Displaying 20 results from an estimated 22 matches for "miscreant".
Did you mean:
miscreants
2015 Oct 08
2
Sernet 4.3.X package is no longer free :/
...strator]@[ROVER]
This latter string (with no timestamp, making it hard to find/correlate) does
give the hostname of the offending computer, but not the IP. Yes, the IP would
be very useful. In this case ROVER is my personal laptop, but all it gives me is
the hostname. The IP would indicate if the miscreant was connecting from inside the
domain (probably OK), or outside the domain (probably very bad). An IP would
also give us a clue as to which IP[range] to firewall if needed.
--Mark
-----Original Message-----
> To: samba at lists.samba.org
> From: mourik jan heupink <heupink at merit.unu.e...
2009 Sep 14
1
time variable throttling rsync traffic
I am using rsync to back up across a VPN. Unfortunately, every so often the
home office miscreants drop a big block of data into the backup and that
particular backup cycle takes many hours. These same people also complain when
net pipe is filled during the day.
What I need is an ability to change the bwlimit based on time of day. Any
suggestions as to how to do this?
2015 Jan 29
2
Investigating international calls fraud
...seems quite steep to me.
Since the Mitel had a default admin password, it seems possible that
somebody accessed its UI over the network, and then accessed and
copied its SIP credentials for your Asterisk server.
If that's the case, the calls might not have been placed through
the phone. The miscreant could have configured the purloined
credentials into another hardphone, or a softphone app on any
PC or tablet or cellphone which was able to access your LAN.
The "cloned" phone would not have needed to actually register
with Asterisk... it could simply have send an INVITE to place
a call...
2010 Dec 09
4
Asterisk SIP attacks and sshguard
...igh-performance compiled C application that can run
off a log file or a pipe from syslogd to sshguard, meaning that it
can respond a lot more quickly than once a minute, and works with
very modest overhead on the host system. It also has features such
as touchiness, so that it can get tougher on a miscreant as time goes
on; my own shell script is naive in that once it passes a threshold,
there's just a permanent rule generated. This worries me if I ever
have a situation where a legitimate remote client gets messed up and
tries the wrong password or something like that; sshguard does a much
nicer...
2007 Oct 14
4
flac fingerprint
hi,
i found this explanation of the flac fingerprint somewhere:
'A FLAC Fingerprint is generated only for the audio data portion of
the file. (Therefore, changing the filename or the tags or
FlacMetadata does not change the fingerprint calculation.) In
contrast, an .md5 is generated against the whole file, including
header portions.'
so i was wondering what advantages it could give me
2017 Oct 27
2
[fdo] Freedesktop sdk aka 'tiny base runtime' project
...aintenance effort (1-2 branches at
a time).
## Code of Conduct
We've discussed a simple but effective code of conduct, along the lines
of: use common sense: don't abuse others and don't misbehave. When
anyone does, folk should tell the mergers, who will be generally annoyed
at the miscreants, and may take actions.
OK, so I think this covers all the initial important points, if I've
missed anything then please feel free to add that.
Thanks,
Laurence
[1] https://gitlab.com/freedesktop-sdk/freedesktop-sdk
[2] https://gitlab.com/freedesktop-sdk/freedesktop-sdk/tree/test-conversio...
2004 Sep 29
5
Kernel-loadable Root Kits
...thing, but can be a pain to do upgrades around
remotely. [A lot of folks use FreeBSD simply because its a breeze to run
remotely].
3) Until someone writes code to add modules to a kernel via /dev/mem and
releases it to the script kiddie world, the bar has been effectively
raised for 99% of the miscreants out there.
4) Marketing-wise, it will make folks who don't understand the issues
very deeply more comfortable. And as in #3, that is probably a 99%
accurate feeling.
5) For those of us using automatic updating systems, having modules and
kernels out of sync is bad potentially, so NO_KLD h...
2005 Jan 11
0
shorewall iprange tweak
I often find myself doing,
whois some.damned.ip.address
and then copying and pasting the address range for
the miscreant in question, and doing,
shorewall iprange x.x.x.x-y.y.y.y
with the aim to drop the entire range.
My one minor complaint is that I often have to edit out
the spaces between the hyphen when copying and pasting
the address range returned by whois. I tweaked the shorewall
script to avoid this by ch...
2015 Oct 08
0
Sernet 4.3.X package is no longer free :/
...t; This latter string (with no timestamp, making it hard to find/correlate) does
> give the hostname of the offending computer, but not the IP. Yes, the IP would
> be very useful. In this case ROVER is my personal laptop, but all it gives me is
> the hostname. The IP would indicate if the miscreant was connecting from inside the
> domain (probably OK), or outside the domain (probably very bad). An IP would
> also give us a clue as to which IP[range] to firewall if needed.
>
> --Mark
Yes, agreed. However, for many of the failed logins I see
[username]@[(null)]
I'm guessing t...
2007 Oct 14
0
Re: flac fingerprint
...f
you also certify that internally stored fingerprint against a list of
correct fingerprints in another file, then you know you have a properly
encoded .flac file of the *right* audio, and that the person who sent
you the .flac files didn't accidentally provide a wrong file instead.
Yes, a miscreant who would intentionally switch .flac files on you would
also alter the .ffp file to show the fingerprint of the wrong file
instead of the right one, but that could not happen by accident.
Sending a set of .flac files with an .ffp file says, "I wouldn't
deliberately deceive you"; s...
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
...xus host before it can chew up
yet more bandwidth.
The right answer might involve having the portable tunneling host inform
the nexus host that an attack was forwarded on a particular port at a
particular time. Then the nexus host, having kept a lot of records of
such things, would look up the miscreant IP on that basis, add it to the
banned ipset, and the attack would stop. Sounds inelegant and perhaps
dangerous.
Thoughts?
2015 Jan 29
0
Investigating international calls fraud
...a seems quite steep to me.
Since the Mitel had a default admin password, it seems possible that
somebody accessed its UI over the network, and then accessed and copied its
SIP credentials for your Asterisk server.
If that's the case, the calls might not have been placed through the phone.
The miscreant could have configured the purloined credentials into another
hardphone, or a softphone app on any PC or tablet or cellphone which was
able to access your LAN.
The "cloned" phone would not have needed to actually register with
Asterisk... it could simply have send an INVITE to place a call...
2007 Apr 18
0
Samba / Winbind / LDAP - Can't access shares
...eachers
invalid users = +BGS\pupils
create mask = 0660
directory mask = 770
force user = %U
force group = %G
[pupils]
comment = Shared Directory for Pupils
path = /share/pupils
browseable = yes
read list = +"BGS\Domain Admins" +BGS\"Domain Users" +BGS\pupils
+BGS\teachers +BGS\miscreants
write list = +"BGS\Domain Admins" +BGS\"Domain Users" +BGS\pupils
+BGS\teachers +BGS\miscreants
create mask = 660
directory mask =770
force user = %U
force group = +BGS\teachers
veto files =
/*.exe/*.mp3/*.scr/*.vbs/*.asf/*.wma/*.wmv/*.mp4/*.mpg/*.mpeg/*.ra/*.ram/*.bas/*.bat/...
2015 Jan 29
1
Investigating international calls fraud
...gt; Since the Mitel had a default admin password, it seems possible that
> somebody accessed its UI over the network, and then accessed and copied its
> SIP credentials for your Asterisk server.
>
> If that's the case, the calls might not have been placed through the phone.
> The miscreant could have configured the purloined credentials into another
> hardphone, or a softphone app on any PC or tablet or cellphone which was
> able to access your LAN.
> The "cloned" phone would not have needed to actually register with
> Asterisk... it could simply have send an IN...
2007 Oct 17
2
Re: flac fingerprint
...hat internally stored fingerprint against a list of
> correct fingerprints in another file, then you know you have a properly
> encoded .flac file of the *right* audio, and that the person who sent
> you the .flac files didn't accidentally provide a wrong file instead.
>
> Yes, a miscreant who would intentionally switch .flac files on you would
> also alter the .ffp file to show the fingerprint of the wrong file
> instead of the right one, but that could not happen by accident.
> Sending a set of .flac files with an .ffp file says, "I wouldn't
> deliberately dece...
2008 Dec 12
5
Source patches from Apple
Hello Dovecot developers,
Apple has made and tested significant changes to Dovecot v1.1 and now
is ready to contribute them back to your open source project. The
changes include:
Scalability and performance:
allow pop/imap mail processes to handle multiple clients
larger listen queues
Stability and maintenance:
fix to allow cross-compilation
workarounds for Mac OS X bugs
a couple general
2013 Oct 04
4
fail2ban
For dovecot 2.1
as per wiki2, is this still valid? noticed a problem before and saw
it does seem to be triggering, I use:
maxretry = 6
findtime = 600
bantime = 3600
and there was like, 2400 hits in 4 minutes, it is pointing to the
correct log file, but I am no expert with fail2ban, so not sure if the
log format of today is compatible with the wiki2 entry
filter.d/dovecot.conf
[Definition]
2000 Jan 20
1
Unsupported Printers - just "sticks" in the lpd queue ;(
...d the lpd man pages, the Printing-HOWTO (at
http://metalab.unc.edu/pub/Linux/docs/HOWTO/Printing-HOWTO) as well as
other web resources and have tried the various suggestions, but I'm
confounded as to why this isn't working.
I'm going to be working on other printers tomorrow including a miscreant
Fuji-Xerox Laser Press 4300, an Epson LP-8600F, and a Xerox Docu-Color
1250, all guaranteed to thoroughly test my patience.
So I'm hoping somebody will provide me a solution while I sleep
tonight. ;-)
- --------------< LINUX: The choice of a GNU generation. >--------------
Steve Frampt...
2008 Feb 06
2
[PATCH] Out-of-band challenge (OBC) authentication method
This patch (https://bugzilla.mindrot.org/show_bug.cgi?id=1438) creates a
kbdint device that provides a server-based authentication mechanism. The
server generates and emails you a random string when you attempt to
login. You're authenticated if you can correctly answer the challenge.
You can use a regular email account, a pager, cell phone or other email
capable device to receive the
2010 Feb 22
6
Augeas type: Removing an entry from /etc/hosts
...ies in the /etc/hosts file like this:
127.0.1.1 hostname
We would like to remove these lines. Now I know this can be done with a
simple exec of sed but if possible I would like to use it as a good test
exercise with Augeas. Now, it''s pretty easy to do this with augtool, as
follows:
root@miscreant:/home/pre500# augtool
augtool> match /files/etc/hosts/*/ipaddr 127.0.1.1
/files/etc/hosts/4/ipaddr
augtool> rm /files/etc/hosts/4
rm : /files/etc/hosts/4 3
augtool> save
Saved 1 file(s)
But I can''t see how this would translate to work in Puppet as I need to
match the relevant pat...