search for: abusively

Displaying 20 results from an estimated 1960 matches for "abusively".

Did you mean: abusive
2019 Apr 11
1
Mail account brute force / harassment
On 11 Apr 2019, at 04:43, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > B. With 500GB dump > - the owner of the attacking server (probably hacked) will notice it > will be forced to take action. Unlikely. What is very likely is that your ISP shuts you don for network abuse. > If abuse clouds are smart (most are) they would notice that attacking my > servers, will
2017 Oct 12
2
Mail Alias Stores in mySQL Not working
"Do you have an SQL entry for abuse at kasdivi.com <mailto:abuse at kasdivi.com> ? Bill? One of my first thoughts mysql> SELECT `address`, `domain`, `goto` FROM `alias` LIMIT 8; +-------------------------------+--------------------+--------------------------+ | address | domain | goto |
2011 Sep 22
2
VoIP Abuse to Twitter (real time VoIP Abuse)
Apologies for cross posting but some of us aren't on the other list (vice/versa) and thought both groups would benefit. For those familiar with the VoIP Abuse Project, no need to explain the gist of this. I got tired of parsing through the alerts (lists) I receive via email daily. They're long and sometimes I don't have the time to post them all. So for now, posting VoIP Abuse
2005 Feb 27
0
[abuse #255766] Systems Support Online Autoreply
***** This an automatic response to confirm that we have received your recent report regarding a Network Abuse or Security incident involving an IKANO Communications Branded partner, and are taking the following actions to resolve the issue. ***** The subject of your e-mail was: Postmaster, &#288;&#279;&#355; ready for
2014 Jun 24
1
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
On Tue, Jun 24, 2014 at 09:23:05PM +0900, Alexandre Courbot wrote: > On Tue, Jun 24, 2014 at 7:55 PM, Alexandre Courbot <acourbot at nvidia.com> wrote: > > The only alternative I see here is to flush the CPU caches when syncing for > > the device, and invalidate them for the other direction. Of course if the > > device has caches on its side as well the opposite
2005 Oct 18
8
free dids on goiax.com
GoIAX, the Asterisk community's free IAX provider, is offering free US dids now. I loaded about 175 dids in and put up a very beta sign in page. Unfortunately I had to restrict the free us/canada outbound calling back down to toll-free only. There was a lot of war dialing and prank calling going on. I'm working on some stuff to hopefully curb that kind of stuff down so I can
2008 Oct 29
2
Barplot: Vertical bars with long labels
Dear List, I need a barplot with vertical bars. Each bar should have a label. The problem is, that the labels are too long, so they overlap, or only every seccond label is displayed in the output. Here is a little syntax: dd <- c(100,110,90,105,95) barplot(dd,names.arg=c('Conduct Disorders','Attention Deficit', 'Eating Disorders',
2012 Oct 05
3
How to log caller IP address in the CDR?
Hello We had this situation: Some bot-net did try to guess SIP logins and finally succeeded. The Asterisk Server was abused to call a large number of expensive destinations. It is clear that the sip logins have been passed to various persons (probably posted on a forum somewhere inviting to do 'free calls'). Right after the affected password was changed, the message log shows which
2019 Apr 11
5
Mail account brute force / harassment
On Thu, 11 Apr 2019 at 13:24, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > > > Say for instance you have some one trying to constantly access an > account > > > Has any of you made something creative like this: > > * configure that account to allow to login with any password > * link that account to something like /dev/zero that generates infinite
2019 Apr 11
1
Mail account brute force / harassment
> Am 11.04.2019 um 12:43 schrieb Marc Roos via dovecot <dovecot at dovecot.org>: > > Please do not assume anything other than what is written, it is a > hypothetical situation > > > A. With the fail2ban solution > - you 'solve' that the current ip is not able to access you > - it will continue bothering other servers and admins > - you get the
2008 May 23
1
[asterisk-dev] Asterisk 1.6 Realtime Database must use ', ' not '|'
On Fri, May 23, 2008 at 01:25:43PM -0400, Donny Kavanagh wrote: > This is getting downright abusive, and is totally uncalled for, this > is not a list for personal attacks. You thought that Steve suggesting JT step in was abusive? If that's not what you meant, then you need to either a) be clearer, or b) reply to the proper message. And hackers ignoring pleasantries to get right down
2005 Feb 27
0
RE: Abuse, Fèèl youngèr and Bètter Hèrbal Way (verification)
You are receiving this reply because you just emailed one of us at EDSON Internet and we are protecting ourselves from receiving junk mail. Please read the below, action is required on your part: Edson Internet has been in business for over 10 years and because of that we get over 4000 junk mails a day! Therefore, we have implemented this system to be more responsive to you. I hope you will
2020 Jul 20
3
Migrate mail aliases to AD ypServ30
How could I migrate these fields to CN=aliases,CN=mail,CN=ypServ30,CN=RpcServices,CN=System,DC=local? dn: cn=abuse,ou=Aliases,DC=mydomail,DC=local cn: abuse objectClass: nisMailAlias objectClass: top rfc822MailMember: root dn: cn=noc,ou=Aliases,DC=mydomail,DC=local cn: noc objectClass: nisMailAlias objectClass: top rfc822MailMember: root dn: cn=security,ou=Aliases,DC=mydomail,DC=local cn:
2020 Apr 22
2
Recommendations on intrusion prevention/detection?
> On 22. Apr 2020, at 19.14, Michael Peddemors <michael at linuxmagic.com> wrote: > The three most common attack vectors, (and attack volumes have never been higher) are: > > * Sniffed unencrypted credentials > (Assume every home wifi router and CPE equipment are compromised ;) > * Re-used passwords where data is exposed from another site's breach > (Users WANT to
2019 Apr 11
1
Mail account brute force / harassment
Marc, There is a strategy loosely referred to as "choose your battles well" :-) Let the others bother with their own problems. If you can, hack the server and dump the 500GB - you'll be using resources transferring the 500GB as the other server receives it. Two servers wasting resources because you think you are punishing an offender! On Thu, 11 Apr 2019 at 13:43, Marc Roos
2018 Nov 30
4
[PATCH RFC 00/15] Zero ****s, hugload of hugs <3
On Friday, 30 November 2018 20:35:07 GMT David Miller wrote: > From: Jens Axboe <axboe at kernel.dk> > Date: Fri, 30 Nov 2018 13:12:26 -0700 > > > On 11/30/18 12:56 PM, Davidlohr Bueso wrote: > >> On Fri, 30 Nov 2018, Kees Cook wrote: > >> > >>> On Fri, Nov 30, 2018 at 11:27 AM Jarkko Sakkinen > >>> <jarkko.sakkinen at
2007 Jul 26
0
abuse
-------------- next part -------------- A non-text attachment was scrubbed... Name: abuse.pdf Type: application/pdf Size: 3600 bytes Desc: not available Url : http://lists.linux-foundation.org/pipermail/virtualization/attachment= s/20070726/e09498ee/abuse.pdf
2010 Sep 30
0
Friday 12 Noon EDT: VoIP Abuse Project
By popular request, we've convinced someone from the VoIP Abuse Project to join us tomorrow at noon on VUC. I think many of you will be interested in this topic, so please come by, join in and ask questions. http://vuc.me for all connection info and links to VoIP Abuse Project A couple of other features and announcements are scheduled after that segment, including an Astricon update and
2014 Jun 24
0
[PATCH v2 2/3] drm/ttm: introduce dma cache sync helpers
On Tue, Jun 24, 2014 at 10:09 PM, Russell King - ARM Linux <linux at arm.linux.org.uk> wrote: > On Tue, Jun 24, 2014 at 09:23:05PM +0900, Alexandre Courbot wrote: >> On Tue, Jun 24, 2014 at 7:55 PM, Alexandre Courbot <acourbot at nvidia.com> wrote: >> > The only alternative I see here is to flush the CPU caches when syncing for >> > the device, and invalidate
2020 Aug 21
1
R 4.0.2 64-bit Windows hangs
For some further information, on compiling with rtools, using the following scripts, https://github.com/r-windows/r-base, I receive a segfault: installing 'sysdata.rda' building package 'compiler' byte-compiling package 'compiler' byte-compiling package 'base' byte-compiling package 'tools' sh: line 3: 3614 Done ( cat