search for: spoofer

Displaying 9 results from an estimated 9 matches for "spoofer".

Did you mean: spoofed
2015 Jan 23
1
DMARC test (request)
..." dealing with Yahoo!'s >> change, others have chosen to do nothing... > > We should stop for a sec and think if what yahoo did was good or not to fight > spammers; I think it was good. A list that impersonates a sender is not a good approach. Don't confuse spammers and spoofers. This is a critical distinction. Both are commonly handled by "spam" filters. Not all spoofers are spammers (mailing list traffic; people who try to send through a local MTA due to network policies blocking their home MTA) and not all spammers are spoofers (think malware or compromised...
1998 Jun 14
3
What are some programs to use to trace spoofers?
ALL, Our Primary DNS has been broken into twice in the last week. The first time it happened I noticed the hacker used named for means of gaining entry. This guy was good at hiding his/her tracks so we reinstalled the OS and left a minimum install to see if it was done again. We logged all goings on from a secure remote machine. We got the hacker''s IP address and even some of what
2015 Jan 18
0
DMARC test (request)
> As per > prior discussions, the "From:" field should remain > with the > original sender. One (important) > reason is that frequent participants > in the > Syslinux Mailing List tend to use the "From:" > field, for > instance as search filter. Well I consider the search filter by subject is a much better approach, for participating on a
2015 Jan 18
2
DMARC test (request)
> On Sun, Jan 18, 2015 at 8:18 AM, Patrick Masotta <masottaus at yahoo.com> wrote: > > Hi Gene: > > Everything that comes from the list goes to my spam folder > > because the message looks as spam to yahoo. > > A simple filter resolves this: > > Deliver to "Inbox" if > To/CC contains "syslinux at zytor.com" > > > why is
2008 Jun 05
2
RESEND [PATCH][BUGFIX] Fix termination of the spoofing portmapper
Hi, I'm resending since I got no feedback: I assume that the message was lost... The attached patch fixes a few bugs related to the spoofing portmapper used by nfsmount. Regards, Louis -- Dr Louis Rilling Kerlabs Skype: louis.rilling Batiment Germanium Phone: (+33|0) 6 80 89 08 23 80 avenue des Buttes de Coesmes http://www.kerlabs.com/ 35700 Rennes -------------- next part
2014 Aug 26
4
OT: Question on Caller ID (Spoofing calls with Asterisk)
I got a call from an overseas call center telling me about the problems with the Windows machine I was using. They wanted to remote in and fix things for me ... (Ignore the fact I use a MacBook Pro or an ASUS laptop with Debian). What I found curious was the caller's name was Asterisk, and the caller's number was Asterisk at 10 or or Astrk at 10 similar. (I don't recall the exact
2003 Oct 11
2
Fwd: RE: SIP / IAX over satellite
..."needs to go". IP applications >work quite well over satellite, no matter what people tell you. >They just get really, really slow if they're TCP due to ACK response >delay, and UDP has the aforementioned 500ms lag as well. > >The skyx stuff is just a forward-ACKing spoofer for TCP, and >probably some smart squid derivatives to boost HTTP transfer speeds. >Not useful for VoIP, but probably useful if you're doing anything >that's not UDP based. > >For VoIP with IAX, there may be application layer issues that are >smudging your results. I...
2011 Jul 08
4
[PATCH 0/4] usr/kinit checkpatch
Various coding style fixes checkpatch warns about. The goal is not to be 100% checkpatch compliant, but to have more consistent coding style. As this is a trivial patch serie, will land in 24 hours in klibc git, unless of course ml review hits a bugger. Checked with size(3) that the generated kinit, fstype, ipconfig and nfsmount are the same. maximilian attems (4): [klibc] ipconfig: reduce
1999 Nov 27
1
Re: Programming ...
...t;/etc/passwd" or whatever is needed. ------" Also pointed out to me was the fact that the spoofed machine will reply back "I don't know about this connection" in many cases. This will stop [...] [mod: the kernel] from continuing with the dialog. [...] Many times a spoofer will step in during the middle of an exchanges, where authentication has already occurred and the "connection" is set up. You need to make sure your connection sequence follows good rules of engagement that can be hard to ascertain from the outside. Don't allow your daemon to b...