Displaying 9 results from an estimated 9 matches for "badguys".
Did you mean:
badguy
2000 May 19
1
[RHSA-2000:028-02] Netscape 4.73 available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Netscape 4.73 available
Advisory ID: RHSA-2000:028-02
Issue date: 2000-05-19
Updated on: 2000-05-19
Product: Red Hat Linux
Keywords: netscape SSL telnet rlogin
Cross references:
2015 Mar 04
1
IP drop list
On 03/04/2015 09:45 PM, Dave McGuire wrote:
> On 03/04/2015 03:37 PM, Oliver Welter wrote:
>> Am 04.03.2015 um 21:03 schrieb Dave McGuire:
>>> Am 04.03.2015 um 20:12 schrieb Michael Orlitzky:
>>>> Please add [DNSBL] support to iptables instead of Dovecot. It's a waste of
>>>> effort to code it into every application that listens on the network.
2010 Jan 08
4
Problems with IPTABLES recent module.
I went to reload (iptables-restore) my iptables configuration and
obtained an error at the COMMIT statement. No further details were
provided even when I ran restore with the -v option.
I determined that none of my backed up configuration files going
back to October will load either. This is more than passing strange
because I altered and uploaded the iptables configuration on this
host several
2017 Oct 12
0
[ANNOUNCE] nftables 0.8 release
...nft list counters
table ip filter {
counter test {
packets 0 bytes 0
}
You can then refer to these objects from maps:
# nft add table filter
# nft add chain filter input { type filter hook input priority 0\; }
# nft add map filter badguys { type ipv4_addr : counter \; }
# nft add rule filter input counter name ip saddr map @badguys
# nft add counter filter badguy1
# nft add counter filter badguy2
# nft add element filter badguys { 192.168.2.3 : "badguy1" }
# nft add element filter badguys { 192.168...
2019 Apr 12
1
Mail account brute force / harassment
On Fri, 12 Apr 2019, mj wrote:
> What we do is: use https://github.com/trick77/ipset-blacklist to block IPs
> (from various existing blacklists) at the iptables level using an ipset.
"www.blocklist.de" is a nifty source. Could you suggest other publically
available blacklists?
> That way, the known bad IPs never even talk to dovecot, but are dropped
> immediately. We
2010 Apr 09
0
iptables info in proc - ttl
Hello List,
I am having problem in getting iptables recent module working for me,
so I was looking into /proc to get some clues. I see following line in
the /proc for my iptables recent rule:
# cat /proc/net/ipt_recent/badguy
src=10.0.0.17 ttl: 63 last_seen: 3301974512 oldest_pkt: 2 3301973507,
3301974512
What does ttl mean? Is it time-to-live or what? What does it signify?
--
CS
2001 Jun 04
0
[patch] user@host in AllowUsers
This is a port of a patch I contributed to ssh 1.2.23 in May 1998. I
have missed the functionality after moving to OpenSSH so I have
updated the patch and hope OpenSSH might accept it.
The patch allows sshd_config to have lines like:
AllowUsers root at localhost
AllowUsers tridge@*
AllowUsers guest at 192.168.2.*
DenyUsers badguy@*
etc.
I found this useful for restricting users to only login
2004 Aug 11
1
FreeBSD-SA-04:13.linux in the wild
Has anyone else seen this in the wild?
We just had an attempted attack yesterday from a live attacker on one of
our machines using this vulnerability. It wasn't all that clever, and
they're long gone, but I *did* manage to catch them in the act and grab
a copy of the binary they tried to run from /tmp/, as well as the PHP
injection code they used to subvert a virtual web site's
1997 Apr 22
1
SNI-12: BIND Vulnerabilities and Solutions (fwd)
I don''t know if this has made it to you yet, so here it is...
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Kirk Bauer Georgia Tech gt5918a@prism.gatech.edu or
Finger for PGP Key --> kirk@kaybee.gt.ed.net
http://www.kaybee.gt.ed.net/~kirk/html/index.html
Resnet RTA (Residence Technical Advisor) GTRI Co-Op
----------