search for: balkanized

Displaying 13 results from an estimated 13 matches for "balkanized".

2013 Jan 15
2
Using postfix in CentOS 6 to relay mails to First.Last@gmail.com
Hello fellow CentOS users, I'm using: # cat /etc/*release CentOS release 6.3 (Final) # rpm -qa | grep post postfix-2.6.6-2.2.el6_1.x86_64 on 2 servers: preferans.de and (yes, funny name) static.103.78.9.176.clients.your-server.de I own several domains and would like all incoming mails addressing those domains to be forwarded to my Gmail address. So I have setup the MX-records for my
2007 Apr 25
1
dist label names
Hello, I am trying to do a multi-dimensional scaling of the World Bank's quality of governance indicators for the Balkan region. I am having trouble labelling my plot. Could some kind person help me out. How do I set the attribute Label by a variable (say, "Code")? At present I get this: >qog.dist<-dist(Balkans.data, method = "euclidean", diag = FALSE, upper =
2017 Jul 29
5
under another kind of attack
On 07/25/2017 07:54 AM, mj wrote: > Since we implemented country blocking, Please don't do that. Balkanizing the Internet doesn't really benefit anyone, and makes innovation a lot more difficult. Instead, take a look at the fail2ban scenarios in this thread, which solve the actual problem with a precision tool, instead of a hammer. Doug
2014 Aug 11
3
Use postfix and spamd on CentOS 6 - looking for a shortest guide
Hello fellow CentOS-users, on the net there are lots of Spamassassin related HOWTOs - describing how to create a shell script for Postfix and how to install Spamassassin and start its spamd daemon - step by step. Additionally antivirus setups are described... But I have a strong feeling, that this is unneeded on CentOS 6 - because there are already preconfigured stock packages for postfix and
2017 Jul 29
0
under another kind of attack
On 07/29/2017 07:44 PM, Doug Barton wrote: > On 07/25/2017 07:54 AM, mj wrote: >> Since we implemented country blocking, > > Please don't do that. Balkanizing the Internet doesn't really benefit > anyone, and makes innovation a lot more difficult. Perhaps I need to be more specific: I block certain countries from accessing imap/smtp directly, as that is where all the
2003 Nov 20
0
smbclient ls error: NT_STATUS_PATH_NOT_COVERED (user permissions are okay)
.../etc/redhat-release Red Hat Linux release 9 (Shrike) [bioinfo@array30 bioinfo]$ /lib/libc.so.6 | sed -ne "/[Ll]ibrary..*version/p" GNU C Library stable release version 2.3.2, by Roland McGrath et al. [bioinfo@array30 bioinfo]$ uname -r 2.4.20-6 I have limited knowledge as to the way our balkanized IT department has set this up on the server side, but it is my understanding that they are pulling together many file shares from various departments and presenting them to this department as a single virtual share (ie: "//rockefeller.edu/genearray"). Is this related to the ip (-I) ar...
2004 Jul 21
1
RE: [Rcom-l] rcom 0.97 available for download
> From: Thomas Baier > > > I am confused as to what I need and must do. > > > > Your message said > > ftp://cran.r-project.org/pub/R/src/contrib/Devel/rcom_0.97.tar.gz > > > > The DESCRIPTION file inside that download says > > Package: rcom > > Version: 0.95 > > Date: 2004-07-14 > > That's too bad. Sorry for that. > >
2015 Nov 22
0
Authenticating VPN addresses: a proposal
There are many ways to set up and manage a VPN. Tinc's roots are a "friend network", where there is a group of nodes that all trust each other, and there is no central authority. It also works well in situations where all nodes are controlled by the same authority, for example when a sysadmin configures several nodes, like within a company that wants to link together several
2018 Mar 26
6
How insecure is NIS ? Possible alternatives ?
Hi, In the past I've setup simple centralized authentication with NIS and NFS, without bothering about possible security implications. Over the next month I have to setup a new network in a local school, and I wonder if I should use NIS/NFS. I still have my own documentation, it's simple and somewhat bone-headed to setup, and it just works. RHEL/CentOS 7 still provide NIS, and I vaguely
2015 Nov 22
5
Authenticating VPN addresses: a proposal
TL;DR: a proposal for a new tinc feature that allows nodes to filter ADD_SUBNET messages based on the metaconnection on which they are received, so that nodes can't impersonate each other's VPN Subnets. Similar to StrictSubnets in spirit, but way more flexible. BACKGROUND: THE ISSUE OF TRUST IN A TINC NETWORK In terms of metaconnections (I'm not discussing data tunnels here), one of
2005 Apr 20
2
heckit / tobit estimation
Dear All, we (Ott Toomet and I) would like to add functions for maximum likelihood (ML) estimations of generalized tobit models of type 2 and type 5 (*see below) in my R package for microeconomic analysis "micEcon". So far we have called these functions "tobit2( )" and "tobit5( )". Are these classifications well known? How are these functions called in other
2017 Jul 25
10
under another kind of attack
Hi folks, "somehow" similar to the thread "under some kind oof attack" started by "MJ": I have dovecot shielded by fail2ban which works fine. But since a few days I see many many IPs per day knocking on my doors with wron password and/or users. But the rate at which they are knocking is very very low. So fail2ban will never catch them. For example one IP: Jul 25
2009 Sep 25
0
Wine release 1.1.30
The Wine development release 1.1.30 is now available. What's new in this release (see below for details): - Support for OpenAL. - Many improvements in HTML and JavaScript support. - Many common controls fixes and improvements. - More Direct3D 10 work. - Better MAPI support. - Various bug fixes. The source is available from the following locations: