Displaying 20 results from an estimated 504 matches for "tamper".
Did you mean:
tampere
2011 Jun 24
5
No DVD Mirrors - Only Torrent
...nd my netbook. Yes there are serious and continuing security
concerns relating to Gnome and KDE but they are not Centos.
Currently running 5.6 and would like a two set DVD of that version.
However none of the mirrors offer pure DVDs only Torrent versions which
involve the possibility of bits being tampered with and things leaving
my servers without explicit knowledge and authority.
None of the CD / DVD sellers I have contacted can offer Centos 5.6 DVDs
because, they say, they can't get a virgin 5.6 DVD only Torrent.
FreeBSD 8.2 (the latest) offers a virgin 1 DVD download. The whole
distributi...
2004 Jul 09
1
Bug#258427: logcheck/logtail didn't detect tampering logfile
Package: logcheck
wanted to work on #195935,
but found a less than funny issue, easy to reproduce:
* remove some lines in front of your logfile
* invoke logcheck
you'll get a big email with all not matching lines from that log.
not setting that to high priority because you are getting also the
newer loglines. don't know if i find time that weekend.
wanted to document it anyways.
a++
2006 Jul 11
1
Integrity checking NANOBSD images
We have a number of Soekris devices that we will be deploying
remotely in semi- hostile physical environments. The remote links
are dialup so I dont have a lot of bandwidth available. I want to do
integrity checks of the images so that I can detect any tampering of
the flash image.
If I upload a static sha256 binary to /tmp on the remote box (which
is a RAM disk) and then do something like
e.g.
# ssh remote1.example.com "mkdir /tmp/rand-directory"
# scp /usr/local/bin/sha256 remote1.example.com:/tmp/rand-directory/sha256
# scp /usr/local/b...
2009 Jul 28
2
How to use formulas for multivariate clustered data?
...way to define the hierarchical structure, is
it the "|" or is there another, better way? How can I restrict the
number of hierarchical levels?
And how to use in this context, the data, subset, weights and na.action
arguments?
Thanks in advance,
Klaus
--
Klaus Nordhausen
Researcher
Tampere School of Public Health
FIN-33014 University of Tampere
phone: +358 3 3551 4153
fax: +358 3 3551 4150
e-mail: Klaus.Nordhausen at uta.fi
2010 Jul 30
5
Aastra phones occasionally show "No Service" - Is there any network setting I can tamper to facilitate a quick DHCP renewal on the Aastra phones?
Hi Everyone,
I am running DD-WRT on a router that feeds about 30 Aastra 6753i. The phones
occasionally go into "No Service" mode. The POE switch doesn't seem to be
the problem as it's tested fine. I think the router sometimes gives up and
comes back quickly. Or something of that nature. However, the connections
are maintained if a call is going on because there are peer to peer
2005 Jan 07
3
Intrusion Suspected, Advice Sought
I run OS X 10.3.7 on a PowerMac MDD G4 on a cable broadband connection.
I have reason to think my system has been tampered with. Security
features in Mac OS X have been left unlocked (Preference Pane - Users)
even though a master lock has always been set in the Security
Preference Pane. This locks all other important preference panes which
could be tampered with. Also permissions have been reset at every boot
in...
2007 Aug 17
1
Cookie Sessions in Merb?
...For those that don''t know: the default session mechanism is to give
developers a Hash called session. To store this object between
requests it Marshals the session object and sends the object itself
(now as a bitstream) back to clients to store in their cookie file. To
prevent users from tampering with this data, a cryptographic digest
(using HMAC with SHA-1) is sent along with the bitstream).
The major problem with this scheme is that the Marshalled data is not
at all encrypted! Users are free to unmarshal and examine what
websites are storing in their sessions. They cannot change the d...
2004 Feb 16
0
Duncan's rooted system
...(automate this, naturally) comparing the restored files against the
installed files for relevant differences.
When thinking about how to prevent this in the future, I would advise
that you (1) automate the transfer of all system logs to electronic
mail, off the server, for preservation against tampering (IE, mail
yourself a copy of every log, to an offsite address, every day, so that
you have a copy in a tamper-proof location) ... and (2), consider using
command-line interfaces and living without X where possible.
(Daemonized Networking Services strongly advises against installing X on
ser...
2002 May 20
1
suggestion for example for base:naresid
...2 <- lm(y ~ x1))
residuals(lm.2)
tmp.omit <- lm.2$na.action # modify the na.action to be "exclude"
class(tmp.omit) <- "exclude"
naresid(tmp.omit, lm.2$residuals)
--
Markus Jantti
markus.jantti at uta.fi ** http://www.abo.fi/~mjantti
Dept of Economics ** University of Tampere ** FIN 33014 University of Tampere
PGP public key: http://www.abo.fi/~mjantti/pubring.asc
2001 Aug 29
1
suggestion for example for base:naresid
...2 <- lm(y ~ x1))
residuals(lm.2)
tmp.omit <- lm.2$na.action # modify the na.action to be "exclude"
class(tmp.omit) <- "exclude"
naresid(tmp.omit, lm.2$residuals)
--
Markus Jantti
markus.jantti at uta.fi ** http://www.abo.fi/~mjantti
Dept of Economics ** University of Tampere ** FIN 33014 University of Tampere
PGP public key: http://www.abo.fi/~mjantti/pubring.asc
2004 Jul 07
4
Setting home path to a dir within a users Linux home dir
...irectory level onto the defauly behavior of a [homes] share looking in /etc/passwd to find the users Linux home dir? It would offer a bit of protection if
Windows clients ended up in say the WinHome directory within their Linux home directory when logging in from Windows so they are not tempted to tamper with their desktop settings files for Linux from
Windows.
Maybe there is a bit of magic someone knows, a variable to include or something?
--
Michael Lueck
Lueck Data Systems
Remove the upper case letters NOSPAM to contact me directly.
2016 Jun 17
1
https and self signed
...to be common-sense these assumptions have
no empirical basis. A properly generated RSA certificate and key of
sufficient strength -- RSA k>=2048bits -- should provide protection
from brute force attacks for decades if not centuries. The usual way a
private key gets compromised is by theft or by tampering with its
generation. Putting yourself on a hamster wheel of constant
certificate generation and distribution simply increases the
opportunities for key theft and tampering.
Keys issued to individuals certainly should have short time limits on
them. In the same way that user accounts on system...
2015 Oct 19
2
Modify Contact in PJsip
...ribution is prohibited. If
you believe this message has been sent to you in error, please notify the
sender by replying to this transmission and delete the message without
disclosing it. Thank you. E-mail including attachments is susceptible to
data corruption, interception, unauthorized amendment, tampering and
viruses, and we only send and receive emails on the basis that we are not
liable for any such corruption, interception, amendment, tampering or
viruses or any consequences thereof.
-----Original Message-----
From: asterisk-users-bounces at lists.digium.com
[mailto:asterisk-users-bounces a...
2004 Mar 24
2
Where does the "prompt come from"
...ibution is prohibited. If you believe this message has been sent to you in error, please notify the sender by replying to this transmission and delete the message without disclosing it. Thank you.
E-mail including attachments is susceptible to data corruption, interruption, unauthorized amendment, tampering and viruses, and we only send and receive e-mails on the basis that we are not liable for any such corruption, interception, amendment, tampering or viruses or any consequences thereof.
2009 Dec 18
2
unverified files in 5.4
Hey, Gang!
To ensure that a file hasn't been corrupted or tampered with, you can
use rpm to verify the package it came from. Well, I found this:
rpm -Vv util-linux
....
........ /usr/bin/cal
S.?..... /usr/bin/chfn
........ /usr/bin/chrt
S.?..... /usr/bin/chsh
....
Does anyone else get this? And what would be the proper course of
action at this p...
2007 Mar 24
1
Video drivers, bittorrent and Centos 5?
...e download? If I am
downloading 4, 5, or 6 CDs from a .gov, .mil, or .edu site, I feel it will be
much more trustworthy. Granted, I could also outright pay for media from the
CentOS organization.
If someone can convince me that bittorrent is a 100% safe way to retrieve a copy
of the OS with no tampering, then I'll feel more comfortable. Otherwise, I
will want to completely redo my machine with CentOS 5, from partitioning on up.
Thanks for any feedback/insights.
Scott
2014 Jun 03
2
shadow_copy2 writable?
Hi,
Can anyone reassure that files & folders made available to windows via vfs
shadow_copy2 cannot be modified in any way? My NAS backups are stored on an
iscsi target formatted with ext4 & I'm concerned that they could be
tampered with by a virus such as Cryptolocker.
Thanks
2008 Oct 14
2
[LLVMdev] LLVM 2.4 problem? (resend)
...timizer does something strange to the sessionEntriesKVO
variable (I get strange "unrecognized selector sent to instance..."
errors at runtime that has nothing to do with the sessionEntriesKVO).
Removing the const keyword (or compiling with -O0) fixes the problem.
---
Tatu Vaajalahti
Tampere, Finland
2007 Apr 22
3
Asterisk & M$ SQL Server
Hi all,
Has anyone successfully set up asterisk to query a M$ SQL Server?
I'd like to be able to query one in the dial plan and use the results to
tamper with call priorities / CLID etc.
If someone could point me to a howto / guide or relate their experiences
with this, that would be great !
Thanking you all in advance.
Callum
P.S. Before anyone asks; it's a legacy database that has to be kept on
SQL Server for other business reasons.
2009 Mar 11
2
HSM devices and FreeBSD
...PCIe hardware security
modules that are supported on FreeBSD? I have not seen any on the
FreeBSD hardware compatibility lists. Again, as Eirik noted in his
question, HSMs are not simply crypto accelerators (which are supported
on FreeBSD), they also are a means of storing keys with physical,
tamper-resistant security.
Thanks.
Ed Sykes