Displaying 20 results from an estimated 504 matches for "tampers".
Did you mean:
tampere
2011 Jun 24
5
No DVD Mirrors - Only Torrent
I love Centos. Have in on my data centre servers, my home servers, my
laptop and my netbook. Yes there are serious and continuing security
concerns relating to Gnome and KDE but they are not Centos.
Currently running 5.6 and would like a two set DVD of that version.
However none of the mirrors offer pure DVDs only Torrent versions which
involve the possibility of bits being tampered with and
2004 Jul 09
1
Bug#258427: logcheck/logtail didn't detect tampering logfile
Package: logcheck
wanted to work on #195935,
but found a less than funny issue, easy to reproduce:
* remove some lines in front of your logfile
* invoke logcheck
you'll get a big email with all not matching lines from that log.
not setting that to high priority because you are getting also the
newer loglines. don't know if i find time that weekend.
wanted to document it anyways.
a++
2006 Jul 11
1
Integrity checking NANOBSD images
We have a number of Soekris devices that we will be deploying
remotely in semi- hostile physical environments. The remote links
are dialup so I dont have a lot of bandwidth available. I want to do
integrity checks of the images so that I can detect any tampering of
the flash image.
If I upload a static sha256 binary to /tmp on the remote box (which
is a RAM disk) and then do something
2009 Jul 28
2
How to use formulas for multivariate clustered data?
Dear R experts,
I wrote already a couple of weeks ago but did not get any reply.
Therefore I'll rephrase my question and hope some of you can give me
some answers or some advice where better to look for an answer.
In general I'm looking for information on how to program functions
using formulas in order to write a nonparametric multivariate
regression function with possible
2010 Jul 30
5
Aastra phones occasionally show "No Service" - Is there any network setting I can tamper to facilitate a quick DHCP renewal on the Aastra phones?
Hi Everyone,
I am running DD-WRT on a router that feeds about 30 Aastra 6753i. The phones
occasionally go into "No Service" mode. The POE switch doesn't seem to be
the problem as it's tested fine. I think the router sometimes gives up and
comes back quickly. Or something of that nature. However, the connections
are maintained if a call is going on because there are peer to peer
2005 Jan 07
3
Intrusion Suspected, Advice Sought
I run OS X 10.3.7 on a PowerMac MDD G4 on a cable broadband connection.
I have reason to think my system has been tampered with. Security
features in Mac OS X have been left unlocked (Preference Pane - Users)
even though a master lock has always been set in the Security
Preference Pane. This locks all other important preference panes which
could be tampered with. Also permissions have been
2007 Aug 17
1
Cookie Sessions in Merb?
I like the cookie sessions that Rails edge has - they make sense,
they''re fast, easy.
For those that don''t know: the default session mechanism is to give
developers a Hash called session. To store this object between
requests it Marshals the session object and sends the object itself
(now as a bitstream) back to clients to store in their cookie file. To
prevent users from
2004 Feb 16
0
Duncan's rooted system
Duncan writes:
>Howyd all? Seems that I have been routed. Possibly
>by a physical B&E, but who knows? Probably some
>of you do.... anyways, some politically sensitive
>email was deleted from a user account and the
>line
>
>low -tr &
>
>inserted into my .xinitrc .
>
>Duncan (Dhu) Campbell
>
I didn't see a lot of feedback that struck me as
2002 May 20
1
suggestion for example for base:naresid
Dear list:
since it took me a little while to figure out how to make use of naresid, I thought that
the below R code might be useful as an example on the help page.
Regards,
Markus
# generate some data
x1 <- runif(20)
y <- 10 + 5*x1 + rnorm(20)
summary(lm.0 <- lm(y ~ x1))
# append some NA's to y
y <- c(y, rep(NA, 5))
# generate some further x1s
x1 <- c(x1, runif(5))
#
2001 Aug 29
1
suggestion for example for base:naresid
Dear list:
since it took me a little while to figure out how to make use of naresid, I thought that
the below R code might be useful as an example on the help page.
Regards,
Markus
# generate some data
x1 <- runif(20)
y <- 10 + 5*x1 + rnorm(20)
summary(lm.0 <- lm(y ~ x1))
# append some NA's to y
y <- c(y, rep(NA, 5))
# generate some further x1s
x1 <- c(x1, runif(5))
#
2004 Jul 07
4
Setting home path to a dir within a users Linux home dir
Is there a trick to append an additional directory level onto the defauly behavior of a [homes] share looking in /etc/passwd to find the users Linux home dir? It would offer a bit of protection if
Windows clients ended up in say the WinHome directory within their Linux home directory when logging in from Windows so they are not tempted to tamper with their desktop settings files for Linux from
2016 Jun 17
1
https and self signed
On Thu, June 16, 2016 14:23, Valeri Galtsev wrote:
>
> On Thu, June 16, 2016 1:09 pm, Gordon Messmer wrote:
>>
>> I doubt that most users check the dates on SSL certificates,
>> unless they are familiar enough with TLS to understand that
>> a shorter validity period is better for security.
>
> Oh, this is what he meant: Cert validity period. Though I agree
>
2015 Oct 19
2
Modify Contact in PJsip
Do you know if this can be achieved with the standard sip stack in asterisk?
Kind Regards
Andrew Colin
Converged Telecoms (Pty) Ltd.
Licensed Telecoms Operator : (0258/IECS/JAN/09) (0258/IECNS/JAN/09)
Switchboard: +27 (0)10?591 4600
Email:? andrew at convergedgroup.net
Web: ?http://www.convergedgroup.net
75 Witkoppen Road, Northriding, Johannesburg, 2169
P O Box 7246, Weltevredenpark, 1715
This
2004 Mar 24
2
Where does the "prompt come from"
Hi All !
I have a little question about the shell that is run when establishing a
connection towards an SSH server.
The client(OpenSSH) displays a prompt(as usual) when a command is executed,
but my question is, where does the prompt come from.
Is it sent by the remote shell or is it handled in the client ??
The reason I ask is that we have developed a product that redirects
stdin/stdout/stderr
2009 Dec 18
2
unverified files in 5.4
Hey, Gang!
To ensure that a file hasn't been corrupted or tampered with, you can
use rpm to verify the package it came from. Well, I found this:
rpm -Vv util-linux
....
........ /usr/bin/cal
S.?..... /usr/bin/chfn
........ /usr/bin/chrt
S.?..... /usr/bin/chsh
....
Does anyone else get this? And what would be the proper course of
action at this point?
Thanks mucho.
--
2007 Mar 24
1
Video drivers, bittorrent and Centos 5?
At home I have CentOS 4.4 running on a Compaq Presario with an ATI Radeon 200G
video chipset. Naturally, the linux driver support ATI offers are pretty
crappy, thus many postings to many web sites on problems and possible
resolutions.
I forget where, and natually I didn't bookmark it, but there was one web site
that provided the exact working solution. From then on, my video support
2014 Jun 03
2
shadow_copy2 writable?
Hi,
Can anyone reassure that files & folders made available to windows via vfs
shadow_copy2 cannot be modified in any way? My NAS backups are stored on an
iscsi target formatted with ext4 & I'm concerned that they could be
tampered with by a virus such as Cryptolocker.
Thanks
2008 Oct 14
2
[LLVMdev] LLVM 2.4 problem? (resend)
Hi,
I don't know enough C to know for certain if this is a programmer or
compiler error:
In a Objective-C source file I have:
.
static const char sessionEntriesKVO = ' ';
.
Later I use that variable as a ID by taking it's address like this:
[feedManager addObserver:self forKeyPath:@"sessionEntriesCount"
options:0 context:&sessionEntriesKVO];
and later
.
if
2007 Apr 22
3
Asterisk & M$ SQL Server
Hi all,
Has anyone successfully set up asterisk to query a M$ SQL Server?
I'd like to be able to query one in the dial plan and use the results to
tamper with call priorities / CLID etc.
If someone could point me to a howto / guide or relate their experiences
with this, that would be great !
Thanking you all in advance.
Callum
P.S. Before anyone asks; it's a legacy database that
2009 Mar 11
2
HSM devices and FreeBSD
I am essentially asking the same question that Eirik Overby asked a
couple of years ago. Is anyone aware of PCI-X/PCIe hardware security
modules that are supported on FreeBSD? I have not seen any on the
FreeBSD hardware compatibility lists. Again, as Eirik noted in his
question, HSMs are not simply crypto accelerators (which are supported
on FreeBSD), they also are a means of storing keys