Displaying 20 results from an estimated 276 matches for "intruders".
Did you mean:
intruder
2004 Jul 12
4
call Intrude
Hi
I have looked through the wiki and search the mailing list, but I cannot
find a way to intrude on a call, can asterisk do this feature?
if so how?
Thanks for your help
Robb
2008 Feb 19
2
asterisk config file online editor
...isk config files
that can be embedded on a web page for online editing (on an interface),
any recommendations?
________________________________________________________________
Anton Krall
Direccion General
Intruder Consulting
A Division of IntruderEnterprises S.A. de C.V.
www.Intruder.com.mx
www.IntruderStore.com.mx
Tel. 3872-2200 ext. 201
Tel. 01-800-INTRUDER (01-800-468-7833)
Email: akrall at intruder.com.mx
Como lo estoy haciendo? Contacte a mi Director:
2004 Jul 13
10
vulnerability with ssh-agent
Hi
I have written a small introduction to newbies in Danish on ssh and
friends. Now some people are questioning my advice and I think they have
a point.
I am advocating people to use DSA-keys and a config file with this:
Protocol 2
ForwardAgent yes
ForwardX11 yes
Compression yes
CompressionLevel 9
and running ssh-agent and ssh-add, and then loggin in without giving
keys.
One
2014 Dec 28
1
"Possible intruder" warning
Hello,
I'm using tinc for a few years now and that this is my first post to this list
tells a lot about the quality of tinc, I think. It's just great, thanks a lot
for your fine work!
Recently I've discovered these messages in my syslog:
Dec 28 16:34:06 vdr tinc.grue[9731]: Possible intruder ix (192.168.178.25 port
60882): wrong keylength
Dec 28 16:34:06 vdr tinc.grue[9731]: Error
2007 Apr 30
1
centos 5 - iintruder alert, intruder alert
CentOS 5 - Intruder alert
Somebody that uses windows has infiltrated the upstream.
Alert, alert, weeeeep weeeeeeeeepppp bweeeeeeeeeepppppp screeeeeccchhhhhh
:-)
[root at tstream11 ~]# ls -axl /bin/tracert
lrwxrwxrwx 1 root root 10 Apr 20 17:56 /bin/tracert -> traceroute
- rh
--
Abba Communications Internet
Spokane, WA
www.abbacomm.net
2008 Jan 13
3
Anti-Rootkit app
Hi all,
I need to install an anti-rootkid in a lot of servers. I know that
there're several options: tripwire, aide, chkrootkit...
?What do you prefer?
Obviously, I have to define my needs:
- easy setup and configuration
- actively developed
--
Thanks,
Jordi Espasa Clofent
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
...y is at the end of this file.
Systems Affected
* Systems running various versions of BIND
I. Description
Six vulnerabilities have been found in BIND, the popular domain name
server from the Internet Software Consortium (ISC). One of these
vulnerabilities may allow remote intruders to gain privileged access
to name servers.
Vulnerability #1: the "nxt bug"
Some versions of BIND fail to properly validate NXT records. This
improper validation could allow an intruder to overflow a buffer and
execute arbitrary code with the privileges of the name server....
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the
communication and repeat the action. What if an intruder notice that there's
a secure session starting (by guessing at the dst IP address and
unintelligible payload) and then start capturing all the packets on this
session for the purpose of repeating the whole session again? The secure
user could add/delete interfaces and
2013 Jul 30
2
Interesting admin info: ipmitool
I've used ipmitool any number of times, but never for more than getting
info, or setting the server name on a Dell LCD screen. However, I had a
server screaming about intruder alert, intruder alert, er, "Chassis
intrusion detected", and I thought there might be a way to shut it up
(this after pulling the server and reseating the lid). A quick google
found, on the first page, an 8
2005 Sep 22
0
rtp problems
Guys.
Im having some audio problems.
My asterisk box is the router for my network but remote softphone cant
connect to it. I tried running 1.2beta1 and cvs-head with the same luck and
etheral throws this:
577.358145 201.138.93.80 -> 201.129.249.28 SIP Request: REGISTER
sip:voip.intruder.com.mx:5060
577.359698 201.129.249.28 -> 201.138.93.80 SIP Status: 100 Trying (1
bindings)
2005 Feb 27
4
Grandest Free Softphone
Guys.. which free softphone is the best,grandest,most recommended one out
there? based on your own experiences..
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
...ERT Advisory CA-98-13-tcp-denial-of-service
Original Issue Date: December 21, 1998
Last Revised
Topic: Vulnerability in Certain TCP/IP Implementations
Affected Systems
Some systems with BSD-derived TCP/IP stacks. See Appendix A for a
complete list of affected systems.
Overview
Intruders can disrupt service or crash systems with vulnerable TCP/IP
stacks. No special access is required, and intruders can use
source-address spoofing to conceal their true location.
I. Description
By carefully constructing a sequence of packets with certain
characteristics, an intruder can...
2003 Sep 16
5
boot -s - can i detect intruder
Hi list
Several people have physical access to my FreeBSD box and I have the feeling
that somebody try to get access with boot -s options . Can I log activity
after boot -s option (change user password, install software and etc.).
I use boot -s and change user password, but after reboot i can't find this
atcivity in log files.
The BSD box is shutdown and run again many time at day.
Best
2005 Mar 11
0
Error cant change devie with no technology
Guys.
What does this error mean?
-- Playing '/var/spool/asterisk/voicemail/intruder/201/unavail'
(language 'sp')
-- Playing 'vm-intro' (language 'sp')
-- Playing 'beep' (language 'sp')
-- Recording the message
-- x=0, open writing:
/var/spool/asterisk/voicemail/intruder/201/INBOX/msg0000 format: wav,
0x812b4f0
-- User ended
2009 Apr 03
4
Bug in yum Logwatch reporting
I've been noticing yum updates on several servers I manage over the
last few weeks, which I know I didn't perform and could not explain
until this morning. At first I suspect a break-in, but found no other
evidence or reason an intruder would run the yum updates I was
viewing.
Yum updates are logged in /var/log/yum.log, which is what Logwatch
scans. Seems that the format of the log
1998 Aug 11
0
Fwd: CERT Advisory CA-98.10 - mime_buffer_overflows
>Date: Tue, 11 Aug 1998 13:21:06 -0400
>From: CERT Advisory <cert-advisory@cert.org>
>To: cert-advisory@coal.cert.org
>Subject: CERT Advisory CA-98.10 - mime_buffer_overflows
>Reply-To: cert-advisory-request@cert.org
>Organization: CERT(sm) Coordination Center - +1 412-268-7090
>
>-----BEGIN PGP SIGNED MESSAGE-----
>
2005 Mar 02
5
Asterisk URL and Callcenter Apps
Guys.
How do those callcenter apps work with Asterisk where a call comes in and *
send a URL and some screen popup up based on callerid or something or
username or id and shows all the customers info?
Anybody done that? What do you need to do that?
If you are using ATAs or IP Phones, how do those integrate with the PC so
the screen would popup?
2005 Aug 09
8
call "load balancing"
Hello All,
Wondering what sort of real world mileage people are getting out of
different internet connecions - i.e. different DSL connection speeds,
cable modems, etc... Is it reasonable to hope to carry 10 - 15
concurrent calls on a 768K DSL? I'm not talking about theoretical BW or
looking for any difinitive absolute guarantee... With DSL and Cable -
there is no guarantee, so I'm
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has
gone out on linux-security..... -- REW]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
Has anyone been hit with the Bind Inverse Query Buffer Overrun on
their Linux servers? We have had 3 servers attacked using this
expoit and all of the machines had several binaries replaced with
trojan
2015 Feb 23
4
Using confirmation of key usage per-host?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Dear all,
bear with me, I know the SUBJECT sounds pretty unclear. I'll clarify
in a minute. And please excuse that due to the keywords being unclear
no usable help was found on google & Co...
Assume there is a workstation, which connects to multiple machines,
one of which is considered potentially unsafe. So, it would be nice to
have agent