search for: tampering

Displaying 20 results from an estimated 504 matches for "tampering".

2011 Jun 24
5
No DVD Mirrors - Only Torrent
...ntos 5.6 DVDs because, they say, they can't get a virgin 5.6 DVD only Torrent. FreeBSD 8.2 (the latest) offers a virgin 1 DVD download. The whole distribution is about 4 DVDs. Can Centos offer a virgin 1 DVD download of 5.6 for those of us who are unhappy about slow Torrent, the possibility of tampering and the traffic out of our machines ? BY THE WAY, a very BIG and GRATEFUL THANK YOU to the EXCELLENT TEAM that gave us the wonderful Centos 5.6. Very much appreciated and if KBS and the others ever venture out of Kent and London a bit northwards but south of Watford I would be delighted to buy hi...
2004 Jul 09
1
Bug#258427: logcheck/logtail didn't detect tampering logfile
Package: logcheck wanted to work on #195935, but found a less than funny issue, easy to reproduce: * remove some lines in front of your logfile * invoke logcheck you'll get a big email with all not matching lines from that log. not setting that to high priority because you are getting also the newer loglines. don't know if i find time that weekend. wanted to document it anyways. a++
2006 Jul 11
1
Integrity checking NANOBSD images
We have a number of Soekris devices that we will be deploying remotely in semi- hostile physical environments. The remote links are dialup so I dont have a lot of bandwidth available. I want to do integrity checks of the images so that I can detect any tampering of the flash image. If I upload a static sha256 binary to /tmp on the remote box (which is a RAM disk) and then do something like e.g. # ssh remote1.example.com "mkdir /tmp/rand-directory" # scp /usr/local/bin/sha256 remote1.example.com:/tmp/rand-directory/sha256 # scp /usr/local/bin/...
2009 Jul 28
2
How to use formulas for multivariate clustered data?
Dear R experts, I wrote already a couple of weeks ago but did not get any reply. Therefore I'll rephrase my question and hope some of you can give me some answers or some advice where better to look for an answer. In general I'm looking for information on how to program functions using formulas in order to write a nonparametric multivariate regression function with possible
2010 Jul 30
5
Aastra phones occasionally show "No Service" - Is there any network setting I can tamper to facilitate a quick DHCP renewal on the Aastra phones?
Hi Everyone, I am running DD-WRT on a router that feeds about 30 Aastra 6753i. The phones occasionally go into "No Service" mode. The POE switch doesn't seem to be the problem as it's tested fine. I think the router sometimes gives up and comes back quickly. Or something of that nature. However, the connections are maintained if a call is going on because there are peer to peer
2005 Jan 07
3
Intrusion Suspected, Advice Sought
I run OS X 10.3.7 on a PowerMac MDD G4 on a cable broadband connection. I have reason to think my system has been tampered with. Security features in Mac OS X have been left unlocked (Preference Pane - Users) even though a master lock has always been set in the Security Preference Pane. This locks all other important preference panes which could be tampered with. Also permissions have been
2007 Aug 17
1
Cookie Sessions in Merb?
...For those that don''t know: the default session mechanism is to give developers a Hash called session. To store this object between requests it Marshals the session object and sends the object itself (now as a bitstream) back to clients to store in their cookie file. To prevent users from tampering with this data, a cryptographic digest (using HMAC with SHA-1) is sent along with the bitstream). The major problem with this scheme is that the Marshalled data is not at all encrypted! Users are free to unmarshal and examine what websites are storing in their sessions. They cannot change the data...
2004 Feb 16
0
Duncan's rooted system
...(automate this, naturally) comparing the restored files against the installed files for relevant differences. When thinking about how to prevent this in the future, I would advise that you (1) automate the transfer of all system logs to electronic mail, off the server, for preservation against tampering (IE, mail yourself a copy of every log, to an offsite address, every day, so that you have a copy in a tamper-proof location) ... and (2), consider using command-line interfaces and living without X where possible. (Daemonized Networking Services strongly advises against installing X on server...
2002 May 20
1
suggestion for example for base:naresid
Dear list: since it took me a little while to figure out how to make use of naresid, I thought that the below R code might be useful as an example on the help page. Regards, Markus # generate some data x1 <- runif(20) y <- 10 + 5*x1 + rnorm(20) summary(lm.0 <- lm(y ~ x1)) # append some NA's to y y <- c(y, rep(NA, 5)) # generate some further x1s x1 <- c(x1, runif(5)) #
2001 Aug 29
1
suggestion for example for base:naresid
Dear list: since it took me a little while to figure out how to make use of naresid, I thought that the below R code might be useful as an example on the help page. Regards, Markus # generate some data x1 <- runif(20) y <- 10 + 5*x1 + rnorm(20) summary(lm.0 <- lm(y ~ x1)) # append some NA's to y y <- c(y, rep(NA, 5)) # generate some further x1s x1 <- c(x1, runif(5)) #
2004 Jul 07
4
Setting home path to a dir within a users Linux home dir
Is there a trick to append an additional directory level onto the defauly behavior of a [homes] share looking in /etc/passwd to find the users Linux home dir? It would offer a bit of protection if Windows clients ended up in say the WinHome directory within their Linux home directory when logging in from Windows so they are not tempted to tamper with their desktop settings files for Linux from
2016 Jun 17
1
https and self signed
...to be common-sense these assumptions have no empirical basis. A properly generated RSA certificate and key of sufficient strength -- RSA k>=2048bits -- should provide protection from brute force attacks for decades if not centuries. The usual way a private key gets compromised is by theft or by tampering with its generation. Putting yourself on a hamster wheel of constant certificate generation and distribution simply increases the opportunities for key theft and tampering. Keys issued to individuals certainly should have short time limits on them. In the same way that user accounts on systems s...
2015 Oct 19
2
Modify Contact in PJsip
...ribution is prohibited. If you believe this message has been sent to you in error, please notify the sender by replying to this transmission and delete the message without disclosing it. Thank you. E-mail including attachments is susceptible to data corruption, interception, unauthorized amendment, tampering and viruses, and we only send and receive emails on the basis that we are not liable for any such corruption, interception, amendment, tampering or viruses or any consequences thereof. -----Original Message----- From: asterisk-users-bounces at lists.digium.com [mailto:asterisk-users-bounces at l...
2004 Mar 24
2
Where does the "prompt come from"
...ibution is prohibited. If you believe this message has been sent to you in error, please notify the sender by replying to this transmission and delete the message without disclosing it. Thank you. E-mail including attachments is susceptible to data corruption, interruption, unauthorized amendment, tampering and viruses, and we only send and receive e-mails on the basis that we are not liable for any such corruption, interception, amendment, tampering or viruses or any consequences thereof.
2009 Dec 18
2
unverified files in 5.4
Hey, Gang! To ensure that a file hasn't been corrupted or tampered with, you can use rpm to verify the package it came from. Well, I found this: rpm -Vv util-linux .... ........ /usr/bin/cal S.?..... /usr/bin/chfn ........ /usr/bin/chrt S.?..... /usr/bin/chsh .... Does anyone else get this? And what would be the proper course of action at this point? Thanks mucho. --
2007 Mar 24
1
Video drivers, bittorrent and Centos 5?
...e download? If I am downloading 4, 5, or 6 CDs from a .gov, .mil, or .edu site, I feel it will be much more trustworthy. Granted, I could also outright pay for media from the CentOS organization. If someone can convince me that bittorrent is a 100% safe way to retrieve a copy of the OS with no tampering, then I'll feel more comfortable. Otherwise, I will want to completely redo my machine with CentOS 5, from partitioning on up. Thanks for any feedback/insights. Scott
2014 Jun 03
2
shadow_copy2 writable?
Hi, Can anyone reassure that files & folders made available to windows via vfs shadow_copy2 cannot be modified in any way? My NAS backups are stored on an iscsi target formatted with ext4 & I'm concerned that they could be tampered with by a virus such as Cryptolocker. Thanks
2008 Oct 14
2
[LLVMdev] LLVM 2.4 problem? (resend)
Hi, I don't know enough C to know for certain if this is a programmer or compiler error: In a Objective-C source file I have: . static const char sessionEntriesKVO = ' '; . Later I use that variable as a ID by taking it's address like this: [feedManager addObserver:self forKeyPath:@"sessionEntriesCount" options:0 context:&sessionEntriesKVO]; and later . if
2007 Apr 22
3
Asterisk & M$ SQL Server
Hi all, Has anyone successfully set up asterisk to query a M$ SQL Server? I'd like to be able to query one in the dial plan and use the results to tamper with call priorities / CLID etc. If someone could point me to a howto / guide or relate their experiences with this, that would be great ! Thanking you all in advance. Callum P.S. Before anyone asks; it's a legacy database that
2009 Mar 11
2
HSM devices and FreeBSD
I am essentially asking the same question that Eirik Overby asked a couple of years ago. Is anyone aware of PCI-X/PCIe hardware security modules that are supported on FreeBSD? I have not seen any on the FreeBSD hardware compatibility lists. Again, as Eirik noted in his question, HSMs are not simply crypto accelerators (which are supported on FreeBSD), they also are a means of storing keys