Displaying 20 results from an estimated 36 matches for "perpetr".
Did you mean:
petrpetr
2008 Aug 15
3
POP3 dictionary attacks
I'm seeing strings of failed POP3 login attempts with obvious bogus
usernames coming from different IP addresses. Today's originated from
216.31.146.19 (which resolves to neovisionlabs.com). This looks like a
botnet attack. I got a similar probe a couple days ago. Is anyone else
seeing these?
The attack involves trying about 20 different names, about 3-4 seconds
apart. Here's a
2019 Oct 05
3
Differences between CentOS 7.x and CentOS 8.x OS
...ne tried using the Mate or Xfce
>> Fedora 28 spins as package sources with CentOS 8?
> I think someone did post recently that he took Mate from F28
> and with some judicious tweaking of the spec file got it built
> and working on C8. Sorry, I have no details.
>
>
Hopefully, the perpetrator will 'fess up and provide the details.
Cheers,
Dave
--
"They that can give up essential liberty to obtain a little temporary safety deserve neither safety nor liberty."
-- Benjamin Franklin
2010 Apr 17
1
Fishy error with NAMESPACE when checking package
...rt(ns, exports) :
undefined exports: pc.plot, pc.matplot
Error: package/namespace load failed for 'Epi'
I cannot seem to find any occurrence of the strings "pc.plot" and "pc.matplot" anywhere in the entire package tree.
Any idea of what goes on (and where to find the perpetrators)???
I use:
_
platform i386-pc-mingw32
arch i386
os mingw32
system i386, mingw32
status
major...
2012 Oct 17
2
CentOS 6.3 - fail2ban not working properly + workaround
...are using fail2ban to block brute force
login attempts.
Packages are from the EPEL repo, so I'm just sharing some knowledge here.
For about two months now I've had a CentOS 6.3 box (web host) in
production that occasionally is ftp brute forced.
Oddly enough fail2ban wasn't nabbing the perpetrators. I found that
the iptables chain for VSFTP isn't created for one.
I have finally come to find [0] that indicates there's a problem with
the inotify backend.
Setting backend=gamin in /etc/fail2ban/jail.conf gives me the iptables
chain I expect to find and one blocked host.
Hope this...
2012 Mar 22
2
Order of terms in formula changes aov() results
...s
manual: [...] Peter Dalgaard: 'svn blame' tells me
that this was Brian's addition in rev.35362 [...]
Brian D. Ripley: I prefer 'svn praise' myself.
Peter Dalgaard: Or 'svn annotate'. I think it
depends on what I'm looking for, plus the risk
that the author (perpetrator, contributor) might
be me... -- Tony Plate, Peter Dalgaard and
Brian D. Ripley (about a typo in the
2015 Nov 24
3
Functions have two types, one can be mutated but not the other
Function has its own FunctionType* member as well as a Type* member that it inherits from GlobalValue. The latter can be mutated but not the former, leading to potential strange inconsistencies.
While I realize using mutateType is probably going to trigger a bunch of "you're doing it wrong" replies, it seems like mutateType, as a necessary evil, should be virtual and do the right
2005 May 27
2
I never made any assumption athat anyone had any obligation to do anything
I just asked a question. If I was too vague, then i am sorry. I dont
expect anyone to help me, but I thought that it was ok to put the
question out there in case someone wanted to help me. I didnt expect
abject hostility for it. Human decency was the only thing I did expect.
If my question was a pain,badly formatted, or too juvinile, then i have
no problem being ignored.I asked a question
2001 Sep 14
1
extremly off topic I know but since it leaked into the list anyway....
...s ahead are even more ominous than
they appeared to be before the latest atrocities.
As to how to react, we have a choice. We can express justified
horror; we can seek to understand what may have
led to the crimes, which means making an effort to enter the
minds of the likely perpetrators. If we choose the
latter course, we can do no better, I think, than to listen to
the words of Robert Fisk, whose direct knowledge
and insight into affairs of the region is unmatched after many
years of distinguished reporting. Describing "The
wickedness and awesome cr...
2017 May 11
2
How to detect fake CallerID? (8xx?)
...r has access to some equipment through which they know that the call will be routed; that potentially includes your Asterisk, but any tampering there would be evident) than falsifying outgoing calls *from* a number.
It would be much more fun to mount a "sting" operation to catch the
perpetrators red-handed (say, falsely set off a fire alarm while you know they
are slacking off down the pub instead of looking after the site like they are paid for) ..... but maybe I have just been watching too many detective dramas on TV!
--
JM
Note: Originating address only accepts e-mail from...
2019 Oct 05
0
Differences between CentOS 7.x and CentOS 8.x OS
...ce
>>> Fedora 28 spins as package sources with CentOS 8?
>> I think someone did post recently that he took Mate from F28
>> and with some judicious tweaking of the spec file got it built
>> and working on C8. Sorry, I have no details.
>>
>>
> Hopefully, the perpetrator will 'fess up and provide the details.
>
> Cheers,
> Dave
>
"It is I, Leclerc"
Here is what I did to have working MATE from Fedora 28 repositories (did
not recompile anything):
https://lists.centos.org/pipermail/centos/2019-September/173533.html
--
Ljubomir Ljub...
2001 Nov 19
1
Lotus Notes under WinNT 4.0
Hello!
I'm trying to run Lotus Notes (installed on another partition,
Win NT 4.0) under SuSE Linux 7.2.
So far I got Wine release 20011108.
If I run
wine --winver nt40 --debugmsg +loaddll \\
/windows/c/Programme/Lotus/Notes/notes.exe
a Lotus opening window shows shortly and then on a mouseclick
it does nothing or produce a memory error.
It seems to have problems with ole32.dll:
2017 May 10
4
How to detect fake CallerID? (8xx?)
On Wed, 10 May 2017, J Montoya or A J Stiles wrote:
> Presumably your staff carry mobile phones. What about an app that gets
> the ID of the cell tower to which it is connected, and passes it and the
> SIM number in a HTTP request to a server you control?
The problem is that they are supposed to use the 'site landline' to
confirm presence -- not their cell phone with the
2011 May 27
1
Email spam from my account on May 26, 2011
I just discovered that some evil spammer has somehow gotten my contacts list and
used it to send out a bunch of spam. This is just to notify you that if you get
an email from me on May 26, 2011 (other than this one or one like it - the
problem was more extensive than I first thought) it wasn't from me. Please
don't add me to your spam filters. I've changed my password and
2004 May 06
1
X11 fonts cannot be loaded - SuSE Linux solution
Dear list,
I would like to make a comment how to solve the X11 font problem under
SuSE Linux (9.0) when you get the message:
"X11 font at size 16 could not be loaded".
After having modified /etc/X11/XF86config as root (see below) you have
to run 'SuSEconfig' as root as well else nothing might be changed in the
X-Server.
After that no further messages should appear.
HTH,
2019 Oct 04
2
Differences between CentOS 7.x and CentOS 8.x OS
On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote:
> On 10/3/19 5:49 PM, Kaushal Shriyan wrote:
>> Hi,
>>
>> I will appreciate it if someone can help me understand the differences
>> between CentOS 7.x and CentOS 8.x OS. I look forward to hearing from you
>> and thanks in advance.
>>
> In short, CentOS 7.x is based on Fedora 19 while CentOS 8 is based on
>
2008 Jan 03
1
The ticket clinic, What Is U.S. Copyright Law?
...oading and sharing
music or movie files can result in serious charges and fines being
brought against them. The popularity of the Internet and file sharing
software has increased copyright violations. Copyright owners are
starting to take a stand against copyright violators and are hunting
down the perpetrators. Be careful you are not overstepping your
boundaries and violating someone?s copyright law.
____________________________________________________________________________________
Be a better friend, newshound, and
know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com...
2002 Mar 12
0
Heineken Face EU Fines for Curbing Rivalry
...yal Grolsch NV of the Netherlands and Birra Peroni of Italy.
Probes of brewers in France, the Netherlands and Portugal are continuing, the commission said without naming the companies.
Unlike in the U.S., there are no provisions under EU law for victims of a cartel to obtain damages, or for the perpetrators to face criminal proceedings.
(Bloomberg, 1/3/2002)
Heineken:
http://www.transnationale.org/anglais/fiches/1129260919.htm
Carlsberg profile:
http://www.transnationale.org/anglais/fiches/963367045.Htm
Interbrew:
http://www.transnationale.org/anglais/fiches/1032529250.htm
The transnational...
2001 Sep 14
2
[Fwd: Bush's Press Conference: Into the Abyss]
...president, "all democratic and freedom-loving people" - no other of whom, it
> should be noted, seems to be on the alleged hit list of Mr. bin Laden.
>
> Furthermore, and ominously, Bush threatens not only to attack - recall this
> is in his words a state of war - the actual perpetrators of yesterday's
> attacks (whomever they may be), but "their harbors." Not those who allegedly
> harbor them, but their harbors.
>
> To be consistent, which is to say honest, Bush, as his legion of intelligence
> operatives could readily tell him, would have to ide...
2015 Oct 16
2
[cfe-dev] Buildbot Noise
On 16 October 2015 at 15:17, Robinson, Paul
<Paul_Robinson at playstation.sony.com> wrote:
> But if
> there are new fails, the blame mailer can do a set-difference and report
> only the new ones. That would reduce the noise a bit, hmm?
Hi Paul,
The danger there is that it'd be easier to "get used" to having some
failures as long as you don't have "new"
1999 Nov 27
1
Re: Programming ...
...om being taken
advantage of.
Most often, hackers get in through several simple ways:
1. Programs put data in local variables in functions. These variables
are on the computer stack. Feeding data to those variables (usually
string variables) causes the stack to be corrupt. Most often the
perpetrator will put code into the string buffer and put the return
address of the code in the string buffer into the correct location in the
stack. When the program exits, it does a return from subroutine call into
the code the perp placed there. Instant access as the user that runs the
daemon, running an...