Displaying 11 results from an estimated 11 matches for "locksmith".
2015 Feb 13
0
Securing SSH wiki article outdated
...or what knock
code you need for the port knocker to access port 22, or whatever).
Brute-forcing is just a way of breaking the obscurity of a password,
etc. Even layered security is only as secure as the obscurity of how
the layers interact.
One of my day job's responsibilities is as site locksmith (and reverse
engineering rotating constant master key systems using the Edwards
matrix system is one of my current areas of study, since the site's
previous occupants didn't leave complete records of the dozen or so RCM
key systems here); it is tacit knowledge in locksmithing circles th...
2005 Nov 03
2
simple menu limitations
...keeppxe
LABEL 11dnet
MENU LABEL Build 11DNET beta (works on 200MB ram)
KERNEL 1/STARTROM.0
APPEND keepxe
LABEL imgctr
MENU LABEL Image Center (experimental)
KERNEL memdisk
APPEND keeppxe initrd=fimages/pqimgctr.vfd
LABEL localboot
MENU LABEL Localboot
MENU DEFAULT
LOCALBOOT 0
LABEL locksmith3com
MENU LABEL Locksmith 3com
KERNEL memdisk
APPEND keeppxe initrd=fimages/locksmith3com.ima
LABEL locksmithbroadcom
MENU LABEL Locksmith Broadcom
KERNEL memdisk
APPEND keeppxe initrd=fimages/locksmithbroadcom.ima
# LABEL locksmithmarvell
# MENU LABEL Locksmith Marvell Yukon
# KERNEL memdis...
2017 Nov 28
0
Failed attempts
...does get logged will likely
be much more useful and indicative of a more determined attacker.?
Anything that substantially increases the log's signal to noise is
useful and not pointless, in my opinion. Anything that slows down the
attack is even more useful.
I actually have training as a locksmith, with a specialty in
masterkeying systems like rotating-constant and some obscure variations
of RCM (this is one of the two masterkey systems explored in the
infamous (in locksmith circles) paper "Cryptology and Physical Security:
Rights Amplification in Master-Keyed Mechanical Locks"...
2017 Nov 27
6
Failed attempts
Pete Biggs wrote:
> On Mon, 2017-11-27 at 12:10 -0500, Jerry Geis wrote:
>> hi All,
>>
>> I happened to login to one of my servers today and saw 96000 failed
>> login attempts. shown below is the address its coming from. I added it
to my
>> firewall to drop.
>>
>> Failed password for root from 123.183.209.135 port 14299 ssh2
>>
>> FYI -
2015 Feb 12
8
Securing SSH wiki article outdated
Hi, just a quick note to whoever is maintaining this page:
http://wiki.centos.org/HowTos/Network/SecuringSSH
The procedure is missing the firewall-cmd calls necessary in EL7:
firewall-cmd --add-port 2345/tcp
firewall-cmd --add-port 2345/tcp --permanent
Also, it may be worth mentioning that semanage is in the policycoreutils-python package, which isn?t installed by default in all stock
2015 Feb 12
8
Securing SSH wiki article outdated
Hi, just a quick note to whoever is maintaining this page:
http://wiki.centos.org/HowTos/Network/SecuringSSH
The procedure is missing the firewall-cmd calls necessary in EL7:
firewall-cmd --add-port 2345/tcp
firewall-cmd --add-port 2345/tcp --permanent
Also, it may be worth mentioning that semanage is in the policycoreutils-python package, which isn?t installed by default in all stock
2012 Jan 27
0
Anyone understand this Climate Change article?
...w as I don't get that article at all.
It's like written in gibberish.
Can anyone please explain to me what it is about?
Why am I so dumb in English..
Thanks in advance :)
--------------------------------------------------------------------
x ray technician (http://xraytechnicianinfo.com/)| locksmithlittleton co (http://www.littleton-locksmith.com/)|Denver locksmith (http://www.denverlocksmiths4u.com)
2011 Jun 04
2
Run-time error '429':
I have read and read and read and cannot seem to figure this out.
I am running Linux Mint 9 and trying to install a windows program that will never have a linux alternative. It is a locksmith code data base program called Code Source. Also has two accompanying programs: COA and Master King.
Install requirements are simply windows 98 and newer OS according to HPC's (manufacture) website. there is a registration code that has to be put in too, but that isn't the issue. I have thr...
2017 Nov 28
4
Failed attempts
...get logged will likely
be much more useful and indicative of a more determined attacker.?
Anything that substantially increases the log's signal to noise is
useful and not pointless, in my opinion. Anything that slows down the
attack is even more useful.
>
> I actually have training as a locksmith, with a specialty in
> masterkeying systems like rotating-constant and some obscure variations
of RCM (this is one of the two masterkey systems explored in the
infamous (in locksmith circles) paper "Cryptology and Physical Security:
Rights Amplification in Master-Keyed Mechanical Locks"...
1997 May 11
4
[Linux UID/GID ''Feature'']
...30).
[mod: Jon Lewis <jlewis@fdt.net> reports: It doesn''t work for slackware
with shadow passwords.... -- REW]
David Phillips, TASC
phillips@pcisys.net
-----End of forwarded message-----
--
Eric Augustus
augustus@stic.net
-----------------
If I had only known, I would have been a locksmith.
-- Albert Einstein
2006 Aug 10
28
On the total nondisclosure of the 8/9/06 security vulnerability
...of locks offers a premium for dishonesty, by showing others how
to be dishonest. This is a fallacy. Rogues are very keen in their
profession, and know already much more than we can teach them respecting
their several kinds of roguery.
Rogues knew a good deal about lock-picking long before locksmiths
discussed it among themselves, as they have lately done. If a lock, let
it have been made in whatever country, or by whatever maker, is not so
inviolable as it has hitherto been deemed to be, surely it is to the
interest of honest persons to know this fact, because the dishonest are
tolerably...