search for: coolheads

Displaying 4 results from an estimated 4 matches for "coolheads".

Did you mean: colheads
2009 Sep 07
2
DO NOT REPLY [Bug 6695] New: whitespace problem in directory paths; I know of no work-around
...work-around Product: rsync Version: 3.0.6 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P3 Component: core AssignedTo: wayned at samba.org ReportedBy: srn at coolheads.com QAContact: rsync-qa at samba.org ## rsync 3.0.6 whitespace bug. ## reported by Steve Newcomb, srn at coolheads.com ## 2009-09-06. ## I haven't figured out any way to work around this problem: ## Apparently rsync can't handle whitespace in the source directory ## path, nor...
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
On 25.04.24 17:15, openssh-unix-dev-request at mindrot.org digested: > Subject: how to block brute force attacks on reverse tunnels? > From: Steve Newcomb <srn at coolheads.com> > Date: 25.04.24, 17:14 > > For many years I've been running ssh reverse tunnels on portable Linux, > OpenWRT, Android etc. hosts so they can be accessed from a server whose > IP is stable (I call such a server a "nexus host"). Increasingly there's > a p...
2019 Dec 19
0
unable to edit wiki 2, here's the edit:
..., mail_location = maildir:~/Maildir namespace { prefix = INBOX. separator = . inbox = yes } ... is wrong. Apparently it should be ... mail_location = maildir:~/INBOX ...which at least seemed to work, although (by that time?) I wound up re-downloading all mail. Steve Newcomb srn at coolheads.com (Unable to edit the wiki page... Mysterious question stood in the way, something like, "How do you prevent spam?" Evidently I don't know the correct answer. -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://dovecot.org/pipermail/doveco...
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
For many years I've been running ssh reverse tunnels on portable Linux, OpenWRT, Android etc. hosts so they can be accessed from a server whose IP is stable (I call such a server a "nexus host"). Increasingly there's a problem with brute force attacks on the nexus host's tunnel ports. The attack is forwarded to the portable tunneling host, where it fails, but it chews up