Displaying 20 results from an estimated 36 matches for "perpetrators".
2008 Aug 15
3
POP3 dictionary attacks
I'm seeing strings of failed POP3 login attempts with obvious bogus
usernames coming from different IP addresses. Today's originated from
216.31.146.19 (which resolves to neovisionlabs.com). This looks like a
botnet attack. I got a similar probe a couple days ago. Is anyone else
seeing these?
The attack involves trying about 20 different names, about 3-4 seconds
apart. Here's a
2019 Oct 05
3
Differences between CentOS 7.x and CentOS 8.x OS
On 10/4/19 6:59 PM, Fred Smith wrote:
> On Fri, Oct 04, 2019 at 04:52:28PM -0600, David G. Miller wrote:
>> On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote:
>>> On 10/3/19 5:49 PM, Kaushal Shriyan wrote:
>>>> Hi,
>>>>
>>>> I will appreciate it if someone can help me understand the differences
>>>> between CentOS 7.x and CentOS 8.x OS.
2010 Apr 17
1
Fishy error with NAMESPACE when checking package
...rt(ns, exports) :
undefined exports: pc.plot, pc.matplot
Error: package/namespace load failed for 'Epi'
I cannot seem to find any occurrence of the strings "pc.plot" and "pc.matplot" anywhere in the entire package tree.
Any idea of what goes on (and where to find the perpetrators)???
I use:
_
platform i386-pc-mingw32
arch i386
os mingw32
system i386, mingw32
status
major 2...
2012 Oct 17
2
CentOS 6.3 - fail2ban not working properly + workaround
...are using fail2ban to block brute force
login attempts.
Packages are from the EPEL repo, so I'm just sharing some knowledge here.
For about two months now I've had a CentOS 6.3 box (web host) in
production that occasionally is ftp brute forced.
Oddly enough fail2ban wasn't nabbing the perpetrators. I found that
the iptables chain for VSFTP isn't created for one.
I have finally come to find [0] that indicates there's a problem with
the inotify backend.
Setting backend=gamin in /etc/fail2ban/jail.conf gives me the iptables
chain I expect to find and one blocked host.
Hope this is he...
2012 Mar 22
2
Order of terms in formula changes aov() results
Hello, This one is very perplexing. I have teacher observation data,
with factors teacher ID, observer ID, component, grade and subject. When
I do this,
aov(data=ratings.prin.22, rating ~ obsid.f + tid.f + subject.f + grade.f + comp.f)
I get this:
Terms:
obsid.f tid.f grade.f comp.f Residuals
Sum of Squares 306.23399 221.38173 1.70000 14.52831 279.05780
Deg. of
2015 Nov 24
3
Functions have two types, one can be mutated but not the other
Function has its own FunctionType* member as well as a Type* member that it inherits from GlobalValue. The latter can be mutated but not the former, leading to potential strange inconsistencies.
While I realize using mutateType is probably going to trigger a bunch of "you're doing it wrong" replies, it seems like mutateType, as a necessary evil, should be virtual and do the right
2005 May 27
2
I never made any assumption athat anyone had any obligation to do anything
I just asked a question. If I was too vague, then i am sorry. I dont
expect anyone to help me, but I thought that it was ok to put the
question out there in case someone wanted to help me. I didnt expect
abject hostility for it. Human decency was the only thing I did expect.
If my question was a pain,badly formatted, or too juvinile, then i have
no problem being ignored.I asked a question
2001 Sep 14
1
extremly off topic I know but since it leaked into the list anyway....
...s ahead are even more ominous than
they appeared to be before the latest atrocities.
As to how to react, we have a choice. We can express justified
horror; we can seek to understand what may have
led to the crimes, which means making an effort to enter the
minds of the likely perpetrators. If we choose the
latter course, we can do no better, I think, than to listen to
the words of Robert Fisk, whose direct knowledge
and insight into affairs of the region is unmatched after many
years of distinguished reporting. Describing "The
wickedness and awesome cruelty...
2017 May 11
2
How to detect fake CallerID? (8xx?)
...r has access to some equipment through which they know that the call will be routed; that potentially includes your Asterisk, but any tampering there would be evident) than falsifying outgoing calls *from* a number.
It would be much more fun to mount a "sting" operation to catch the
perpetrators red-handed (say, falsely set off a fire alarm while you know they
are slacking off down the pub instead of looking after the site like they are paid for) ..... but maybe I have just been watching too many detective dramas on TV!
--
JM
Note: Originating address only accepts e-mail from list!...
2019 Oct 05
0
Differences between CentOS 7.x and CentOS 8.x OS
On 10/5/19 3:14 AM, David G. Miller wrote:
> On 10/4/19 6:59 PM, Fred Smith wrote:
>> On Fri, Oct 04, 2019 at 04:52:28PM -0600, David G. Miller wrote:
>>> On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote:
>>>> On 10/3/19 5:49 PM, Kaushal Shriyan wrote:
>>>>> Hi,
>>>>>
>>>>> I will appreciate it if someone can help me
2001 Nov 19
1
Lotus Notes under WinNT 4.0
Hello!
I'm trying to run Lotus Notes (installed on another partition,
Win NT 4.0) under SuSE Linux 7.2.
So far I got Wine release 20011108.
If I run
wine --winver nt40 --debugmsg +loaddll \\
/windows/c/Programme/Lotus/Notes/notes.exe
a Lotus opening window shows shortly and then on a mouseclick
it does nothing or produce a memory error.
It seems to have problems with ole32.dll:
2017 May 10
4
How to detect fake CallerID? (8xx?)
On Wed, 10 May 2017, J Montoya or A J Stiles wrote:
> Presumably your staff carry mobile phones. What about an app that gets
> the ID of the cell tower to which it is connected, and passes it and the
> SIM number in a HTTP request to a server you control?
The problem is that they are supposed to use the 'site landline' to
confirm presence -- not their cell phone with the
2011 May 27
1
Email spam from my account on May 26, 2011
I just discovered that some evil spammer has somehow gotten my contacts list and
used it to send out a bunch of spam. This is just to notify you that if you get
an email from me on May 26, 2011 (other than this one or one like it - the
problem was more extensive than I first thought) it wasn't from me. Please
don't add me to your spam filters. I've changed my password and
2004 May 06
1
X11 fonts cannot be loaded - SuSE Linux solution
Dear list,
I would like to make a comment how to solve the X11 font problem under
SuSE Linux (9.0) when you get the message:
"X11 font at size 16 could not be loaded".
After having modified /etc/X11/XF86config as root (see below) you have
to run 'SuSEconfig' as root as well else nothing might be changed in the
X-Server.
After that no further messages should appear.
HTH,
2019 Oct 04
2
Differences between CentOS 7.x and CentOS 8.x OS
On 10/3/19 1:37 PM, Ljubomir Ljubojevic wrote:
> On 10/3/19 5:49 PM, Kaushal Shriyan wrote:
>> Hi,
>>
>> I will appreciate it if someone can help me understand the differences
>> between CentOS 7.x and CentOS 8.x OS. I look forward to hearing from you
>> and thanks in advance.
>>
> In short, CentOS 7.x is based on Fedora 19 while CentOS 8 is based on
>
2008 Jan 03
1
The ticket clinic, What Is U.S. Copyright Law?
...oading and sharing
music or movie files can result in serious charges and fines being
brought against them. The popularity of the Internet and file sharing
software has increased copyright violations. Copyright owners are
starting to take a stand against copyright violators and are hunting
down the perpetrators. Be careful you are not overstepping your
boundaries and violating someone?s copyright law.
____________________________________________________________________________________
Be a better friend, newshound, and
know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com/;_yl...
2002 Mar 12
0
Heineken Face EU Fines for Curbing Rivalry
...yal Grolsch NV of the Netherlands and Birra Peroni of Italy.
Probes of brewers in France, the Netherlands and Portugal are continuing, the commission said without naming the companies.
Unlike in the U.S., there are no provisions under EU law for victims of a cartel to obtain damages, or for the perpetrators to face criminal proceedings.
(Bloomberg, 1/3/2002)
Heineken:
http://www.transnationale.org/anglais/fiches/1129260919.htm
Carlsberg profile:
http://www.transnationale.org/anglais/fiches/963367045.Htm
Interbrew:
http://www.transnationale.org/anglais/fiches/1032529250.htm
The transnational corpo...
2001 Sep 14
2
[Fwd: Bush's Press Conference: Into the Abyss]
...president, "all democratic and freedom-loving people" - no other of whom, it
> should be noted, seems to be on the alleged hit list of Mr. bin Laden.
>
> Furthermore, and ominously, Bush threatens not only to attack - recall this
> is in his words a state of war - the actual perpetrators of yesterday's
> attacks (whomever they may be), but "their harbors." Not those who allegedly
> harbor them, but their harbors.
>
> To be consistent, which is to say honest, Bush, as his legion of intelligence
> operatives could readily tell him, would have to identify...
2015 Oct 16
2
[cfe-dev] Buildbot Noise
On 16 October 2015 at 15:17, Robinson, Paul
<Paul_Robinson at playstation.sony.com> wrote:
> But if
> there are new fails, the blame mailer can do a set-difference and report
> only the new ones. That would reduce the noise a bit, hmm?
Hi Paul,
The danger there is that it'd be easier to "get used" to having some
failures as long as you don't have "new"
1999 Nov 27
1
Re: Programming ...
Many thanks to the moderator who pointed out errors and suggested the
correct information on this post. Over half the ideas are due to him. ;)
Don't forget this is about writing your own daemon or TCP program. Some
of the ideas here will not happen with today's software that has been
hardened. It is presented to prevent your software from being taken
advantage of.
Most often,