Displaying 20 results from an estimated 9000 matches similar to: "Blacklist callers from file"
2013 Mar 14
2
blacklist caller ID
Can someone refresh my memory how to backlist caller ID in asterisk 1.8?
I had it working in ver. 1.4 but in 1.8 it changed.
--
Joseph
2013 Apr 10
2
my "blacklist" is not working
In my blacklist I have: database show
...
/blacklist/Manitoba : advertising
...
[incoming]
; First, lets take care of telemarketers
exten => 4,1,GotoIf(${BLACKLIST()}?blacklisted,s,1)
exten => 4,n,Set(goaway=${CALLERID(number):0:2})
exten => 4,n,GotoIf($["${goaway}" = "V4" ]?blacklisted,s,1)
exten => 4,n,GotoIf($["${goaway}" = "V3"
2004 Oct 12
4
Blacklisted packages still logged
Hello,
Pardon me if this turns out to be stupid question.
I have an IP address blacklisted in /etc/shorewall/blacklist. I have
BLACKLIS_LOGLEVEL not set in /etc/shorewall/shorewall.conf, but I can still
see the packages coming from the blacklisted IP logged in /var/log/messages
when I do ''tail -f /var/log/messages''.
Is there someplace else I should check ?
Thanks.
RDB
--
2014 May 29
4
[LLVMdev] Unifying TSan blacklist and no_sanitize_thread
Hi,
I consider reducing the usage of blacklist in sanitizer instrumentation
passes and doing the necessary work in frontend (Clang) instead.
Some of it is already implemented: e.g. Clang will attach an attribute
"sanitize_address" to function definition only if this function is not
blacklisted. In this case we won't instrument the memory accesses in this
function in ASan
2014 May 31
2
[LLVMdev] Unifying TSan blacklist and no_sanitize_thread
On Fri, May 30, 2014 at 1:53 AM, Evgeniy Stepanov <eugeni.stepanov at gmail.com
> wrote:
> On Fri, May 30, 2014 at 12:41 AM, Alexey Samsonov <vonosmas at gmail.com>
> wrote:
> > Hi,
> >
> > I consider reducing the usage of blacklist in sanitizer instrumentation
> > passes and doing the necessary work in frontend (Clang) instead.
> >
> > Some
2003 Jan 08
3
Shorewall blacklist does all
Hello,
I''m a very happy user of shorewall but I have found a problem
or maybe a misconfiguration I made which I can not resolve.
I use a fairly large blacklist based on probes, nimda & codered
attacks, proxy & relay probes etc.
The only problem is that I want to block incoming trafic on
all ports FROM a block but it does also block a httpd, ping
etc TO a ip in a block what I do
2017 Nov 15
4
How to blacklist a device driver (sysemd)
Hi,
how can a specific device driver in CentOS 7 be blacklisted, so that it
doesn't load at boot time? We have Infiniband adapters which are not
completely supported by CentOS and we want to silence the error messages
for the time being.
I tried with the files
/etc/modprobe.d/blacklist
/etc/modprobe.d/blacklist.conf
and with entries
mlx5_core
mlx5_ib
blacklist
2013 Apr 10
1
bnlearn: how to compute boot strength with mmhc and a blacklist
Dear R-help list:
I have two related questions regarding the functions boot.strength and
custom.strength in bnlearn.
1)
I am using the following commands (on a set of continuous data, the
example here run on fake data):
> myblacklist<-data.frame(from=c("x1", "x1", "x1", "x2", "x2",
"x2")) , to=c("x2",
2019 Jan 05
4
Chromium - Application-level nouveau blacklist
It looks like as of Chromium 71, nouveau is completely blacklisted.
I don't really see a way back from this, since they don't cite any
easily reproducible issues, except that some people had some issues
with indeterminate hardware and indeterminate versions of mesa.
In the bug that triggered this
(https://bugs.chromium.org/p/chromium/issues/detail?id=876523), where
I might have slightly
2013 Nov 22
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
(2013/11/22 11:35), Masami Hiramatsu wrote:
> (2013/11/21 16:29), Ingo Molnar wrote:
>>
>> * Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote:
>>
>>> (2013/11/21 2:36), Frank Ch. Eigler wrote:
>>
>> [ ... ]
>>>> one needs to resort to something like:
>>>>
>>>> # cat /proc/kallsyms | grep ' [tT] '
2013 Nov 22
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
(2013/11/22 11:35), Masami Hiramatsu wrote:
> (2013/11/21 16:29), Ingo Molnar wrote:
>>
>> * Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote:
>>
>>> (2013/11/21 2:36), Frank Ch. Eigler wrote:
>>
>> [ ... ]
>>>> one needs to resort to something like:
>>>>
>>>> # cat /proc/kallsyms | grep ' [tT] '
2003 Jan 25
7
automagic blacklist
Hello list members,
Over the past 12 hours my firewall box has had over 300 hits to port 1434 from numerous ip''s. I ran tcpdump on a couple of them and it looks like the ms-sql exploit attempt. I don''t use ms-sql. I''ve always gotten a few hits per day, but now it''s gotten out of control.
I use logcheck to email the system logs to me and at this rate by the
2010 Oct 21
5
SIP Blacklisting
Hi,
Given the recent increase in SIP brute force attacks, I've had a little idea.
The standard scripts that block after X attempts work well to prevent you actually being compromised, but once you've been 'found' then the attempts seem to keep coming for quite some time. Older versions of sipvicious don't appear to stop once you start sending un-reachables (or straight
2013 Apr 06
1
blacklist/V* - using wildcard
Does wildcard "*" character works in asterisk "blacklist"?
I have a telemarketing caller who is rotating caller id but they usually start with "V4-something" eg. V40611320600265
I've tried to block using whildcard "*" :
/blacklist/V4* : advertising
but it doesn't work.
--
Joseph
2004 May 24
1
Using Blacklist
I am attempting to write in incoming context for calls.
1. If the caller id is given and it is not black listed it will Playback a
greeting and then right the phone or go to voicemail under busy or
unavailable conditions
2. If no caller id is given, then Privacy Manager will ask for the number.
I am testing 6145551212 to see if the black list will work
3. If a caller id is given, and it is
2010 May 10
1
Manipulating the Blacklist database
I am running Asterisk 1.4.2 and recently we changed the SIP provider of
our main incoming DID number. The new provider prefixes all CallerID
records with a +1 in front of the number, whereas the previous SIP
provider did not.
Consequently now all my blacklisted numbers aren't matching in my
Dialplan, so I'm getting tele-spammed.
Is there a way that I can work with the blacklist
2013 Nov 21
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
* Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote:
> (2013/11/21 2:36), Frank Ch. Eigler wrote:
[ ... ]
> > one needs to resort to something like:
> >
> > # cat /proc/kallsyms | grep ' [tT] ' | while read addr type symbol; do
> > perf probe $symbol
> > done
> >
> > then wait for a few hours for that to finish. Then, or
2013 Nov 21
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
* Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote:
> (2013/11/21 2:36), Frank Ch. Eigler wrote:
[ ... ]
> > one needs to resort to something like:
> >
> > # cat /proc/kallsyms | grep ' [tT] ' | while read addr type symbol; do
> > perf probe $symbol
> > done
> >
> > then wait for a few hours for that to finish. Then, or
2000 Aug 21
4
[OT but please read] ORBS blacklisting ns1.samba.org
Some lists and emails are distributed via ns1.samba.org. For those of
you that use ORBS, you'll find it is blacklisted now. There is no
mention of it on the website and it doesn't return a positive when you
enter it for testing but it has slipped into the ORBS blacklist
somewhere.
Samba.org admins may wish to force all ns1 outbound email via another
netblock, bringing it up to ORBS only
2010 Mar 12
3
how to monitor,or be notified of email blacklisting ?
Hi,
Does anyone know how I can monitor our server's for blacklisting? We
run a large amount of shared hosting & reseller hosting servers and
from time to time one of the IP's will get blacklisted. I'm looking
for a way to be notified if any of our IP's get blacklisted. Is this
possible?
--
Kind Regards
Rudi Ahlers
SoftDux
Website: http://www.SoftDux.com
Technical Blog: