Displaying 20 results from an estimated 126 matches for "crackers".
Did you mean:
trackers
2018 Dec 10
1
Crackers?
...lt;https://www.anubis-ca.com/tmp/IMG_20181210_173521.jpg>
<https://www.anubis-ca.com/tmp/IMG_20181210_175350.jpg>
---------Videresendt melding-------
Fra: Arun I. Gurung <arun-g at anubis-ca.com>
Til: Ian Mapleson <mapesdhs at yahoo.com>, rbowen at centosproject.org
Emne: Re: Crackers?
Dato: Mon, 10 Dec 2018 19:30:20 +0100
> I will take backup of my personal files and reinstall CentOS 1804
> (version 7.5).
>
> The trojan is a metadata crawler which infiltrates as a systemd
> service. It arrived today, when I did a "yum distribution-
> synchronization&quo...
2009 Jun 04
2
deleteing label (cheating crackers)
Dear all,
When i telnet to my server, I see following things:
[root at daka ~]# telnet 0 110
Trying 0.0.0.0...
Connected to 0.
Escape character is '^]'.
+OK Dovecot ready.
Now i want to delete Dovecot word & put my word.
How i do?
Yours,
Mohsen
2009 Jul 22
3
How to replace NAs in a vector of factors?
...basic stuff mastered....
# This has been quite perplexing, thanks for any help
## Here's the example:
db1=data.frame(
olditems=c('soup','','','','nuts'),
prices=c(4.45, 3.25, 4.42, 2.25, 3.98))
db2=data.frame(
newitems=c('stew','crackers','tofu','goatsmilk','peanuts'))
str(db1) #factors and prices
str(db2) #new names, but I want *only* the updates
is.na(db1$olditems) #a little surprising that '' is not equal to NA
db1$olditems=='' #oh good, at least I can get to the blanks th...
2006 Sep 21
2
4.4 kickstart issues
Greetings all,
I'm trying to create a CentOS 4.4 kickstart CD (not a network install),
duplicating what
I've done for Fedora Core 3.
I am having a cirular dependency for initscripts, which causes
initscripts not to be installed
(no /etc/inittab when the boot gets to INIT)
The cascade is:
initscripts-7.39.25.EL-1.centos4 requires /sbin/nash
/sbin/nash is in mkinitrd-4.2.1.8-1
2001 Jun 02
3
Recent breakins / SSHD root hole?
The trojaned ssh client is nothing new to the hacker community, and the
statement in the previous thread claiming
"This type of man-in-the-middle attack (trojaned ssh) is not theoretical
anymore, and password authentication is broken."
is an example of how many poeple still think "hacking" is something very
difficult and nothing short of a genius is required to make the
1998 May 12
25
Checking remote servers
I''d like to hear some suggestions about securely administering a
system remotely. Here''s the application: a project is going to
scatter some server machines around the US. The server machines will
be running Linux, with the only network servers being a custom
application.
Ignoring the separate question of physical security, how can I
remotely check the system''s
2004 Mar 30
3
mysql or postgresql?
...ast_load_resource: /usr/lib/asterisk/modules/cdr_mysql.so:
cannot open shared object file: No such file or directory
loader.c:359 load_modules: Loading module cdr_mysql.so failed!
Ok, there is no cdr_mysql.so, anybody it's using * with mysql?
Thanks!
(o_
//\
V_/_
"hackers build things, crackers break them."
http://kokey.gluch.org.mx
2008 Dec 09
8
pop3 attack
I was looking at my maillog and it looks like someone is trying to get
into my pop3 server.
Dec 9 15:28:54 mailserver dovecot: pop3-login: Aborted login: user=<alexis>, method=PLAIN, rip=::ffff:66.167.184.203, lip=::ffff:192.168.1.2
Dec 9 15:29:08 mailserver dovecot: pop3-login: Aborted login: user=<alfonso>, method=PLAIN, rip=::ffff:66.167.184.203, lip=::ffff:192.168.1.2
Dec 9
2009 Aug 19
5
How to tell if I've been hacked?
There is a lot of talk about the vulnerable Linux kernel. I'm simply
wondering the telltale signs if a given system has been hacked?
What, specifically, does a person look for?
Thanks.
Scott
2015 Feb 05
2
Another Fedora decision
On 02/04/2015 07:55 PM, Always Learning wrote:
> Rent ? That costs money. Just crack open some Windoze machines and do
> it for free. That is what many hackers do.
Those crackers who build these botnets are the ones who rent out botnet
time to people who just was to get the work done. There is a large
market in botnet time.
>
> Is this safe enough ?
>
> wac4140SoeTer'#621strAAt0918;@@
>
>
Yes, it is.
2001 Jun 01
1
recent breakins
>From http://www.apache.org/info/20010519-hack.html:
"The ssh client at SourceForge had been compromised to log outgoing names
and passwords, so the cracker was thus able get a shell on apache.org."
user's ssh --> SF's ssh --> apache.org's sshd
So basically the user's password was entered in the clear to an untrusted
program (SF's ssh). Never mind that
1997 Sep 23
1
C''t Article on Juggernaut
There is a recent article in the German magazine C''t that may be of
interest to those on this list. It describes a cracker program,
Juggernaut, which can hijack telnet sessions. The program is written
specifically to run under Linux. An english translation of the article
is available at:
http://www.ix.de/ct/english/9710142/
It also mentions that they are working on a version of the
2005 Aug 02
2
probes on udp port 500
Last couple of days some of my hosts were probed for UDP port 500 (IKE daemon,
used by IPSec for key exchange) from dialup IPs. Don't remember seeing similar
probes before. Some new vaulnerability that script kiddies (and pro crackers)
are trying out, or is this some old stuff? I do remember there were some
security problems with racoon in the past (that were fixed in current CentOS
ipsec-tools packages), but don't remember reading anywhere there were any
automated tools to exploit it floating around. Or are there some new...
2008 Mar 07
2
Importing Accounts from Windows?
Is there some automated system to import windows accounts into a samba
or a samba ldap situation?
I've got a few hundred users on an NT domain, and I'd like to migrate
them sometime before the last piece of hardware supported by NT4
rusts.
Right now several linux based samba servers are doing all of the heavy
lifting (shared files printers etc), but they are all looking at the
domain
2014 Nov 26
3
Two new CVEs against FLAC
On Nov 25, 2014, at 8:27 AM, Declan Kelly <flac-dev at groov.ie> wrote:
>
> On Tue, Nov 25, 2014 at 12:29:33AM -0800, mle+la at mega-nerd.com wrote:
>>
>> CVE-2014-9028 : Heap buffer write overflow
>> CVE-2014-8962 : Heap buffer read overflow
>
> Is it known what other FLAC decoding software or firmware is vulnerable
> to these overflows?
>
>
2017 Oct 17
2
Auth failure messages
...nd 6) in /var/log/messages, similar to:
saslauthd[2765]: do_auth : auth failure: [user=bettie]
[service=smtp] [realm=] [mech=pam] [reason=PAM auth error]
I guess that this is because somebody tried to access one of the SMTP
ports with a logon attempt. This is understandable; there are
crackers out there. I'd like to block SMTP completely from the
originating sender (by dropping the IP packets), but don't know how
to figure out what the IP address is. I don't see anything in the
"maillog" that, for example, has the name "bettie" or some other
clue. T...
1997 Apr 11
3
[LINUX] IP_MASQ / Ethernet Passing Traffic After Halt
-----BEGIN PGP SIGNED MESSAGE-----
Friday, April 11, 1997
The Litterbox
Sean B. Hamor <hamors@litterbox.org>
LINUX IP MASQUERADE
Synopsis:
A problem exists in IP
2010 Jun 28
2
restricting sip users to a certain useragent
Greetings list,this question is rather a pain in my side.. i have been trying to figure it out.. it could be simple.i have a customer with a callcenter .. we developed a CRM "Customer Relations Management" with an SIP dialers built in.the question is the following.. is it possible to force the agents (users) to use a certain UserAgent which is the one built-in our system? this way will
2001 Nov 29
4
openssh 2.9p2 release 8.7 security alert!!!
Hi, everyone:
My system was compromised a few days ago.
The cracker attacked the system through openssh 2.9p2 release 8.7.
I attached part of the log file.
Thanks.
Pin Lu (pin at stredo.com)
Nov 25 11:33:05 ns sshd[10627]: Disconnecting: Corrupted check bytes on
input.
Nov 25 11:33:36 ns named[10478]: Lame server on '55.254.58.211.in-addr.arpa'
(in
2009 Mar 11
2
dictionary for crackcheck
Hello All,
Can anyone tell me where i can get a "starter" dictionary for crackcheck? i tried googling this but didn't find anything. tia