Displaying 5 results from an estimated 5 matches for "stealthy".
Did you mean:
stealth
2018 Nov 07
0
Checksums of packages change on CRAN without change in version number
...ile. This does cause the checksums to change, and we end up
with two packages with the exact same version number but different
checksums.
To date there hasn't been any satisfactory answer on how to avoid having to
update our own configuration builds a week after the initial update due to
these stealthy checksum changes.
It's also an increasing safety concern for our IT department, as they
seriously frown upon software that makes in-place changes. According to
them, there's no way they can know whether it is a legitimate change to the
package, or the result of some kind of hack. They have...
2006 Apr 25
5
XenAccess Library: Introspection for Xen
I''m pleased to announce a new project called XenAccess. The project
goals are to provide a full featured introspection library for Xen.
Introspection is a technique where applications in one domain can
view memory from another domain. For example, you can run an
application in dom0 to list the processes or LKMs in a domU. More
information is available on the website:
2005 Jul 29
4
Reinstall Windows but preserve CentOS
I have a computer that dual boots between Windows and CentOS. Each
has it's own hard drive.
I suddenly have a problem with Windows, and may need to reinstall. I
need it for applications like After Effects, Premiere, and other things
that I am currently in the middle of a project with.
It seems the system has become usnstable, it's preventing me from
continuing to work, and I
2016 Jan 15
3
[Patch] TCP MD5SIG for OpenSSH
On 15 January 2016 at 08:48, Alex Bligh <alex at alex.org.uk> wrote:
> > The socket option is enabled *after* connection establishment, thus
> > doesn't protect against SYN floods. This is because server doesn't
> > know (in userspace) what the address of the peer is until they
> > connect. Again because signed addresses.
> So could they exchange a secret
2008 Jul 21
20
Ideas for stopping ssh brute force attacks
just wanted to get some feedback from the community. Over the last few
days I have noticed my web server and email box have attempted to ssh'd to
using weird names like admin,appuser,nobody,etc.... None of these are
valid users. I know that I can block sshd all together with iptables but
that will not work for us. I did a little research on google and found
programs like sshguard and