search for: abus

Displaying 20 results from an estimated 1960 matches for "abus".

Did you mean: abuse
2019 Apr 11
1
Mail account brute force / harassment
On 11 Apr 2019, at 04:43, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > B. With 500GB dump > - the owner of the attacking server (probably hacked) will notice it > will be forced to take action. Unlikely. What is very likely is that your ISP shuts you don for network abuse. > If abuse clouds are smart (most are) they would notice that attacking my > servers, will result in the loss of abuse nodes, hence they will not > bother me anymore. Not at all the case. > If every one would apply strategy B, the abuse problem would get less. No. The abuse pr...
2017 Oct 12
2
Mail Alias Stores in mySQL Not working
"Do you have an SQL entry for abuse at kasdivi.com <mailto:abuse at kasdivi.com> ? Bill? One of my first thoughts mysql> SELECT `address`, `domain`, `goto` FROM `alias` LIMIT 8; +-------------------------------+--------------------+--------------------------+ | address | domain | goto...
2011 Sep 22
2
VoIP Abuse to Twitter (real time VoIP Abuse)
Apologies for cross posting but some of us aren't on the other list (vice/versa) and thought both groups would benefit. For those familiar with the VoIP Abuse Project, no need to explain the gist of this. I got tired of parsing through the alerts (lists) I receive via email daily. They're long and sometimes I don't have the time to post them all. So for now, posting VoIP Abuse addresses straight to Twitter. So, anyone trying to compromise a pbx...
2005 Feb 27
0
[abuse #255766] Systems Support Online Autoreply
***** This an automatic response to confirm that we have received your recent report regarding a Network Abuse or Security incident involving an IKANO Communications Branded partner, and are taking the following actions to resolve the issue. ***** The subject of your e-mail was: Postmaster, &#288;&#279;&#355; ready for Romá&#328;&am...
2014 Jun 24
1
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
...d we would only > have support for ARM. > > The usage of the DMA API that we are doing might be illegal, but in > essence it does exactly what we need - at least for ARM. What are the > alternatives? It may seem /to you/ as a driver developer to be the easiest thing in the world to abuse an API in a way that it's not supposed to be used, and it is easy to do that. However, what you're actually saying is that you don't respect your fellow kernel developers who have to maintain the other side of that interface. When they need to change the implementation of that interf...
2005 Oct 18
8
free dids on goiax.com
...e us/canada outbound calling back down to toll-free only. There was a lot of war dialing and prank calling going on. I'm working on some stuff to hopefully curb that kind of stuff down so I can unrestrict outdial again, but this is the problem with free.. there is always someone that will abuse it. If anybody has any ideas on how to keep the abuse down let me know. The best ideas I have now is to only allow a certain amount of calling per month, add velocity checking, and somehow put some accountability into the sign up process to keep the prank callers and multiple account abusers...
2008 Oct 29
2
Barplot: Vertical bars with long labels
...so they overlap, or only every seccond label is displayed in the output. Here is a little syntax: dd <- c(100,110,90,105,95) barplot(dd,names.arg=c('Conduct Disorders','Attention Deficit', 'Eating Disorders', 'Substance Abuse','Developmental Disorders')) My question is, if there is a chance to force a line break in each label. The result shoud look like this: Bar1 Bar2 Bar3 Bar4 Bar5 Conduct Attention Eating Substance Developmental Disorders Disorders Disorde...
2012 Oct 05
3
How to log caller IP address in the CDR?
Hello We had this situation: Some bot-net did try to guess SIP logins and finally succeeded. The Asterisk Server was abused to call a large number of expensive destinations. It is clear that the sip logins have been passed to various persons (probably posted on a forum somewhere inviting to do 'free calls'). Right after the affected password was changed, the message log shows which IP did try to make calls...
2019 Apr 11
5
Mail account brute force / harassment
On Thu, 11 Apr 2019 at 13:24, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > > > Say for instance you have some one trying to constantly access an > account > > > Has any of you made something creative like this: > > * configure that account to allow to login with any password > * link that account to something like /dev/zero that generates infinite
2019 Apr 11
1
Mail account brute force / harassment
...se do not assume anything other than what is written, it is a > hypothetical situation > > > A. With the fail2ban solution > - you 'solve' that the current ip is not able to access you > - it will continue bothering other servers and admins > - you get the next abuse host to give a try. > > B. With 500GB dump > - the owner of the attacking server (probably hacked) will notice it > will be forced to take action. > > > If abuse clouds are smart (most are) they would notice that attacking my > servers, will result in the loss of abuse...
2008 May 23
1
[asterisk-dev] Asterisk 1.6 Realtime Database must use ', ' not '|'
On Fri, May 23, 2008 at 01:25:43PM -0400, Donny Kavanagh wrote: > This is getting downright abusive, and is totally uncalled for, this > is not a list for personal attacks. You thought that Steve suggesting JT step in was abusive? If that's not what you meant, then you need to either a) be clearer, or b) reply to the proper message. And hackers ignoring pleasantries to get right down...
2005 Feb 27
0
RE: Abuse, Fèèl youngèr and Bètter Hèrbal Way (verification)
...st customer. ------------------------------------------------------------ Below are the complete headers of the message that this email was generated in response to. Return-Path: <samba@lists.samba.org> Date: Sat, 26 Feb 2005 10:40:56 +0000 From: Samba <samba@lists.samba.org> Subject: Abuse, F??l young?r and B?tter H?rbal Way To: Abuse <abuse@edson.net> References: <FFC6AHCB6491HKEJ@edson.net> In-Reply-To: <FFC6AHCB6491HKEJ@edson.net> Message-ID: <EE045J874KFBIGFC@lists.samba.org> Reply-To: Postmaster <postmaster@jas-inc.com> Sender: Ayoti <ayoti@sat...
2020 Jul 20
3
Migrate mail aliases to AD ypServ30
How could I migrate these fields to CN=aliases,CN=mail,CN=ypServ30,CN=RpcServices,CN=System,DC=local? dn: cn=abuse,ou=Aliases,DC=mydomail,DC=local cn: abuse objectClass: nisMailAlias objectClass: top rfc822MailMember: root dn: cn=noc,ou=Aliases,DC=mydomail,DC=local cn: noc objectClass: nisMailAlias objectClass: top rfc822MailMember: root dn: cn=security,ou=Aliases,DC=mydomail,DC=local cn: security objectClas...
2020 Apr 22
2
Recommendations on intrusion prevention/detection?
> On 22. Apr 2020, at 19.14, Michael Peddemors <michael at linuxmagic.com> wrote: > The three most common attack vectors, (and attack volumes have never been higher) are: > > * Sniffed unencrypted credentials > (Assume every home wifi router and CPE equipment are compromised ;) > * Re-used passwords where data is exposed from another site's breach > (Users WANT to
2019 Apr 11
1
Mail account brute force / harassment
...se do not assume anything other than what is written, it is a > hypothetical situation > > > A. With the fail2ban solution > - you 'solve' that the current ip is not able to access you > - it will continue bothering other servers and admins > - you get the next abuse host to give a try. > > B. With 500GB dump > - the owner of the attacking server (probably hacked) will notice it > will be forced to take action. > > > If abuse clouds are smart (most are) they would notice that attacking my > servers, will result in the loss of abuse nod...
2018 Nov 30
4
[PATCH RFC 00/15] Zero ****s, hugload of hugs <3
On Friday, 30 November 2018 20:35:07 GMT David Miller wrote: > From: Jens Axboe <axboe at kernel.dk> > Date: Fri, 30 Nov 2018 13:12:26 -0700 > > > On 11/30/18 12:56 PM, Davidlohr Bueso wrote: > >> On Fri, 30 Nov 2018, Kees Cook wrote: > >> > >>> On Fri, Nov 30, 2018 at 11:27 AM Jarkko Sakkinen > >>> <jarkko.sakkinen at
2007 Jul 26
0
abuse
-------------- next part -------------- A non-text attachment was scrubbed... Name: abuse.pdf Type: application/pdf Size: 3600 bytes Desc: not available Url : http://lists.linux-foundation.org/pipermail/virtualization/attachment= s/20070726/e09498ee/abuse.pdf
2010 Sep 30
0
Friday 12 Noon EDT: VoIP Abuse Project
By popular request, we've convinced someone from the VoIP Abuse Project to join us tomorrow at noon on VUC. I think many of you will be interested in this topic, so please come by, join in and ask questions. http://vuc.me for all connection info and links to VoIP Abuse Project A couple of other features and announcements are scheduled after that segment, inc...
2014 Jun 24
0
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
...port for ARM. >> >> The usage of the DMA API that we are doing might be illegal, but in >> essence it does exactly what we need - at least for ARM. What are the >> alternatives? > > It may seem /to you/ as a driver developer to be the easiest thing in > the world to abuse an API in a way that it's not supposed to be used, > and it is easy to do that. > > However, what you're actually saying is that you don't respect your > fellow kernel developers who have to maintain the other side of that > interface. When they need to change the imple...
2020 Aug 21
1
R 4.0.2 64-bit Windows hangs
...uce, it is > >> still open. > >> > >> Thanks > >> Tomas > >> > >>> > >>> > >>> > >>> > >>> > >>> ---- > >>> Sent using Guerrillamail.com > >>> Block or report abuse: > >> https://www.guerrillamail.com//abuse/?a=UwxwABsFT5QHxR6m%2F3QacQCJQtiX > >>> > >>> > >>> ______________________________________________ > >>> R-devel at r-project.org mailing list > >>> https://stat.ethz.ch/mailman/listinfo...