search for: perpetrated

Displaying 20 results from an estimated 36 matches for "perpetrated".

2008 Aug 15
3
POP3 dictionary attacks
I'm seeing strings of failed POP3 login attempts with obvious bogus usernames coming from different IP addresses. Today's originated from 216.31.146.19 (which resolves to neovisionlabs.com). This looks like a botnet attack. I got a similar probe a couple days ago. Is anyone else seeing these? The attack involves trying about 20 different names, about 3-4 seconds apart. Here's a
2019 Oct 05
3
Differences between CentOS 7.x and CentOS 8.x OS
On 10/4/19 6:59 PM, Fred Smith wrote: > On Fri, Oct 04, 2019 at 04:52:28PM -0600, David G. Miller wrote: >> On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: >>> On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >>>> Hi, >>>> >>>> I will appreciate it if someone can help me understand the differences >>>> between CentOS 7.x and CentOS 8.x OS.
2010 Apr 17
1
Fishy error with NAMESPACE when checking package
I am updating the Epi package. I added functions named pc.points and pc.matpoints. Erroneously I wrote pc.plot and pc.matplot in the NAMESPACE file and of course got an error from Rcmd check. So I corrected the NAMESPACE file, but I still get from r-check: * install options are ' --no-html' Loading required package: utils Error in namespaceExport(ns, exports) : undefined exports:
2012 Oct 17
2
CentOS 6.3 - fail2ban not working properly + workaround
I recall others on this list are using fail2ban to block brute force login attempts. Packages are from the EPEL repo, so I'm just sharing some knowledge here. For about two months now I've had a CentOS 6.3 box (web host) in production that occasionally is ftp brute forced. Oddly enough fail2ban wasn't nabbing the perpetrators. I found that the iptables chain for VSFTP isn't
2012 Mar 22
2
Order of terms in formula changes aov() results
Hello, This one is very perplexing. I have teacher observation data, with factors teacher ID, observer ID, component, grade and subject. When I do this, aov(data=ratings.prin.22, rating ~ obsid.f + tid.f + subject.f + grade.f + comp.f) I get this: Terms: obsid.f tid.f grade.f comp.f Residuals Sum of Squares 306.23399 221.38173 1.70000 14.52831 279.05780 Deg. of
2015 Nov 24
3
Functions have two types, one can be mutated but not the other
Function has its own FunctionType* member as well as a Type* member that it inherits from GlobalValue. The latter can be mutated but not the former, leading to potential strange inconsistencies. While I realize using mutateType is probably going to trigger a bunch of "you're doing it wrong" replies, it seems like mutateType, as a necessary evil, should be virtual and do the right
2005 May 27
2
I never made any assumption athat anyone had any obligation to do anything
I just asked a question. If I was too vague, then i am sorry. I dont expect anyone to help me, but I thought that it was ok to put the question out there in case someone wanted to help me. I didnt expect abject hostility for it. Human decency was the only thing I did expect. If my question was a pain,badly formatted, or too juvinile, then i have no problem being ignored.I asked a question
2001 Sep 14
1
extremly off topic I know but since it leaked into the list anyway....
On the Bombings Noam Chomsky The terrorist attacks were major atrocities. In scale they may not reach the level of many others, for example, Clinton's bombing of the Sudan with no credible pretext, destroying half its pharmaceutical supplies and killing
2017 May 11
2
How to detect fake CallerID? (8xx?)
Seems like this is the best idea (challenge-response), a callback. No matter the callerid, you don't know where the caller is. But if you place a call BACK to the callerid, it's going to go to the destination. Then you either need the phone to be answered, or the phone to be answered and and the challenge entered. Adam Goldberg AGP, LLC +1-202-507-9900 -----Original Message-----
2019 Oct 05
0
Differences between CentOS 7.x and CentOS 8.x OS
On 10/5/19 3:14 AM, David G. Miller wrote: > On 10/4/19 6:59 PM, Fred Smith wrote: >> On Fri, Oct 04, 2019 at 04:52:28PM -0600, David G. Miller wrote: >>> On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: >>>> On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >>>>> Hi, >>>>> >>>>> I will appreciate it if someone can help me
2001 Nov 19
1
Lotus Notes under WinNT 4.0
Hello! I'm trying to run Lotus Notes (installed on another partition, Win NT 4.0) under SuSE Linux 7.2. So far I got Wine release 20011108. If I run wine --winver nt40 --debugmsg +loaddll \\ /windows/c/Programme/Lotus/Notes/notes.exe a Lotus opening window shows shortly and then on a mouseclick it does nothing or produce a memory error. It seems to have problems with ole32.dll:
2017 May 10
4
How to detect fake CallerID? (8xx?)
On Wed, 10 May 2017, J Montoya or A J Stiles wrote: > Presumably your staff carry mobile phones. What about an app that gets > the ID of the cell tower to which it is connected, and passes it and the > SIM number in a HTTP request to a server you control? The problem is that they are supposed to use the 'site landline' to confirm presence -- not their cell phone with the
2011 May 27
1
Email spam from my account on May 26, 2011
I just discovered that some evil spammer has somehow gotten my contacts list and used it to send out a bunch of spam. This is just to notify you that if you get an email from me on May 26, 2011 (other than this one or one like it - the problem was more extensive than I first thought) it wasn't from me. Please don't add me to your spam filters. I've changed my password and
2004 May 06
1
X11 fonts cannot be loaded - SuSE Linux solution
Dear list, I would like to make a comment how to solve the X11 font problem under SuSE Linux (9.0) when you get the message: "X11 font at size 16 could not be loaded". After having modified /etc/X11/XF86config as root (see below) you have to run 'SuSEconfig' as root as well else nothing might be changed in the X-Server. After that no further messages should appear. HTH,
2019 Oct 04
2
Differences between CentOS 7.x and CentOS 8.x OS
On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: > On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >> Hi, >> >> I will appreciate it if someone can help me understand the differences >> between CentOS 7.x and CentOS 8.x OS. I look forward to hearing from you >> and thanks in advance. >> > In short, CentOS 7.x is based on Fedora 19 while CentOS 8 is based on >
2008 Jan 03
1
The ticket clinic, What Is U.S. Copyright Law?
The ticket clinic, What Is U.S. Copyright Law? The US Copyright Law grants rights to individuals for the works they create. The US Copyright Act of 1790 has changed over the years. The current basis of US copyright law is based on the Copyright Act of 1976. US copyright law is relatively automatic. Once someone has an idea and produces it in tangible form, the creator is the copyright holder and
2002 Mar 12
0
Heineken Face EU Fines for Curbing Rivalry
Heineken NV and Carlsberg A/S may be fined after the European Commission charged that they conspired to curb competition in the Dutch and Danish beer markets from 1993 to 1996. The European Union's antitrust regulator said evidence collected in raids two years ago showed the two brewers broke EU law by agreeing not to sell ``intensively'' in each other's territory. The companies
2001 Sep 14
2
[Fwd: Bush's Press Conference: Into the Abyss]
Emperors1000@aol.com wrote: > > Dear reader, > The emperorsclothes list does not seem to be working. Please forgive us if > you receive this post twice. - Jared Israel, www.tenc.net > ************************** > URL for this article: http://emperors-clothes.com/articles/rozoff/abyss.htm > > To join the Emperor's Clothes email list, go to >
2015 Oct 16
2
[cfe-dev] Buildbot Noise
On 16 October 2015 at 15:17, Robinson, Paul <Paul_Robinson at playstation.sony.com> wrote: > But if > there are new fails, the blame mailer can do a set-difference and report > only the new ones. That would reduce the noise a bit, hmm? Hi Paul, The danger there is that it'd be easier to "get used" to having some failures as long as you don't have "new"
1999 Nov 27
1
Re: Programming ...
Many thanks to the moderator who pointed out errors and suggested the correct information on this post. Over half the ideas are due to him. ;) Don't forget this is about writing your own daemon or TCP program. Some of the ideas here will not happen with today's software that has been hardened. It is presented to prevent your software from being taken advantage of. Most often,