search for: breech

Displaying 17 results from an estimated 17 matches for "breech".

Did you mean: breach
1998 Dec 16
1
Once more into the breech (browsing problems)
Howdy all: I thought I had this problem beaten into submission, but I guess not. We just got our first NT box, which is another new wrinkle... Anyway, the LAN just went belly-up again yesterday, and when the LAN guy disconnected my linux/samba box from the network, Network Neighborhood came right back. I still don't think it's a linux/samba problem, but I'm certainly no
2008 Apr 17
1
stunnel
Dear all, I had notice that my logwatch has a heap of stunneling like the one below. Is there a security breech? **Unmatched Entries** (1) LOG5[6504:3086657232]: Connection closed: 29433 bytes sent to SSL, 62 bytes sent to socket (1) LOG5[9516:3086649040]: stunnel 4.15 on i686-redhat-linux-gnu with OpenSSL 0.9.8b 04 May 2006 (1) LOG5[9516:3086649040]: Threading:PTHREAD SSL:ENGINE Sockets:POLL,IPv6 Auth:L...
2012 Nov 27
1
For-loop,string variables, and the $-operator
Hi all, First time poster, so sorry if I commit some breech of posting etiquette. My problem is as follows. I have a data frame where each column represents a category and the individual data points in each category are binary responses (in this case they are actually 1's and 0's). What I want to extract are the counts for each category and put the...
2003 Sep 01
4
Sip Software from Nero Folk?
http://www.nero.com/us/631911127302064.html Have you all seen this? Its a SIP softphone put out by the people that do the CD burning software Nero... Check it out it works with * Dave
2016 Apr 29
3
C5: The Firefox ESR 45.1.0 Nighmare
...ime I don't have. Centos might form a special interests group specifically for the existing Firefox ESR browser. Another poster recently stated Mozilla was dropping ESR versions which is likely to jeopardise browser stability. Ultimately it would be nice for a Firefox folk removing privacy breeches, phoning home, allowing web sites to secretly store data (despite options turned-off) and removal of lots of crap unnecessary for the vast majority of Enterprise users. It could eliminate the constant changes - often apparently just to amuse Firefox developers - which users seem to hate. When us...
2015 Feb 13
5
Securing SSH wiki article outdated
...'s comments are very sensible. I always change the SSH port to something conspicuously different. Every server has a different and difficult to guess SSH port number with access restricted to a few IP addresses. Waste of time = all the time and energy required to clean-up after a hacker's breech when a few seconds work selecting a different port could make a beneficial improvement to security. -- Regards, Paul. England, EU. Je suis Charlie.
2007 Mar 02
1
How to log VERBOSE statement to a file?
I would like to log a verbose statement in my 900/976 extens to a special file called 'attacks'. These are not standard messages like debug, notice, warning, error, vebose or dtmf that could be logged to /var/log/asterisk/messages. Does the 'verbose' in VERBOSE commands have anything to do with the 'verbose' in error messages? I tried >> redirection of a
2017 Jan 19
1
[OT] VOIP
-----Original Message----- From: CentOS [mailto:centos-bounces at centos.org] On Behalf Of John R Pierce Sent: Thursday, January 19, 2017 1:01 PM To: centos at centos.org Subject: Re: [CentOS] [OT] VOIP On 1/19/2017 4:41 AM, TE Dukes wrote: > I lost > the ability to use the DSL as a FAX line. Analog traditional FAX may not work very well over VOIP. Just sayin'. > So, I bought an
2015 Feb 13
0
Securing SSH wiki article outdated
.... > > I always change the SSH port to something conspicuously different. Every > server has a different and difficult to guess SSH port number with > access restricted to a few IP addresses. > > Waste of time = all the time and energy required to clean-up after a > hacker's breech when a few seconds work selecting a different port could > make a beneficial improvement to security. > Just to mention (even though someone already mentioned that): changing port numbers, or, say removing disclosure by the daemon what software, version, ... it is does not really add securit...
2004 Jul 10
0
Root users shell
...5 completely off the SGI Challenge servers and the multi $K netscape commercial product to FreeBSD and Apache in 1996. Far more speed on platforms that weren't as powerful. I don't see anything more insecure with having both a root and toor account. And I've had exactly ONE security breech. I had missed ONE machine on a telnet upgrade - late 1990s. I caught it within hours ot the daily security email. I keep them as tight as I can as I'm on a 10Gbps backbone - but I've never removed toor. But that's just my approach. Bill -- Bill Vermillion - bv @ wjv . com
2016 Apr 29
0
C5: The Firefox ESR 45.1.0 Nighmare
...Centos might form a special interests group specifically for the > existing Firefox ESR browser. Another poster recently stated Mozilla was > dropping ESR versions which is likely to jeopardise browser stability. > > Ultimately it would be nice for a Firefox folk removing privacy > breeches, phoning home, allowing web sites to secretly store data > (despite options turned-off) and removal of lots of crap unnecessary for > the vast majority of Enterprise users. It could eliminate the constant > changes - often apparently just to amuse Firefox developers - which > users se...
2016 Apr 29
5
C5: The Firefox ESR 45.1.0 Nighmare
Centos replaced well-running customise Firefox with version ESR 45.1.0 * All the add-ons (language dictionaries, Adblock Plus, Classic Theme Restorer etc.) were disabled with no simple method of reactivating them. Reason given was they were "unsigned". * About:config xpinstall.signatures.required = false partially reduced the problem. * Then possible to reactivate some disabled
2012 Oct 30
2
help with lme
Dear Madam or Sir I am writing you hoping, that you can help me with a problem concerning the output of regressions done with the function lme in R. I would need the standard deviations for intercepts and predictors, but in the output I can only find those for the intercepts. Could it be, that this is my fault? (I am just a beginner with R and multilevel modeling). I am sorry to annoy you with
2015 Feb 12
8
Securing SSH wiki article outdated
Hi, just a quick note to whoever is maintaining this page: http://wiki.centos.org/HowTos/Network/SecuringSSH The procedure is missing the firewall-cmd calls necessary in EL7: firewall-cmd --add-port 2345/tcp firewall-cmd --add-port 2345/tcp --permanent Also, it may be worth mentioning that semanage is in the policycoreutils-python package, which isn?t installed by default in all stock
2015 Feb 12
8
Securing SSH wiki article outdated
Hi, just a quick note to whoever is maintaining this page: http://wiki.centos.org/HowTos/Network/SecuringSSH The procedure is missing the firewall-cmd calls necessary in EL7: firewall-cmd --add-port 2345/tcp firewall-cmd --add-port 2345/tcp --permanent Also, it may be worth mentioning that semanage is in the policycoreutils-python package, which isn?t installed by default in all stock
2015 Feb 02
8
Another Fedora decision
On Mon, 2015-02-02 at 15:17 -0700, Warren Young wrote: > The answer is clear to me: general security principles. By the time EL8 comes out, we?ll have had ~3 years of warnings under EL7 that weak passwords would not be tolerated, and they?re finally disallowing them. Good! > > (More like 6 years, actually, because EL6 gives a red warning bar for weak passwords.) > > Let?s flip
2008 Jul 10
1
Non-normal data issues in PhD software engineering experiment
Hi All, Title: Non-normal data issues in PhD software engineering experiment I hope I am not breeching any terms of this forum by this rather general post. There are very R specific elements to this rather long posting. I will do my best to clearly explain my experiment, goals and problems here but please let me know if I have left out any vital information or if there is any ambiguity that I ne...