search for: recid

Displaying 20 results from an estimated 26 matches for "recid".

Did you mean: recip
2004 Feb 26
1
Distance and Aggregate Data - Again...
I appreciate the help I've been given so far. The issue I face is that the data I'm working with has 53000 rows, so in calculating distance, finding all recids that fall within 2km and summing the population, etc. - a) takes too long and b) have no sense of progress. Below is a loop that reads each recid one at a time, calculates the distance and identifies the recids that fall within 2 km. It iterates through all records successfully. Where I'm s...
2019 Aug 05
4
[OT] odd network question
...letely from my network. I like this as if a system is > brute-forcing my SSH server, I can now block it from all resources on the > network, and stop the attempts even reaching the internal hosts. I've found the default 10min bans hardly bother some attackers. So I've added the "recidive" feature of fail2ban. After the second 10min ban, the attacker is blocked for 1 week. jon -- Jon H. LaBadie jon at jgcomp.com 11226 South Shore Rd. (703) 787-0688 (H) Reston, VA 20190 (703) 935-6720 (C)
2004 Feb 24
3
Calculate Distance and Aggregate Data?
Hi all, I've been struggling learning R and need to turn to the list again. I've got a dataset (comma-delimited file) with the following fields: recid, latitude, longitude, population, dwelling and age. For each observation, I'd like to calculate the total number of people and dwellings and average age within 2 k.m. Distance could be Euclidean, however, a proper distance calculation (great circle route) is best. Any assistance would be app...
2019 Aug 05
2
[OT] odd network question
On 05/08/2019 09:18, Pete Biggs wrote: >> I've found the default 10min bans hardly bother some attackers. >> So I've added the "recidive" feature of fail2ban. After the >> second 10min ban, the attacker is blocked for 1 week. >> > Oh definitely. My systems are set to "3 bans and you're out" - a > recidive ban is permanent after three other bans. I have large parts > of some subnets in my...
2013 May 09
2
question about CDR
...ut cdr ,i have installed the module cdr in my asterisk 1.4 . for the inbound calls when i call my sip exten like below : exten => 506,1,Dial(SIP/223, 10) exten => 506,n,Dial(SIP/276, 10) in CDR i have just one line with SIP /276 the last line but there is no historic for the first SIP 223 recid Record ID | calldate |clid |src | dst |dcontext |channel | dstchannel |lastapp |lastdata |duration |billsec |disposition |amaflags |accountcode |uniqueid |3 | 626747 |2013-05-09 09:22:55 |0661551203 |0661551203 |506 |default |Zap/14-1 |S...
2019 Apr 28
1
faI2ban detecting and banning but nothing happens
> > > > /var/log/fail2ban.log is showing that it's working: > > I have seem similar odd behaviour with f2b with other filters. > Try to uninstall the package > fail2ban-systemd > and stop and start fail2ban again. > This might change its behavior to the better. > The fail2ban-systemd package configures fail2ban to use systemd journal for log input. The OP
2019 Aug 05
0
[OT] odd network question
> > I've found the default 10min bans hardly bother some attackers. > So I've added the "recidive" feature of fail2ban. After the > second 10min ban, the attacker is blocked for 1 week. > Oh definitely. My systems are set to "3 bans and you're out" - a recidive ban is permanent after three other bans. I have large parts of some subnets in my ban list as attackers...
2019 Aug 05
0
[OT] odd network question
On Mon, Aug 05, 2019 at 09:31:56AM +0100, Giles Coochey wrote: > > On 05/08/2019 09:18, Pete Biggs wrote: > > > I've found the default 10min bans hardly bother some attackers. > > > So I've added the "recidive" feature of fail2ban. After the > > > second 10min ban, the attacker is blocked for 1 week. > > > > > Oh definitely. My systems are set to "3 bans and you're out" - a > > recidive ban is permanent after three other bans. I have large parts >...
2004 Nov 09
1
colnames argument in sqlFetch backwards? (PR#7355)
...ion from: (NULL) (192.12.78.250) The TRUE/FALSE options of the colnames argument in sqlFetch (RODBC) seem to be reversed, at least for .xls files. ## z is a connection to an xls workbook opened by odbcConnectExcel() > dat<-sqlFetch(z,'SuccessRates',colnames=FALSE) > dat[1:5,] RecID Name Run Grams Lost Run (80L) 1 NA Activase 117 839.91 0 2 NA Activase 118 860.52 0 3 NA Activase 119 921.23 0 4 NA Activase NA NA 1 5 NA Activase 120 722.62 0 > dat2<-sqlFetch(z,'SuccessRates',...
2020 Jan 01
1
Nasty Fail2Ban update for Centos 7
...yself before I noticed and fixed it...) I do have the f2b-firewalld package installed yes. Since it was an update - it only replaced same installed packages. A standard install of F2B on Centos7 do also include the f2b-systemd package - which would seem logical. However, after I started using the recidive filter - which IMHO is one of the most important ones - it didn't work. Removing the f2b-systemd package fixed that - and didn't hurt anything else. I have no idea why that is - or if that could be part of the problem with the update here on my system. Allan.
2011 Oct 11
11
Reporting for Asterisk Call Center
Dear Tariq; About elastix.org, this can be use with Asterisk or it is coming as a complete IP Telephony, Call Center, IVR and Reporting? Because, I do not need to install another IP Telephony on the server which already has asterisk which is an IP Telephony, this will cause a problem in the service (for example, when listening for SIP port of 5060).
2013 Nov 27
0
[PATCH 07/25] block: Convert bio_for_each_segment() to bvec_iter
...block/dasd_diag.c @@ -504,7 +504,7 @@ static struct dasd_ccw_req *dasd_diag_build_cp(struct dasd_device *memdev, struct dasd_diag_req *dreq; struct dasd_diag_bio *dbio; struct req_iterator iter; - struct bio_vec *bv; + struct bio_vec bv; char *dst; unsigned int count, datasize; sector_t recid, first_rec, last_rec; @@ -525,10 +525,10 @@ static struct dasd_ccw_req *dasd_diag_build_cp(struct dasd_device *memdev, /* Check struct bio and count the number of blocks for the request. */ count = 0; rq_for_each_segment(bv, req, iter) { - if (bv->bv_len & (blksize - 1)) + if (bv.bv_...
2013 Nov 27
0
[PATCH 07/25] block: Convert bio_for_each_segment() to bvec_iter
...block/dasd_diag.c @@ -504,7 +504,7 @@ static struct dasd_ccw_req *dasd_diag_build_cp(struct dasd_device *memdev, struct dasd_diag_req *dreq; struct dasd_diag_bio *dbio; struct req_iterator iter; - struct bio_vec *bv; + struct bio_vec bv; char *dst; unsigned int count, datasize; sector_t recid, first_rec, last_rec; @@ -525,10 +525,10 @@ static struct dasd_ccw_req *dasd_diag_build_cp(struct dasd_device *memdev, /* Check struct bio and count the number of blocks for the request. */ count = 0; rq_for_each_segment(bv, req, iter) { - if (bv->bv_len & (blksize - 1)) + if (bv.bv_...
2013 Nov 27
0
[PATCH 07/25] block: Convert bio_for_each_segment() to bvec_iter
...block/dasd_diag.c @@ -504,7 +504,7 @@ static struct dasd_ccw_req *dasd_diag_build_cp(struct dasd_device *memdev, struct dasd_diag_req *dreq; struct dasd_diag_bio *dbio; struct req_iterator iter; - struct bio_vec *bv; + struct bio_vec bv; char *dst; unsigned int count, datasize; sector_t recid, first_rec, last_rec; @@ -525,10 +525,10 @@ static struct dasd_ccw_req *dasd_diag_build_cp(struct dasd_device *memdev, /* Check struct bio and count the number of blocks for the request. */ count = 0; rq_for_each_segment(bv, req, iter) { - if (bv->bv_len & (blksize - 1)) + if (bv.bv_...
2007 Dec 20
7
ip phone suggestion for Asia?
Hi: i am surveying ip phones for our company. we will use them with asterisk. we have office in taiwan, hong kong,singapore and china. cisco and polycom are too expensive for us. we try several china brand ip phones. they are all cheap and some of them have good quality. but most of them won't offer future firmware support, which we think it's important for ip phones.
2010 Feb 08
1
megatec and blazer drivers for (brand)Tuncmatik (series)Newtech Pro 1KVA
Hi, I would like to report that Tuncmatik Newtech Pro 1 KVA (http://www.tuncmatik.com/en-US/productDetail.asp?RecID=290) works with nut(2.4.1) blazer_usb, blazer_ser and megatec drivers. The UPS came with an usb cable and a java based software for both linux and windows, named ViewPower (http://www-power-software-download.com). This UPS has double interface a USB interface and a serial interface. Perhaps other...
2020 Jan 09
7
Blocking attacks from a range of IP addresses
I am being attacked by an entire subnet where the first two parts of the IP address remain identical but the last two parts vary sufficiently that it is not caught by fail2ban since the attempts do not meet the cut-off of a certain number of attempts within the given time. Has anyone created a fail2ban filter for this type of attack? As of right now, I have manually banned a range of IP addresses
2019 Aug 05
0
[OT] odd network question
On 05/08/2019 08:50, Jon LaBadie wrote: > > I've found the default 10min bans hardly bother some attackers. > So I've added the "recidive" feature of fail2ban. After the > second 10min ban, the attacker is blocked for 1 week. > Interesting, didn't know about that feature, but, oh, I just generally ban for a whole week regardless, yes, I realise that a typo might? set it off for a actual user, but I have other met...
2020 Jan 09
0
Blocking attacks from a range of IP addresses
...times of trouble is to be a bit more aggressive in why and how hosts are banned. It depends on how you are being attacked, but setting the threshold to 1 or 2 failures resulting in a ban and then setting the ban time to something fairly short. Repeat offenders will then quickly be picked up by the recidive filter and permanently banned. A downside to this is that your firewall filters get very large and things will inevitably slow down, but it will at least give you the chance to manually block a whole range but still give you a level of automated protection. P.
2020 Jan 09
3
Blocking attacks from a range of IP addresses
...to be a bit more aggressive in > why and how hosts are banned. It depends on how you are being attacked, > but setting the threshold to 1 or 2 failures resulting in a ban and > then setting the ban time to something fairly short. Repeat offenders > will then quickly be picked up by the recidive filter and permanently > banned. > > A downside to this is that your firewall filters get very large and > things will inevitably slow down, but it will at least give you the > chance to manually block a whole range but still give you a level of > automated protection. > &gt...