Displaying 4 results from an estimated 4 matches for "dt1c78vrxa".
2017 Aug 07
2
Volume hacked
Interesting problem...
Did you considered an insider job?( comes to mind http://verelox.com
<https://t.co/dt1c78VRxA> recent troubles)
On Mon, Aug 7, 2017 at 3:30 AM, W Kern <wkmail at bneit.com> wrote:
>
>
> On 8/6/2017 4:57 PM, lemonnierk at ulrar.net wrote:
>
>
> Gluster already uses a vlan, the problem is that there is no easy way
> that I know of to tell gluster not to listen...
2017 Aug 07
0
Volume hacked
On Mon, Aug 07, 2017 at 10:40:08AM +0200, Arman Khalatyan wrote:
> Interesting problem...
> Did you considered an insider job?( comes to mind http://verelox.com
> <https://t.co/dt1c78VRxA> recent troubles)
I would be really really surprised, we are only 5 / 6 with access and as
far as I know no one has a problem with the company.
The last person to leave did so last year, and we revoked everything (I
hope). And I can't think of a reason they'd leave the website of a
hung...
2017 Aug 07
0
Volume hacked
On 8/6/2017 4:57 PM, lemonnierk at ulrar.net wrote:
>
> Gluster already uses a vlan, the problem is that there is no easy way
> that I know of to tell gluster not to listen on an interface, and I
> can't not have a public IP on the server. I really wish ther was a
> simple "listen only on this IP/interface" option for this
What about this?
2017 Aug 06
2
Volume hacked
> You should add VLANS, and/or overlay networks and/or Mac Address
> filtering/locking/security which raises the bar quite a bit for hackers.
> Perhaps your provider can help you with that.
>
Gluster already uses a vlan, the problem is that there is no easy way
that I know of to tell gluster not to listen on an interface, and I
can't not have a public IP on the server. I really