search for: malevol

Displaying 16 results from an estimated 16 matches for "malevol".

Did you mean: molevol
2015 Jun 28
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...he compiler >>> can figure something out that tells it that comparing those two pointers is >>> undefined by the language standard, then, well, technically it can do >>> whatever it wants. >>> >>> Many people interpret this as the compiler being somewhat malevolent, but >>> there's another interpretation in some cases. >>> >>> I have not looked in depth at the history in all the undefined behaviors >>> mentioned in the survey, but some of the undefined behaviors are there >>> because at some point in time th...
2007 Sep 06
2
FAX machine connect with audiocode SIP device
Dear all I have FAX machine connected with audiocode SIP device i am trying to send fax and when negosiation going on and i start send fax button then my after half page it got stuck in fax machine so is there any codec problem i am useing ulaw/alaw is it fine or not anybody have idea about sending fax with SIP connected device --------------------------------- Ready
2017 Feb 02
2
Serious attack vector on pkcheck ignored by Red Hat
...but I understand I'll have to take up that issue elsewhere.) We do not need the privilege escalation in the binary. The vector will make any attack way easier, including a potential privilege escalation. So by continuing to have these memory leaks in the binary you are making it easier for a malevolent local user to mount an attack that might cause the "desired" privilege escalation. But I agree that to get the more serious issue fixed I should stop talking about pkcheck.c in those bug reports ;) . Thanks for your input. Regards, Leonard. -- mount -t life -o ro /dev/dna /genetic...
2017 Aug 17
3
Detecting DoS attacks via SIP
...in the log are ONLY the ones > that Asterisk is detecting and rejecting. All other attacks aren't even > showing up! > > There's a good discussion of how to secure your PBX here: > https://www.voip-info.org/wiki/view/asterisk+security > > In general, don't let the malevolent traffic get as far as the PBX (block > at > the firewall). Also, Digium regularly warns users that fail2ban is NOT a > security system: http://forums.asterisk.org/viewtopic.php?p=159984 > > -----Original Message----- > From: asterisk-users-bounces at lists.digium.com > [mai...
2015 Jun 27
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...common computer architectures); but if the compiler > can figure something out that tells it that comparing those two pointers is > undefined by the language standard, then, well, technically it can do > whatever it wants. > > Many people interpret this as the compiler being somewhat malevolent, but > there's another interpretation in some cases. > > I have not looked in depth at the history in all the undefined behaviors > mentioned in the survey, but some of the undefined behaviors are there > because at some point in time the underlying system diversity made it &g...
2017 Feb 02
0
Serious attack vector on pkcheck ignored by Red Hat
On 02/02/2017 12:37 PM, Leonard den Ottolander wrote: > So by continuing to have these memory leaks in the binary you are making > it easier for a malevolent local user to mount an attack that might > cause the "desired" privilege escalation. I'm really struggling to explain this more simply and clearly. Privilege escalation means that the attacker gains a privilege they do not start with. Right? Escalation means that you end w...
2007 Jul 06
1
Samba 3.0.25b + Vista Printers
Hello there I've just upgraded our Samba server to 3.0.25b and am still having problems with Windows Vista clients accessing printers. XP/2000 clients continue to work fine - but Vista refuses to connect to Samba printers that have drivers hosted on the Samba server. To clarify, as part of the netlogon batch job, clients attempt to connect to Samba-hosted printer shares, and if they
2017 Aug 15
6
Detecting DoS attacks via SIP
Hi all, Lately, I've seen an increase in the number of attacks against my system from the so-called "Friendly Scanner." When one of these script kiddies targets my server, all I see for symptoms is a few of my trunks become lagged due to server load and a stream of messages on the console that resemble this: [Aug 2 20:27:50] == Using SIP VIDEO CoS mark 6 [Aug 2 20:27:50] ==
2003 Sep 11
2
Blocking spamblocked.earthlink.net
For those who don't know, Greg Houlette sent in a request from an address that doesn't conveniently accept replies. If people can't be bothered to read our replies, we shouldn't be bothered by their requests. Just a note. Maybe a request for a killfile. --Dan
2017 Feb 02
2
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 10:39 -0800, Gordon Messmer wrote: > It took me a while to find the patch that you mentioned, which is > probably why your bugs are being disregarded. It is beyond my control where patches are listed in the Red Hat bugzilla pages. I don't think the Red Hat employee involved should have a hard time finding it in my report. > Open a new bug report and focus on
2015 Jun 30
8
[LLVMdev] C as used/implemented in practice: analysis of responses
...computer architectures); but if the compiler can figure > something out that tells it that comparing those two pointers is > undefined by the language standard, then, well, technically it can > do whatever it wants. > > > Many people interpret this as the compiler being somewhat malevolent, > but there's another interpretation in some cases. > > > > I have not looked in depth at the history in all the undefined > behaviors mentioned in the survey, but some of the undefined > behaviors are there because at some point in time the underlying > system di...
2015 Jun 26
3
[LLVMdev] C as used/implemented in practice: analysis of responses
As part of a project to clarify what behaviour of C implementations is actually relied upon in modern practice, and what behaviour is guaranteed by current mainstream implementations, we recently distributed a survey of 15 questions about C, https://goo.gl/AZXH3S. We were asking what C is in current mainstream practice: the behaviour that programmers assume they can rely on, the behaviour
2015 Jul 01
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...ure > >> something out that tells it that comparing those two pointers is > >> undefined by the language standard, then, well, technically it can > >> do whatever it wants. > >> > >> > >> Many people interpret this as the compiler being somewhat malevolent, > >> but there's another interpretation in some cases. > >> > >> > >> > >> I have not looked in depth at the history in all the undefined > >> behaviors mentioned in the survey, but some of the undefined > >> behaviors are there...
2014 Oct 03
2
CentOS-docs Digest, Vol 95, Issue 2
...tomated > scripts looking for easy targets. > - changing the default port to anything above 1024 creates a greater > risk than using one below 1024 > > On the other hand, even if it's easier to start a rouge daemon > impersonating sshd to listen on a higher port, if you have a malevolent > user already sniffing on a port - any port - from my point of view you > already have bigger issues than the potential risk you mentioned. > > > Incidentally I am a fan of using iptables (recent match) to limit the > number of admissible attempts from any given IP to connect...
2009 Jan 16
16
Testing arbitrary post action parameters
I am working on our (newly renamed) authentication feature. The current scenario is: Scenario: Non-administrators should not set administrator ability Given I have no users And I add a user named "admin" as an administrator And I add a user named "myuser" as not an administrator When the user named "myuser" authenticates And the user
2000 Feb 02
0
Factor Analysis?
Hello. I have been browsing the R- manual and not seen any direct implementation of Factor analysis. Is there anyone out there who has run Factor Analysis with R? Thanks Michael -- Michael Preminger Forsker / Research Scientist Avdeling for journalistikk, bibliotek- og informasjonsfag / Faculty of Journalism, Library and Information Science H?gskolen i Oslo / Oslo College