Displaying 20 results from an estimated 290 matches for "breached".
Did you mean:
reached
2015 Apr 07
3
Linux Australia breached, personal details leaked
...ized a
currently unknown vulnerability to trigger a remote buffer overflow and
gain root level access to the server,? Hesketh wrote.
The attacker installed a remote access tool and then botnet command and
control software.
--- end excerpt ---
<http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html>
mark
2003 Dec 12
3
SIPURA Breaches Contract
...vide them.
In general, I beleive that the actions of SIPURA and its managment
team have been less than honorable, they have damaged Chagres and
have hurt our customers.
Sipura has a simple and clear path to resolve this matter. Honor
the contract they signed with us.
SIPURA has also further breached their agreement with us by removing
us from their "Partners" page.
I remain hopeful that SIPURA ownership and management will see
the honorable course of action and live to the terms of the
contract we executed. Should they decide to continue to ignore
us and our attorney's attemt...
2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;)
We have a prospective client who is asking us what our policy is in the event
of unauthorized access. Obviously you fix the system(s) that have been
compromised, but what steps do you take to mitigate the effects of a breach?
What is industry best practice? So far, searches haven't produced anything
that looks consistent, except maybe identity monitoring
2015 Apr 07
0
Linux Australia breached, personal details leaked
...ity to trigger a remote buffer overflow and
> gain root level access to the server,? Hesketh wrote.
>
> The attacker installed a remote access tool and then botnet command and
> control software.
> --- end excerpt ---
>
> <http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html>
Its stupid and unprofessional to store personal data on a public
accessible server when there is no current public requirement for that
data.
How do these people ever become 'konputar xperts' ?
I would like to know what operating system was used and the m...
2012 May 30
4
[Bug 8965] New: unexpected --exclude behaviour which can lead to a data breach
https://bugzilla.samba.org/show_bug.cgi?id=8965
Summary: unexpected --exclude behaviour which can lead to a
data breach
Product: rsync
Version: 3.1.0
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P5
Component: core
AssignedTo: wayned at samba.org
2008 Aug 22
2
RH's servers breached
What's the point on this for us, CentOS users ?
http://www.redhat.com/security/data/openssh-blacklist.html
Regards,
kfx
2009 Dec 28
4
Hardening
Hi Guys,
I would like advice for best practices to secure my linux boxes. Know if I have been hacked, know of security breaches, etc.
Can anyone provide advice?
-Jason
2016 Jan 26
1
What to do when you've been hacked?
On Monday, January 25, 2016 11:56:19 AM Warren Young wrote:
> On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com>
wrote:
> > We have a prospective client who is asking us what our policy is in the
> > event of unauthorized access.
>
> Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
>
> Your prospective client sounds like they?re
2005 Jul 20
12
Mahler's Book - New Project
Hi all,
I'm currently gearing up for a possible PBX replacement project using
Asterisk, and I'm just breaching the iceberg of information that's
available. I typically like to have something thick with pages in front
of me. Mahler's book was the first one to come up and it seems like a
good place to start. However, the big name bookstores tell me it'll
take up to three
2002 Jun 04
1
Netatalk connection on Samba machine account - security breach?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[please cc to my address]
Dear Samba and Netatalk experts,
I've got a server running both samba 2.2.3a as PDC and netatalk (1.5pre7
as supplied by SuSE73). Samba machine accounts are added to /etc/passwd
automatically by the command
add user script = /usr/sbin/useradd -d /dev/null -g 90 -s /bin/false -M %u
when a NT machine is added to the
2016 Jan 26
0
What to do when you've been hacked?
On Mon, January 25, 2016 19:12, Benjamin Smith wrote:
>
> Which I'd consider "best practices" and we do them.
> They are specifically asking about what to do *after* a
> breach. Despite all the best practices in
> place, there's *still* some risk.
>
If someone wants in to your network then they will get in. There is
no point in deluding yourself or your
2005 Mar 29
6
Can Asterisk do this ?
I am a newbie to Asterisk , and I am doing research in Asterisk, hope that
can get some guidance from the experience users .
1. I wonder Asterisk can do this (refer to the following diagram) or not ?
(Can I make a call from the SIP phone to the normal phone )
Asterisk server 1
Asterisk server 2
=======
=======
| |
2020 Sep 16
3
Logging successful log-ins
Hi all,
Due to a security breach at my office recently, we need to log
successful / failed log-ins.? I've put in "log level = 3" in smb.conf on
our active directory domain controller which seems to log what we need,
however this is generating massive log files, due to it logging every
file opening/closing by all users.? How do I log successful/failed
log-ins without having to
2020 Jun 11
11
handling spam from gmail.
I am sick of this gmail spam. Does anyone know a solution where I can do
something like this:
1. received email from adcpni444 at gmail.com
2. system recognizes this email address has been 'whitelisted', continue
with 7.
3. system recognizes as this email never been seen before
4. auto reply with something like (maybe with a wait time of x hours):
Your message did not receive the
2005 Jun 30
5
Logrotate
I created some scripts to logrotate. I am having a problem. After I do
it, I am sending kill -HUP to the process
its not using the newly created messages file again. Could someone help
me out with how I can rotate asterisk's
log's without killing the process?
..o-------------------------------------------------------o.
Brian Fertig
NOC/Network Engineer
Planet Telecom, Inc.
Tampa, FL
2019 Feb 16
3
Can we disable SSH compression by default?
Compressing data before encryption may be dangerous, for example
CRIME, BREACH and VORACLE. Can compression be disabled by default in
OpenSSH, only being enabled if user requests it?
Another scenario when SSH compression may be bad is use of commands
like tar cz | ssh root at remote "tar xz", which seem pretty common. If
SSH compression is enabled, data will be (wastefully) compressed
2016 Jan 25
0
What to do when you've been hacked?
On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com> wrote:
>
> We have a prospective client who is asking us what our policy is in the event
> of unauthorized access.
Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
Your prospective client sounds like they?re expecting someone to have established procedures to deal with breaches. You know who
2009 Apr 24
1
About ParallelR and licensing of packages
Howdy all...
Reading with interest the thread(s) about REvolution, package
licensing and the requirements of the GPL.
First of all, let me introduce myself?. ?I joined REvolution Computing
in February, after working for nearly 4 years for Intel as an open
source strategist and before that for 6 years at Sun, where I
established the first corporate open source programs office. ?I'm a
Member of
2016 Jul 04
2
SSH multi factor authentication
On Sun, 3 Jul 2016, Stephen Harris wrote:
> On Sun, Jul 03, 2016 at 09:19:43PM -0500, Bruce F Bading wrote:
> > One, the Google Authenticator (OTP authentication).
>
> On its own, this is not 2FA. It's single factor ("something you
> have").
>
> A combination of Google Authenticator _and_ password is 2FA. This is
> easy to do with PAM.
Agreed
>
2018 Apr 04
5
OpenSSH-Client without reverse tunnel ability
Good day!
A few weeks ago, we had a security breach in the company I'm working
for, because employees used "ssh -R" to expose systems from our internal
network to some SSH server in the outer world.
Of course, this is a breach of our internal security policy, but lead us
to wonder, whether there is a technical solution to prevent our users
from creating SSH-reverse-tunnels.
After