Displaying 19 results from an estimated 19 matches for "comprimised".
Did you mean:
comprimise
2000 Feb 24
1
Making password driven SSH 'immune' to MTM attacks.
...ly secure methods of establishing and protecting
passwords. Unfortuantly, when using passwords with SSH you are fairly
vulnarable to a Man-in-the-middle attack. SSH provides some basic
protection against this in the form of saved host keys. Unfortunatly, this
is insufficent as the network could be comprimised before inital
connection, and often users will just 'okay' the WARNING message anyways
because it is falsely triggered so easily.
I have a proposed solution that will make MTM virtually impossible in a
password authenticated SSH enviroment assuming the password is indeed a
shared secret an...
2014 Nov 14
1
Evolution clientware and Dovecot
Got a customer using Evolution 2.12.3 and was using SSL and could not
retrieve e-mail in the last week. Got the custome to turn off
SSL and he was able to retrieve e-mail.
Recently I compiled SSL so that any comprimise was removed
and then all apps using SSL including dovecot was recompiled.
Could this be an app/Evolution issue?
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici
2000 Feb 16
1
Re: SUMMARY: IMAP security across the net
...which is (relatively) well encrypted on the
server, decrypts my e-mail before it sends it to the client. Of course
any content that is cached in the e-mail client is insecure, but the
large amount of archived e-mail I have on the server is both accessible,
and (relatively) safe even if my system is comprimised.
This is a a bit theoretical, but I was wondering if you thought there
was a way to configure my server to do this without writing a lot of
source code. Also can I have opinions as to whether this enhances my
security, or if there is a way (without going too far overboard) to
enhance it even furth...
2002 Dec 26
8
Is this just anti-Ogg FUD?
I was recently talking to a friend of mine who produces what's widely
referred to as "techno", music that's heavy on electronically generated
loops and effects, samples, and has plenty of bass.
He doesn't like ogg for a few reasons - he sent me a rather long email, and
I've stripped out the nonsense from it (he has some technically irrelevant
reasons for not liking
2018 Jan 02
2
SIP invite timeouts : how is someone sending invites from our server ??
On 12/30/2017 08:18 PM, Dovid Bender wrote:
> Script kiddies trying to find vulnerable systems that they can make
> calls on. Lock down the box with iptables and use fail2ban to block
> them. The via is probably bogus unless a box at the DoD was comprimised.
>
>
>
> On Sat, Dec 30, 2017 at 6:49 PM, sean darcy <seandarcy2 at gmail.com
> <mailto:seandarcy2 at gmail.com>> wrote:
>
> I've been getting a lot of timeouts on non-critical invite
> transactions. I turned on sip debug. They were the result of...
2017 Dec 30
4
SIP invite timeouts : how is someone sending invites from our server ??
I've been getting a lot of timeouts on non-critical invite transactions.
I turned on sip debug. They were the result of SIP invites like this:
Retransmitting #10 (NAT) to 185.107.94.10:13057:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
215.45.145.211:5060;branch=z9hG4bK-524287-1---zg4cfkl50hpwpv4p;received=185.107.94.10;rport=13057
From:
2001 Feb 15
4
package dependence
Hi,
I want to create several packages, with package Aa depending on functions
in package A. My directories with .r and .Rd are organized as follows
./A/man/*.Rd
./A/R/*.r
./Aa/man/*.Rd
./Aa/R/*.r
Afre creatin package A with
R CMD check A
R CMD INSTALL --library=lib A
I then have
./lib/A/help etc
If I try to do
R CMD check Aa
R CMD INSTALL --library=lib Aa
I am getting
* checking
2003 Aug 28
4
compromised server
I have a server that has been compromised.
I'm running version 4.6.2
when I do
>last
this line comes up in the list.
shutdown ~ Thu Aug 28 05:22
That was the time the server went down.
There seemed to be some configuration changes.
Some of the files seemed to revert back to default versions
(httpd.conf, resolv.conf)
Does anyone have a clue what type of
2010 Dec 30
1
Re: Wine 1.2 IE8
I think this is the minimal recipe:
winetricks ie6
winetricks ie8
wine iexplore
Installing ie6 just makes the menus work, I think.
2000 Feb 17
0
Re: SUMMARY: IMAP security across the net
...accept it for this session only, or future sessions
(a nice feature.) Unfortunately it doesn't work at all in Netscape. Wierd.
Let me explain something about my interest in encrypting my mail on the
server. It is to protect my archived mail, not to protect my incoming mail.
So that if somebody comprimised root, they couldn't read my history. And, I
would hope I would notice a break-in. The only time I was broken into I
noticed it in less than 12 hours. Admittedly I was lucky, it was the IMAP
security hole from RH 5.x that let them in. But I am sure I would have
noticed eventually. Even if I didn...
2003 Nov 25
10
PCI 3.3 V
Why PCI 3.3V for E1/T1 card!? I can not use it because I can not find
any motherboard with PCI 3.3 . Any sugestions!?
Cristian VASILIU
AccessNET International S.A.
Software Programmer
mail to :<cvasiliu@accessnet.ro>
www:<http://cvasiliu.home.ro>
2018 Sep 24
3
Debian Stretch AMD64 only, Samba 4.9.1 Available TESTING
Hai Daniel,
Yes yes.. As you can see in my change log.
( found here, http://downloads.van-belle.nl/samba4/Buildlogs/stretch-experimental/ )
>From my changelog.
samba (2:4.9.0+dfsg-1.1nmu~deb9) stretch; urgency=medium .
* Non-maintainer upload.
* Rebuild from Debian stretch from Debian Experimental
* Bump build-depends cmocka 1.1.2
* enabled --enable-spotlight to make TimeMachine work
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of
> > the trojan''s that were inserted into the compromised system - does anybody know
> > what is in these trojans?
>
> Check the Linux RootKit ... (LRK)..
>
> Typically LRK to use config-files.. (and typically LRK-users to place
> files in /dev.. find /dev -type f | grep -v
2006 Sep 05
15
ferret finds ''tests'' but not ''test''
Hello all,
Quick question (possibly!) - I''ve got a few records indexed and doing a
search for ''test'' reports in no hits even though I know the word ''tests''
exists in the indexed field. Doing a search for ''tests'' produces a
result. I would have thought that ''test'' would match ''tests'' but no such
2004 Nov 22
20
Is it possible to Xenify a stock Redhat/Fedora kernel.
I would have sworn that someone on the list had a way to Xenify a stock
RH kernel but I was not able to dig it up on the archives.
If this does not exist I am sure it would be a nice addition to Xen to
be able to patch and build some kernels that are compatable with some of
the popular distributions.
--
Alvin Starr || voice: (416)585-9971
Interlink Connectivity ||
2013 Oct 02
1
Dovecot namespace solved while writing; preparing to refilter
...sole
"==="
characters. Thank you!
Upon umptieth failure, and having cloned the system onto another same
arch,
much more: same MBO-model box (cloning and restoring clean is my
defence to get
the system into as clean a state as can be, after any longer time
online --I
had had systems comprimised, and now I am a little paranoid)...
So, after weeks of some failures in some phases of installations of
dovecot and
friends (as explained further in this text), I cloned the same system,
but from
previously taken clean backup, used it some time, and now I want to
update the
mailbox back because...
2018 Jan 22
2
[Patches] AD Database corruption after upgrade from <= 4.6 to 4.7 (bug #13228)
On Mon, Jan 22, 2018 at 05:24:44PM +0100, Achim Gottinger via samba wrote:
> Am 22.01.2018 um 10:49 schrieb Stefan Metzmacher via samba:
> > Also DO NOT repair the following errors with samba-tool dbcheck!
> > "Remove duplicate links in attribute"
> > and
> > "ERROR: orphaned backlink"
> > as this removes the ability to repair the database
>
1999 Jul 28
6
You got some 'splaininn to do Lucy ;-)
We just had a security application vendor come in. We asked about Linux
support and he said that putting a security application on top of an
insecure OS was useless. When I asked what he meant by insecure he replied
that Linux does not have a true Auditing capability - as opposed to HP-UX &
Solaris which they do support. Can anyone explain to me what he was talking
about?
Thanks,
Marty
2005 Nov 16
11
Need urgent help regarding security
Good Day!
I think we have a serious problem. One of our old
server running FreeBSD 4.9 have been compromised and
is now connected to an ircd server..
195.204.1.132.6667 ESTABLISHED
However, we still haven't brought the server down in
an attempt to track the intruder down. Right now we
are clueless as to what we need to do..
Most of our servers are running legacy operating
systems(old