search for: hacker's

Displaying 20 results from an estimated 1517 matches for "hacker's".

2012 Nov 29
1
Hacked by Microsoft?
This morning someone tried to make sip call through my Asterisk. My server just drop these calls and record them in CDR with IP address: 2012-11-28 06:30:51 SIP/216... 1000 "1000" <1000> Hangup 999011972592249388 ANSWERED 00:01 Hacker: 168.63.67.239 2. 2012-11-28 06:30:49 SIP/216... 1000 "1000" <1000> Hangup 88011972592249388 ANSWERED 00:01 Hacker: 168.63.67.239 3. 2012-11-28 06:30:46 SIP/216... 1000 "1000" <1000> Answer 99011972592249388 ANSWERED 00:02 4. 2012-11-28 06:30:43 SIP/216... 10...
2017 Sep 24
1
Volunteers for Hackers Lab Needed!
All, We need volunteers for the Hackers Lab at the upcoming 2017 LLVM Developers’ Meeting! The Hackers Lab is for small groups to form to discuss topics or work on problems. Please let me know ASAP if you will able to volunteer so I can add your topic to the online listing and make appropriate signs. The Hackers Lab is split into 1.5...
2014 Mar 26
6
Numbers hackers call
I see a lot of attempts by hackers to call 00972595301123? or 011972595115207? or variations but that same 972595 is often present. Can someone break down that dial string with an explanation? The 011 look like an overseas call (from Americas), while the 972595XXXXXX is unclear... -------------- next part -------------- An HTML...
1998 Jun 14
3
What are some programs to use to trace spoofers?
ALL, Our Primary DNS has been broken into twice in the last week. The first time it happened I noticed the hacker used named for means of gaining entry. This guy was good at hiding his/her tracks so we reinstalled the OS and left a minimum install to see if it was done again. We logged all goings on from a secure remote machine. We got the hacker''s IP address and even some of what he/she did on the...
2013 Oct 22
4
Odd Feature Request - RBL blacklist lookup to prevent authentication
I would like to have a list of IPs (hacker list) that I can do a lookup on so that if anyone tries to authenticate to dovecot they always fail if they are on my list. I have the list - and the list is available as a DNS blacklist. I'd like to have it work with both local IP lists or RBL lookup. The idea is so hackers from known IP...
2005 Feb 14
3
Hackers on my Web server
I have discovered that a gamer has hacked into my web server through a backdoor left open by my predecessor. I have closed the door, but when I try to delete the folders left behind I receive "Access Denied", or when I try to take ownership I receive "Unable to Find File...". I have removed most of the files to obtain enough space to continue operations but would like to remove
2011 Jun 16
2
How to secure our Asterisk server from hacker's ?
Hi List, I want to secure my server from the hacker's. What is the case by which I can protest it. I have done security of Dialplan, Sip,IAX base security. For linux we are working on Iptables. What else is left so that I will do it too... -- ----- Thanks and regards Virendra Bhati +91-9172341457 Asterisk Engineer -------------- next part...
2010 Nov 07
3
Why are the hackers scanning for these?
Hey, I'm going thru logs, and I see some very common and interesting things that the hackers are looking for. In a whole bunch of scans, I've noticed that the first guess or two for sip accounts is usually a 10-digit number. I'm asking myself, why these numbers? Are they looking for a voip trunk? Or is it just like a serial number for the scan? What? Here's some examples: 2...
2017 Mar 13
2
[llvm-devmeeting] [EuroLLVM] Hacker's Lab - Topics and Volunteers needed!
Registered, thx! On 03/13, Renato Golin wrote: > On 13 March 2017 at 13:01, Tobias Grosser <tobias.grosser at inf.ethz.ch> wrote: > > I am happy to merge these things. > > Ok. We'll need a big table. :) -- Johannes Doerfert Researcher / PhD Student Compiler Design Lab (Prof. Hack) Saarland Informatics Campus, Germany Building E1.3, Room 4.31 Tel. +49 (0)681
2008 Jun 06
5
Hardening CentOS by removing "hacker" tools
Hi, My boss asked me to harden a CentOS box by removing "hacker" tools, such as nmap, tcpdump, nc (netcat), telnet, etc. I would like to know which list of packages would you remove from a base install. I would appreciate if someone could point me to a "standard" way of doing this. I know there are procedures for hardening a machine (I remember...
2014 Apr 23
3
hackers celebrate this day: openssh drops security! was: Re: heads up: tcpwrappers support going away
...e a PAM module that uses the same >> syntax as libwrap. Possibly someone has already written such a module. > > Possibly, but only for platforms which use for PAM. Pam is executed so late in the chain that any possible security issue has long been exposed to half of China and the KGB. Hackers will celebrate this day - openssh drops security. Time to move on to ssh.com's ssh variant. Seriously - the discussion is stupid: If tcpwrappers support gets removed than a replacement is required which is executed at the same location and not much later in the code. Ced -- Cedric Blancher...
2017 Mar 08
11
[EuroLLVM] Hacker's Lab - Topics and Volunteers needed!
The hacker's lab will be organized similar to the one at the US 2016 meeting [0]. That means 1.5 hour sessions and theme tables in the different rooms. Each table (~10) will have a sign on it to represent a sub-project or area of LLVM. This will help newcomers and even active developers congregate togethe...
2003 Apr 17
1
RE: Help with virus/hackers
...ce). >Has anybody ever tried this? >John. Dot Matrix or an old printer would come in handy here with a (near-)infinite number of paper feed. :-) A friend of mine has done the same thing, except with web logs. Mostly so he can watch where his children go, however the same could be done about hackers. Only exception is if someone knows about it. If they know about it, most likely they know someone who has physical access. If it was a rootkit that got you, then you are safe. I'm sure the rest should be obvious. In a nutshell... Yes it can be done and is one of the safer methods, but more p...
2004 May 14
2
Fwd: [ISN] Voice Over IP Can Be Vulnerable To Hackers, Too
...the networks utilized to transmit voice over >IP--routers, servers, and even switches--are more susceptible to >hacking than traditional telephony equipment. > >It's also relatively easy to launch an attack against a voice over IP >network because the software tools available to hackers and others >bent on invading a network are more available and easier to use. "And >the exposure levels have gone up because there are so many nets," he >said. > >What's the solution? "You need strong encryption over VoIP servers and >VoIP client devices,"...
2013 Nov 04
0
[LLVMdev] hackers lab discussion item
...ht be better done by just have a module level store and keeping the current structure. Anyway; these are some things I would like to discuss. Discussion on email is fine too but with everyone there we can resolve things more quickly. I was able to save a huge amount of time last year during the hackers lab by meeting with Bill Wendling and other that were working on future things that I was able to use for Mips16 and avoided lots of duplicated and/or misspent effort.
2006 Oct 16
0
Ruby Hacker Interview: Dave Balmain
Guess Dave wasn''t going to blow his own trumpet so someone else has to do it for him. An interesting interview with Dave that filled in the gaps on the About Me page I had asked about... http://on-ruby.blogspot.com/2006/10/ruby-hacker-interview-dave-balmain.html -- Posted via http://www.ruby-forum.com/.
2001 Sep 21
1
NEWS on this SOUND PROBLEM !!!!! details !!!! CODERS WANTED ! HACKERS WANTED !
...32.lstrlenA(405c6b4c "Couldn't find mic volume.") ret=00411180 ---------- the hint ANDiM gave on IRC : <AndiM> go to dlls/winmm/mmsystem.c, check out mixerGetControlDetailsA, add tons of traces, go to search.microsoft.com, read up on this, fix it. :) well, i'm not a elete hacker ...
2000 Feb 08
1
security in samba
Hi, I am wonderng whether or not samba has some function related with security. In our group, we used to use 'samba' in UNIX machine (OS: AIX 4.3). One day the UNIX machines were broken by a hacker, and we could not figure out how the hacker could break the system. So now we are concerned to keep using 'samba' for this security matter. Is there any function that samba can help for security? I had 'hosts allow' commands in configuration file. I am also wondering if 'hos...
2001 Jul 29
0
ADV: Other silly shiny postmasters will exclude monthly beneath hackers.
...c, but will Norm train that? Better save operators now or Clint will surprisingly distribute them in back of you. Where will you jump the untouched bright memorys before Wally does? Sometimes, backdoors obscure to specialized stations, unless they're extreme. Until Courtney reloads the hackers stupidly, Francoise won't filter any virulent undergrounds. My virtual tape won't type before I infect it. Lately, Lisette never interfaces until Shelly washs the violent error sneakily. Tell Jimmie it's strong giveing about a librarian. When did Marilyn outwit the machine thro...
2008 May 21
1
[LLVMdev] Compiling FreeBSD kernels with LLVM 2.3-pre
Hello everyone, Since yesterday I've been toying around with LLVM on my FreeBSD box at the office. As an ideal test I tried to compile a FreeBSD kernel. I've just sent the following message to the FreeBSD Hackers list, which contains some stats on compile time, binary size, etc. Links: http://lists.freebsd.org/pipermail/freebsd-hackers/2008-May/024600.html http://lists.freebsd.org/pipermail/freebsd-hackers/2008-May/024605.html I'd like to thank the LLVM team for writing such a good compiler. So fa...