search for: tamper

Displaying 20 results from an estimated 485 matches for "tamper".

Did you mean: tampere
2011 Jun 24
5
No DVD Mirrors - Only Torrent
...nd my netbook. Yes there are serious and continuing security concerns relating to Gnome and KDE but they are not Centos. Currently running 5.6 and would like a two set DVD of that version. However none of the mirrors offer pure DVDs only Torrent versions which involve the possibility of bits being tampered with and things leaving my servers without explicit knowledge and authority. None of the CD / DVD sellers I have contacted can offer Centos 5.6 DVDs because, they say, they can't get a virgin 5.6 DVD only Torrent. FreeBSD 8.2 (the latest) offers a virgin 1 DVD download. The whole distributi...
2004 Jul 09
1
Bug#258427: logcheck/logtail didn't detect tampering logfile
Package: logcheck wanted to work on #195935, but found a less than funny issue, easy to reproduce: * remove some lines in front of your logfile * invoke logcheck you'll get a big email with all not matching lines from that log. not setting that to high priority because you are getting also the newer loglines. don't know if i find time that weekend. wanted to document it anyways. a++
2006 Jul 11
1
Integrity checking NANOBSD images
We have a number of Soekris devices that we will be deploying remotely in semi- hostile physical environments. The remote links are dialup so I dont have a lot of bandwidth available. I want to do integrity checks of the images so that I can detect any tampering of the flash image. If I upload a static sha256 binary to /tmp on the remote box (which is a RAM disk) and then do something like e.g. # ssh remote1.example.com "mkdir /tmp/rand-directory" # scp /usr/local/bin/sha256 remote1.example.com:/tmp/rand-directory/sha256 # scp /usr/local/b...
2009 Jul 28
2
How to use formulas for multivariate clustered data?
...way to define the hierarchical structure, is it the "|" or is there another, better way? How can I restrict the number of hierarchical levels? And how to use in this context, the data, subset, weights and na.action arguments? Thanks in advance, Klaus -- Klaus Nordhausen Researcher Tampere School of Public Health FIN-33014 University of Tampere phone: +358 3 3551 4153 fax: +358 3 3551 4150 e-mail: Klaus.Nordhausen at uta.fi
2010 Jul 30
5
Aastra phones occasionally show "No Service" - Is there any network setting I can tamper to facilitate a quick DHCP renewal on the Aastra phones?
Hi Everyone, I am running DD-WRT on a router that feeds about 30 Aastra 6753i. The phones occasionally go into "No Service" mode. The POE switch doesn't seem to be the problem as it's tested fine. I think the router sometimes gives up and comes back quickly. Or something of that nature. However, the connections are maintained if a call is going on because there are peer to peer
2005 Jan 07
3
Intrusion Suspected, Advice Sought
I run OS X 10.3.7 on a PowerMac MDD G4 on a cable broadband connection. I have reason to think my system has been tampered with. Security features in Mac OS X have been left unlocked (Preference Pane - Users) even though a master lock has always been set in the Security Preference Pane. This locks all other important preference panes which could be tampered with. Also permissions have been reset at every boot in...
2007 Aug 17
1
Cookie Sessions in Merb?
...For those that don''t know: the default session mechanism is to give developers a Hash called session. To store this object between requests it Marshals the session object and sends the object itself (now as a bitstream) back to clients to store in their cookie file. To prevent users from tampering with this data, a cryptographic digest (using HMAC with SHA-1) is sent along with the bitstream). The major problem with this scheme is that the Marshalled data is not at all encrypted! Users are free to unmarshal and examine what websites are storing in their sessions. They cannot change the d...
2004 Feb 16
0
Duncan's rooted system
...(automate this, naturally) comparing the restored files against the installed files for relevant differences. When thinking about how to prevent this in the future, I would advise that you (1) automate the transfer of all system logs to electronic mail, off the server, for preservation against tampering (IE, mail yourself a copy of every log, to an offsite address, every day, so that you have a copy in a tamper-proof location) ... and (2), consider using command-line interfaces and living without X where possible. (Daemonized Networking Services strongly advises against installing X on ser...
2002 May 20
1
suggestion for example for base:naresid
...2 <- lm(y ~ x1)) residuals(lm.2) tmp.omit <- lm.2$na.action # modify the na.action to be "exclude" class(tmp.omit) <- "exclude" naresid(tmp.omit, lm.2$residuals) -- Markus Jantti markus.jantti at uta.fi ** http://www.abo.fi/~mjantti Dept of Economics ** University of Tampere ** FIN 33014 University of Tampere PGP public key: http://www.abo.fi/~mjantti/pubring.asc
2001 Aug 29
1
suggestion for example for base:naresid
...2 <- lm(y ~ x1)) residuals(lm.2) tmp.omit <- lm.2$na.action # modify the na.action to be "exclude" class(tmp.omit) <- "exclude" naresid(tmp.omit, lm.2$residuals) -- Markus Jantti markus.jantti at uta.fi ** http://www.abo.fi/~mjantti Dept of Economics ** University of Tampere ** FIN 33014 University of Tampere PGP public key: http://www.abo.fi/~mjantti/pubring.asc
2004 Jul 07
4
Setting home path to a dir within a users Linux home dir
...irectory level onto the defauly behavior of a [homes] share looking in /etc/passwd to find the users Linux home dir? It would offer a bit of protection if Windows clients ended up in say the WinHome directory within their Linux home directory when logging in from Windows so they are not tempted to tamper with their desktop settings files for Linux from Windows. Maybe there is a bit of magic someone knows, a variable to include or something? -- Michael Lueck Lueck Data Systems Remove the upper case letters NOSPAM to contact me directly.
2016 Jun 17
1
https and self signed
...to be common-sense these assumptions have no empirical basis. A properly generated RSA certificate and key of sufficient strength -- RSA k>=2048bits -- should provide protection from brute force attacks for decades if not centuries. The usual way a private key gets compromised is by theft or by tampering with its generation. Putting yourself on a hamster wheel of constant certificate generation and distribution simply increases the opportunities for key theft and tampering. Keys issued to individuals certainly should have short time limits on them. In the same way that user accounts on system...
2015 Oct 19
2
Modify Contact in PJsip
...ribution is prohibited. If you believe this message has been sent to you in error, please notify the sender by replying to this transmission and delete the message without disclosing it. Thank you. E-mail including attachments is susceptible to data corruption, interception, unauthorized amendment, tampering and viruses, and we only send and receive emails on the basis that we are not liable for any such corruption, interception, amendment, tampering or viruses or any consequences thereof. -----Original Message----- From: asterisk-users-bounces at lists.digium.com [mailto:asterisk-users-bounces a...
2004 Mar 24
2
Where does the "prompt come from"
...ibution is prohibited. If you believe this message has been sent to you in error, please notify the sender by replying to this transmission and delete the message without disclosing it. Thank you. E-mail including attachments is susceptible to data corruption, interruption, unauthorized amendment, tampering and viruses, and we only send and receive e-mails on the basis that we are not liable for any such corruption, interception, amendment, tampering or viruses or any consequences thereof.
2009 Dec 18
2
unverified files in 5.4
Hey, Gang! To ensure that a file hasn't been corrupted or tampered with, you can use rpm to verify the package it came from. Well, I found this: rpm -Vv util-linux .... ........ /usr/bin/cal S.?..... /usr/bin/chfn ........ /usr/bin/chrt S.?..... /usr/bin/chsh .... Does anyone else get this? And what would be the proper course of action at this p...
2007 Mar 24
1
Video drivers, bittorrent and Centos 5?
...e download? If I am downloading 4, 5, or 6 CDs from a .gov, .mil, or .edu site, I feel it will be much more trustworthy. Granted, I could also outright pay for media from the CentOS organization. If someone can convince me that bittorrent is a 100% safe way to retrieve a copy of the OS with no tampering, then I'll feel more comfortable. Otherwise, I will want to completely redo my machine with CentOS 5, from partitioning on up. Thanks for any feedback/insights. Scott
2014 Jun 03
2
shadow_copy2 writable?
Hi, Can anyone reassure that files & folders made available to windows via vfs shadow_copy2 cannot be modified in any way? My NAS backups are stored on an iscsi target formatted with ext4 & I'm concerned that they could be tampered with by a virus such as Cryptolocker. Thanks
2008 Oct 14
2
[LLVMdev] LLVM 2.4 problem? (resend)
...timizer does something strange to the sessionEntriesKVO variable (I get strange "unrecognized selector sent to instance..." errors at runtime that has nothing to do with the sessionEntriesKVO). Removing the const keyword (or compiling with -O0) fixes the problem. --- Tatu Vaajalahti Tampere, Finland
2007 Apr 22
3
Asterisk & M$ SQL Server
Hi all, Has anyone successfully set up asterisk to query a M$ SQL Server? I'd like to be able to query one in the dial plan and use the results to tamper with call priorities / CLID etc. If someone could point me to a howto / guide or relate their experiences with this, that would be great ! Thanking you all in advance. Callum P.S. Before anyone asks; it's a legacy database that has to be kept on SQL Server for other business reasons.
2009 Mar 11
2
HSM devices and FreeBSD
...PCIe hardware security modules that are supported on FreeBSD? I have not seen any on the FreeBSD hardware compatibility lists. Again, as Eirik noted in his question, HSMs are not simply crypto accelerators (which are supported on FreeBSD), they also are a means of storing keys with physical, tamper-resistant security. Thanks. Ed Sykes