search for: breach

Displaying 20 results from an estimated 285 matches for "breach".

Did you mean: reach
2015 Apr 07
3
Linux Australia breached, personal details leaked
FYI, folks, Excerpt: Linux Australia discovered the breach on March 24 after it noticed conference management software it uses called Zookeepr started sending a large number of error reporting emails, Hesketh wrote. A server had been attacked two days prior. ?It is the assessment of Linux Australia that the individual utilized a currently unknown vulnerab...
2003 Dec 12
3
SIPURA Breaches Contract
Hi list, Well I really didn't want to see things get to this point, but Sherman at Sipura along with their President Jan F. leave me no other choice. SIPURA has been provided a letter from our attorney for Breach of Contract and damages. They have yet to respond. A quick background. 1. Sherman (SIPURA's Director of Marketing), stated that we would do a join press release for the Oct VoIP conference in Long Beach. The day the release was suppose to go out, he decided not to do it. We had agreed to pa...
2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;) We have a prospective client who is asking us what our policy is in the event of unauthorized access. Obviously you fix the system(s) that have been compromised, but what steps do you take to mitigate the effects of a breach? What is industry best practice? So far, searches haven't produced anything that looks consistent, except maybe identity monitoring for financial data. (EG: Target breach) We host a significant amount of educational data, but no financial information. How would we even respond to this ques...
2015 Apr 07
0
Linux Australia breached, personal details leaked
...ity to trigger a remote buffer overflow and > gain root level access to the server,? Hesketh wrote. > > The attacker installed a remote access tool and then botnet command and > control software. > --- end excerpt --- > > <http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html> Its stupid and unprofessional to store personal data on a public accessible server when there is no current public requirement for that data. How do these people ever become 'konputar xperts' ? I would like to know what operating system was used and the...
2012 May 30
4
[Bug 8965] New: unexpected --exclude behaviour which can lead to a data breach
https://bugzilla.samba.org/show_bug.cgi?id=8965 Summary: unexpected --exclude behaviour which can lead to a data breach Product: rsync Version: 3.1.0 Platform: All OS/Version: All Status: NEW Severity: major Priority: P5 Component: core AssignedTo: wayned at samba.org ReportedBy: devkral at web.de QAContact: rsy...
2008 Aug 22
2
RH's servers breached
What's the point on this for us, CentOS users ? http://www.redhat.com/security/data/openssh-blacklist.html Regards, kfx
2009 Dec 28
4
Hardening
Hi Guys, I would like advice for best practices to secure my linux boxes. Know if I have been hacked, know of security breaches, etc. Can anyone provide advice? -Jason
2016 Jan 26
1
What to do when you've been hacked?
...ave a prospective client who is asking us what our policy is in the > > event of unauthorized access. > > Tell them you use the Mr. Miyagi defense: ?Don?t get hit.? > > Your prospective client sounds like they?re expecting someone to have > established procedures to deal with breaches. You know who has established > procedures? Organizations that see the same problems again and again. > > Selecting an information service provider based on which one is best at > recovering from a hack attack is like hiring a football coach based on how > skilled he is at setti...
2005 Jul 20
12
Mahler's Book - New Project
Hi all, I'm currently gearing up for a possible PBX replacement project using Asterisk, and I'm just breaching the iceberg of information that's available. I typically like to have something thick with pages in front of me. Mahler's book was the first one to come up and it seems like a good place to start. However, the big name bookstores tell me it'll take up to three weeks, and this proj...
2002 Jun 04
1
Netatalk connection on Samba machine account - security breach?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [please cc to my address] Dear Samba and Netatalk experts, I've got a server running both samba 2.2.3a as PDC and netatalk (1.5pre7 as supplied by SuSE73). Samba machine accounts are added to /etc/passwd automatically by the command add user script = /usr/sbin/useradd -d /dev/null -g 90 -s /bin/false -M %u when a NT machine is added to the
2016 Jan 26
0
What to do when you've been hacked?
On Mon, January 25, 2016 19:12, Benjamin Smith wrote: > > Which I'd consider "best practices" and we do them. > They are specifically asking about what to do *after* a > breach. Despite all the best practices in > place, there's *still* some risk. > If someone wants in to your network then they will get in. There is no point in deluding yourself or your clients on that point. The first thing that you must do after a breach is detected, or even suspected, is t...
2005 Mar 29
6
Can Asterisk do this ?
.................................................................................. E-mail Disclaimer: This e-mail and any attachment(s) contain confidential information and are privileged. If you are not the intended recipient, dissemination or copying of this communication is prohibited and may be in breach of the applicable law. Please notify the sender and delete this email from your system. Thank you. From the Likom Management.
2020 Sep 16
3
Logging successful log-ins
Hi all, Due to a security breach at my office recently, we need to log successful / failed log-ins.? I've put in "log level = 3" in smb.conf on our active directory domain controller which seems to log what we need, however this is generating massive log files, due to it logging every file opening/closing by all...
2020 Jun 11
11
handling spam from gmail.
...am provider network that is why we blocked your message. Please confirm that: - you are not a spammer and - you have permission to use the mail adress you send your message to - you and your provider agree to uphold GDPR legislation - you and your provider are liable for damages when breaching any of the above. Click link to confirm and you agree with the above https://www.domainwithoutletsencryptcertificate.com/asdfasdfadsfaf 5. sender clicks confirm url 6. email address is added to some white list. 7. email is delivered to recipient.
2005 Jun 30
5
Logrotate
...by: Mcafee GroupShield ---------------- CONFIDENTIAL DISCLAMER ---------------- All information provided in this email is considered confidential and proprietary of Planet Telecom, Inc. and Telecenter Inc. Use of this information by anyone other than the recipient or sender will be considered in breach of agreement.
2019 Feb 16
3
Can we disable SSH compression by default?
Compressing data before encryption may be dangerous, for example CRIME, BREACH and VORACLE. Can compression be disabled by default in OpenSSH, only being enabled if user requests it? Another scenario when SSH compression may be bad is use of commands like tar cz | ssh root at remote "tar xz", which seem pretty common. If SSH compression is enabled, data will be (wa...
2016 Jan 25
0
What to do when you've been hacked?
...om> wrote: > > We have a prospective client who is asking us what our policy is in the event > of unauthorized access. Tell them you use the Mr. Miyagi defense: ?Don?t get hit.? Your prospective client sounds like they?re expecting someone to have established procedures to deal with breaches. You know who has established procedures? Organizations that see the same problems again and again. Selecting an information service provider based on which one is best at recovering from a hack attack is like hiring a football coach based on how skilled he is at setting bones or selecting a c...
2009 Apr 24
1
About ParallelR and licensing of packages
Howdy all... Reading with interest the thread(s) about REvolution, package licensing and the requirements of the GPL. First of all, let me introduce myself?. ?I joined REvolution Computing in February, after working for nearly 4 years for Intel as an open source strategist and before that for 6 years at Sun, where I established the first corporate open source programs office. ?I'm a Member of
2016 Jul 04
2
SSH multi factor authentication
On Sun, 3 Jul 2016, Stephen Harris wrote: > On Sun, Jul 03, 2016 at 09:19:43PM -0500, Bruce F Bading wrote: > > One, the Google Authenticator (OTP authentication). > > On its own, this is not 2FA. It's single factor ("something you > have"). > > A combination of Google Authenticator _and_ password is 2FA. This is > easy to do with PAM. Agreed >
2018 Apr 04
5
OpenSSH-Client without reverse tunnel ability
Good day! A few weeks ago, we had a security breach in the company I'm working for, because employees used "ssh -R" to expose systems from our internal network to some SSH server in the outer world. Of course, this is a breach of our internal security policy, but lead us to wonder, whether there is a technical solution to prevent our...