Displaying 20 results from an estimated 290 matches for "breach".
Did you mean:
reach
2015 Apr 07
3
Linux Australia breached, personal details leaked
FYI, folks,
Excerpt:
Linux Australia discovered the breach on March 24 after it noticed
conference management software it uses called Zookeepr started sending a
large number of error reporting emails, Hesketh wrote. A server had been
attacked two days prior.
?It is the assessment of Linux Australia that the individual utilized a
currently unknown vulnerab...
2003 Dec 12
3
SIPURA Breaches Contract
Hi list,
Well I really didn't want to see things get to this point,
but Sherman at Sipura along with their President Jan F.
leave me no other choice.
SIPURA has been provided a letter from our attorney for
Breach of Contract and damages. They have yet to respond.
A quick background.
1. Sherman (SIPURA's Director of Marketing), stated that
we would do a join press release for the Oct VoIP conference
in Long Beach. The day the release was suppose to go out,
he decided not to do it. We had agreed to pa...
2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;)
We have a prospective client who is asking us what our policy is in the event
of unauthorized access. Obviously you fix the system(s) that have been
compromised, but what steps do you take to mitigate the effects of a breach?
What is industry best practice? So far, searches haven't produced anything
that looks consistent, except maybe identity monitoring for financial data.
(EG: Target breach)
We host a significant amount of educational data, but no financial information.
How would we even respond to this ques...
2015 Apr 07
0
Linux Australia breached, personal details leaked
...ity to trigger a remote buffer overflow and
> gain root level access to the server,? Hesketh wrote.
>
> The attacker installed a remote access tool and then botnet command and
> control software.
> --- end excerpt ---
>
> <http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html>
Its stupid and unprofessional to store personal data on a public
accessible server when there is no current public requirement for that
data.
How do these people ever become 'konputar xperts' ?
I would like to know what operating system was used and the...
2012 May 30
4
[Bug 8965] New: unexpected --exclude behaviour which can lead to a data breach
https://bugzilla.samba.org/show_bug.cgi?id=8965
Summary: unexpected --exclude behaviour which can lead to a
data breach
Product: rsync
Version: 3.1.0
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P5
Component: core
AssignedTo: wayned at samba.org
ReportedBy: devkral at web.de
QAContact: rsy...
2008 Aug 22
2
RH's servers breached
What's the point on this for us, CentOS users ?
http://www.redhat.com/security/data/openssh-blacklist.html
Regards,
kfx
2009 Dec 28
4
Hardening
Hi Guys,
I would like advice for best practices to secure my linux boxes. Know if I have been hacked, know of security breaches, etc.
Can anyone provide advice?
-Jason
2016 Jan 26
1
What to do when you've been hacked?
...ave a prospective client who is asking us what our policy is in the
> > event of unauthorized access.
>
> Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
>
> Your prospective client sounds like they?re expecting someone to have
> established procedures to deal with breaches. You know who has established
> procedures? Organizations that see the same problems again and again.
>
> Selecting an information service provider based on which one is best at
> recovering from a hack attack is like hiring a football coach based on how
> skilled he is at setti...
2005 Jul 20
12
Mahler's Book - New Project
Hi all,
I'm currently gearing up for a possible PBX replacement project using
Asterisk, and I'm just breaching the iceberg of information that's
available. I typically like to have something thick with pages in front
of me. Mahler's book was the first one to come up and it seems like a
good place to start. However, the big name bookstores tell me it'll
take up to three weeks, and this proj...
2002 Jun 04
1
Netatalk connection on Samba machine account - security breach?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[please cc to my address]
Dear Samba and Netatalk experts,
I've got a server running both samba 2.2.3a as PDC and netatalk (1.5pre7
as supplied by SuSE73). Samba machine accounts are added to /etc/passwd
automatically by the command
add user script = /usr/sbin/useradd -d /dev/null -g 90 -s /bin/false -M %u
when a NT machine is added to the
2016 Jan 26
0
What to do when you've been hacked?
On Mon, January 25, 2016 19:12, Benjamin Smith wrote:
>
> Which I'd consider "best practices" and we do them.
> They are specifically asking about what to do *after* a
> breach. Despite all the best practices in
> place, there's *still* some risk.
>
If someone wants in to your network then they will get in. There is
no point in deluding yourself or your clients on that point.
The first thing that you must do after a breach is detected, or even
suspected, is t...
2005 Mar 29
6
Can Asterisk do this ?
..................................................................................
E-mail Disclaimer:
This e-mail and any attachment(s) contain confidential information and are privileged.
If you are not the intended recipient, dissemination or copying of this communication
is prohibited and may be in breach of the applicable law. Please notify the sender and
delete this email from your system. Thank you. From the Likom Management.
2020 Sep 16
3
Logging successful log-ins
Hi all,
Due to a security breach at my office recently, we need to log
successful / failed log-ins.? I've put in "log level = 3" in smb.conf on
our active directory domain controller which seems to log what we need,
however this is generating massive log files, due to it logging every
file opening/closing by all...
2020 Jun 11
11
handling spam from gmail.
...am provider
network that is why we blocked your message. Please confirm that:
- you are not a spammer and
- you have permission to use the mail adress you send your message to
- you and your provider agree to uphold GDPR legislation
- you and your provider are liable for damages when breaching any of
the above.
Click link to confirm and you agree with the above
https://www.domainwithoutletsencryptcertificate.com/asdfasdfadsfaf
5. sender clicks confirm url
6. email address is added to some white list.
7. email is delivered to recipient.
2005 Jun 30
5
Logrotate
...by: Mcafee GroupShield
---------------- CONFIDENTIAL DISCLAMER ----------------
All information provided in this email is considered confidential
and proprietary of Planet Telecom, Inc. and Telecenter Inc.
Use of this information by anyone other than the recipient or
sender will be considered in breach of agreement.
2019 Feb 16
3
Can we disable SSH compression by default?
Compressing data before encryption may be dangerous, for example
CRIME, BREACH and VORACLE. Can compression be disabled by default in
OpenSSH, only being enabled if user requests it?
Another scenario when SSH compression may be bad is use of commands
like tar cz | ssh root at remote "tar xz", which seem pretty common. If
SSH compression is enabled, data will be (wa...
2016 Jan 25
0
What to do when you've been hacked?
...om> wrote:
>
> We have a prospective client who is asking us what our policy is in the event
> of unauthorized access.
Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
Your prospective client sounds like they?re expecting someone to have established procedures to deal with breaches. You know who has established procedures? Organizations that see the same problems again and again.
Selecting an information service provider based on which one is best at recovering from a hack attack is like hiring a football coach based on how skilled he is at setting bones or selecting a c...
2009 Apr 24
1
About ParallelR and licensing of packages
Howdy all...
Reading with interest the thread(s) about REvolution, package
licensing and the requirements of the GPL.
First of all, let me introduce myself?. ?I joined REvolution Computing
in February, after working for nearly 4 years for Intel as an open
source strategist and before that for 6 years at Sun, where I
established the first corporate open source programs office. ?I'm a
Member of
2016 Jul 04
2
SSH multi factor authentication
On Sun, 3 Jul 2016, Stephen Harris wrote:
> On Sun, Jul 03, 2016 at 09:19:43PM -0500, Bruce F Bading wrote:
> > One, the Google Authenticator (OTP authentication).
>
> On its own, this is not 2FA. It's single factor ("something you
> have").
>
> A combination of Google Authenticator _and_ password is 2FA. This is
> easy to do with PAM.
Agreed
>
2018 Apr 04
5
OpenSSH-Client without reverse tunnel ability
Good day!
A few weeks ago, we had a security breach in the company I'm working
for, because employees used "ssh -R" to expose systems from our internal
network to some SSH server in the outer world.
Of course, this is a breach of our internal security policy, but lead us
to wonder, whether there is a technical solution to prevent our...