search for: perpetr

Displaying 20 results from an estimated 36 matches for "perpetr".

Did you mean: petrpetr
2008 Aug 15
3
POP3 dictionary attacks
I'm seeing strings of failed POP3 login attempts with obvious bogus usernames coming from different IP addresses. Today's originated from 216.31.146.19 (which resolves to neovisionlabs.com). This looks like a botnet attack. I got a similar probe a couple days ago. Is anyone else seeing these? The attack involves trying about 20 different names, about 3-4 seconds apart. Here's a
2019 Oct 05
3
Differences between CentOS 7.x and CentOS 8.x OS
...ne tried using the Mate or Xfce >> Fedora 28 spins as package sources with CentOS 8? > I think someone did post recently that he took Mate from F28 > and with some judicious tweaking of the spec file got it built > and working on C8. Sorry, I have no details. > > Hopefully, the perpetrator will 'fess up and provide the details. Cheers, Dave -- "They that can give up essential liberty to obtain a little temporary safety deserve neither safety nor liberty." -- Benjamin Franklin
2010 Apr 17
1
Fishy error with NAMESPACE when checking package
...rt(ns, exports) : undefined exports: pc.plot, pc.matplot Error: package/namespace load failed for 'Epi' I cannot seem to find any occurrence of the strings "pc.plot" and "pc.matplot" anywhere in the entire package tree. Any idea of what goes on (and where to find the perpetrators)??? I use: _ platform i386-pc-mingw32 arch i386 os mingw32 system i386, mingw32 status major...
2012 Oct 17
2
CentOS 6.3 - fail2ban not working properly + workaround
...are using fail2ban to block brute force login attempts. Packages are from the EPEL repo, so I'm just sharing some knowledge here. For about two months now I've had a CentOS 6.3 box (web host) in production that occasionally is ftp brute forced. Oddly enough fail2ban wasn't nabbing the perpetrators. I found that the iptables chain for VSFTP isn't created for one. I have finally come to find [0] that indicates there's a problem with the inotify backend. Setting backend=gamin in /etc/fail2ban/jail.conf gives me the iptables chain I expect to find and one blocked host. Hope this...
2012 Mar 22
2
Order of terms in formula changes aov() results
...s manual: [...] Peter Dalgaard: 'svn blame' tells me that this was Brian's addition in rev.35362 [...] Brian D. Ripley: I prefer 'svn praise' myself. Peter Dalgaard: Or 'svn annotate'. I think it depends on what I'm looking for, plus the risk that the author (perpetrator, contributor) might be me... -- Tony Plate, Peter Dalgaard and Brian D. Ripley (about a typo in the
2015 Nov 24
3
Functions have two types, one can be mutated but not the other
Function has its own FunctionType* member as well as a Type* member that it inherits from GlobalValue. The latter can be mutated but not the former, leading to potential strange inconsistencies. While I realize using mutateType is probably going to trigger a bunch of "you're doing it wrong" replies, it seems like mutateType, as a necessary evil, should be virtual and do the right
2005 May 27
2
I never made any assumption athat anyone had any obligation to do anything
I just asked a question. If I was too vague, then i am sorry. I dont expect anyone to help me, but I thought that it was ok to put the question out there in case someone wanted to help me. I didnt expect abject hostility for it. Human decency was the only thing I did expect. If my question was a pain,badly formatted, or too juvinile, then i have no problem being ignored.I asked a question
2001 Sep 14
1
extremly off topic I know but since it leaked into the list anyway....
...s ahead are even more ominous than they appeared to be before the latest atrocities. As to how to react, we have a choice. We can express justified horror; we can seek to understand what may have led to the crimes, which means making an effort to enter the minds of the likely perpetrators. If we choose the latter course, we can do no better, I think, than to listen to the words of Robert Fisk, whose direct knowledge and insight into affairs of the region is unmatched after many years of distinguished reporting. Describing "The wickedness and awesome cr...
2017 May 11
2
How to detect fake CallerID? (8xx?)
...r has access to some equipment through which they know that the call will be routed; that potentially includes your Asterisk, but any tampering there would be evident) than falsifying outgoing calls *from* a number. It would be much more fun to mount a "sting" operation to catch the perpetrators red-handed (say, falsely set off a fire alarm while you know they are slacking off down the pub instead of looking after the site like they are paid for) ..... but maybe I have just been watching too many detective dramas on TV! -- JM Note: Originating address only accepts e-mail from...
2019 Oct 05
0
Differences between CentOS 7.x and CentOS 8.x OS
...ce >>> Fedora 28 spins as package sources with CentOS 8? >> I think someone did post recently that he took Mate from F28 >> and with some judicious tweaking of the spec file got it built >> and working on C8. Sorry, I have no details. >> >> > Hopefully, the perpetrator will 'fess up and provide the details. > > Cheers, > Dave > "It is I, Leclerc" Here is what I did to have working MATE from Fedora 28 repositories (did not recompile anything): https://lists.centos.org/pipermail/centos/2019-September/173533.html -- Ljubomir Ljub...
2001 Nov 19
1
Lotus Notes under WinNT 4.0
Hello! I'm trying to run Lotus Notes (installed on another partition, Win NT 4.0) under SuSE Linux 7.2. So far I got Wine release 20011108. If I run wine --winver nt40 --debugmsg +loaddll \\ /windows/c/Programme/Lotus/Notes/notes.exe a Lotus opening window shows shortly and then on a mouseclick it does nothing or produce a memory error. It seems to have problems with ole32.dll:
2017 May 10
4
How to detect fake CallerID? (8xx?)
On Wed, 10 May 2017, J Montoya or A J Stiles wrote: > Presumably your staff carry mobile phones. What about an app that gets > the ID of the cell tower to which it is connected, and passes it and the > SIM number in a HTTP request to a server you control? The problem is that they are supposed to use the 'site landline' to confirm presence -- not their cell phone with the
2011 May 27
1
Email spam from my account on May 26, 2011
I just discovered that some evil spammer has somehow gotten my contacts list and used it to send out a bunch of spam. This is just to notify you that if you get an email from me on May 26, 2011 (other than this one or one like it - the problem was more extensive than I first thought) it wasn't from me. Please don't add me to your spam filters. I've changed my password and
2004 May 06
1
X11 fonts cannot be loaded - SuSE Linux solution
Dear list, I would like to make a comment how to solve the X11 font problem under SuSE Linux (9.0) when you get the message: "X11 font at size 16 could not be loaded". After having modified /etc/X11/XF86config as root (see below) you have to run 'SuSEconfig' as root as well else nothing might be changed in the X-Server. After that no further messages should appear. HTH,
2019 Oct 04
2
Differences between CentOS 7.x and CentOS 8.x OS
On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: > On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >> Hi, >> >> I will appreciate it if someone can help me understand the differences >> between CentOS 7.x and CentOS 8.x OS. I look forward to hearing from you >> and thanks in advance. >> > In short, CentOS 7.x is based on Fedora 19 while CentOS 8 is based on >
2008 Jan 03
1
The ticket clinic, What Is U.S. Copyright Law?
...oading and sharing music or movie files can result in serious charges and fines being brought against them. The popularity of the Internet and file sharing software has increased copyright violations. Copyright owners are starting to take a stand against copyright violators and are hunting down the perpetrators. Be careful you are not overstepping your boundaries and violating someone?s copyright law. ____________________________________________________________________________________ Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com...
2002 Mar 12
0
Heineken Face EU Fines for Curbing Rivalry
...yal Grolsch NV of the Netherlands and Birra Peroni of Italy. Probes of brewers in France, the Netherlands and Portugal are continuing, the commission said without naming the companies. Unlike in the U.S., there are no provisions under EU law for victims of a cartel to obtain damages, or for the perpetrators to face criminal proceedings. (Bloomberg, 1/3/2002) Heineken: http://www.transnationale.org/anglais/fiches/1129260919.htm Carlsberg profile: http://www.transnationale.org/anglais/fiches/963367045.Htm Interbrew: http://www.transnationale.org/anglais/fiches/1032529250.htm The transnational...
2001 Sep 14
2
[Fwd: Bush's Press Conference: Into the Abyss]
...president, "all democratic and freedom-loving people" - no other of whom, it > should be noted, seems to be on the alleged hit list of Mr. bin Laden. > > Furthermore, and ominously, Bush threatens not only to attack - recall this > is in his words a state of war - the actual perpetrators of yesterday's > attacks (whomever they may be), but "their harbors." Not those who allegedly > harbor them, but their harbors. > > To be consistent, which is to say honest, Bush, as his legion of intelligence > operatives could readily tell him, would have to ide...
2015 Oct 16
2
[cfe-dev] Buildbot Noise
On 16 October 2015 at 15:17, Robinson, Paul <Paul_Robinson at playstation.sony.com> wrote: > But if > there are new fails, the blame mailer can do a set-difference and report > only the new ones. That would reduce the noise a bit, hmm? Hi Paul, The danger there is that it'd be easier to "get used" to having some failures as long as you don't have "new"
1999 Nov 27
1
Re: Programming ...
...om being taken advantage of. Most often, hackers get in through several simple ways: 1. Programs put data in local variables in functions. These variables are on the computer stack. Feeding data to those variables (usually string variables) causes the stack to be corrupt. Most often the perpetrator will put code into the string buffer and put the return address of the code in the string buffer into the correct location in the stack. When the program exits, it does a return from subroutine call into the code the perp placed there. Instant access as the user that runs the daemon, running an...