search for: locksmith

Displaying 11 results from an estimated 11 matches for "locksmith".

2015 Feb 13
0
Securing SSH wiki article outdated
...or what knock code you need for the port knocker to access port 22, or whatever). Brute-forcing is just a way of breaking the obscurity of a password, etc. Even layered security is only as secure as the obscurity of how the layers interact. One of my day job's responsibilities is as site locksmith (and reverse engineering rotating constant master key systems using the Edwards matrix system is one of my current areas of study, since the site's previous occupants didn't leave complete records of the dozen or so RCM key systems here); it is tacit knowledge in locksmithing circles th...
2005 Nov 03
2
simple menu limitations
...keeppxe LABEL 11dnet MENU LABEL Build 11DNET beta (works on 200MB ram) KERNEL 1/STARTROM.0 APPEND keepxe LABEL imgctr MENU LABEL Image Center (experimental) KERNEL memdisk APPEND keeppxe initrd=fimages/pqimgctr.vfd LABEL localboot MENU LABEL Localboot MENU DEFAULT LOCALBOOT 0 LABEL locksmith3com MENU LABEL Locksmith 3com KERNEL memdisk APPEND keeppxe initrd=fimages/locksmith3com.ima LABEL locksmithbroadcom MENU LABEL Locksmith Broadcom KERNEL memdisk APPEND keeppxe initrd=fimages/locksmithbroadcom.ima # LABEL locksmithmarvell # MENU LABEL Locksmith Marvell Yukon # KERNEL memdis...
2017 Nov 28
0
Failed attempts
...does get logged will likely be much more useful and indicative of a more determined attacker.? Anything that substantially increases the log's signal to noise is useful and not pointless, in my opinion. Anything that slows down the attack is even more useful. I actually have training as a locksmith, with a specialty in masterkeying systems like rotating-constant and some obscure variations of RCM (this is one of the two masterkey systems explored in the infamous (in locksmith circles) paper "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks"...
2017 Nov 27
6
Failed attempts
Pete Biggs wrote: > On Mon, 2017-11-27 at 12:10 -0500, Jerry Geis wrote: >> hi All, >> >> I happened to login to one of my servers today and saw 96000 failed >> login attempts. shown below is the address its coming from. I added it to my >> firewall to drop. >> >> Failed password for root from 123.183.209.135 port 14299 ssh2 >> >> FYI -
2015 Feb 12
8
Securing SSH wiki article outdated
Hi, just a quick note to whoever is maintaining this page: http://wiki.centos.org/HowTos/Network/SecuringSSH The procedure is missing the firewall-cmd calls necessary in EL7: firewall-cmd --add-port 2345/tcp firewall-cmd --add-port 2345/tcp --permanent Also, it may be worth mentioning that semanage is in the policycoreutils-python package, which isn?t installed by default in all stock
2015 Feb 12
8
Securing SSH wiki article outdated
Hi, just a quick note to whoever is maintaining this page: http://wiki.centos.org/HowTos/Network/SecuringSSH The procedure is missing the firewall-cmd calls necessary in EL7: firewall-cmd --add-port 2345/tcp firewall-cmd --add-port 2345/tcp --permanent Also, it may be worth mentioning that semanage is in the policycoreutils-python package, which isn?t installed by default in all stock
2012 Jan 27
0
Anyone understand this Climate Change article?
...w as I don't get that article at all. It's like written in gibberish. Can anyone please explain to me what it is about? Why am I so dumb in English.. Thanks in advance :) -------------------------------------------------------------------- x ray technician (http://xraytechnicianinfo.com/)| locksmithlittleton co (http://www.littleton-locksmith.com/)|Denver locksmith (http://www.denverlocksmiths4u.com)
2011 Jun 04
2
Run-time error '429':
I have read and read and read and cannot seem to figure this out. I am running Linux Mint 9 and trying to install a windows program that will never have a linux alternative. It is a locksmith code data base program called Code Source. Also has two accompanying programs: COA and Master King. Install requirements are simply windows 98 and newer OS according to HPC's (manufacture) website. there is a registration code that has to be put in too, but that isn't the issue. I have thr...
2017 Nov 28
4
Failed attempts
...get logged will likely be much more useful and indicative of a more determined attacker.? Anything that substantially increases the log's signal to noise is useful and not pointless, in my opinion. Anything that slows down the attack is even more useful. > > I actually have training as a locksmith, with a specialty in > masterkeying systems like rotating-constant and some obscure variations of RCM (this is one of the two masterkey systems explored in the infamous (in locksmith circles) paper "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks&quot...
1997 May 11
4
[Linux UID/GID ''Feature'']
...30). [mod: Jon Lewis <jlewis@fdt.net> reports: It doesn''t work for slackware with shadow passwords.... -- REW] David Phillips, TASC phillips@pcisys.net -----End of forwarded message----- -- Eric Augustus augustus@stic.net ----------------- If I had only known, I would have been a locksmith. -- Albert Einstein
2006 Aug 10
28
On the total nondisclosure of the 8/9/06 security vulnerability
...of locks offers a premium for dishonesty, by showing others how to be dishonest. This is a fallacy. Rogues are very keen in their profession, and know already much more than we can teach them respecting their several kinds of roguery. Rogues knew a good deal about lock-picking long before locksmiths discussed it among themselves, as they have lately done. If a lock, let it have been made in whatever country, or by whatever maker, is not so inviolable as it has hitherto been deemed to be, surely it is to the interest of honest persons to know this fact, because the dishonest are tolerably...