search for: abusers

Displaying 20 results from an estimated 1957 matches for "abusers".

2019 Apr 11
1
Mail account brute force / harassment
On 11 Apr 2019, at 04:43, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > B. With 500GB dump > - the owner of the attacking server (probably hacked) will notice it > will be forced to take action. Unlikely. What is very likely is that your ISP shuts you don for network abuse. > If abuse clouds are smart (most are) they would notice that attacking my > servers, will
2017 Oct 12
2
Mail Alias Stores in mySQL Not working
"Do you have an SQL entry for abuse at kasdivi.com <mailto:abuse at kasdivi.com> ? Bill? One of my first thoughts mysql> SELECT `address`, `domain`, `goto` FROM `alias` LIMIT 8; +-------------------------------+--------------------+--------------------------+ | address | domain | goto |
2011 Sep 22
2
VoIP Abuse to Twitter (real time VoIP Abuse)
Apologies for cross posting but some of us aren't on the other list (vice/versa) and thought both groups would benefit. For those familiar with the VoIP Abuse Project, no need to explain the gist of this. I got tired of parsing through the alerts (lists) I receive via email daily. They're long and sometimes I don't have the time to post them all. So for now, posting VoIP Abuse
2005 Feb 27
0
[abuse #255766] Systems Support Online Autoreply
***** This an automatic response to confirm that we have received your recent report regarding a Network Abuse or Security incident involving an IKANO Communications Branded partner, and are taking the following actions to resolve the issue. ***** The subject of your e-mail was: Postmaster, &#288;&#279;&#355; ready for
2014 Jun 24
1
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
On Tue, Jun 24, 2014 at 09:23:05PM +0900, Alexandre Courbot wrote: > On Tue, Jun 24, 2014 at 7:55 PM, Alexandre Courbot <acourbot at nvidia.com> wrote: > > The only alternative I see here is to flush the CPU caches when syncing for > > the device, and invalidate them for the other direction. Of course if the > > device has caches on its side as well the opposite
2005 Oct 18
8
free dids on goiax.com
...ll abuse it. If anybody has any ideas on how to keep the abuse down let me know. The best ideas I have now is to only allow a certain amount of calling per month, add velocity checking, and somehow put some accountability into the sign up process to keep the prank callers and multiple account abusers away. yours, Matthew Simpson GoIAX -- www.goiax.com TxLink -- www.txlink.net
2008 Oct 29
2
Barplot: Vertical bars with long labels
Dear List, I need a barplot with vertical bars. Each bar should have a label. The problem is, that the labels are too long, so they overlap, or only every seccond label is displayed in the output. Here is a little syntax: dd <- c(100,110,90,105,95) barplot(dd,names.arg=c('Conduct Disorders','Attention Deficit', 'Eating Disorders',
2012 Oct 05
3
How to log caller IP address in the CDR?
...sage log shows which IP did try to make calls. We also got a few snapshots of 'sip show channels' which show the ip addresses of active in call connections. So basicly it is known, who abused the service. It was abused from multiple IP addresses at the same time. Legal steps against the abusers have been taken, but to claim the costs of the damage they generated we would need to know exactly which calls originated from which IP address to put an exact sum of damage done by each of the abusers. Well for this case it is too late now. But is there a way to get the IP Address of the SIP...
2019 Apr 11
5
Mail account brute force / harassment
On Thu, 11 Apr 2019 at 13:24, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > > > Say for instance you have some one trying to constantly access an > account > > > Has any of you made something creative like this: > > * configure that account to allow to login with any password > * link that account to something like /dev/zero that generates infinite
2019 Apr 11
1
Mail account brute force / harassment
> Am 11.04.2019 um 12:43 schrieb Marc Roos via dovecot <dovecot at dovecot.org>: > > Please do not assume anything other than what is written, it is a > hypothetical situation > > > A. With the fail2ban solution > - you 'solve' that the current ip is not able to access you > - it will continue bothering other servers and admins > - you get the
2008 May 23
1
[asterisk-dev] Asterisk 1.6 Realtime Database must use ', ' not '|'
On Fri, May 23, 2008 at 01:25:43PM -0400, Donny Kavanagh wrote: > This is getting downright abusive, and is totally uncalled for, this > is not a list for personal attacks. You thought that Steve suggesting JT step in was abusive? If that's not what you meant, then you need to either a) be clearer, or b) reply to the proper message. And hackers ignoring pleasantries to get right down
2005 Feb 27
0
RE: Abuse, Fèèl youngèr and Bètter Hèrbal Way (verification)
You are receiving this reply because you just emailed one of us at EDSON Internet and we are protecting ourselves from receiving junk mail. Please read the below, action is required on your part: Edson Internet has been in business for over 10 years and because of that we get over 4000 junk mails a day! Therefore, we have implemented this system to be more responsive to you. I hope you will
2020 Jul 20
3
Migrate mail aliases to AD ypServ30
How could I migrate these fields to CN=aliases,CN=mail,CN=ypServ30,CN=RpcServices,CN=System,DC=local? dn: cn=abuse,ou=Aliases,DC=mydomail,DC=local cn: abuse objectClass: nisMailAlias objectClass: top rfc822MailMember: root dn: cn=noc,ou=Aliases,DC=mydomail,DC=local cn: noc objectClass: nisMailAlias objectClass: top rfc822MailMember: root dn: cn=security,ou=Aliases,DC=mydomail,DC=local cn:
2020 Apr 22
2
Recommendations on intrusion prevention/detection?
> On 22. Apr 2020, at 19.14, Michael Peddemors <michael at linuxmagic.com> wrote: > The three most common attack vectors, (and attack volumes have never been higher) are: > > * Sniffed unencrypted credentials > (Assume every home wifi router and CPE equipment are compromised ;) > * Re-used passwords where data is exposed from another site's breach > (Users WANT to
2019 Apr 11
1
Mail account brute force / harassment
Marc, There is a strategy loosely referred to as "choose your battles well" :-) Let the others bother with their own problems. If you can, hack the server and dump the 500GB - you'll be using resources transferring the 500GB as the other server receives it. Two servers wasting resources because you think you are punishing an offender! On Thu, 11 Apr 2019 at 13:43, Marc Roos
2018 Nov 30
4
[PATCH RFC 00/15] Zero ****s, hugload of hugs <3
On Friday, 30 November 2018 20:35:07 GMT David Miller wrote: > From: Jens Axboe <axboe at kernel.dk> > Date: Fri, 30 Nov 2018 13:12:26 -0700 > > > On 11/30/18 12:56 PM, Davidlohr Bueso wrote: > >> On Fri, 30 Nov 2018, Kees Cook wrote: > >> > >>> On Fri, Nov 30, 2018 at 11:27 AM Jarkko Sakkinen > >>> <jarkko.sakkinen at
2007 Jul 26
0
abuse
-------------- next part -------------- A non-text attachment was scrubbed... Name: abuse.pdf Type: application/pdf Size: 3600 bytes Desc: not available Url : http://lists.linux-foundation.org/pipermail/virtualization/attachment= s/20070726/e09498ee/abuse.pdf
2010 Sep 30
0
Friday 12 Noon EDT: VoIP Abuse Project
By popular request, we've convinced someone from the VoIP Abuse Project to join us tomorrow at noon on VUC. I think many of you will be interested in this topic, so please come by, join in and ask questions. http://vuc.me for all connection info and links to VoIP Abuse Project A couple of other features and announcements are scheduled after that segment, including an Astricon update and
2014 Jun 24
0
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
On Tue, Jun 24, 2014 at 10:09 PM, Russell King - ARM Linux <linux at arm.linux.org.uk> wrote: > On Tue, Jun 24, 2014 at 09:23:05PM +0900, Alexandre Courbot wrote: >> On Tue, Jun 24, 2014 at 7:55 PM, Alexandre Courbot <acourbot at nvidia.com> wrote: >> > The only alternative I see here is to flush the CPU caches when syncing for >> > the device, and invalidate
2020 Aug 21
1
R 4.0.2 64-bit Windows hangs
For some further information, on compiling with rtools, using the following scripts, https://github.com/r-windows/r-base, I receive a segfault: installing 'sysdata.rda' building package 'compiler' byte-compiling package 'compiler' byte-compiling package 'base' byte-compiling package 'tools' sh: line 3: 3614 Done ( cat