search for: illegitimate

Displaying 13 results from an estimated 13 matches for "illegitimate".

2009 Feb 06
4
Security issue
Is there a way to restrict connection to my asterisk server to users based on their IP addresses, and not just password. I have some hackers who connect to my server to make illegitimate solicitation calls to people. I had to shutdown the server for now until I find a solution. ANY HELP? Thanks. ond -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20090206/142dcd22/attachment.htm
2010 Jul 22
3
My Switch is being attacked using sip scanner tool (Service Abuse Attack)
An attacker is scanning my Asterisk Switch to gain illegitimate access to VoIP call functionality. Using a sip scanning tool, *it* sends REGISTERs with random identities. And when it discovers one identity subscribed in my switch, it tries to authenticate with random passwords using this user name. For the moment, I have replaced this account. And also bloc...
2010 Jul 20
5
Record Failed Passwords
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi OpenSSH'ers, I am emailing you to ask is it possible to record failed passwords attempts and log them to syslog? Are there patches available for this? Has anyone managed to do this before? Are there alternitive methods? Many Thanks, A - -- Alan Neville, Postgraduate Education Officer, DCU Students' Union 2009/2010, BS.c Computer
2011 Oct 14
3
heritability estimation
Hello, I'm looking for a method to estimate narrow sense heritability of traits in a RIL population. Papers I've checked either use either SAS or SPSS or do not give any details at all. I've found some reference to using variance components in ANOVA, using the kinship or wgaim packages, but I don't have a clue as to how to do any of this. Is there any way fro a very R illiterate
2012 Apr 13
3
A little exercise in R!
...er, adds up to give a square number?" Well, that's the challenge: Write (from scratch) an R program that solves this problem. And make it neat. NOTE: If there should happen to be some R package that can solve this kind of problem already, without you having to think much, then its use is illegitimate! (I.e. will be deemed "regurgitation"). Over to you. With best wishes, Ted. ------------------------------------------------- E-Mail: (Ted Harding) <Ted.Harding at wlandres.net> Date: 13-Apr-2012 Time: 22:33:43 This message was sent by XFMail
2015 Jul 10
2
[LLVMdev] [cfe-dev] Phabricator update
...with some modifications to subject and body -- an email really written from the "From" account). No, these messages are just fabricated whole-cloth without the knowledge of the sending domain's email system. So, recipients which run DMARC checks will rightfully detect these emails as illegitimate, and might reject/quarentine/etc them. (I've no idea if that's actually what's going on with Apple's servers, but an increasing number of domains are using dmarc checks at least as one input of "potentially-spam", if not to outright reject the messages. And it makes sense...
2012 Jun 15
1
Update on spam, postfix, fail2ban, centos 6
...through all of this was 50% free mail (yahoo, msn/live, some aol, etc) Yahoo being the biggest. Another thing I noticed. When I started adding domains to my 'blacklist of commercial senders', legitimate or not, I started to get yahoo mails with references inside the mails to many of the illegitimate sites that were coming from the UCE's I had blocked. It is quite interesting to watch this process. More interesting that no matter how strict or lax I make the system there will be the same number of attempted mails sent to my server. (give or take a few hundred). If I unban all the ips, w...
2011 Jul 29
0
HTML sanitization
...d to crash MySpace.) Note that this category includes things like blogging software where someone might plausibly copy and paste a piece of someone else's web page in order to quote it. 3. Using Markdown to render stuff sent by a possible spammer or by someone else who has an illegitimate interest in knowing whether you have read it ? such as email ? in which case you do *not* want to confirm to the spammer that you have read it. In this case want to filter out anything whose rendering will generate network traffic (to anywhere other than the source of the rendered d...
2015 Jul 10
2
[LLVMdev] Phabricator update
Do you have a bounced email, we can look at for clues? > On Jul 10, 2015, at 12:49 AM, Manuel Klimek <klimek at google.com> wrote: > > Ok, apple addresses still bounce without a reason - the sendgrid folks say this is completely controlled by apple.com <http://apple.com/>'s mail servers - do you have somebody you can ask? > > On Thu, Jul 9, 2015 at 10:10 AM Manuel
2004 Jan 09
0
large file pre-allocation causing Windows error
...ecified network resource or device is no longer available. I've tested this with Samba 2.2.3a, 2.2.8a, and 3.0.0 with no difference in behavior. I'm including a debug snip that comes from 3.0.0. Is there another path through the code where "strict allocate" takes effect? Is it illegitimate or too hard to try to get Samba to trick Windows into believing that its pre-allocate has succeeded? Thanks, Scott -------------- [2004/01/09 10:04:17, 5] smbd/uid.c:change_to_root_user(218) change_to_root_user: now uid=(0,0) gid=(0,0) [2004/01/09 10:04:17, 2] smbd/server.c:exit_server(558)...
2011 Jan 07
9
Idea to possibly improve flac?
First of all, I am not aware of any official source of FLAC files that provide MP3 sourced data. I meticulously check the music I purchase, especially when it is 24/48 or 24/96 material, because this is new technology, and sometimes people get it wrong. However, you should be aware that many modern producers use software to create their music, and when the software stores sound clips in
2006 Jul 29
29
Dynamically generating 10k pages per second
Hi, Anyone got an idea of how many web and database servers I''d need to push out 10,000 dynamic pages per second? Fairly simple pages and database queries. I''d appreciate recommendations for hardware. The clients for this project are anticipating large amounts of burst traffic. Joe
2007 Oct 24
182
Yager on ZFS
Not sure if it''s been posted yet, my email is currently down... http://weblog.infoworld.com/yager/archives/2007/10/suns_zfs_is_clo.html Interesting piece. This is the second post from Yager that shows solaris in a pretty good light. I particularly like his closing comment: "If you haven''t checked out ZFS yet, do, because it will eventually become ubiquitously implemented