search for: perpetrators

Displaying 20 results from an estimated 36 matches for "perpetrators".

2008 Aug 15
3
POP3 dictionary attacks
I'm seeing strings of failed POP3 login attempts with obvious bogus usernames coming from different IP addresses. Today's originated from 216.31.146.19 (which resolves to neovisionlabs.com). This looks like a botnet attack. I got a similar probe a couple days ago. Is anyone else seeing these? The attack involves trying about 20 different names, about 3-4 seconds apart. Here's a
2019 Oct 05
3
Differences between CentOS 7.x and CentOS 8.x OS
On 10/4/19 6:59 PM, Fred Smith wrote: > On Fri, Oct 04, 2019 at 04:52:28PM -0600, David G. Miller wrote: >> On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: >>> On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >>>> Hi, >>>> >>>> I will appreciate it if someone can help me understand the differences >>>> between CentOS 7.x and CentOS 8.x OS.
2010 Apr 17
1
Fishy error with NAMESPACE when checking package
...rt(ns, exports) : undefined exports: pc.plot, pc.matplot Error: package/namespace load failed for 'Epi' I cannot seem to find any occurrence of the strings "pc.plot" and "pc.matplot" anywhere in the entire package tree. Any idea of what goes on (and where to find the perpetrators)??? I use: _ platform i386-pc-mingw32 arch i386 os mingw32 system i386, mingw32 status major 2...
2012 Oct 17
2
CentOS 6.3 - fail2ban not working properly + workaround
...are using fail2ban to block brute force login attempts. Packages are from the EPEL repo, so I'm just sharing some knowledge here. For about two months now I've had a CentOS 6.3 box (web host) in production that occasionally is ftp brute forced. Oddly enough fail2ban wasn't nabbing the perpetrators. I found that the iptables chain for VSFTP isn't created for one. I have finally come to find [0] that indicates there's a problem with the inotify backend. Setting backend=gamin in /etc/fail2ban/jail.conf gives me the iptables chain I expect to find and one blocked host. Hope this is he...
2012 Mar 22
2
Order of terms in formula changes aov() results
Hello, This one is very perplexing. I have teacher observation data, with factors teacher ID, observer ID, component, grade and subject. When I do this, aov(data=ratings.prin.22, rating ~ obsid.f + tid.f + subject.f + grade.f + comp.f) I get this: Terms: obsid.f tid.f grade.f comp.f Residuals Sum of Squares 306.23399 221.38173 1.70000 14.52831 279.05780 Deg. of
2015 Nov 24
3
Functions have two types, one can be mutated but not the other
Function has its own FunctionType* member as well as a Type* member that it inherits from GlobalValue. The latter can be mutated but not the former, leading to potential strange inconsistencies. While I realize using mutateType is probably going to trigger a bunch of "you're doing it wrong" replies, it seems like mutateType, as a necessary evil, should be virtual and do the right
2005 May 27
2
I never made any assumption athat anyone had any obligation to do anything
I just asked a question. If I was too vague, then i am sorry. I dont expect anyone to help me, but I thought that it was ok to put the question out there in case someone wanted to help me. I didnt expect abject hostility for it. Human decency was the only thing I did expect. If my question was a pain,badly formatted, or too juvinile, then i have no problem being ignored.I asked a question
2001 Sep 14
1
extremly off topic I know but since it leaked into the list anyway....
...s ahead are even more ominous than they appeared to be before the latest atrocities. As to how to react, we have a choice. We can express justified horror; we can seek to understand what may have led to the crimes, which means making an effort to enter the minds of the likely perpetrators. If we choose the latter course, we can do no better, I think, than to listen to the words of Robert Fisk, whose direct knowledge and insight into affairs of the region is unmatched after many years of distinguished reporting. Describing "The wickedness and awesome cruelty...
2017 May 11
2
How to detect fake CallerID? (8xx?)
...r has access to some equipment through which they know that the call will be routed; that potentially includes your Asterisk, but any tampering there would be evident) than falsifying outgoing calls *from* a number. It would be much more fun to mount a "sting" operation to catch the perpetrators red-handed (say, falsely set off a fire alarm while you know they are slacking off down the pub instead of looking after the site like they are paid for) ..... but maybe I have just been watching too many detective dramas on TV! -- JM Note: Originating address only accepts e-mail from list!...
2019 Oct 05
0
Differences between CentOS 7.x and CentOS 8.x OS
On 10/5/19 3:14 AM, David G. Miller wrote: > On 10/4/19 6:59 PM, Fred Smith wrote: >> On Fri, Oct 04, 2019 at 04:52:28PM -0600, David G. Miller wrote: >>> On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: >>>> On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >>>>> Hi, >>>>> >>>>> I will appreciate it if someone can help me
2001 Nov 19
1
Lotus Notes under WinNT 4.0
Hello! I'm trying to run Lotus Notes (installed on another partition, Win NT 4.0) under SuSE Linux 7.2. So far I got Wine release 20011108. If I run wine --winver nt40 --debugmsg +loaddll \\ /windows/c/Programme/Lotus/Notes/notes.exe a Lotus opening window shows shortly and then on a mouseclick it does nothing or produce a memory error. It seems to have problems with ole32.dll:
2017 May 10
4
How to detect fake CallerID? (8xx?)
On Wed, 10 May 2017, J Montoya or A J Stiles wrote: > Presumably your staff carry mobile phones. What about an app that gets > the ID of the cell tower to which it is connected, and passes it and the > SIM number in a HTTP request to a server you control? The problem is that they are supposed to use the 'site landline' to confirm presence -- not their cell phone with the
2011 May 27
1
Email spam from my account on May 26, 2011
I just discovered that some evil spammer has somehow gotten my contacts list and used it to send out a bunch of spam. This is just to notify you that if you get an email from me on May 26, 2011 (other than this one or one like it - the problem was more extensive than I first thought) it wasn't from me. Please don't add me to your spam filters. I've changed my password and
2004 May 06
1
X11 fonts cannot be loaded - SuSE Linux solution
Dear list, I would like to make a comment how to solve the X11 font problem under SuSE Linux (9.0) when you get the message: "X11 font at size 16 could not be loaded". After having modified /etc/X11/XF86config as root (see below) you have to run 'SuSEconfig' as root as well else nothing might be changed in the X-Server. After that no further messages should appear. HTH,
2019 Oct 04
2
Differences between CentOS 7.x and CentOS 8.x OS
On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote: > On 10/3/19 5:49 PM, Kaushal Shriyan wrote: >> Hi, >> >> I will appreciate it if someone can help me understand the differences >> between CentOS 7.x and CentOS 8.x OS. I look forward to hearing from you >> and thanks in advance. >> > In short, CentOS 7.x is based on Fedora 19 while CentOS 8 is based on >
2008 Jan 03
1
The ticket clinic, What Is U.S. Copyright Law?
...oading and sharing music or movie files can result in serious charges and fines being brought against them. The popularity of the Internet and file sharing software has increased copyright violations. Copyright owners are starting to take a stand against copyright violators and are hunting down the perpetrators. Be careful you are not overstepping your boundaries and violating someone?s copyright law. ____________________________________________________________________________________ Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com/;_yl...
2002 Mar 12
0
Heineken Face EU Fines for Curbing Rivalry
...yal Grolsch NV of the Netherlands and Birra Peroni of Italy. Probes of brewers in France, the Netherlands and Portugal are continuing, the commission said without naming the companies. Unlike in the U.S., there are no provisions under EU law for victims of a cartel to obtain damages, or for the perpetrators to face criminal proceedings. (Bloomberg, 1/3/2002) Heineken: http://www.transnationale.org/anglais/fiches/1129260919.htm Carlsberg profile: http://www.transnationale.org/anglais/fiches/963367045.Htm Interbrew: http://www.transnationale.org/anglais/fiches/1032529250.htm The transnational corpo...
2001 Sep 14
2
[Fwd: Bush's Press Conference: Into the Abyss]
...president, "all democratic and freedom-loving people" - no other of whom, it > should be noted, seems to be on the alleged hit list of Mr. bin Laden. > > Furthermore, and ominously, Bush threatens not only to attack - recall this > is in his words a state of war - the actual perpetrators of yesterday's > attacks (whomever they may be), but "their harbors." Not those who allegedly > harbor them, but their harbors. > > To be consistent, which is to say honest, Bush, as his legion of intelligence > operatives could readily tell him, would have to identify...
2015 Oct 16
2
[cfe-dev] Buildbot Noise
On 16 October 2015 at 15:17, Robinson, Paul <Paul_Robinson at playstation.sony.com> wrote: > But if > there are new fails, the blame mailer can do a set-difference and report > only the new ones. That would reduce the noise a bit, hmm? Hi Paul, The danger there is that it'd be easier to "get used" to having some failures as long as you don't have "new"
1999 Nov 27
1
Re: Programming ...
Many thanks to the moderator who pointed out errors and suggested the correct information on this post. Over half the ideas are due to him. ;) Don't forget this is about writing your own daemon or TCP program. Some of the ideas here will not happen with today's software that has been hardened. It is presented to prevent your software from being taken advantage of. Most often,