search for: penetr

Displaying 20 results from an estimated 200 matches for "penetr".

Did you mean: penetra
2013 Mar 21
7
Is it fine to upgrade to Centos 6 rpms, being at centos 5.8
Hi, I'm currently at CentOS 5.8. After some penetration testing, found some high severity OpenSSH issues which would require its upgrade. But till CentOS 5.9 the latest rpm available is openssh-4.3p2-82.el5 (which I'm currently using). Is it fine to upgrade to CentOS 6 rpms while I'm on CentOS 5? Thanks, Anumeha
2004 Apr 19
11
Size of R user base
...figures for other R books, as it appears that publishers are closed-mouthed about such figures. And no, I can't reveal which particular book this was, so don't ask.) Conclusion: Very few books sell to more than 12% of the population of potential buyers, and most books have a far lower penetration -- 1% or less is not uncommon. A 12% penetration for the book in question implies 42,000 R users; a more reasonable 5% penetration implies 100,000 users. A low 1% penetration implies 500,000 users. 3. There are a total of 3225 unique subscribers to the three R mailing lists.
2009 Oct 17
5
Calling all Hackers
Hey guys. I have a server that is owned by me and can confirm through servint that it is owned by me. I would like to do a penetration test and of course to allow you to upload files on the server and kind of trash it to the point where it is always restarting and running out of memory etc etc. This is going to be mainly script kiddie stuff, however will be able to get you hired on with me for some other jobs that are invovl...
2008 Oct 10
0
[LLVMdev] 2.4 Pre-release (v1) Available for Testing
...system TODO, but so far I'm a bit > skeptic about LLVM relevance on the non-Unix world. The Windows build > can be broken for a long period before anyone notices. The VS2003 > support is broken since a long time ago and, apart from myself, no > other > user cares. Seems that LLVM penetration on Windows, for instance, is > almost nil. Is it really worth the trouble to support things like > testing on systems that almost nobody (wants to) use?. > > -- > Oscar I, for one, hugely appreciate your effort and the CMake build files. My primary target is the Windows platfo...
2015 Jun 10
2
Am I cracked?
...ck if my Asterisk is an "Open > Relay" that accept connections from every peer? Someone on this list is bound to have the wherewithal to be able to do that. All they will need to know is the IP address of your Asterisk server. I suggest that if anyone offers to help you by remotely penetration-testing your system, you post "on-list" that you'll contact them "off-list" to give them the server IP. That way, everyone gets to know that a deal has been established, but only the directly-concerned parties have all the necessary information. -- AJS Note: Or...
2016 Jan 22
2
How to get UEFI setting by shell?
...level access to the OS, so thats nothing new. Most all servers I run have remote KVM via IPMI, or are VM's, so this can be done without physical presence, unless somehow mokutil disables KVM (keyboard/video/mouse, not kernel virtualization) AND refuses to run in a VM. Sure, if someone has penetrated my IPMI and/or virtualization management, I'm already in a world of hurt, but no physical presence is required. -- john r pierce, recycling bits in santa cruz
2006 Jun 30
2
Rails Powers #1 Selling Album Site
...runs on Rails and PostgreSQL. Right now it is FCGI based but we''re moving to Apache+Mongrel next week. It is looking like they are going to have the #1 selling album in the country this week with Dashboard Confessional''s new record. Just a note to let people know that Rails has penetrated Billboard!
2008 Oct 10
8
[LLVMdev] 2.4 Pre-release (v1) Available for Testing
...d that to my CMake build system TODO, but so far I'm a bit skeptic about LLVM relevance on the non-Unix world. The Windows build can be broken for a long period before anyone notices. The VS2003 support is broken since a long time ago and, apart from myself, no other user cares. Seems that LLVM penetration on Windows, for instance, is almost nil. Is it really worth the trouble to support things like testing on systems that almost nobody (wants to) use?. -- Oscar
2006 Jun 12
6
Changing from dynamic ip to static ip
Hello, I have been on a dynamic ip for about 5 years and have just upgraded to a static ip. I know I need to change my network setup on my eth0 nic to static and stop ddclient from trying to update my address but is there _really_ anything else I need to change. I have a couple of websites on this address using *:80 in my httpd.conf. I can easily change this but don't think it would really
2015 Feb 03
6
Another Fedora decision
OK, folks. You're doing a great job of describing the current milieu with a rough description of some best practices. Now how about some specific sources you personally used to learn your craft that we can use likewise? PatrickD
2015 Feb 03
0
Another Fedora decision
...ed up, you can even do courses with SANS. Reading about the security infrastructure that you are already using is a good idea, often accessible via mysterious things called "man pages". I learned a lot simply by reading about pam, iptables, and selinux. Thinking about you systems from a penetration testing perspective can be helpful. For example, "Always Learning" has just told us that he uses single character root passwords on his testing machines, that he is testing 7 days a week and does not turn off his test machines. A pen tester or cracker could use that information to...
2015 Feb 04
1
Another Fedora decision
On Tue, 2015-02-03 at 15:02 +1100, Kahlil Hodgson wrote: > Thinking about you systems from a penetration testing perspective can > be helpful. For example, "Always Learning" has just told us that he > uses single character root passwords on his testing machines, that he > is testing 7 days a week and does not turn off his test machines. Yes single character. Writing and testi...
2010 Jan 02
1
Boxplot- change the vertical line from dash to solid
Dear, I am a newbie to R. Now I am learning to draw boxplot using graphics(). I want to change the vertical line penetrating the box from dashed line to solid line Please kindly share the command and thank you. Elaine [[alternative HTML version deleted]]
2005 Sep 19
0
RUXCON 2005 Update
...speakers list is complete [1] and our timetable has been finalised [2]. Below is a list of presentations for RUXCON 2005 (in order of acceptance): 1. Breaking Mac OSX - Ilja Van Sprundel & Neil Archibald 2. Binary protection schemes - Andrew Griffiths 3. Using OWASP Guide 2.0 for Deep Penetration Testing - Andrew van der Stock 4. Black Box Web Application Penetration Testing - David Jorm 5. Long Filename, Long Parameter, Malformed Data. Another Day, Another Vulnerability. Same Bug, Different App. - Brett Moore 6. Computer Forensics: Practise and Procedure - Adam Daniel 7. P...
2004 Sep 04
2
Demo of using Theora under Windows
...as anyone made a webpage with a link to a theora-file that automatically (or with a few clicks on Accept/OK) installs the needed codecs on a unmodified Windows machine? (The links to theora-files on www.theora.org does not do this, which is a shame). I am afraid if this is not possible to do, then penetrating the Windows-segement will be very hard indeed. /Ole
2004 Jul 22
2
Nortel SL1 protocol and *?
...e the SL1 protocol. Does anyone have any more information on the SL1 protocol? I don't expect * to support it currently but I'm more interested in investigating what is required. I think that allowing * to play with these systems nicely will go a LONG way in furthering Asterisk's penetration into the small/mid business market. Aside: Since we moved to the new building (and * is handling all calls and faxes for us) our * system has handled over 11500 calls. That's over 5500 calls a month, incoming, outgoing and faxes. Not a bad start. :-) -A.
2004 Aug 10
2
WiFi phone radiation regulation?
...arket Cisco, WiSIP, Zyxel are all rated at 10mW. I'm not really sure if I want to stick something with that power to my ear. Assuming a reasonable antenna gain of 2.2dBi, we're talking about 22.2dBm - that's nearly 200mW of power radiating out of the phone. At 2.4GHz, it has higher penetration power than cells phones. My question: Does anyone know if cell phone SAR rules apply to WiFi phones as well? Over here in Singapore, there seems to be a loophole. As long as your equipment is in 2.4GHz, approval is not required if Tx power is <200mW.
2008 Jan 27
3
WPA question
...;ll work on any ole machine. Nor do I know what is involved in making it happen. Clues would be appreciated. Thanks! -- ---- Fred Smith -- fredex at fcshome.stoneham.ma.us ----------------------------- "For the word of God is living and active. Sharper than any double-edged sword, it penetrates even to dividing soul and spirit, joints and marrow; it judges the thoughts and attitudes of the heart." ---------------------------- Hebrews 4:12 (niv) ------------------------------ -------------- next part -------------- A non-text attachment was scrubbed... Name: not a...
2018 Dec 17
2
A question about why the function "recv" return 0
I am a website developer. We deploy a Nginx server on centos to provide HTTP services. Recently, some customers of our website were complaining about that occasionally they could not open the webpage, the web browser show that the tcp connection was reset. I checked the Nginx logs and source code and found that the function "recv" return 0 when some customers made HTTP requests. Our
2016 Jun 17
1
https and self signed
...term expiry date set. People are careless. And their motivations are subject to change. So having a guillotine date on a personal certificate makes sense from an administrative standpoint. One wants to fail safe. But modifying certificates on sealed servers?. Really, unless one has evidence of penetration and theft of the key store, what possible benefit accrues from changing secured device keys on a frequent basis? We mainly use 4096bit keys which will be secure from brute force until the advent of Quantum computing. At which point brute force attacks will become a pointless worry. Not becau...