search for: tampers

Displaying 20 results from an estimated 485 matches for "tampers".

Did you mean: tampere
2011 Jun 24
5
No DVD Mirrors - Only Torrent
I love Centos. Have in on my data centre servers, my home servers, my laptop and my netbook. Yes there are serious and continuing security concerns relating to Gnome and KDE but they are not Centos. Currently running 5.6 and would like a two set DVD of that version. However none of the mirrors offer pure DVDs only Torrent versions which involve the possibility of bits being tampered with and
2004 Jul 09
1
Bug#258427: logcheck/logtail didn't detect tampering logfile
Package: logcheck wanted to work on #195935, but found a less than funny issue, easy to reproduce: * remove some lines in front of your logfile * invoke logcheck you'll get a big email with all not matching lines from that log. not setting that to high priority because you are getting also the newer loglines. don't know if i find time that weekend. wanted to document it anyways. a++
2006 Jul 11
1
Integrity checking NANOBSD images
We have a number of Soekris devices that we will be deploying remotely in semi- hostile physical environments. The remote links are dialup so I dont have a lot of bandwidth available. I want to do integrity checks of the images so that I can detect any tampering of the flash image. If I upload a static sha256 binary to /tmp on the remote box (which is a RAM disk) and then do something
2009 Jul 28
2
How to use formulas for multivariate clustered data?
Dear R experts, I wrote already a couple of weeks ago but did not get any reply. Therefore I'll rephrase my question and hope some of you can give me some answers or some advice where better to look for an answer. In general I'm looking for information on how to program functions using formulas in order to write a nonparametric multivariate regression function with possible
2010 Jul 30
5
Aastra phones occasionally show "No Service" - Is there any network setting I can tamper to facilitate a quick DHCP renewal on the Aastra phones?
Hi Everyone, I am running DD-WRT on a router that feeds about 30 Aastra 6753i. The phones occasionally go into "No Service" mode. The POE switch doesn't seem to be the problem as it's tested fine. I think the router sometimes gives up and comes back quickly. Or something of that nature. However, the connections are maintained if a call is going on because there are peer to peer
2005 Jan 07
3
Intrusion Suspected, Advice Sought
I run OS X 10.3.7 on a PowerMac MDD G4 on a cable broadband connection. I have reason to think my system has been tampered with. Security features in Mac OS X have been left unlocked (Preference Pane - Users) even though a master lock has always been set in the Security Preference Pane. This locks all other important preference panes which could be tampered with. Also permissions have been
2007 Aug 17
1
Cookie Sessions in Merb?
I like the cookie sessions that Rails edge has - they make sense, they''re fast, easy. For those that don''t know: the default session mechanism is to give developers a Hash called session. To store this object between requests it Marshals the session object and sends the object itself (now as a bitstream) back to clients to store in their cookie file. To prevent users from
2004 Feb 16
0
Duncan's rooted system
Duncan writes: >Howyd all? Seems that I have been routed. Possibly >by a physical B&E, but who knows? Probably some >of you do.... anyways, some politically sensitive >email was deleted from a user account and the >line > >low -tr & > >inserted into my .xinitrc . > >Duncan (Dhu) Campbell > I didn't see a lot of feedback that struck me as
2002 May 20
1
suggestion for example for base:naresid
Dear list: since it took me a little while to figure out how to make use of naresid, I thought that the below R code might be useful as an example on the help page. Regards, Markus # generate some data x1 <- runif(20) y <- 10 + 5*x1 + rnorm(20) summary(lm.0 <- lm(y ~ x1)) # append some NA's to y y <- c(y, rep(NA, 5)) # generate some further x1s x1 <- c(x1, runif(5)) #
2001 Aug 29
1
suggestion for example for base:naresid
Dear list: since it took me a little while to figure out how to make use of naresid, I thought that the below R code might be useful as an example on the help page. Regards, Markus # generate some data x1 <- runif(20) y <- 10 + 5*x1 + rnorm(20) summary(lm.0 <- lm(y ~ x1)) # append some NA's to y y <- c(y, rep(NA, 5)) # generate some further x1s x1 <- c(x1, runif(5)) #
2004 Jul 07
4
Setting home path to a dir within a users Linux home dir
Is there a trick to append an additional directory level onto the defauly behavior of a [homes] share looking in /etc/passwd to find the users Linux home dir? It would offer a bit of protection if Windows clients ended up in say the WinHome directory within their Linux home directory when logging in from Windows so they are not tempted to tamper with their desktop settings files for Linux from
2016 Jun 17
1
https and self signed
On Thu, June 16, 2016 14:23, Valeri Galtsev wrote: > > On Thu, June 16, 2016 1:09 pm, Gordon Messmer wrote: >> >> I doubt that most users check the dates on SSL certificates, >> unless they are familiar enough with TLS to understand that >> a shorter validity period is better for security. > > Oh, this is what he meant: Cert validity period. Though I agree >
2015 Oct 19
2
Modify Contact in PJsip
Do you know if this can be achieved with the standard sip stack in asterisk? Kind Regards Andrew Colin Converged Telecoms (Pty) Ltd. Licensed Telecoms Operator : (0258/IECS/JAN/09) (0258/IECNS/JAN/09) Switchboard: +27 (0)10?591 4600 Email:? andrew at convergedgroup.net Web: ?http://www.convergedgroup.net 75 Witkoppen Road, Northriding, Johannesburg, 2169 P O Box 7246, Weltevredenpark, 1715 This
2004 Mar 24
2
Where does the "prompt come from"
Hi All ! I have a little question about the shell that is run when establishing a connection towards an SSH server. The client(OpenSSH) displays a prompt(as usual) when a command is executed, but my question is, where does the prompt come from. Is it sent by the remote shell or is it handled in the client ?? The reason I ask is that we have developed a product that redirects stdin/stdout/stderr
2009 Dec 18
2
unverified files in 5.4
Hey, Gang! To ensure that a file hasn't been corrupted or tampered with, you can use rpm to verify the package it came from. Well, I found this: rpm -Vv util-linux .... ........ /usr/bin/cal S.?..... /usr/bin/chfn ........ /usr/bin/chrt S.?..... /usr/bin/chsh .... Does anyone else get this? And what would be the proper course of action at this point? Thanks mucho. --
2007 Mar 24
1
Video drivers, bittorrent and Centos 5?
At home I have CentOS 4.4 running on a Compaq Presario with an ATI Radeon 200G video chipset. Naturally, the linux driver support ATI offers are pretty crappy, thus many postings to many web sites on problems and possible resolutions. I forget where, and natually I didn't bookmark it, but there was one web site that provided the exact working solution. From then on, my video support
2014 Jun 03
2
shadow_copy2 writable?
Hi, Can anyone reassure that files & folders made available to windows via vfs shadow_copy2 cannot be modified in any way? My NAS backups are stored on an iscsi target formatted with ext4 & I'm concerned that they could be tampered with by a virus such as Cryptolocker. Thanks
2008 Oct 14
2
[LLVMdev] LLVM 2.4 problem? (resend)
Hi, I don't know enough C to know for certain if this is a programmer or compiler error: In a Objective-C source file I have: . static const char sessionEntriesKVO = ' '; . Later I use that variable as a ID by taking it's address like this: [feedManager addObserver:self forKeyPath:@"sessionEntriesCount" options:0 context:&sessionEntriesKVO]; and later . if
2007 Apr 22
3
Asterisk & M$ SQL Server
Hi all, Has anyone successfully set up asterisk to query a M$ SQL Server? I'd like to be able to query one in the dial plan and use the results to tamper with call priorities / CLID etc. If someone could point me to a howto / guide or relate their experiences with this, that would be great ! Thanking you all in advance. Callum P.S. Before anyone asks; it's a legacy database that
2009 Mar 11
2
HSM devices and FreeBSD
I am essentially asking the same question that Eirik Overby asked a couple of years ago. Is anyone aware of PCI-X/PCIe hardware security modules that are supported on FreeBSD? I have not seen any on the FreeBSD hardware compatibility lists. Again, as Eirik noted in his question, HSMs are not simply crypto accelerators (which are supported on FreeBSD), they also are a means of storing keys