search for: intruders

Displaying 20 results from an estimated 276 matches for "intruders".

Did you mean: intruder
2004 Jul 12
4
call Intrude
Hi I have looked through the wiki and search the mailing list, but I cannot find a way to intrude on a call, can asterisk do this feature? if so how? Thanks for your help Robb
2008 Feb 19
2
asterisk config file online editor
...isk config files that can be embedded on a web page for online editing (on an interface), any recommendations? ________________________________________________________________ Anton Krall Direccion General Intruder Consulting A Division of IntruderEnterprises S.A. de C.V. www.Intruder.com.mx www.IntruderStore.com.mx Tel. 3872-2200 ext. 201 Tel. 01-800-INTRUDER (01-800-468-7833) Email: akrall at intruder.com.mx Como lo estoy haciendo? Contacte a mi Director:
2004 Jul 13
10
vulnerability with ssh-agent
Hi I have written a small introduction to newbies in Danish on ssh and friends. Now some people are questioning my advice and I think they have a point. I am advocating people to use DSA-keys and a config file with this: Protocol 2 ForwardAgent yes ForwardX11 yes Compression yes CompressionLevel 9 and running ssh-agent and ssh-add, and then loggin in without giving keys. One
2014 Dec 28
1
"Possible intruder" warning
Hello, I'm using tinc for a few years now and that this is my first post to this list tells a lot about the quality of tinc, I think. It's just great, thanks a lot for your fine work! Recently I've discovered these messages in my syslog: Dec 28 16:34:06 vdr tinc.grue[9731]: Possible intruder ix (192.168.178.25 port 60882): wrong keylength Dec 28 16:34:06 vdr tinc.grue[9731]: Error
2007 Apr 30
1
centos 5 - iintruder alert, intruder alert
CentOS 5 - Intruder alert Somebody that uses windows has infiltrated the upstream. Alert, alert, weeeeep weeeeeeeeepppp bweeeeeeeeeepppppp screeeeeccchhhhhh :-) [root at tstream11 ~]# ls -axl /bin/tracert lrwxrwxrwx 1 root root 10 Apr 20 17:56 /bin/tracert -> traceroute - rh -- Abba Communications Internet Spokane, WA www.abbacomm.net
2008 Jan 13
3
Anti-Rootkit app
Hi all, I need to install an anti-rootkid in a lot of servers. I know that there're several options: tripwire, aide, chkrootkit... ?What do you prefer? Obviously, I have to define my needs: - easy setup and configuration - actively developed -- Thanks, Jordi Espasa Clofent
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
...y is at the end of this file. Systems Affected * Systems running various versions of BIND I. Description Six vulnerabilities have been found in BIND, the popular domain name server from the Internet Software Consortium (ISC). One of these vulnerabilities may allow remote intruders to gain privileged access to name servers. Vulnerability #1: the "nxt bug" Some versions of BIND fail to properly validate NXT records. This improper validation could allow an intruder to overflow a buffer and execute arbitrary code with the privileges of the name server....
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the communication and repeat the action. What if an intruder notice that there's a secure session starting (by guessing at the dst IP address and unintelligible payload) and then start capturing all the packets on this session for the purpose of repeating the whole session again? The secure user could add/delete interfaces and
2013 Jul 30
2
Interesting admin info: ipmitool
I've used ipmitool any number of times, but never for more than getting info, or setting the server name on a Dell LCD screen. However, I had a server screaming about intruder alert, intruder alert, er, "Chassis intrusion detected", and I thought there might be a way to shut it up (this after pulling the server and reseating the lid). A quick google found, on the first page, an 8
2005 Sep 22
0
rtp problems
Guys. Im having some audio problems. My asterisk box is the router for my network but remote softphone cant connect to it. I tried running 1.2beta1 and cvs-head with the same luck and etheral throws this: 577.358145 201.138.93.80 -> 201.129.249.28 SIP Request: REGISTER sip:voip.intruder.com.mx:5060 577.359698 201.129.249.28 -> 201.138.93.80 SIP Status: 100 Trying (1 bindings)
2005 Feb 27
4
Grandest Free Softphone
Guys.. which free softphone is the best,grandest,most recommended one out there? based on your own experiences..
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
...ERT Advisory CA-98-13-tcp-denial-of-service Original Issue Date: December 21, 1998 Last Revised Topic: Vulnerability in Certain TCP/IP Implementations Affected Systems Some systems with BSD-derived TCP/IP stacks. See Appendix A for a complete list of affected systems. Overview Intruders can disrupt service or crash systems with vulnerable TCP/IP stacks. No special access is required, and intruders can use source-address spoofing to conceal their true location. I. Description By carefully constructing a sequence of packets with certain characteristics, an intruder can...
2003 Sep 16
5
boot -s - can i detect intruder
Hi list Several people have physical access to my FreeBSD box and I have the feeling that somebody try to get access with boot -s options . Can I log activity after boot -s option (change user password, install software and etc.). I use boot -s and change user password, but after reboot i can't find this atcivity in log files. The BSD box is shutdown and run again many time at day. Best
2005 Mar 11
0
Error cant change devie with no technology
Guys. What does this error mean? -- Playing '/var/spool/asterisk/voicemail/intruder/201/unavail' (language 'sp') -- Playing 'vm-intro' (language 'sp') -- Playing 'beep' (language 'sp') -- Recording the message -- x=0, open writing: /var/spool/asterisk/voicemail/intruder/201/INBOX/msg0000 format: wav, 0x812b4f0 -- User ended
2009 Apr 03
4
Bug in yum Logwatch reporting
I've been noticing yum updates on several servers I manage over the last few weeks, which I know I didn't perform and could not explain until this morning. At first I suspect a break-in, but found no other evidence or reason an intruder would run the yum updates I was viewing. Yum updates are logged in /var/log/yum.log, which is what Logwatch scans. Seems that the format of the log
1998 Aug 11
0
Fwd: CERT Advisory CA-98.10 - mime_buffer_overflows
>Date: Tue, 11 Aug 1998 13:21:06 -0400 >From: CERT Advisory <cert-advisory@cert.org> >To: cert-advisory@coal.cert.org >Subject: CERT Advisory CA-98.10 - mime_buffer_overflows >Reply-To: cert-advisory-request@cert.org >Organization: CERT(sm) Coordination Center - +1 412-268-7090 > >-----BEGIN PGP SIGNED MESSAGE----- >
2005 Mar 02
5
Asterisk URL and Callcenter Apps
Guys. How do those callcenter apps work with Asterisk where a call comes in and * send a URL and some screen popup up based on callerid or something or username or id and shows all the customers info? Anybody done that? What do you need to do that? If you are using ATAs or IP Phones, how do those integrate with the PC so the screen would popup?
2005 Aug 09
8
call "load balancing"
Hello All, Wondering what sort of real world mileage people are getting out of different internet connecions - i.e. different DSL connection speeds, cable modems, etc... Is it reasonable to hope to carry 10 - 15 concurrent calls on a 768K DSL? I'm not talking about theoretical BW or looking for any difinitive absolute guarantee... With DSL and Cable - there is no guarantee, so I'm
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan
2015 Feb 23
4
Using confirmation of key usage per-host?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dear all, bear with me, I know the SUBJECT sounds pretty unclear. I'll clarify in a minute. And please excuse that due to the keywords being unclear no usable help was found on google & Co... Assume there is a workstation, which connects to multiple machines, one of which is considered potentially unsafe. So, it would be nice to have agent