search for: breaching

Displaying 20 results from an estimated 285 matches for "breaching".

Did you mean: reaching
2015 Apr 07
3
Linux Australia breached, personal details leaked
FYI, folks, Excerpt: Linux Australia discovered the breach on March 24 after it noticed conference management software it uses called Zookeepr started sending a large number of error reporting emails, Hesketh wrote. A server had been attacked two days prior. ?It is the assessment of Linux Australia that the individual utilized a currently unknown vulnerability to trigger a remote buffer overflow
2003 Dec 12
3
SIPURA Breaches Contract
Hi list, Well I really didn't want to see things get to this point, but Sherman at Sipura along with their President Jan F. leave me no other choice. SIPURA has been provided a letter from our attorney for Breach of Contract and damages. They have yet to respond. A quick background. 1. Sherman (SIPURA's Director of Marketing), stated that we would do a join press release for the Oct
2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;) We have a prospective client who is asking us what our policy is in the event of unauthorized access. Obviously you fix the system(s) that have been compromised, but what steps do you take to mitigate the effects of a breach? What is industry best practice? So far, searches haven't produced anything that looks consistent, except maybe identity monitoring
2015 Apr 07
0
Linux Australia breached, personal details leaked
On Tue, 2015-04-07 at 12:28 -0400, m.roth at 5-cent.us wrote: > ?It is the assessment of Linux Australia that the individual utilized a > currently unknown vulnerability to trigger a remote buffer overflow and > gain root level access to the server,? Hesketh wrote. > > The attacker installed a remote access tool and then botnet command and > control software. > --- end
2012 May 30
4
[Bug 8965] New: unexpected --exclude behaviour which can lead to a data breach
https://bugzilla.samba.org/show_bug.cgi?id=8965 Summary: unexpected --exclude behaviour which can lead to a data breach Product: rsync Version: 3.1.0 Platform: All OS/Version: All Status: NEW Severity: major Priority: P5 Component: core AssignedTo: wayned at samba.org
2008 Aug 22
2
RH's servers breached
What's the point on this for us, CentOS users ? http://www.redhat.com/security/data/openssh-blacklist.html Regards, kfx
2009 Dec 28
4
Hardening
Hi Guys, I would like advice for best practices to secure my linux boxes. Know if I have been hacked, know of security breaches, etc. Can anyone provide advice? -Jason
2016 Jan 26
1
What to do when you've been hacked?
On Monday, January 25, 2016 11:56:19 AM Warren Young wrote: > On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com> wrote: > > We have a prospective client who is asking us what our policy is in the > > event of unauthorized access. > > Tell them you use the Mr. Miyagi defense: ?Don?t get hit.? > > Your prospective client sounds like they?re
2005 Jul 20
12
Mahler's Book - New Project
Hi all, I'm currently gearing up for a possible PBX replacement project using Asterisk, and I'm just breaching the iceberg of information that's available. I typically like to have something thick with pages in front of me. Mahler's book was the first one to come up and it seems like a good place to start. However, the big name bookstores tell me it'll take up to three weeks, and this project...
2002 Jun 04
1
Netatalk connection on Samba machine account - security breach?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [please cc to my address] Dear Samba and Netatalk experts, I've got a server running both samba 2.2.3a as PDC and netatalk (1.5pre7 as supplied by SuSE73). Samba machine accounts are added to /etc/passwd automatically by the command add user script = /usr/sbin/useradd -d /dev/null -g 90 -s /bin/false -M %u when a NT machine is added to the
2016 Jan 26
0
What to do when you've been hacked?
On Mon, January 25, 2016 19:12, Benjamin Smith wrote: > > Which I'd consider "best practices" and we do them. > They are specifically asking about what to do *after* a > breach. Despite all the best practices in > place, there's *still* some risk. > If someone wants in to your network then they will get in. There is no point in deluding yourself or your
2005 Mar 29
6
Can Asterisk do this ?
I am a newbie to Asterisk , and I am doing research in Asterisk, hope that can get some guidance from the experience users . 1. I wonder Asterisk can do this (refer to the following diagram) or not ? (Can I make a call from the SIP phone to the normal phone ) Asterisk server 1 Asterisk server 2 ======= ======= | |
2020 Sep 16
3
Logging successful log-ins
Hi all, Due to a security breach at my office recently, we need to log successful / failed log-ins.? I've put in "log level = 3" in smb.conf on our active directory domain controller which seems to log what we need, however this is generating massive log files, due to it logging every file opening/closing by all users.? How do I log successful/failed log-ins without having to
2020 Jun 11
11
handling spam from gmail.
...am provider network that is why we blocked your message. Please confirm that: - you are not a spammer and - you have permission to use the mail adress you send your message to - you and your provider agree to uphold GDPR legislation - you and your provider are liable for damages when breaching any of the above. Click link to confirm and you agree with the above https://www.domainwithoutletsencryptcertificate.com/asdfasdfadsfaf 5. sender clicks confirm url 6. email address is added to some white list. 7. email is delivered to recipient.
2005 Jun 30
5
Logrotate
I created some scripts to logrotate. I am having a problem. After I do it, I am sending kill -HUP to the process its not using the newly created messages file again. Could someone help me out with how I can rotate asterisk's log's without killing the process? ..o-------------------------------------------------------o. Brian Fertig NOC/Network Engineer Planet Telecom, Inc. Tampa, FL
2019 Feb 16
3
Can we disable SSH compression by default?
Compressing data before encryption may be dangerous, for example CRIME, BREACH and VORACLE. Can compression be disabled by default in OpenSSH, only being enabled if user requests it? Another scenario when SSH compression may be bad is use of commands like tar cz | ssh root at remote "tar xz", which seem pretty common. If SSH compression is enabled, data will be (wastefully) compressed
2016 Jan 25
0
What to do when you've been hacked?
On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com> wrote: > > We have a prospective client who is asking us what our policy is in the event > of unauthorized access. Tell them you use the Mr. Miyagi defense: ?Don?t get hit.? Your prospective client sounds like they?re expecting someone to have established procedures to deal with breaches. You know who
2009 Apr 24
1
About ParallelR and licensing of packages
Howdy all... Reading with interest the thread(s) about REvolution, package licensing and the requirements of the GPL. First of all, let me introduce myself?. ?I joined REvolution Computing in February, after working for nearly 4 years for Intel as an open source strategist and before that for 6 years at Sun, where I established the first corporate open source programs office. ?I'm a Member of
2016 Jul 04
2
SSH multi factor authentication
On Sun, 3 Jul 2016, Stephen Harris wrote: > On Sun, Jul 03, 2016 at 09:19:43PM -0500, Bruce F Bading wrote: > > One, the Google Authenticator (OTP authentication). > > On its own, this is not 2FA. It's single factor ("something you > have"). > > A combination of Google Authenticator _and_ password is 2FA. This is > easy to do with PAM. Agreed >
2018 Apr 04
5
OpenSSH-Client without reverse tunnel ability
Good day! A few weeks ago, we had a security breach in the company I'm working for, because employees used "ssh -R" to expose systems from our internal network to some SSH server in the outer world. Of course, this is a breach of our internal security policy, but lead us to wonder, whether there is a technical solution to prevent our users from creating SSH-reverse-tunnels. After