is also the leading provider of business intelligence and strategic services to the global telecoms and media markets. Driven by constant first-hand contact with the industry, its 90 analysts and researchers produce a range of intelligence services including news and analytical products, in depth market reports and datasets focussed on technology, strategy and content. For media information please contact Dana Hare at dana.hare@proactive-pr.com or Holly Leonardi at holly.leonardi@proactive-pr.com or Matthew Dunkling at matthew.dunkling@proactive-pr.com or call on +44 1636 812152.Source: RealWire

Insurers to demand more data via telematics to fine-tune insurance prices,...

Insurance companies are to demand an increasing amount of personal data via telematics - both in-car and in-home - in order to fine-tune insurance rates for consumers, according to AXA's group CIO and COO, Kevin Murray. Murray believes that telematics will become a mainstay in the UK within five years after making inroads in the US, despite initially being regarded as a "Big Brother"-style tool. "People are currently saying that it's kind of like Big Brother, and that they don't want third parties to necessarily know where they are and how they're driving," he said in an interview with Computing. But telematics won over parents in the US, as they could install the technology in their cars to ensure their children were driving safely, and it has become more widely used in the UK in recent years.  "The parents thought, 'I'm paying for this and I want to know where my kids are'. There were added benefits, too, such as in the case of an accident the system would immediately alert emergency services and, if your kid drove well, then you would receive a 15 to 20 per cent discount," said Murray. This was as long as children abided by certain conditions set by the insurers, such as not driving after midnight and not driving with more than two people in the car, for example - all information that needs to be recorded and sent back to the insurance company via the telematics device.  To help alleviate the Big Brother fears, US insurers Geico and Progressive told consumers that they could even switch-off the telematics boxes for a particular day if, for whatever reason, the driver didn't want to be tracked by a third party - as long as the driver meets certain data thresholds every week or month that satisfies the insurers' underwriting criteria. "What they found was that now that they've given the ability for people to turn it off, very few people do [turn it off]," said Murray. And as telematics evolves - with manufacturers such as BMW and Mercedes installing them as standard into cars themselves, in an attempt to lure drivers back to dealers' garages for maintenance - Murray believes that consumers will become more willing to give up their data in return for a personalised insurance quote. In the process, the insurer will also know when the car is being driven, where it is parked, how often it is driven and how well maintained it is. Murray suggested that someone who purchases a car could tell the manufacturer that they don't mind their data being handed to insurance companies, but not to any other third parties. Alternatively, they could decline the use of their data altogether. Either way, both the manufacturer and insurer would need consent in one form or another. Murray's belief that insurance rates should shift from being a "big underwriting pool of risk" to more targeted and strategically set prices does not stop at car insurance either. He believes that similar new technology will help insurers to tailor pricing in other areas of insurance, such as home insurance, while data gleaned from wearables could help set the price of health insurance.  AXA is looking into how connected devices in the home can also send data back to the insurance company, which could enable it to find out more about the consumer. "[Google-owned] Nest is a good example, because not only is it going to monitor the home for temperature but it may know when you're home as well as other details," he said. Other ideas that Murray said AXA is looking into is the use of heat sensors and graphical imagery from satellites to determine the condition of a roof and how much energy leakage there is. Keep an eye out for the full interview with Murray, which will be published on Computing.co.uk shortly.  Computing is available online, on iPad and Android, and in print. For the very latest news direct to your in-tray, subscribe to our daily newsletter. 

Feds Investigating Potential JPMorgan Chase Hacking Attack

[unable to retrieve full-text content]Reports allege that JPMorgan Chase has been breached, with "gigabytes of sensitive data" stolen in the attack.

FTC picks winners in latest robocall-defeating contest, scammers keep scamming

Contestants set up honeypots and spoof existing robocall-screening technologies.