search for: comprimised

Displaying 19 results from an estimated 19 matches for "comprimised".

Did you mean: comprimise
2000 Feb 24
1
Making password driven SSH 'immune' to MTM attacks.
...ly secure methods of establishing and protecting passwords. Unfortuantly, when using passwords with SSH you are fairly vulnarable to a Man-in-the-middle attack. SSH provides some basic protection against this in the form of saved host keys. Unfortunatly, this is insufficent as the network could be comprimised before inital connection, and often users will just 'okay' the WARNING message anyways because it is falsely triggered so easily. I have a proposed solution that will make MTM virtually impossible in a password authenticated SSH enviroment assuming the password is indeed a shared secret an...
2014 Nov 14
1
Evolution clientware and Dovecot
Got a customer using Evolution 2.12.3 and was using SSL and could not retrieve e-mail in the last week. Got the custome to turn off SSL and he was able to retrieve e-mail. Recently I compiled SSL so that any comprimise was removed and then all apps using SSL including dovecot was recompiled. Could this be an app/Evolution issue? -- Member - Liberal International This is doctor@@nl2k.ab.ca Ici
2000 Feb 16
1
Re: SUMMARY: IMAP security across the net
...which is (relatively) well encrypted on the server, decrypts my e-mail before it sends it to the client. Of course any content that is cached in the e-mail client is insecure, but the large amount of archived e-mail I have on the server is both accessible, and (relatively) safe even if my system is comprimised. This is a a bit theoretical, but I was wondering if you thought there was a way to configure my server to do this without writing a lot of source code. Also can I have opinions as to whether this enhances my security, or if there is a way (without going too far overboard) to enhance it even furth...
2002 Dec 26
8
Is this just anti-Ogg FUD?
I was recently talking to a friend of mine who produces what's widely referred to as "techno", music that's heavy on electronically generated loops and effects, samples, and has plenty of bass. He doesn't like ogg for a few reasons - he sent me a rather long email, and I've stripped out the nonsense from it (he has some technically irrelevant reasons for not liking
2018 Jan 02
2
SIP invite timeouts : how is someone sending invites from our server ??
On 12/30/2017 08:18 PM, Dovid Bender wrote: > Script kiddies trying to find vulnerable systems that they can make > calls on. Lock down the box with iptables and use fail2ban to block > them. The via is probably bogus unless a box at the DoD was comprimised. > > > > On Sat, Dec 30, 2017 at 6:49 PM, sean darcy <seandarcy2 at gmail.com > <mailto:seandarcy2 at gmail.com>> wrote: > > I've been getting a lot of timeouts on non-critical invite > transactions. I turned on sip debug. They were the result of...
2017 Dec 30
4
SIP invite timeouts : how is someone sending invites from our server ??
I've been getting a lot of timeouts on non-critical invite transactions. I turned on sip debug. They were the result of SIP invites like this: Retransmitting #10 (NAT) to 185.107.94.10:13057: SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 215.45.145.211:5060;branch=z9hG4bK-524287-1---zg4cfkl50hpwpv4p;received=185.107.94.10;rport=13057 From:
2001 Feb 15
4
package dependence
Hi, I want to create several packages, with package Aa depending on functions in package A. My directories with .r and .Rd are organized as follows ./A/man/*.Rd ./A/R/*.r ./Aa/man/*.Rd ./Aa/R/*.r Afre creatin package A with R CMD check A R CMD INSTALL --library=lib A I then have ./lib/A/help etc If I try to do R CMD check Aa R CMD INSTALL --library=lib Aa I am getting * checking
2003 Aug 28
4
compromised server
I have a server that has been compromised. I'm running version 4.6.2 when I do >last this line comes up in the list. shutdown ~ Thu Aug 28 05:22 That was the time the server went down. There seemed to be some configuration changes. Some of the files seemed to revert back to default versions (httpd.conf, resolv.conf) Does anyone have a clue what type of
2010 Dec 30
1
Re: Wine 1.2 IE8
I think this is the minimal recipe: winetricks ie6 winetricks ie8 wine iexplore Installing ie6 just makes the menus work, I think.
2000 Feb 17
0
Re: SUMMARY: IMAP security across the net
...accept it for this session only, or future sessions (a nice feature.) Unfortunately it doesn't work at all in Netscape. Wierd. Let me explain something about my interest in encrypting my mail on the server. It is to protect my archived mail, not to protect my incoming mail. So that if somebody comprimised root, they couldn't read my history. And, I would hope I would notice a break-in. The only time I was broken into I noticed it in less than 12 hours. Admittedly I was lucky, it was the IMAP security hole from RH 5.x that let them in. But I am sure I would have noticed eventually. Even if I didn...
2003 Nov 25
10
PCI 3.3 V
Why PCI 3.3V for E1/T1 card!? I can not use it because I can not find any motherboard with PCI 3.3 . Any sugestions!? Cristian VASILIU AccessNET International S.A. Software Programmer mail to :<cvasiliu@accessnet.ro> www:<http://cvasiliu.home.ro>
2018 Sep 24
3
Debian Stretch AMD64 only, Samba 4.9.1 Available TESTING
Hai Daniel, Yes yes.. As you can see in my change log. ( found here, http://downloads.van-belle.nl/samba4/Buildlogs/stretch-experimental/ ) >From my changelog. samba (2:4.9.0+dfsg-1.1nmu~deb9) stretch; urgency=medium . * Non-maintainer upload. * Rebuild from Debian stretch from Debian Experimental * Bump build-depends cmocka 1.1.2 * enabled --enable-spotlight to make TimeMachine work
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of > > the trojan''s that were inserted into the compromised system - does anybody know > > what is in these trojans? > > Check the Linux RootKit ... (LRK).. > > Typically LRK to use config-files.. (and typically LRK-users to place > files in /dev.. find /dev -type f | grep -v
2006 Sep 05
15
ferret finds ''tests'' but not ''test''
Hello all, Quick question (possibly!) - I''ve got a few records indexed and doing a search for ''test'' reports in no hits even though I know the word ''tests'' exists in the indexed field. Doing a search for ''tests'' produces a result. I would have thought that ''test'' would match ''tests'' but no such
2004 Nov 22
20
Is it possible to Xenify a stock Redhat/Fedora kernel.
I would have sworn that someone on the list had a way to Xenify a stock RH kernel but I was not able to dig it up on the archives. If this does not exist I am sure it would be a nice addition to Xen to be able to patch and build some kernels that are compatable with some of the popular distributions. -- Alvin Starr || voice: (416)585-9971 Interlink Connectivity ||
2013 Oct 02
1
Dovecot namespace solved while writing; preparing to refilter
...sole "===" characters. Thank you! Upon umptieth failure, and having cloned the system onto another same arch, much more: same MBO-model box (cloning and restoring clean is my defence to get the system into as clean a state as can be, after any longer time online --I had had systems comprimised, and now I am a little paranoid)... So, after weeks of some failures in some phases of installations of dovecot and friends (as explained further in this text), I cloned the same system, but from previously taken clean backup, used it some time, and now I want to update the mailbox back because...
2018 Jan 22
2
[Patches] AD Database corruption after upgrade from <= 4.6 to 4.7 (bug #13228)
On Mon, Jan 22, 2018 at 05:24:44PM +0100, Achim Gottinger via samba wrote: > Am 22.01.2018 um 10:49 schrieb Stefan Metzmacher via samba: > > Also DO NOT repair the following errors with samba-tool dbcheck! > > "Remove duplicate links in attribute" > > and > > "ERROR: orphaned backlink" > > as this removes the ability to repair the database >
1999 Jul 28
6
You got some 'splaininn to do Lucy ;-)
We just had a security application vendor come in. We asked about Linux support and he said that putting a security application on top of an insecure OS was useless. When I asked what he meant by insecure he replied that Linux does not have a true Auditing capability - as opposed to HP-UX & Solaris which they do support. Can anyone explain to me what he was talking about? Thanks, Marty
2005 Nov 16
11
Need urgent help regarding security
Good Day! I think we have a serious problem. One of our old server running FreeBSD 4.9 have been compromised and is now connected to an ircd server.. 195.204.1.132.6667 ESTABLISHED However, we still haven't brought the server down in an attempt to track the intruder down. Right now we are clueless as to what we need to do.. Most of our servers are running legacy operating systems(old