Displaying 20 results from an estimated 1960 matches for "abus".
Did you mean:
abuse
2019 Apr 11
1
Mail account brute force / harassment
On 11 Apr 2019, at 04:43, Marc Roos via dovecot <dovecot at dovecot.org> wrote:
> B. With 500GB dump
> - the owner of the attacking server (probably hacked) will notice it
> will be forced to take action.
Unlikely. What is very likely is that your ISP shuts you don for network abuse.
> If abuse clouds are smart (most are) they would notice that attacking my
> servers, will result in the loss of abuse nodes, hence they will not
> bother me anymore.
Not at all the case.
> If every one would apply strategy B, the abuse problem would get less.
No. The abuse pr...
2017 Oct 12
2
Mail Alias Stores in mySQL Not working
"Do you have an SQL entry for abuse at kasdivi.com <mailto:abuse at kasdivi.com> ?
Bill?
One of my first thoughts
mysql> SELECT `address`, `domain`, `goto` FROM `alias` LIMIT 8;
+-------------------------------+--------------------+--------------------------+
| address | domain | goto...
2011 Sep 22
2
VoIP Abuse to Twitter (real time VoIP Abuse)
Apologies for cross posting but some of us aren't on the other list
(vice/versa) and thought both groups would benefit.
For those familiar with the VoIP Abuse Project, no need to explain the
gist of this. I got tired of parsing through the alerts (lists) I
receive via email daily. They're long and sometimes I don't have the
time to post them all. So for now, posting VoIP Abuse addresses straight
to Twitter.
So, anyone trying to compromise a pbx...
2005 Feb 27
0
[abuse #255766] Systems Support Online Autoreply
***** This an automatic response to confirm that we have
received your recent report regarding a Network Abuse or
Security incident involving an IKANO Communications
Branded
partner, and are taking the following actions to resolve
the issue. *****
The subject of your e-mail was:
Postmaster, Ġėţ ready for Romáň&am...
2014 Jun 24
1
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
...d we would only
> have support for ARM.
>
> The usage of the DMA API that we are doing might be illegal, but in
> essence it does exactly what we need - at least for ARM. What are the
> alternatives?
It may seem /to you/ as a driver developer to be the easiest thing in
the world to abuse an API in a way that it's not supposed to be used,
and it is easy to do that.
However, what you're actually saying is that you don't respect your
fellow kernel developers who have to maintain the other side of that
interface. When they need to change the implementation of that
interf...
2005 Oct 18
8
free dids on goiax.com
...e us/canada outbound calling back
down to toll-free only. There was a lot of war dialing and prank
calling going on. I'm working on some stuff to hopefully curb that kind
of stuff down so I can unrestrict outdial again, but this is the problem
with free.. there is always someone that will abuse it.
If anybody has any ideas on how to keep the abuse down let me know. The
best ideas I have now is to only allow a certain amount of calling per
month, add velocity checking, and somehow put some accountability into
the sign up process to keep the prank callers and multiple account
abusers...
2008 Oct 29
2
Barplot: Vertical bars with long labels
...so they overlap, or
only every seccond label is displayed in the output.
Here is a little syntax:
dd <- c(100,110,90,105,95)
barplot(dd,names.arg=c('Conduct Disorders','Attention Deficit',
'Eating Disorders',
'Substance Abuse','Developmental Disorders'))
My question is, if there is a chance to force a line break in each label.
The result shoud look like this:
Bar1 Bar2 Bar3 Bar4 Bar5
Conduct Attention Eating Substance Developmental
Disorders Disorders Disorde...
2012 Oct 05
3
How to log caller IP address in the CDR?
Hello
We had this situation:
Some bot-net did try to guess SIP logins and finally succeeded. The Asterisk
Server was abused to call a large number of expensive destinations.
It is clear that the sip logins have been passed to various persons (probably
posted on a forum somewhere inviting to do 'free calls').
Right after the affected password was changed, the message log shows which IP
did try to make calls...
2019 Apr 11
5
Mail account brute force / harassment
On Thu, 11 Apr 2019 at 13:24, Marc Roos via dovecot <dovecot at dovecot.org>
wrote:
>
>
> Say for instance you have some one trying to constantly access an
> account
>
>
> Has any of you made something creative like this:
>
> * configure that account to allow to login with any password
> * link that account to something like /dev/zero that generates infinite
2019 Apr 11
1
Mail account brute force / harassment
...se do not assume anything other than what is written, it is a
> hypothetical situation
>
>
> A. With the fail2ban solution
> - you 'solve' that the current ip is not able to access you
> - it will continue bothering other servers and admins
> - you get the next abuse host to give a try.
>
> B. With 500GB dump
> - the owner of the attacking server (probably hacked) will notice it
> will be forced to take action.
>
>
> If abuse clouds are smart (most are) they would notice that attacking my
> servers, will result in the loss of abuse...
2008 May 23
1
[asterisk-dev] Asterisk 1.6 Realtime Database must use ', ' not '|'
On Fri, May 23, 2008 at 01:25:43PM -0400, Donny Kavanagh wrote:
> This is getting downright abusive, and is totally uncalled for, this
> is not a list for personal attacks.
You thought that Steve suggesting JT step in was abusive?
If that's not what you meant, then you need to either a) be clearer, or
b) reply to the proper message.
And hackers ignoring pleasantries to get right down...
2005 Feb 27
0
RE: Abuse, Fèèl youngèr and Bètter Hèrbal Way (verification)
...st customer.
------------------------------------------------------------
Below are the complete headers of the message that this email
was generated in response to.
Return-Path: <samba@lists.samba.org>
Date: Sat, 26 Feb 2005 10:40:56 +0000
From: Samba <samba@lists.samba.org>
Subject: Abuse, F??l young?r and B?tter H?rbal Way
To: Abuse <abuse@edson.net>
References: <FFC6AHCB6491HKEJ@edson.net>
In-Reply-To: <FFC6AHCB6491HKEJ@edson.net>
Message-ID: <EE045J874KFBIGFC@lists.samba.org>
Reply-To: Postmaster <postmaster@jas-inc.com>
Sender: Ayoti <ayoti@sat...
2020 Jul 20
3
Migrate mail aliases to AD ypServ30
How could I migrate these fields to CN=aliases,CN=mail,CN=ypServ30,CN=RpcServices,CN=System,DC=local?
dn: cn=abuse,ou=Aliases,DC=mydomail,DC=local
cn: abuse
objectClass: nisMailAlias
objectClass: top
rfc822MailMember: root
dn: cn=noc,ou=Aliases,DC=mydomail,DC=local
cn: noc
objectClass: nisMailAlias
objectClass: top
rfc822MailMember: root
dn: cn=security,ou=Aliases,DC=mydomail,DC=local
cn: security
objectClas...
2020 Apr 22
2
Recommendations on intrusion prevention/detection?
> On 22. Apr 2020, at 19.14, Michael Peddemors <michael at linuxmagic.com> wrote:
> The three most common attack vectors, (and attack volumes have never been higher) are:
>
> * Sniffed unencrypted credentials
> (Assume every home wifi router and CPE equipment are compromised ;)
> * Re-used passwords where data is exposed from another site's breach
> (Users WANT to
2019 Apr 11
1
Mail account brute force / harassment
...se do not assume anything other than what is written, it is a
> hypothetical situation
>
>
> A. With the fail2ban solution
> - you 'solve' that the current ip is not able to access you
> - it will continue bothering other servers and admins
> - you get the next abuse host to give a try.
>
> B. With 500GB dump
> - the owner of the attacking server (probably hacked) will notice it
> will be forced to take action.
>
>
> If abuse clouds are smart (most are) they would notice that attacking my
> servers, will result in the loss of abuse nod...
2018 Nov 30
4
[PATCH RFC 00/15] Zero ****s, hugload of hugs <3
On Friday, 30 November 2018 20:35:07 GMT David Miller wrote:
> From: Jens Axboe <axboe at kernel.dk>
> Date: Fri, 30 Nov 2018 13:12:26 -0700
>
> > On 11/30/18 12:56 PM, Davidlohr Bueso wrote:
> >> On Fri, 30 Nov 2018, Kees Cook wrote:
> >>
> >>> On Fri, Nov 30, 2018 at 11:27 AM Jarkko Sakkinen
> >>> <jarkko.sakkinen at
2007 Jul 26
0
abuse
-------------- next part --------------
A non-text attachment was scrubbed...
Name: abuse.pdf
Type: application/pdf
Size: 3600 bytes
Desc: not available
Url : http://lists.linux-foundation.org/pipermail/virtualization/attachment=
s/20070726/e09498ee/abuse.pdf
2010 Sep 30
0
Friday 12 Noon EDT: VoIP Abuse Project
By popular request, we've convinced someone from the VoIP Abuse
Project to join us tomorrow at noon on VUC. I think many of you will
be interested in this topic, so please come by, join in and ask
questions.
http://vuc.me for all connection info and links to VoIP Abuse Project
A couple of other features and announcements are scheduled after that
segment, inc...
2014 Jun 24
0
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
...port for ARM.
>>
>> The usage of the DMA API that we are doing might be illegal, but in
>> essence it does exactly what we need - at least for ARM. What are the
>> alternatives?
>
> It may seem /to you/ as a driver developer to be the easiest thing in
> the world to abuse an API in a way that it's not supposed to be used,
> and it is easy to do that.
>
> However, what you're actually saying is that you don't respect your
> fellow kernel developers who have to maintain the other side of that
> interface. When they need to change the imple...
2020 Aug 21
1
R 4.0.2 64-bit Windows hangs
...uce, it is
> >> still open.
> >>
> >> Thanks
> >> Tomas
> >>
> >>>
> >>>
> >>>
> >>>
> >>>
> >>> ----
> >>> Sent using Guerrillamail.com
> >>> Block or report abuse:
> >> https://www.guerrillamail.com//abuse/?a=UwxwABsFT5QHxR6m%2F3QacQCJQtiX
> >>>
> >>>
> >>> ______________________________________________
> >>> R-devel at r-project.org mailing list
> >>> https://stat.ethz.ch/mailman/listinfo...