search for: maliciously

Displaying 20 results from an estimated 1233 matches for "maliciously".

2006 Feb 08
0
possible fraud attempt and phising on my mail logs
hi guys, found this logs on my mail server about possible fraud attempt and phising. is this normal ? Found ip-based phishing fraud from 10.2.0.0 Found ip-based phishing fraud from 255.255.255.255 Found ip-based phishing fraud from 10.1.0.0 Found ip-based phishing fraud from 255.255.255.255 . MailScanner has detected a possible fraud attempt from "ee.ee.ee.ee" claiming to be
2003 Aug 12
1
Malicious Call Trace
All, Has anyone had any thoughts/discussion on providing a malicious call trace feature within Asterisk. Most legacy PBX's support this feature which allows a handset user to indicate using DTMF during a call that it's a malicious call which instructs the PBX to send a specific Q931 message over the ISDN to the providers switch telling it to log the call details as malicious for later
2007 Sep 03
3
Shorewall + IPSec: help debugging why gw1<->gw2 SA works, but loc<->gw2 traffic doesn't trigger SA
Dear list, I''m running Shorewall on a dedicated Fedora 7 box. Shorewall is working well as an office DSL router (dynamic IP) with loc and dmz zones. I am now trying to configure IPSec to connect a VPS, "casp", with a static IP to both the firewall and to the loc network behind it. The host to host SA works fine. However, pings from "loc" to "casp" can be
2019 May 20
3
Create a malicious directory
Use scripts to create some malicious directories. Here is my creation process. How can I prevent the creation of these directories? I used the python imapclient script to create a directory. There may be no big threat to dovecot, but it is dangerous for doveadm. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2006 Dec 28
1
How to add a route to a network via 2 gateways.
Hi iproute2, I have a network to reach which is 192.168.2.0/24. It is a branch of the company. I have currently added a route to that network via one gateway ( 192.168.0.254) in following way. ip route add 192.168.2.0/24 via 192.168.0.254 Now, We got another gateway which is 192.168.0.250. Now I want to add a route to the same network which is 192.168.2.0/24 via this gateway ( 192.168.0.250)
2019 Jun 25
2
Problem to join Samba 4 DC an existing Windows AD
Hai Marcio, Please keep mailing to the list, that helps everybody. ;-) Question, does the Windows AD domain contain MS Exchange also? Ow and my bad.. This : samba-tool domain tombstones expunge You need to purge the tombstones on the windows server, but forget that all. I had a new look and noticed: root at samba4dc:/etc/init.d# samba-tool domain join empresa.com.br DC
2019 Jun 27
3
Problem to join Samba 4 DC an existing Windows AD
Hai Marcio, ? I've checked the script output, that looks good. ? Just two small comments, - The hosts file, if your resolving is correctly working then you could remove the other DC's and FS from it, but it does not hurt is you keep it as is. - As long your are sure the DNS servers are ok and all needed zones are in these "proxy?dns" server. that should be fine also. ??? (
2019 Jun 27
0
Problem to join Samba 4 DC an existing Windows AD
Hi, I'm using Debian 9.9 and my DC's are Win 2008 Server (isn't R2). I intend replace my Windows DC by Samba 4 DC. Follows dependencies package that I have installed: apt-get install acl attr autoconf bind9utils bison build-essential apt-get install debhelper dnsutils docbook-xml docbook-xsl flex gdb libjansson-dev krb5-user apt-get install libacl1-dev libaio-dev libarchive-dev
2016 Feb 09
1
centos.firehosted.com / tagged as malicious
This repository has begun triggering alerts in my enterprises trend micro solution this morning. centos.firehosted.com/7.2.1511/updates/x86_64/repodata/repomd.xml Any tips on ensuring this repository is never queried by my systems ? It seems to keep getting picked up on freshly deployed vagrants for development at this time. Thanks, Corey Erickson
2013 Jan 06
1
Malicious traffic comming from 37.75.210.90
Hello Osama, and Hisham, At 1330GMT there was some malicious activity coming from your network IP 37.75.210.90. Please act accordingly. Things that may be of use "972599779558" N.
2012 Oct 26
0
Xen Security Advisory 25 (CVE-2012-4544) - Xen domain builder Out-of-memory due to malicious kernel/ramdisk
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Xen Security Advisory CVE-2012-4544 / XSA-25 Xen domain builder Out-of-memory due to malicious kernel/ramdisk ISSUE DESCRIPTION ================= The Xen PV domain builder contained no validation of the size of the supplied kernel or ramdisk either before or after decompression. This could cause the toolstack to consume all available RAM
2016 Jun 03
4
[Bug 11949] New: A malicious sender can still use symlinks to overwrite files
https://bugzilla.samba.org/show_bug.cgi?id=11949 Bug ID: 11949 Summary: A malicious sender can still use symlinks to overwrite files Product: rsync Version: 3.1.2 Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: core Assignee:
2012 Nov 13
0
Xen Security Advisory 25 (CVE-2012-4544, CVE-2012-2625) - Xen domain builder Out-of-memory due to malicious kernel/ramdisk
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Xen Security Advisory CVE-2012-4544,CVE-2012-2625 / XSA-25 version 2 Xen domain builder Out-of-memory due to malicious kernel/ramdisk UPDATES IN VERSION 2 ==================== Clarify that XSA-25 is reporting, via the Xen.org security process, both CVE-2012-4544 and CVE-2012-2625. Also we would like to
2019 May 20
0
Directory name have some malicious characters.
Directory name have some malicious characters, is it safe?How can I exclude some characters,thanks! -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://dovecot.org/pipermail/dovecot/attachments/20190520/e3ea2c53/attachment.html> -------------- next part -------------- A non-text attachment was scrubbed... Name: smiley-laughing.gif Type: image/gif
2002 Jan 01
1
Transparent bridging / smart rate limiting
I''ve decided to try to make a transparent bridge, that should drop packet''s based on some weird rules. I have googled around a bit and couldn''t find any information about what I would like to do. And therefore I now send a mail to this mailinglist in hope that someone can either help me, or point me in the right direction. What I want to do is the following: Make a
2016 Feb 02
2
Wiki Update - Aide Link
Hello All, My username is MikeThompson The link to configure Aide at the bottom of this page: https://wiki.centos.org/HowTos/OS_Protection Is dead, and says its dead, however, the old link to http://www.bofh-hunter.com/2008/04/10/centos-5-and-aide/ now redirects to a malicious website. One of my less than savvy users got his windows machine infected there last night. I'm wondering if it
2020 Feb 13
1
admin console
Good afternoon, please have a look into your MUA setup. You keep breaking threading for this thread (In-Reply-To header is set incorrectly). On Tue, 2020-02-11 at 13:40 +0000, user wrote: > > On Thu, 2020-02-06 at 19:20 +0000, user wrote: > > > 2020-01-08 09:59, Marvin Scholz wrote: > > > Expectation on malicious activity force me to put icecast behind reverse > >
2016 Apr 14
2
(rfc) too many keys, usecase?
On Thu, 14 Apr 2016, Jakub Jelen wrote: > On 04/14/2016 01:19 PM, Cristian Ionescu-Idbohrn wrote: > > There is no /root/.ssh/authorized_keys on remote host, so I have to > > authenticate with password. > > > > On the remote host: > > > > # /usr/sbin/sshd -T | egrep permitroot > > permitrootlogin yes > > > > Attempting: > > > >
2019 Jun 26
0
Problem to join Samba 4 DC an existing Windows AD
Hai,? ? ? this part. Adding CN=NTDS Settings,CN=SAMBA4DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=empresa,DC-com,DC=br DsAddEntry failed with status WERR_ACCESS_DENIED info (8363, 'WERR_DS_NO_CROSSREF_FOR_NC') Join failed - cleaning up Deleted CN=SAMBA4DC,OU=Domain Controllers,DC=empresa,DC-com,DC=br I?just noticed?the same?question, (30 may
2013 May 15
1
How to allow AMI access to Originate yet deny Application: System
While doing a security audit on a system I maintain, I stumbled upon an unvalidated use of a variable to compose an Originate request to the local Asterisk instance via AMI. Taking as an example an earlier exploit for FreePBX, I realized that this, combined with Application: System as an injected value, could allow arbitrary code execution. I am in the process of fixing all instances of this bug