Displaying 20 results from an estimated 276 matches for "intruder".
Did you mean:
intrude
2004 Jul 12
4
call Intrude
Hi
I have looked through the wiki and search the mailing list, but I cannot
find a way to intrude on a call, can asterisk do this feature?
if so how?
Thanks for your help
Robb
2008 Feb 19
2
asterisk config file online editor
Guys, Im looking for a good text file editor for asterisk config files
that can be embedded on a web page for online editing (on an interface),
any recommendations?
________________________________________________________________
Anton Krall
Direccion General
Intruder Consulting
A Division of IntruderEnterprises S.A. de C.V.
www.Intruder.com.mx
www.IntruderStore.com.mx
Tel. 3872-2200 ext. 201
Tel. 01-800-INTRUDER (01-800-468-7833)
Email: akrall at intruder.com.mx
Como lo estoy haciendo? Contacte a mi Director:
2004 Jul 13
10
vulnerability with ssh-agent
...ave
a point.
I am advocating people to use DSA-keys and a config file with this:
Protocol 2
ForwardAgent yes
ForwardX11 yes
Compression yes
CompressionLevel 9
and running ssh-agent and ssh-add, and then loggin in without giving
keys.
One commenter said that this has big holes. An intruder with root
privileges could set SSH_AUTH_SOCKET to at socket for ssh-agent found in
/tmp, and he could also find the keys in the /proc area for the
ssh-agent.
Is that true?
Are the keys visible under Linux in the /proc memory mapping for ssh-agent?
Could there be done something to better these vul...
2014 Dec 28
1
"Possible intruder" warning
Hello,
I'm using tinc for a few years now and that this is my first post to this list
tells a lot about the quality of tinc, I think. It's just great, thanks a lot
for your fine work!
Recently I've discovered these messages in my syslog:
Dec 28 16:34:06 vdr tinc.grue[9731]: Possible intruder ix (192.168.178.25 port
60882): wrong keylength
Dec 28 16:34:06 vdr tinc.grue[9731]: Error while processing METAKEY from ix
(192.168.178.25 port 60882)
Could you give me a hint about the reason? I've compared the public keys and
they match. Also, there's no problem to connect from host vd...
2007 Apr 30
1
centos 5 - iintruder alert, intruder alert
CentOS 5 - Intruder alert
Somebody that uses windows has infiltrated the upstream.
Alert, alert, weeeeep weeeeeeeeepppp bweeeeeeeeeepppppp screeeeeccchhhhhh
:-)
[root at tstream11 ~]# ls -axl /bin/tracert
lrwxrwxrwx 1 root root 10 Apr 20 17:56 /bin/tracert -> traceroute
- rh
--
Abba Communications Internet...
2008 Jan 13
3
Anti-Rootkit app
Hi all,
I need to install an anti-rootkid in a lot of servers. I know that
there're several options: tripwire, aide, chkrootkit...
?What do you prefer?
Obviously, I have to define my needs:
- easy setup and configuration
- actively developed
--
Thanks,
Jordi Espasa Clofent
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
...y is at the end of this file.
Systems Affected
* Systems running various versions of BIND
I. Description
Six vulnerabilities have been found in BIND, the popular domain name
server from the Internet Software Consortium (ISC). One of these
vulnerabilities may allow remote intruders to gain privileged access
to name servers.
Vulnerability #1: the "nxt bug"
Some versions of BIND fail to properly validate NXT records. This
improper validation could allow an intruder to overflow a buffer and
execute arbitrary code with the privileges of the name server...
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the
communication and repeat the action. What if an intruder notice that there's
a secure session starting (by guessing at the dst IP address and
unintelligible payload) and then start capturing all the packets on this
session for the purpose of repeating the whole session again? The secure
user could add/delete interfaces and stuff, therefore just by re...
2013 Jul 30
2
Interesting admin info: ipmitool
I've used ipmitool any number of times, but never for more than getting
info, or setting the server name on a Dell LCD screen. However, I had a
server screaming about intruder alert, intruder alert, er, "Chassis
intrusion detected", and I thought there might be a way to shut it up
(this after pulling the server and reseating the lid). A quick google
found, on the first page, an 8 page document by Dell called "Managing Dell
PowerEdge Servers Using IPMItool&...
2005 Sep 22
0
rtp problems
Guys.
Im having some audio problems.
My asterisk box is the router for my network but remote softphone cant
connect to it. I tried running 1.2beta1 and cvs-head with the same luck and
etheral throws this:
577.358145 201.138.93.80 -> 201.129.249.28 SIP Request: REGISTER
sip:voip.intruder.com.mx:5060
577.359698 201.129.249.28 -> 201.138.93.80 SIP Status: 100 Trying (1
bindings)
577.359723 201.129.249.28 -> 201.138.93.80 SIP Status: 401 Unauthorized
(1 bindings)
577.420875 201.129.249.28 -> 201.138.93.80 SIP Request: OPTIONS
sip:2@192.168.1.127:5060
577.424962 201.138.93....
2005 Feb 27
4
Grandest Free Softphone
Guys.. which free softphone is the best,grandest,most recommended one out
there? based on your own experiences..
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
...ERT Advisory CA-98-13-tcp-denial-of-service
Original Issue Date: December 21, 1998
Last Revised
Topic: Vulnerability in Certain TCP/IP Implementations
Affected Systems
Some systems with BSD-derived TCP/IP stacks. See Appendix A for a
complete list of affected systems.
Overview
Intruders can disrupt service or crash systems with vulnerable TCP/IP
stacks. No special access is required, and intruders can use
source-address spoofing to conceal their true location.
I. Description
By carefully constructing a sequence of packets with certain
characteristics, an intruder ca...
2003 Sep 16
5
boot -s - can i detect intruder
Hi list
Several people have physical access to my FreeBSD box and I have the feeling
that somebody try to get access with boot -s options . Can I log activity
after boot -s option (change user password, install software and etc.).
I use boot -s and change user password, but after reboot i can't find this
atcivity in log files.
The BSD box is shutdown and run again many time at day.
Best
2005 Mar 11
0
Error cant change devie with no technology
Guys.
What does this error mean?
-- Playing '/var/spool/asterisk/voicemail/intruder/201/unavail'
(language 'sp')
-- Playing 'vm-intro' (language 'sp')
-- Playing 'beep' (language 'sp')
-- Recording the message
-- x=0, open writing:
/var/spool/asterisk/voicemail/intruder/201/INBOX/msg0000 format: wav,
0x812b4f0
-- User...
2009 Apr 03
4
Bug in yum Logwatch reporting
I've been noticing yum updates on several servers I manage over the
last few weeks, which I know I didn't perform and could not explain
until this morning. At first I suspect a break-in, but found no other
evidence or reason an intruder would run the yum updates I was
viewing.
Yum updates are logged in /var/log/yum.log, which is what Logwatch
scans. Seems that the format of the log entries is: "MMM DD", the
year is missing! This morning looking at this log sequentially I
noticed I did do yum updates on Apr 02 and Apr...
1998 Aug 11
0
Fwd: CERT Advisory CA-98.10 - mime_buffer_overflows
...we have not received any
>reports indicating this vulnerability has been successfully exploited.
>
>-
-----------------------------------------------------------------------------
>
>I. Description
>
>A vulnerability in some MIME-aware mail and news clients could allow
>an intruder to execute arbitrary code, crash the system, or gain
>administrative rights on vulnerable systems. The vulnerability has
>been discovered by Marko Laakso and Ari Takanen of the Secure
>Programming Group of the University of Oulu. It has received
>considerable public attention in the med...
2005 Mar 02
5
Asterisk URL and Callcenter Apps
Guys.
How do those callcenter apps work with Asterisk where a call comes in and *
send a URL and some screen popup up based on callerid or something or
username or id and shows all the customers info?
Anybody done that? What do you need to do that?
If you are using ATAs or IP Phones, how do those integrate with the PC so
the screen would popup?
2005 Aug 09
8
call "load balancing"
Hello All,
Wondering what sort of real world mileage people are getting out of
different internet connecions - i.e. different DSL connection speeds,
cable modems, etc... Is it reasonable to hope to carry 10 - 15
concurrent calls on a 768K DSL? I'm not talking about theoretical BW or
looking for any difinitive absolute guarantee... With DSL and Cable -
there is no guarantee, so I'm
1998 May 19
7
Bind Overrun Bug and Linux
...ND 8 Releases
3. Denial-of-Service Vulnerability in BIND 8 Releases
- ----------------------------------------------------------------------------
I. Description
This advisory describes three distinct problems in BIND. Topic 1 describes
a vulnerability that may allow a remote intruder to gain root access on
your name server or to disrupt normal operation of your name server.
Topics
2 and 3 deal with vulnerabilities that can allow an intruder to disrupt
your name server. Detailed descriptions of each problem and its solutions
are included in the individual se...
2015 Feb 23
4
Using confirmation of key usage per-host?
...hich connects to multiple machines,
one of which is considered potentially unsafe. So, it would be nice to
have agent forwarding to that machine combined with the confirmation
option of ssh-add (-c). If the 'forwarded key' is used on this
machine, the user is prompted on the workstation. An intruder cannot
use the authentication information without the user knowing (at least
that is how I understood the idea of agent confirmation).
Using ssh-add -c on the workstation together with setting
'ForwardAgent=yes' in the .ssh/config achieves the desired behaviour.
Unfortunately, this means...