search for: stealthy

Displaying 5 results from an estimated 5 matches for "stealthy".

Did you mean: stealth
2018 Nov 07
0
Checksums of packages change on CRAN without change in version number
...ile. This does cause the checksums to change, and we end up with two packages with the exact same version number but different checksums. To date there hasn't been any satisfactory answer on how to avoid having to update our own configuration builds a week after the initial update due to these stealthy checksum changes. It's also an increasing safety concern for our IT department, as they seriously frown upon software that makes in-place changes. According to them, there's no way they can know whether it is a legitimate change to the package, or the result of some kind of hack. They have...
2006 Apr 25
5
XenAccess Library: Introspection for Xen
I''m pleased to announce a new project called XenAccess. The project goals are to provide a full featured introspection library for Xen. Introspection is a technique where applications in one domain can view memory from another domain. For example, you can run an application in dom0 to list the processes or LKMs in a domU. More information is available on the website:
2005 Jul 29
4
Reinstall Windows but preserve CentOS
I have a computer that dual boots between Windows and CentOS. Each has it's own hard drive. I suddenly have a problem with Windows, and may need to reinstall. I need it for applications like After Effects, Premiere, and other things that I am currently in the middle of a project with. It seems the system has become usnstable, it's preventing me from continuing to work, and I
2016 Jan 15
3
[Patch] TCP MD5SIG for OpenSSH
On 15 January 2016 at 08:48, Alex Bligh <alex at alex.org.uk> wrote: > > The socket option is enabled *after* connection establishment, thus > > doesn't protect against SYN floods. This is because server doesn't > > know (in userspace) what the address of the peer is until they > > connect. Again because signed addresses. > So could they exchange a secret
2008 Jul 21
20
Ideas for stopping ssh brute force attacks
just wanted to get some feedback from the community. Over the last few days I have noticed my web server and email box have attempted to ssh'd to using weird names like admin,appuser,nobody,etc.... None of these are valid users. I know that I can block sshd all together with iptables but that will not work for us. I did a little research on google and found programs like sshguard and