search for: safeguard

Displaying 20 results from an estimated 124 matches for "safeguard".

2015 Jul 06
0
Asterisk pin code for out-going international calls (safeguard against fraud)
The Authenticate application will do this for you. https://wiki.asterisk.org/wiki/display/AST/Asterisk+13+Application_Authenticate You can either give it a single PIN to use for all calls, Authenticate using a value in the Asterisk Database, Or use a plain text file for the PIN's On Mon, Jul 6, 2015 at 2:43 PM, Motty Cruz <motty.cruz at gmail.com> wrote: > Hello All, > >
2015 Jul 06
3
Asterisk pin code for out-going international calls (safeguard against fraud)
Hello All, I will like to configure Asterisk to use PIN Code for all outgoing international calls. Also, any suggestions as to when should I prompt users for code prior to dialing the number or after dialing the number? can someone provide with a example on how to accomplish this goal? I am a bit confuse by this :
2006 Jun 12
3
zfs destroy - destroying a snapshot
Hello zfs-discuss, I''m writing a script to do automatically snapshots and destroy old one. I think it would be great to add to zfs destroy another option so only snapshots can be destroyed. Something like: zfs destroy -s SNAPSHOT so if something other than snapshot is provided as an argument zfs destroy wouldn''t actually destroy it. That way it would
2015 Jul 07
2
Asterisk pin code for out-going international calls (safeguard against fraud)
Hello, I used this guide, it worked for me: http://www.binaryheartbeat.net/2014/03/asterisk-pin-based-dialing.html Thanks, On 07/06/2015 04:54 PM, John Kiniston wrote: > The Authenticate application will do this for you. > > https://wiki.asterisk.org/wiki/display/AST/Asterisk+13+Application_Authenticate > > You can either give it a single PIN to use for all calls, Authenticate
2006 Mar 09
4
Testing Migrations
Is there some standard way to test migrations? It seems to me that an additional safeguard for migrations would be to test and see if applying the migrations to the test database allows one to reconstruct the structure of the development database. If you can''t, then there is an error in your migrations, most likely because someone hand-modified the database without genera...
2002 Nov 08
2
behavior of =
...,TRUE) y[x=min(x)] is even worse -- it gives the "wrong" answer. I know exactly what's going on here (the = in the subsetting statement above was a typo for ==), and I should have known better, but I felt like I was programming in C again! I know that the designers tried to build in safeguards (from the man page): the `=' is only allowed at the top level (that is, in the complete expression typed by the user) or as one of the subexpressions in a braced list of expressions. These safeguards don't prevent the mishap shown above. Is there any way to detect this case...
2010 Jun 22
1
Subject: Re ZINB by Newton Raphson??
...e just tidying up) does not have such a choice. Since the question comes up fairly frequently, here is a response. I caution that it is based on my experience and others may get different mileage. My reasons for being cautious about Newton are as follows: 1) Newton's method needs a number of safeguards to avoid singular or indefinite Hessian issues. These can be tricky to implement well and to do so in a way that does not hinder the progress of the optimization. 2) One needs both gradient and Hessian information, and it needs to be accurate. Numerical approximations are slow and often inadequ...
2008 Jun 06
3
how xen recognizes fibre channel based storage resources
Hello I''m a newbie here so please don''t laugh at me... I plan to setup several (4) physical servers to run xen virtualized OS-es (in example web servers). What I need is that those virtualized OS-es must have simultaneous access to disk storage physically created on FC array. I read that this could be done by OCFS or Lustre file system but my question is: how virtualized
2008 Jan 16
2
Optional 'test' or benchmark cipher
...ed allows wider usage across the internet of pre-encrypted or non-sensitive, compressed data. (I'm sorta surprised a null algorithm hasn't already been made available, at least for testing during development.) Hopefully it wouldn't be thought of as a security risk with the appropriate safeguards in place. Linda Walsh
2015 Jul 06
2
Asterisk how to setup alarm too many outgoing calls from same user
Hello, I would like to setup a mechanism to trigger an alarm if user is deal too many numbers within a very short period of time. Safeguard against users hacked accounts. can someone help? Thanks,
2016 Jun 08
1
Solaris 10 Configure failure
...vidual to whom it is addressed. If this > Email has been misdirected, please notify the author as soon as > possible. If this email has a protective marking of OFFICIAL – > SENSITIVE, PROTECT or RESTRICTED in its title or contents, the > information within must be subject to appropriate safeguards to > protect against unauthorised or unlawful processing and against > accidental loss or destruction or damage. OFFICIAL – SENSITIVE, > PROTECT and RESTRICTED information should only be further shared where > there is a legitimate need. If you are not the intended recipient you > m...
2002 May 02
0
Carlos Donoso en la UIS
...----------------- -------------------------------------------------------------------- -------------------------------------------------------------------- -------------------------------------------------------------------- -------------------------------------------------------------------- (This safeguard is not inserted when using the registered version) -------------------------------------------------------------------- -------------------------------------------------------------------- -------------------------------------------------------------------- -----------------------------------------...
2010 Dec 06
1
Simple Question
I have been using rsync on my laptop for some time to safeguard an extensive image collection. My usage has been: .. rsync -av --delete ~/Pictures /media/disk I have found this exceptionally fast ... just as advertised! I now have set up a new computer system where I want to back up my /home to a sata drive. My phrase for this is: .. rsync -av --delete /home/d...
2005 May 15
1
Thank you for your inquiry to the Campus Hub.
...epending on the volume and complexity of requests currently being received, please allow up to 3-4 business days for us to research and answer your question. If you have not included your full name and Tech ID in your original email, please resubmit your request and include this information. To safeguard the privacy of student information, all responses will be directed to the student's official University email address (firstname.lastname@mnsu.edu). Additional information can be obtained on the University website at www.mnsu.edu. Student billing, registration and financial aid status can b...
2010 Aug 04
1
Optimising the Rsync algorithm for speed by reverting to MD4 hashing
Hi, From v3.0.0 onwards the hash function implemented by Rsync was changed from MD4 to MD5 (http://rsync.samba.org/ftp/rsync/src/rsync-3.0.0-NEWS). My understanding is that MD5 is a more secure, slower version of MD4 but I am not convinced that the added security of MD5 would alone have merited the change from MD4 (particularly since MD4 is ~30% faster than MD5). I wonder if I am missing other
2017 Nov 29
2
[OT?] Lam and tree view...
...d that i cannot use the ''tree view'' apart pointing it to some sub-OU. EG, if i set as base dn my domain base dn: DC=ad,DC=fvg,DC=lnf,DC=it tree view does not work; if i set to an OU: OU=FVG,DC=ad,DC=fvg,DC=lnf,DC=it works as expected. HOW?! It is a Samba/AD touble/limitation/safeguard, or is LAM? Thanks. -- dott. Marco Gaiarin GNUPG Key ID: 240A3D66 Associazione ``La Nostra Famiglia'' http://www.lanostrafamiglia.it/ Polo FVG - Via della Bontà, 7 - 33078 - San Vito al Tagliamento (PN) marco.gaiarin(at)lanostrafamiglia.it t +39-0434-...
2018 Mar 07
1
Build LLVM on RedHat 7
...message, please delete it and notify the sender. This message may not represent the opinion of Euronext N.V. or any of its subsidiaries or affiliates, and does not constitute a contract or guarantee. Unencrypted electronic mail is not secure and the recipient of this message is expected to provide safeguards from viruses and pursue alternate means of communication where privacy or a binding message is desired. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20180307/2af2d71d/attachment.html>
2016 Jun 21
2
[GSoC 2016] Better Alias Analysis By Default - Mid Term Summary
...hancement I made for CFL-AA: - [r271322] Remove aliasing relations between GEP pointers and GEP indices. Before this patch, CFL-AA will claim that a and b may-alias each other in the following codes: int a[10], b[10]; a[N] = ...; b[N] = ...; This seemingly insane behavior was actually there to safeguard certain cases where people do crazy stuffs with pointer arithmetics. Later we figured out that those crazy behaviors were in fact UB and therefore we could drop support for it. - [r271421] Teach CFL-AA to understand function attributes. CFL-AA used to treat opaque function calls in a very cons...
2018 Feb 28
2
Wide links and insecure wide links
...ons, it *also* prevents the user from creating or modifying symlinks on the share, so in wffect it inherently prevents this being exploited unless an insecure symlink already exists or is created by some *other* route. And thus, that enabling "insecure" wide links simply removes that safeguard. If that's right, my clarification questions are 1) does this mean that configs containing "ordinary" wide link = yes might become a risk, when SMB2 style functionality eventually lands, or will it presumably be mitigated or remain unchanged from a security perspective at that ti...
2015 May 11
1
Wrongly checked MD5 checksums in R 3.2.0's windows binary
...hing you could do. > > Duncan As a general matter, checksumming is useless against tampering if you ship the checksums with the files (that's why I put the checksums in the release announcements: so that they travel alon a different route to the user). If you do, they only make sense as safeguards against technical errors (such as the infamous CR/CRLF conversions). I still don't get why Tal refuses to work out the apparently quite simple logic that decides which checksums should be used to check the installed R.exe and Rscript.exe. -- Peter Dalgaard, Professor, Center for Statistics,...