search for: 28with

Displaying 15 results from an estimated 15 matches for "28with".

Did you mean: 20with
2017 Feb 21
2
Which tool to automatically restart Asterisk ?
Why not to use Fail2ban https://www.voip-info.org/wiki/view/Fail2Ban+%28with+iptables%29+And+Asterisk *Tahir Almas* Managing Partner ICT Innovations http://www.ictinnovations.com http://www.ictbroadcast.com Leveraging open source in ICT On Tue, Feb 21, 2017 at 12:28 AM, Tzafrir Cohen <tzafrir.cohen at xorcom.com> wrote: > On Mon, Feb 20, 2017 at 11:36:24AM...
2009 Feb 16
2
[LLVMdev] Modeling GPU vector registers, again (with my implementation)
...e physical register, how can I model the use of r0.xyzw in the following example: // dp4 = dot product 4-element dp4 r0.x, r1, r2 dp4 r0.y, r3, r4 dp4 r0.z, r5, r6 dp4 r0.w, r7, r8 sub r5, r0.xyzw, r6 -- View this message in context: http://www.nabble.com/Modeling-GPU-vector-registers%2C-again-%28with-my-implementation%29-tp22001613p22034856.html Sent from the LLVM - Dev mailing list archive at Nabble.com.
2010 Mar 19
6
(no subject)
Hello, I'm looking for some advice on securing Asterisk. Recently my servers been under several brute-force SIP attacks. I have several remote sites, as well as many roaming users, who may have PC softclients and/or SIP based hardphones. My first step will be to strengthen the passwords in use, and for the hardphones to restrict by IP address, but that still leaves the softphone
2011 Mar 17
0
Asterisk not logging originating IP of a brute force attack
...work-around like: alwaysauthreject=yes allowguest=no The above works around the unknown peer issue, but that really be logging the IP address too! Those two or three users on the forums and I would like to use Fail2Ban with Asterisk to block hackers... http://www.voip-info.org/wiki/view/Fail2Ban+%28with+iptables%29+And+Asterisk ... and I expect others would appreciate logging hackers' IP addresses too! It is also useful for debugging purposes when setting up users to have their IP addresses too. Is there any known solution or patch available? Unpatched, I consider this a security vulnerabi...
2009 Jul 20
0
No subject
.... I will read the articles. Thanks again to everyone. Regards, Rodrigo Lang. 2010/6/29 Kenny Watson <kwatson at geniusgroupltd.com> > Hi, you can use fail2ban > http://www.voip-info.org/wiki/view/Fail2Ban+(with+iptables)+And+Asterisk<http://www.voip-info.org/wiki/view/Fail2Ban+%28with+iptables%29+And+Asterisk> > > Which works well, when a pattern is found in a log file it addes in an > iptables rules to block the traffic for a period. > > On debian you can apt-get install fail2ban and on centos/redhat yum -i > fail2ban > > Thanks > > Kenny > &...
2009 Feb 16
0
[LLVMdev] Modeling GPU vector registers, again (with my implementation)
...e physical register, how can I model the use of r0.xyzw in the following example: // dp4 = dot product 4-element dp4 r0.x, r1, r2 dp4 r0.y, r3, r4 dp4 r0.z, r5, r6 dp4 r0.w, r7, r8 sub r5, r0.xyzw, r6 -- View this message in context: http://www.nabble.com/Modeling-GPU-vector-registers%2C-again-%28with-my- implementation%29-tp22001613p22034856.html Sent from the LLVM - Dev mailing list archive at Nabble.com. _______________________________________________ LLVM Developers mailing list LLVMdev at cs.uiuc.edu http://llvm.cs.uiuc.edu http://lists.cs.uiuc.edu/mailman/listinfo/llvmdev
2008 Jan 16
2
Memory Leak
So, I''ve stumbled across bleak_house (http://blog.evanweaver.com/files/doc/fauna/bleak_house/files/README.html) - this looks like it may help me track down what is causing the Memory leak I''m seeing (be it me, Ubuntu, Debian, or Puppet). First step: I''m going to clone the repo, branch Second step: Learn Ruby - shouldn''t be too hard. Third step: Do exactly what
2013 Jan 02
8
Auto ban IP addresses
Greetings all, I have been seeing a lot of [Jan 2 16:36:31] NOTICE[7519]: chan_sip.c:23149 handle_request_invite: Sending fake auth rejection for device 100<sip:100 at 108.161.145.18>;tag=2e921697 in my logs lately. Is there a way to automatically ban IP address from attackers within asterisk ? Thank you
2009 Feb 13
0
[LLVMdev] Modeling GPU vector registers, again (with my implementation)
On Feb 13, 2009, at 9:47 AM, Alex wrote: > It seems to me that LLVM sub-register is not for the following > hardware architecture. > > All instructions of a hardware are vector instructions. All > registers contains > 4 32-bit FP sub-registers. They are called r0.x, r0.y, r0.z, r0.w. > > Most instructions write more than one elements in this way: > > mul
2009 Aug 16
1
How to deal with multicollinearity in mixed models (with lmer)?
...ow the fact that number of children declines with time. So, would you please give a suggestion to deal with collinearity between kids and byear? Thank you very much for helping! Best regards, -- View this message in context: http://www.nabble.com/How-to-deal-with-multicollinearity-in-mixed-models-%28with-lmer%29--tp24994095p24994095.html Sent from the R help mailing list archive at Nabble.com.
2017 Feb 20
2
Which tool to automatically restart Asterisk ?
Hi, Oliver. Maybe something like this (add this script to your crontab): ------------------------8<-------------------------- #!/bin/bash # # File: asterisk-watchdog.sh # Date: 2015.05.26 # Build: v1.0 # Brief: Secuencia para monitorizar procesos. # # ${PATH}: Variable de entorno con las rutas a los ejecutables. PATH=/bin:/sbin:/usr/bin:/usr/sbin # ${DAEMON}:
2011 Jul 26
3
file2ban
I want to add an entry to a database every time a brute force registration attempt is done. from this database we are updating cisco routers with our ban list so our entire network is protected. The database side of things is working and has been for some time. I really would like to add the file2ban side of it to protect our asterisk system better. How would I best go about doing this
2017 Feb 27
2
Which tool to automatically restart Asterisk ?
...everaging open source in ICT On Thu, Feb 23, 2017 at 3:45 PM, Olivier <oza.4h07 at gmail.com> wrote: > > > 2017-02-21 14:09 GMT+01:00 Tahir Almas <tahir at ictinnovations.com>: > >> Why not to use Fail2ban https://www.voip-info.org/wiki >> /view/Fail2Ban+%28with+iptables%29+And+Asterisk >> >> How would fail2ban detect that Asterisk needs to be restarted ? > > >> >> >> *Tahir Almas* >> >> Managing Partner >> ICT Innovations >> http://www.ictinnovations.com >> http://www.ictbroadcast.com >&...
2009 Feb 13
3
[LLVMdev] Modeling GPU vector registers, again (with my implementation)
It seems to me that LLVM sub-register is not for the following hardware architecture. All instructions of a hardware are vector instructions. All registers contains 4 32-bit FP sub-registers. They are called r0.x, r0.y, r0.z, r0.w. Most instructions write more than one elements in this way: mul r0.xyw, r1, r2 add r0.z, r3, r4 sub r5, r0, r1 Notice that the four elements of r0 are written
2017 Aug 17
3
Detecting DoS attacks via SIP
Well, correct me if I'm wrong, but I would say this conversation you have posted is a bit outdated, now fail2ban can be used with asterisk security log https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Event+Logger. On Thu, Aug 17, 2017, 4:53 AM Telium Technical Support <support at telium.ca> wrote: > Keep in mind that the attacks you are seeing in the log are ONLY the