Displaying 13 results from an estimated 13 matches for "ipblocker".
Did you mean:
blocker
2006 Jan 05
6
InPlaceEditor and textarea
Hi to all.
First of all exchuse for my bad english
I try to use Ajax.InPlaceEditor with a textarea:
##################
new Ajax.InPlaceEditor($(''ipblock''), ''tools/admin_save.php'',
{ ajaxOptions: {method: ''get''},
rows:10,
cols:20,
callback: function(form, value) { return ''op=ipblock&value='' + value},
2019 Jan 14
3
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
Hi
Specs in subject line: CentOS 6.X all latest patches), iptables 1.47, Apache2.2
I use the Geolite legacy databases together with iptables 1.47 to filter traffic for a variety of ports and only allow .AU traffic to have access.
Maxmind (https://dev.maxmind.com/geoip/geoip2/geolite2/) changed the default DB to the latest version which is GeoLite2, this leaves all users in need of the old
2013 May 17
2
[Bug 699] please add new options to iptables-restore to continue on error and suppress error output
https://bugzilla.netfilter.org/show_bug.cgi?id=699
Pablo Neira Ayuso <pablo at netfilter.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |pablo at netfilter.org
Resolution|
2020 Feb 04
3
Switching from lokkit (iptables) to firewalld
Hi All,
Over the last 20 some years I have a file with about 200K worth of address
that have "wrongly" tried to connect to my boxes running centos. So the
file has one line per address or group of addresses like:
2.244.112.0/24
So using the OLD iptables I would run through my file build the
iptables.txt file and start that with DROP for the IP address. iptables ran
through the big
2019 Jan 15
2
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
On Mon, Jan 14, 2019 at 07:29:45AM +0000, Phil Perry (pperry at elrepo.org) wrote:
> On 14/01/2019 07:09, Jobst Schmalenbach wrote:
> > Hi
> I use ipdeny's aggregated country lists to do the same thing:
>
> http://www.ipdeny.com/ipblocks/data/aggregated/
>
> I just feed this data directly into ipset/iptables via a script running on
> my firewall (not a C6 box).
2019 Jan 15
0
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
On 15/01/2019 01:29, Jobst Schmalenbach wrote:
>
> On Mon, Jan 14, 2019 at 07:29:45AM +0000, Phil Perry (pperry at elrepo.org) wrote:
>> On 14/01/2019 07:09, Jobst Schmalenbach wrote:
>>> Hi
>> I use ipdeny's aggregated country lists to do the same thing:
>>
>> http://www.ipdeny.com/ipblocks/data/aggregated/
>>
>> I just feed this data
2020 Feb 04
2
Switching from lokkit (iptables) to firewalld
On Tue, 4 Feb 2020 at 05:37, Pete Biggs <pete at biggs.org.uk> wrote:
> On Mon, 2020-02-03 at 19:04 -0500, Jerry Geis wrote:
> > Hi All,
> >
> > Over the last 20 some years I have a file with about 200K worth of
> address
> > that have "wrongly" tried to connect to my boxes running centos. So the
> > file has one line per address or group of
2019 Jan 14
0
CentOS 6.X, iptables 1.47 and GeoLite2 Country Database
On 14/01/2019 07:09, Jobst Schmalenbach wrote:
> Hi
>
> Specs in subject line: CentOS 6.X all latest patches), iptables 1.47, Apache2.2
>
> I use the Geolite legacy databases together with iptables 1.47 to filter traffic for a variety of ports and only allow .AU traffic to have access.
>
I use ipdeny's aggregated country lists to do the same thing:
2020 Feb 04
0
Switching from lokkit (iptables) to firewalld
On Mon, 2020-02-03 at 19:04 -0500, Jerry Geis wrote:
> Hi All,
>
> Over the last 20 some years I have a file with about 200K worth of address
> that have "wrongly" tried to connect to my boxes running centos. So the
> file has one line per address or group of addresses like:
> 2.244.112.0/24
>
> So using the OLD iptables I would run through my file build the
2015 Jun 08
4
Am I cracked?
Kevin Larsen <kevin.larsen at pioneerballoon.com> schrieb:
> Based on SIP packets coming in from IP addresses you don't recognize,
> while you may not be hacked, you would seem to have people probing your
I think, too, it's someone probing my IP...
> system. One thing you can do at the firewall level is restrict inbound sip
> communications to only those from your
2007 Jan 06
1
Re: [nut-commits] svn commit r710 - in trunk: . clients server
Great, thanks Arjen! Now we need an autoconf test to set HAVE_IPV6
automatically. I will look into what functionality needs to be tested;
the test can be refined as problems arise later. -- Peter
Arjen de Korte wrote:
>
> Author: adkorte-guest
> Date: Sat Jan 6 19:39:08 2007
> New Revision: 710
>
> Modified:
> trunk/ChangeLog
> trunk/clients/upsc.c
>
2017 Jan 09
2
NUT Client shuts down when performing runtime calibration on APC UPS
Here are the results from the output of upsc under different conditions from my Debian Test system with NUT 2.7.2 :
Normal: ups.status: OL
No wall power: ups.status: OB
Runtime calibration (started from AP9630 web interface): ups.status: OB CAL
So at this stage there is a difference!
I then connected to my QNAP and set the UPS settings on the web interface to "Shutdown server if power
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
With the Ipv6 patch (r708), I get:
upsclient.c: In function `upscli_connect':
upsclient.c:469: `AI_ADDRCONFIG' undeclared (first use in this function)
upsclient.c:469: (Each undeclared identifier is reported only once
upsclient.c:469: for each function it appears in.)
Even if it doesn't break IPv4 support, it may break portability, as
IPv6 seems to require specific functions that are