search for: fraudulent

Displaying 20 results from an estimated 74 matches for "fraudulent".

2011 Jul 05
24
Shorewall 4.4.21 RC 3
...all.net \________________________________________________ ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2
2011 Jul 05
24
Shorewall 4.4.21 RC 3
...all.net \________________________________________________ ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2
2011 Dec 04
6
Shorewall 4.4.27 Beta 1
...//shorewall.net \________________________________________________ ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d
2011 Dec 04
6
Shorewall 4.4.27 Beta 1
...//shorewall.net \________________________________________________ ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d
2014 Oct 01
2
PBX hacked: why hundred of calls to the same number ?
Hi, Someone reported me that from a PBX on which someone gained fraudulent access, he could observe hundreds of calls to the same destination number. For curiosity's sake, I'm wondering why would this happen (dialing the same number over and over) ? Some special numbers generate here and there revenues for callees (and not for callers). Beside sharing interests...
2008 Jun 27
6
African IP addresses list
Hi all, I am trying to block all IP addresses from Africa due to a high rate of fraudulent orders coming from them. I have some found some websites that can generate a range of IP addresses. However, you would have to enter the ranges by country. I can use those perhaps but that would mean I would have to get the ranges for each country one by one. Has anyone here a list of addresses f...
2006 Apr 20
1
Odd stemmer behavior
...by port: irb(main):003:0> @stem.stem_word("anybody") => "anybodi" irb(main):004:0> @stem.stem_word("swimmingly") => "swim" irb(main):005:0> @stem.stem_word("fiercely") => "fierc" irb(main):006:0> @stem.stem_word("fraudulently") => "fraudul" Is it supposed to behave like this, or is this a bug in my Ruby wrapper? Best, Paul -- -------------------------------------------------- -- Paul Legato, Senior Software Engineer -- --- Networked Knowledge Systems --- ---- P.O. Box 207...
2011 Oct 10
2
several problem with shorewall and Multi-port Match: Available
...yserver pgp.mit.edu --recv-key 092164A7 http://urlshort.eu fakessh @ ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1
2018 Apr 06
2
PJSip CallerID Question
...ds_auth = no accepts_auth = no Rather than routing these to the "internal" context, should I create another context and somehow parse/manipulate the caller ID in there then route to "internal" ? --- This email has been checked for viruses by AVG. http://www.avg.com WARNING-FRAUDULENT FUNDING INSTRUCTIONS Email hacking and fraud are on the rise to fraudulently misdirect funds. Please call your escrow officer immediately using contract information found from an independent source, such as the sales contract or internet, to verify any funding instructions received. We are not res...
2011 Oct 10
2
Two networks on one interface problem
...formation I can provide about the setup to hep with this? Thanks, Alex ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1
2018 Apr 03
3
Audio Dropouts During Call
> I looked at your network diagram. Try checking the configuration of the > Ethernet ports on the firewall and the Asterisk box. Make sure they are > set to auto-negotiate and not set to a fixed speed and fixed duplex. > I have found in the past that if one end of a link is expecting auto- > negotiation (as the switches probably are) and the other end is expecting > a fixed
2018 Mar 09
0
NT_STATUS_CONNECTION_REFUSED Joining Domain - Desperately need help - [SOLVED]
...ptions=options) > File "/usr/lib64/python2.7/site-packages/samba/__init__.py", line 114, in > __init__ > self.connect(url, flags, options) > File "/usr/lib64/python2.7/site-packages/samba/samdb.py", line 72, in > connect > options=options) > > WARNING-FRAUDULENT FUNDING INSTRUCTIONS > > > > Email hacking and fraud are on the rise to fraudulently misdirect funds. > Please call your escrow officer immediately using contract information > found > from an independent source, such as the sales contract or internet, to > verify &g...
2009 Feb 03
2
New York Times - R - article a fraud?
...rable software had been designed by computer scientists and proved hard to use.? This is grossly ungenerous to the original inventors of the wonderful S language underlying the R system. ----------------------------------------------------------------------- I think R community should report this fraudulent article to the NYT ed board. It's fraud, not journalism and someone has to say it! 1- They got money for it....fine it's business as usual (unless someone knows someone and took some bribes). Yes... One company seems to appear many many times in the article... 2- It's a 'free'...
2013 Sep 13
2
Transfer Fraud
Is there a general recipe to avoid fraudulent calls under the following conditions? A receptionist transfers calls as a callee (customers are calling) and as a caller (boss asks to call and then transfer to him), i.e. the Dial cmd for the internal context contains "Tt". Then an outside call would operate as a Local channel in an i...
2014 Jan 17
1
how can I get authenticate from my own server?
I'm used to seeing fraudulent attempts to authenticate, But now I'm getting them from the server itself. I have an asterisk server behind a firewalled router. The local subnet is 10.10.10.0/24, the server is 10.10.10.100. Now I'm seeing in the log lots of: Failed to authenticate device <*>00<sip:<*>...
2011 Dec 01
1
Blocked host getting through
...puzzling. Is the something I am overlooking. Regards /K ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d
2008 Nov 23
3
Trouble Donating on centos.org
...a couple of days ago successfully, and I know I have plenty of available credit. Has anybody else gotten an error like this? I suspect PayPal is blocking this, not my credit card company. I suspect, too, PayPal is doing this to reduce their own costs rather than protect centos.org or me from a fraudulent transaction. I have a PayPal account that was set up a few years back as a test based on a PayPal offer to me, have never used beyond setting up, but which PayPal has suspended. I'm not interested in using this account nor jumping through the hoops they require. I may have entered this cred...
2017 Feb 23
1
Checksums for git repo content?
...atches the same hash and doesn't break compiling. Maybe you could do that by padding the file in a comment, but I suspect it would be extremely difficult to pull off. Bottom line is git needs to move to sha256 but I do not believe there is any present danger. I'd be more worried about fraudulently issued TLS certs combined with a DNS cache attack when doing a git checkout. That would be easier to easier to pull off.
2018 Mar 22
2
Audio Dropouts During Call
[This email is either empty or too large to be displayed at this time]
2018 Mar 08
4
NT_STATUS_CONNECTION_REFUSED Joining Domain - Desperately need help
...amdb.py", line 57, in __init__ options=options) File "/usr/lib64/python2.7/site-packages/samba/__init__.py", line 114, in __init__ self.connect(url, flags, options) File "/usr/lib64/python2.7/site-packages/samba/samdb.py", line 72, in connect options=options) WARNING-FRAUDULENT FUNDING INSTRUCTIONS Email hacking and fraud are on the rise to fraudulently misdirect funds. Please call your escrow officer immediately using contract information found from an independent source, such as the sales contract or internet, to verify any funding instructions received. We are not r...