search for: gerzo

Displaying 5 results from an estimated 5 matches for "gerzo".

Did you mean: gergo
2010 Jun 08
0
NanoBSD and other topics in newest issue of BSD Magazine!
...NanoBSD NanoBSD is a tool developed by Poul-Henning Kamp phk@FreeBSD.org. It creates a FreeBSD system image for embedded applications, suitable for use on a Compact Flash card (or other mass storage medium). -------------------------------------------------------------------------------- - DANIEL GERZO a.. Feature: WebHostingBuzz a hosting company all too familiar with BSD You may have noticed WebHostingBuzz has started to advertise in BSD magazine in recent months. In this article, we catch up with Matthew Russell, CEO and Dennis Arkhangelski, Senior Technical Manager and ask them some questi...
2006 Aug 19
9
SSH scans vs connection ratelimiting
Gang, For months now, we're all seeing repeated bruteforce attempts on SSH. I've configured my pf install to ratelimit TCP connections to port 22 and to automatically add IP-addresses that connect too fast to a table that's filtered: table <lamers> { } block quick from <lamers> to any pass in quick on $ext_if inet proto tcp from any to ($ext_if) port 22 modulate
2008 Feb 23
1
packet loss with re(4)
With FreeBSD 6.3-RELEASE, I'm finding significant packet loss (sometimes 85%). If I insert an Intel nic (fxp), there is nil packet loss with similar tests (ping -c 100). re0: <RealTek 8168/8111B PCIe Gigabit Ethernet> port 0xc800-0xc8ff mem 0xf9fff000-0xf9ffffff irq 17 at device 0.0 on pci1 I have seen a thread on current mentioning similar problems:
2005 Mar 28
3
FreeBSD Security Advisory FreeBSD-SA-05:01.telnet
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-05:01.telnet Security Advisory The FreeBSD Project Topic: telnet client buffer overflows Category: contrib Module: contrib/telnet Announced:
2005 Oct 02
11
Repeated attacks via SSH
Everyone: We're starting to see a rash of password guessing attacks via SSH on all of our exposed BSD servers which are running an SSH daemon. They're coming from multiple addresses, which makes us suspect that they're being carried out by a network of "bots" rather than a single attacker. But wait... there's more. The interesting thing about these attacks is that