Displaying 20 results from an estimated 290 matches for "breaching".
Did you mean:
reaching
2015 Apr 07
3
Linux Australia breached, personal details leaked
FYI, folks,
Excerpt:
Linux Australia discovered the breach on March 24 after it noticed
conference management software it uses called Zookeepr started sending a
large number of error reporting emails, Hesketh wrote. A server had been
attacked two days prior.
?It is the assessment of Linux Australia that the individual utilized a
currently unknown vulnerability to trigger a remote buffer overflow
2003 Dec 12
3
SIPURA Breaches Contract
Hi list,
Well I really didn't want to see things get to this point,
but Sherman at Sipura along with their President Jan F.
leave me no other choice.
SIPURA has been provided a letter from our attorney for
Breach of Contract and damages. They have yet to respond.
A quick background.
1. Sherman (SIPURA's Director of Marketing), stated that
we would do a join press release for the Oct
2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;)
We have a prospective client who is asking us what our policy is in the event
of unauthorized access. Obviously you fix the system(s) that have been
compromised, but what steps do you take to mitigate the effects of a breach?
What is industry best practice? So far, searches haven't produced anything
that looks consistent, except maybe identity monitoring
2015 Apr 07
0
Linux Australia breached, personal details leaked
On Tue, 2015-04-07 at 12:28 -0400, m.roth at 5-cent.us wrote:
> ?It is the assessment of Linux Australia that the individual utilized a
> currently unknown vulnerability to trigger a remote buffer overflow and
> gain root level access to the server,? Hesketh wrote.
>
> The attacker installed a remote access tool and then botnet command and
> control software.
> --- end
2012 May 30
4
[Bug 8965] New: unexpected --exclude behaviour which can lead to a data breach
https://bugzilla.samba.org/show_bug.cgi?id=8965
Summary: unexpected --exclude behaviour which can lead to a
data breach
Product: rsync
Version: 3.1.0
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P5
Component: core
AssignedTo: wayned at samba.org
2008 Aug 22
2
RH's servers breached
What's the point on this for us, CentOS users ?
http://www.redhat.com/security/data/openssh-blacklist.html
Regards,
kfx
2009 Dec 28
4
Hardening
Hi Guys,
I would like advice for best practices to secure my linux boxes. Know if I have been hacked, know of security breaches, etc.
Can anyone provide advice?
-Jason
2016 Jan 26
1
What to do when you've been hacked?
On Monday, January 25, 2016 11:56:19 AM Warren Young wrote:
> On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com>
wrote:
> > We have a prospective client who is asking us what our policy is in the
> > event of unauthorized access.
>
> Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
>
> Your prospective client sounds like they?re
2005 Jul 20
12
Mahler's Book - New Project
Hi all,
I'm currently gearing up for a possible PBX replacement project using
Asterisk, and I'm just breaching the iceberg of information that's
available. I typically like to have something thick with pages in front
of me. Mahler's book was the first one to come up and it seems like a
good place to start. However, the big name bookstores tell me it'll
take up to three weeks, and this project...
2002 Jun 04
1
Netatalk connection on Samba machine account - security breach?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[please cc to my address]
Dear Samba and Netatalk experts,
I've got a server running both samba 2.2.3a as PDC and netatalk (1.5pre7
as supplied by SuSE73). Samba machine accounts are added to /etc/passwd
automatically by the command
add user script = /usr/sbin/useradd -d /dev/null -g 90 -s /bin/false -M %u
when a NT machine is added to the
2016 Jan 26
0
What to do when you've been hacked?
On Mon, January 25, 2016 19:12, Benjamin Smith wrote:
>
> Which I'd consider "best practices" and we do them.
> They are specifically asking about what to do *after* a
> breach. Despite all the best practices in
> place, there's *still* some risk.
>
If someone wants in to your network then they will get in. There is
no point in deluding yourself or your
2005 Mar 29
6
Can Asterisk do this ?
I am a newbie to Asterisk , and I am doing research in Asterisk, hope that
can get some guidance from the experience users .
1. I wonder Asterisk can do this (refer to the following diagram) or not ?
(Can I make a call from the SIP phone to the normal phone )
Asterisk server 1
Asterisk server 2
=======
=======
| |
2020 Sep 16
3
Logging successful log-ins
Hi all,
Due to a security breach at my office recently, we need to log
successful / failed log-ins.? I've put in "log level = 3" in smb.conf on
our active directory domain controller which seems to log what we need,
however this is generating massive log files, due to it logging every
file opening/closing by all users.? How do I log successful/failed
log-ins without having to
2020 Jun 11
11
handling spam from gmail.
...am provider
network that is why we blocked your message. Please confirm that:
- you are not a spammer and
- you have permission to use the mail adress you send your message to
- you and your provider agree to uphold GDPR legislation
- you and your provider are liable for damages when breaching any of
the above.
Click link to confirm and you agree with the above
https://www.domainwithoutletsencryptcertificate.com/asdfasdfadsfaf
5. sender clicks confirm url
6. email address is added to some white list.
7. email is delivered to recipient.
2005 Jun 30
5
Logrotate
I created some scripts to logrotate. I am having a problem. After I do
it, I am sending kill -HUP to the process
its not using the newly created messages file again. Could someone help
me out with how I can rotate asterisk's
log's without killing the process?
..o-------------------------------------------------------o.
Brian Fertig
NOC/Network Engineer
Planet Telecom, Inc.
Tampa, FL
2019 Feb 16
3
Can we disable SSH compression by default?
Compressing data before encryption may be dangerous, for example
CRIME, BREACH and VORACLE. Can compression be disabled by default in
OpenSSH, only being enabled if user requests it?
Another scenario when SSH compression may be bad is use of commands
like tar cz | ssh root at remote "tar xz", which seem pretty common. If
SSH compression is enabled, data will be (wastefully) compressed
2016 Jan 25
0
What to do when you've been hacked?
On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com> wrote:
>
> We have a prospective client who is asking us what our policy is in the event
> of unauthorized access.
Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
Your prospective client sounds like they?re expecting someone to have established procedures to deal with breaches. You know who
2009 Apr 24
1
About ParallelR and licensing of packages
Howdy all...
Reading with interest the thread(s) about REvolution, package
licensing and the requirements of the GPL.
First of all, let me introduce myself?. ?I joined REvolution Computing
in February, after working for nearly 4 years for Intel as an open
source strategist and before that for 6 years at Sun, where I
established the first corporate open source programs office. ?I'm a
Member of
2016 Jul 04
2
SSH multi factor authentication
On Sun, 3 Jul 2016, Stephen Harris wrote:
> On Sun, Jul 03, 2016 at 09:19:43PM -0500, Bruce F Bading wrote:
> > One, the Google Authenticator (OTP authentication).
>
> On its own, this is not 2FA. It's single factor ("something you
> have").
>
> A combination of Google Authenticator _and_ password is 2FA. This is
> easy to do with PAM.
Agreed
>
2018 Apr 04
5
OpenSSH-Client without reverse tunnel ability
Good day!
A few weeks ago, we had a security breach in the company I'm working
for, because employees used "ssh -R" to expose systems from our internal
network to some SSH server in the outer world.
Of course, this is a breach of our internal security policy, but lead us
to wonder, whether there is a technical solution to prevent our users
from creating SSH-reverse-tunnels.
After