search for: threat

Displaying 20 results from an estimated 649 matches for "threat".

Did you mean: thread
2012 Jun 06
5
Error when upgrade from shorewall-4.4.13-3 to shorewall-4.5.2.3-1
...the net about this, but no still no light. Somebody can help me? Great appreciate for any help. Regards, ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Jul 05
11
testing shorewall6 on a virtual machine
...eth0:1 as interfaces for shorewall6. How is this done with IPv6? Viele Grüße Andreas Rittershofer -- ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Jul 31
11
A lot of kernel martian source messages in /var/log/messages
...the AP and not a misconfigured firewall/router since the messages goes away when I power the AP down. Thanks. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 May 18
11
Shorewall 4.5.4 Beta 3
...\ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 May 18
11
Shorewall 4.5.4 Beta 3
...\ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2011 Jul 05
24
Shorewall 4.4.21 RC 3
...://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2
2011 Jul 05
24
Shorewall 4.4.21 RC 3
...://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2
2012 May 31
5
Shorewall + squid + multi isp
...e squid mask source IP, shorewall can maintain and load balance sessions for the same source IP ? Thanks Fred ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 May 08
19
Shorewall, TPROXY, Transparent Squid and Multiples ISP
...sts or networks (LAN). My guess is the TPRoxy interception (spoofing) is not working.. Thank you... ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Jun 13
3
Default Route disappear
...) 1:P eth0 - tcp 22120 2:P eth0 - tcp 22122 ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Dec 07
3
Advanced Persistent Threats; Why aren't we confining Firefox and Evolution?
Moat of the advanced persistent threats (APT) are initiated via e-mail. Opening an attachment or clicking on a web link starts the process. Why isn't Firefox and Evolution confined with SELinux policy in a way that APT can't damage the rest of the system? Why are we not sandboxing these two apps with SELinux? I've discover...
2007 Oct 04
2
Internet threat management package
... Looking for a recommendation for a commercial threat management package. ( Think antivirus / antispy / anti-rootkit -- all rolled into one engine ), similar to this product: http://usa.kaspersky.com/products_services/work-space-security.php, which currently only supports one kernel for FC6, and RHEL4, officially. Here's the background. Nee...
2009 Jul 24
1
Russia Calls Skype/VoIP Security Threat
Anybody seen this article yet? Looks like Russian Telecom business have decided that VoIP is going to put a dent in their profits so their pitching it as a threat to Russia's national security and working to get laws put into place to make sure the government controls VoIP providers operating in or providing services to Russia. http://www.reuters.com/article/technologyNews/idUSTRE56N41I20090724?feedType=RSS&feedName=technologyNews&rpc=22&s...
2012 Jul 13
4
Multiple Wifi Profiles
...b the neighbors with my video streaming. 5.12GHz is a must, so NetworkMangler is out. Any advice welcomed. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Sep 03
10
Shorewall 4.5.8 Beta 1
...\ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Sep 03
10
Shorewall 4.5.8 Beta 1
...\ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2012 Apr 30
4
Shorewall under xen
...details for fallover. I''m pretty confident it can be done but is it a good idea? Any thoughts? John ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
2007 Aug 10
0
MINNESOTA - TwinCities Asterisk Users Group 8/11/2007 Echo Cancellation Threat or Menace?
This is a reminder that the Twin Cities Asterisk Users Group will be meeting this Saturday @ 11:30am. August 11 2007 TCAUG Meeting - Echo Cancellation Threat or Menace? Sound Choice Communications LLC Offices, Bloomington Start: 08/11/2007 - 11:30am Hey all you Twin cities Asterisk Users, It's time once again to have another meeting. The Main topic for the August 11th meeting is: Echo Cancellation. Eric Osterberg will be hosting the meeting at...
2010 Oct 24
3
will darwine a big threats to bill gates? or a big helper?
1) darwine helps linux with enough applications on none-x86 machines. user can drop windows/x86 away. it seems dar wine is a threat. 2) when linux people are used to windows applications on those machines. microsoft claims to compile vista to those machines. microsoft gets the world of those machines . darwine helps microsoft without any thanks from bill gates. what will happen next?
2008 May 25
1
marginality principle / selecting the right type of SS for an interaction hypothesis
...uestion (although I found some good pointers). In brief, leaving my covariates aside, I hypothesize that women (a) generally perform lower then men in a specific task (microworld performance, MWP) and that they (b) perform especially poor if a certain situational condition exists ("stereotype threat"). N = 160, 80 female & 80 male participants, 82 under stereotype threat and 78 not. I realize that it makes no sense to report/interpret a main effect of stereotype threat in the confirmed presence of the interaction effect GENDER:STTHREAT, because a main effect of stereotype threat woul...