similar to: sip extension compromised, need help blocking brute force attempts

Displaying 20 results from an estimated 300 matches similar to: "sip extension compromised, need help blocking brute force attempts"

2004 Aug 22
3
asterisk T100P to Merlin Legend
Management just approved purchase of a Digium T100P and a T1 card for our Merlin Legend Switch. I will appreciate comments from anyone performing this installation before: - Which T1 card did you use in the Merlin Legend? - Did you require any special interface? (CSU/DSU, etc) - Any items to watch during installation. Also we will need to remove one of our old analog Trunk cards to accomodate
2009 May 11
1
Seewave options
Good afternoon, My name is Thiago. I'm?a graduate student?and affiliated to an Anuran Bioacustic and Systematics Laboratory at UFU (Federal University of Uberl?ndia)?in Brazil.?The professor in charge of the?lab (Dr. Ariovaldo Antonio Giaretta) and I?have recently been?making use?of R, specially the packages Sound and Seewave so as to analize?anuran recordings. This software is just
2009 Oct 19
1
speech spectogram
Hi, I need to plot a spectogram for a speech signal. Is there a package that can do this? -- Rajesh.J [[alternative HTML version deleted]]
2004 Aug 21
1
just-added second X100P
I just added a second X100P card to my * server, altough it seems to be working * seems to be ignoring it: zaptel.conf: ----------------- fxsks=1-2 loadzone=us defaultzone=us zapata.conf: ------------------ context=inbound-analog signalling=fxs_ks group=1 channel => 1 channel => 2 I created a couple of test extensions: ; test extensions
2004 Jul 22
6
D-Link DPH-80S vs *
List, The D'Link phones are not reliable at this time. I am trying to get them fix their Firmware to my specifications. It is half done so far. However there are still hurdles. below email is self explanatory. At present if you want to use these phones, you need to buy D'Link's SIP Server and run this as one of your SIP servers in the blend to call to Asterisk. Seshu Kanuri "G
2010 Dec 20
2
SIP 420
Hi; I am running asterisk 1.6 from Fonality (Trixbox PRO). I am trying to initiate a call FROM a softphone client to asterisk (either an internal 4 digit extension call) or an outside line via a SIP trunk. In both cases, asterisk rejects the call with a 420. In this case, it?s a call from x3992 to x4415 Does this require a change on the softphone for x-call-detail? <--- SIP read
2020 Jan 25
1
Prevent the firewall from being compromised through libvirtd
Hello @ all The libvirt-daemon compromises the packet-filtering-rules at daemon-startup, before any VM is started. To prevent this, I first have create a hook-script which deletes existing rules, but apparently these rules are set after the hook. Removing the defined networks was no solution either. Worst of all is, a service restart of the daemon may even completely neutralize the firewall.
2008 May 14
2
OpenSSL/SSH Bug on Debian - Compromised key pairs
Hi People, I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or an SSL cert request on Debian or Ubuntu from 2006 on is vulnerable http://it.slashdot.org/it/08/05/13/1533212.shtml
2019 Nov 14
0
how to know when a system is compromised
Do you run rkhunter? On 11/14/19 9:40 AM, Christopher Wensink wrote: > How do you know when a Linux system has been compromised?? > > Every day I watch our systems with all the typical tools, ps, top, who, > I watch firewall / IPS logs, I have logwatch setup and mailing daily > summaries to me and I dive deeper into logs if something looks suspicious. > > What am I missing
2019 Nov 14
0
how to know when a system is compromised
On 2019-11-14 10:01, Christopher Wensink wrote: > I have not, I'll look into that one, thanks! > > On 11/14/2019 9:48 AM, SternData wrote: >> Do you run rkhunter? >> >> On 11/14/19 9:40 AM, Christopher Wensink wrote: >>> How do you know when a Linux system has been compromised? I'm sure you have followed the procedure how to install system and
2019 Nov 14
0
how to know when a system is compromised
<sigh> Thanks - I'll keep that in mind... ________________________________ From: CentOS <centos-bounces at centos.org> on behalf of Chris Adams <linux at cmadams.net> Sent: Thursday, November 14, 2019 10:57 AM To: centos at centos.org <centos at centos.org> Subject: [EXTERNAL] Re: [CentOS] how to know when a system is compromised Once upon a time, Leroy Tennison
2005 May 09
0
Account compromised: billing information moved or changed.
[paypal_logo.gif] [action.gif] LEGAL NOTICE The following message is an email sent to you by an administrator of "PayPal.com". If this message is spam, contains abusive or other comments you find offensive please contact the webmaster at the following address: [1]admin at
2008 Dec 10
1
DSA harmful for remote authentication to compromised hosts?
Hello! I'd just like to run this by some people who are more familiar with the RSA and DSA algorithms and their use within (Open)SSH. I've been using OpenSSH happily with the assumption that using key-based authentication (RSA or DSA public keys pushed to .ssh/authorized_keys on remote hosts) provides a number of benefits, including an important security-related one -- Logging in to a
2008 May 22
0
/home/putnopvut/asa/AST-2008-007/AST-2008-007: AST-2008-007 Cryptographic keys generated by OpenSSL on Debian-based systems compromised
Asterisk Project Security Advisory - AST-2008-007 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Asterisk installations using cryptographic keys | | | generated
2003 Jun 04
3
I am totaly frustrated running samba
Hi I am still in my begining steps with linux and samba. my system is 100MHz 128MB 4GB OS is RH 9.0 every time I tried to access my samba server called (linux) from my windows 2000 pro it gave me " the network path was not found " I can ping it and telnet to it no prob I ran testparm and the result 'll be below- I 'm waiting for your help guys ( I tried to clear the log as much
2019 Nov 14
0
how to know when a system is compromised
This is one where there's probably no limit to what you could do. We have a high-security environment and are using Aide and OSSEC. Aide has been good at reporting file system changes and is very granular, the dilemma is what to monitor and what to ignore (keep from being inundated with reports of innocuous changes at the risk of missing something). However, it is not daemon-based so
2005 Feb 09
2
full-d] Administrivia: List Compromised due to Mailman Vulnerability (fwd)
Sorry for the cross post, but this is an important one potentially affecting all recipients. This just crossed the Full Disclosure mailman moderated mailing list. It bears a careful read, and thought about whether a response is needed. The implication is that if there is any use of a mailman password in common with a password you 'care' about, you need to take appropriate action at
2008 Aug 06
1
Help: Server security compromised?
Hi, Need some help about this as it's gotten me really concerned. I'm probably reading too much into this but for about two weeks now my daily log has increased by almost 10 times. After running through a couple of days of logs with a script, it seems that I'm getting flooded on SMTP from this IP 219.64.114.52 which belongs to VSNL and appears to be statically assigned IP
2018 Nov 28
2
4.20.0-rc3 nouveau/Quadro P2000 Mobile: runpm causing ACPI errors, lockups
On Wed, Nov 28, 2018 at 05:55:44PM +0200, Mika Westerberg wrote: > On Wed, Nov 28, 2018 at 10:09:22AM -0500, Michael S. Tsirkin wrote: > > Yea all this is weird, in particular I wonder why does everyone > > using dsm insists on saying Arg4 > > when they actually mean Arg3. ACPI numbers arguments from 0. > > > > So it's a bit ugly, and maybe worth fixing but
2019 Nov 14
2
how to know when a system is compromised
I have not, I'll look into that one, thanks! On 11/14/2019 9:48 AM, SternData wrote: > Do you run rkhunter? > > On 11/14/19 9:40 AM, Christopher Wensink wrote: >> How do you know when a Linux system has been compromised?? >> >> Every day I watch our systems with all the typical tools, ps, top, who, >> I watch firewall / IPS logs, I have logwatch setup and