Displaying 19 results from an estimated 19 matches for "comprimise".
2000 Feb 24
1
Making password driven SSH 'immune' to MTM attacks.
...ly secure methods of establishing and protecting
passwords. Unfortuantly, when using passwords with SSH you are fairly
vulnarable to a Man-in-the-middle attack. SSH provides some basic
protection against this in the form of saved host keys. Unfortunatly, this
is insufficent as the network could be comprimised before inital
connection, and often users will just 'okay' the WARNING message anyways
because it is falsely triggered so easily.
I have a proposed solution that will make MTM virtually impossible in a
password authenticated SSH enviroment assuming the password is indeed a
shared secret a...
2014 Nov 14
1
Evolution clientware and Dovecot
Got a customer using Evolution 2.12.3 and was using SSL and could not
retrieve e-mail in the last week. Got the custome to turn off
SSL and he was able to retrieve e-mail.
Recently I compiled SSL so that any comprimise was removed
and then all apps using SSL including dovecot was recompiled.
Could this be an app/Evolution issue?
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist rising!
http://www.fullyfoll...
2000 Feb 16
1
Re: SUMMARY: IMAP security across the net
...which is (relatively) well encrypted on the
server, decrypts my e-mail before it sends it to the client. Of course
any content that is cached in the e-mail client is insecure, but the
large amount of archived e-mail I have on the server is both accessible,
and (relatively) safe even if my system is comprimised.
This is a a bit theoretical, but I was wondering if you thought there
was a way to configure my server to do this without writing a lot of
source code. Also can I have opinions as to whether this enhances my
security, or if there is a way (without going too far overboard) to
enhance it even furt...
2002 Dec 26
8
Is this just anti-Ogg FUD?
...ne starts making "serious" amounts of money
off of Ogg, you can bet the patent lawyers will be on Xiph faster then a
fat kid on a smartie.
[Ogg is too little, too late.] There are audio and video encoding systems
coming out in the next year that will futher push the envelope without
comprimise and many of those are based completely on wavelets which is
really where Ogg should have gone in the first place ...
<p>--- >8 ----
List archives: http://www.xiph.org/archives/
Ogg project homepage: http://www.xiph.org/ogg/
To unsubscribe from this list, send a message to 'vorbis-re...
2018 Jan 02
2
SIP invite timeouts : how is someone sending invites from our server ??
On 12/30/2017 08:18 PM, Dovid Bender wrote:
> Script kiddies trying to find vulnerable systems that they can make
> calls on. Lock down the box with iptables and use fail2ban to block
> them. The via is probably bogus unless a box at the DoD was comprimised.
>
>
>
> On Sat, Dec 30, 2017 at 6:49 PM, sean darcy <seandarcy2 at gmail.com
> <mailto:seandarcy2 at gmail.com>> wrote:
>
> I've been getting a lot of timeouts on non-critical invite
> transactions. I turned on sip debug. They were the result o...
2017 Dec 30
4
SIP invite timeouts : how is someone sending invites from our server ??
I've been getting a lot of timeouts on non-critical invite transactions.
I turned on sip debug. They were the result of SIP invites like this:
Retransmitting #10 (NAT) to 185.107.94.10:13057:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
215.45.145.211:5060;branch=z9hG4bK-524287-1---zg4cfkl50hpwpv4p;received=185.107.94.10;rport=13057
From:
2001 Feb 15
4
package dependence
Hi,
I want to create several packages, with package Aa depending on functions
in package A. My directories with .r and .Rd are organized as follows
./A/man/*.Rd
./A/R/*.r
./Aa/man/*.Rd
./Aa/R/*.r
Afre creatin package A with
R CMD check A
R CMD INSTALL --library=lib A
I then have
./lib/A/help etc
If I try to do
R CMD check Aa
R CMD INSTALL --library=lib Aa
I am getting
* checking
2003 Aug 28
4
compromised server
I have a server that has been compromised.
I'm running version 4.6.2
when I do
>last
this line comes up in the list.
shutdown ~ Thu Aug 28 05:22
That was the time the server went down.
There seemed to be some configuration changes.
Some of the files seemed to revert back to default versions
(httpd.conf, resolv.conf)
Does anyone have a clue what type of
2010 Dec 30
1
Re: Wine 1.2 IE8
I think this is the minimal recipe:
winetricks ie6
winetricks ie8
wine iexplore
Installing ie6 just makes the menus work, I think.
2000 Feb 17
0
Re: SUMMARY: IMAP security across the net
...accept it for this session only, or future sessions
(a nice feature.) Unfortunately it doesn't work at all in Netscape. Wierd.
Let me explain something about my interest in encrypting my mail on the
server. It is to protect my archived mail, not to protect my incoming mail.
So that if somebody comprimised root, they couldn't read my history. And, I
would hope I would notice a break-in. The only time I was broken into I
noticed it in less than 12 hours. Admittedly I was lucky, it was the IMAP
security hole from RH 5.x that let them in. But I am sure I would have
noticed eventually. Even if I did...
2003 Nov 25
10
PCI 3.3 V
Why PCI 3.3V for E1/T1 card!? I can not use it because I can not find
any motherboard with PCI 3.3 . Any sugestions!?
Cristian VASILIU
AccessNET International S.A.
Software Programmer
mail to :<cvasiliu@accessnet.ro>
www:<http://cvasiliu.home.ro>
2018 Sep 24
3
Debian Stretch AMD64 only, Samba 4.9.1 Available TESTING
Hai Daniel,
Yes yes.. As you can see in my change log.
( found here, http://downloads.van-belle.nl/samba4/Buildlogs/stretch-experimental/ )
>From my changelog.
samba (2:4.9.0+dfsg-1.1nmu~deb9) stretch; urgency=medium .
* Non-maintainer upload.
* Rebuild from Debian stretch from Debian Experimental
* Bump build-depends cmocka 1.1.2
* enabled --enable-spotlight to make TimeMachine work
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
...and loadable modules
-do nightly diff''s between crucial system files, eg: /etc/passwd
There are many other measures to be taken, and many software packages out
there to help. But it all boils down to the whole fact that if you are
security concious, rootsh3ll hackers will not be able to comprimise your
network integrity as they only use publically available exploits. And if
the person that is hacking you does not use rootsh3ll warez, expect to
never get rid of him without rm -rf /''ing your whole system.
On a side note, LRK has much quantity, but lacks quality. Any hacker
with s...
2006 Sep 05
15
ferret finds ''tests'' but not ''test''
Hello all,
Quick question (possibly!) - I''ve got a few records indexed and doing a
search for ''test'' reports in no hits even though I know the word ''tests''
exists in the indexed field. Doing a search for ''tests'' produces a
result. I would have thought that ''test'' would match ''tests'' but no such
2004 Nov 22
20
Is it possible to Xenify a stock Redhat/Fedora kernel.
I would have sworn that someone on the list had a way to Xenify a stock
RH kernel but I was not able to dig it up on the archives.
If this does not exist I am sure it would be a nice addition to Xen to
be able to patch and build some kernels that are compatable with some of
the popular distributions.
--
Alvin Starr || voice: (416)585-9971
Interlink Connectivity ||
2013 Oct 02
1
Dovecot namespace solved while writing; preparing to refilter
...sole
"==="
characters. Thank you!
Upon umptieth failure, and having cloned the system onto another same
arch,
much more: same MBO-model box (cloning and restoring clean is my
defence to get
the system into as clean a state as can be, after any longer time
online --I
had had systems comprimised, and now I am a little paranoid)...
So, after weeks of some failures in some phases of installations of
dovecot and
friends (as explained further in this text), I cloned the same system,
but from
previously taken clean backup, used it some time, and now I want to
update the
mailbox back becaus...
2018 Jan 22
2
[Patches] AD Database corruption after upgrade from <= 4.6 to 4.7 (bug #13228)
On Mon, Jan 22, 2018 at 05:24:44PM +0100, Achim Gottinger via samba wrote:
> Am 22.01.2018 um 10:49 schrieb Stefan Metzmacher via samba:
> > Also DO NOT repair the following errors with samba-tool dbcheck!
> > "Remove duplicate links in attribute"
> > and
> > "ERROR: orphaned backlink"
> > as this removes the ability to repair the database
>
1999 Jul 28
6
You got some 'splaininn to do Lucy ;-)
We just had a security application vendor come in. We asked about Linux
support and he said that putting a security application on top of an
insecure OS was useless. When I asked what he meant by insecure he replied
that Linux does not have a true Auditing capability - as opposed to HP-UX &
Solaris which they do support. Can anyone explain to me what he was talking
about?
Thanks,
Marty
2005 Nov 16
11
Need urgent help regarding security
Good Day!
I think we have a serious problem. One of our old
server running FreeBSD 4.9 have been compromised and
is now connected to an ircd server..
195.204.1.132.6667 ESTABLISHED
However, we still haven't brought the server down in
an attempt to track the intruder down. Right now we
are clueless as to what we need to do..
Most of our servers are running legacy operating
systems(old