Displaying 20 results from an estimated 600 matches similar to: "Is there a public blacklist of hackers' IPaddresses?"
2008 Jan 18
2
OT: Call for beta testers (well... perhaps late Alpha).
We've just launched the beta of a free service which is, really, still
only JUST out of the alpha stages.
http://www.voipmagnet.com
The basic idea is this: it's an opt-in directory focused on VoIP contact
info (with elements of social networking and privacy control).
Again, the service is very rough, but we'd like input from the VoIP
community. There are a good many things that are
2006 May 24
2
PDF Writing without Cached File
I''m researching generating PDF files via RoR. I see there are packages
available to do this. One such package is the PDF-Writer. The examples
I saw for this package save the PDF to a file. Is there a way I can
output the PDF on-the-fly to the browser rather than having a temporary
PDF file?
I just can''t have these files laying around since they contain sensitive
2009 Mar 24
6
Is there a public blacklist of hackers' IP addresses?
Hi,
In last one week I have seen two servers of our organization successfully
hacked and some other under attack from some other IP addresses. We would
block one IP address on our firewall and after a few hours, they would start
getting hits from some another IP address. When I checked them on whois.net,
they all were from Amsterdam. Surprisingly, I once had similar attack in the
past and it was
2001 Jun 02
1
ssh-keygen(1) misinfo: English prose entropy 0.6 - 1.3 b/char!
Quoth manpage:
otherwise easily guessable (English prose has only 1-2 bits of entropy
per word, and provides very bad passphrases). The passphrase can be
Whoever wrote that manpage is either possessed of some
amazing human insight to which I am not privvy, chose a very
non-representative sample of English prose, or is just plain
wrong. I know none of you would ever make such a glaring
error,
2008 Dec 05
4
Using DECT phones as SIP phones?
I see a variety of DECT 6 phones available CHEAP at costco. Is there a way
to convert these to SIP?
I recall someone talking about a Siemens devices that works with all DECT
phones, making them SIP (I think)....
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20081205/fdd14af9/attachment.htm
2009 Jan 07
9
''zfs recv'' is very slow
On Wed 07/01/09 20:31 , Carsten Aulbert carsten.aulbert at aei.mpg.de sent:
> Brent Jones wrote:
> >
> > Using mbuffer can speed it up dramatically, but
> > this seems like a hack> without addressing a real problem with zfs
> > send/recv.> Trying to send any meaningful sized snapshots
> > from say an X4540 takes> up to 24 hours, for as little as 300GB
2009 Aug 20
12
IPKall and FWD
We all know the FWD is NO more available.
How to set up IPKALL so that my Inbound number rings on my eyebeam or xlite
?
Any alternative for FWD ?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20090820/4206395a/attachment.htm
2008 Dec 09
8
pop3 attack
I was looking at my maillog and it looks like someone is trying to get
into my pop3 server.
Dec 9 15:28:54 mailserver dovecot: pop3-login: Aborted login: user=<alexis>, method=PLAIN, rip=::ffff:66.167.184.203, lip=::ffff:192.168.1.2
Dec 9 15:29:08 mailserver dovecot: pop3-login: Aborted login: user=<alfonso>, method=PLAIN, rip=::ffff:66.167.184.203, lip=::ffff:192.168.1.2
Dec 9
2002 Dec 29
1
Deleted from partition table
I accidentally removed an ext3 partition from the partition table. I know
roughly where it started. Is there any way of finding the superblock and
reconstructing it?
TIA,
Dave
(Yes I have a backup of the important stuff!)
2010 Jul 25
2
using Lazy_Expunge to enforce retention policy
Hi,
I've been experimenting with using Lazy_Expunge as a tool to enforce
document retention policies (by keeping users from deleting emails
forever, instead expiring them after a set time). My problem is, how do
I keep the user from deleting/expunging mails *inside the expunge folder
itself*?
I am using dovecot-1.2.10 built from FreeBSD's ports tree, and I am
using the following
2001 Aug 02
1
AIM can't find "Application Data" folder
when I try to run aim.exe under wine, i get the following error:
err:shell:SHGetSpecialFolderPathA Failed to create directory
'C:\WINNT\Application Data'.
why is it looking for that folder there? The partition is a win2k
install, so it would find it under "C:\Documents and
Settings\Administrator\Application Data". How do I make it look there?
Erik
2009 Jul 29
1
Misunderstood thing
Hello,
I'm novice on the SIP protocol also on Asterisk. Could someone explain
me why the Asterisk is using username and secret config on peer connection?
Does Asterisk can send call to peer without username and secret
configuration ?
Sincerely,
Tseveen.
2013 Nov 04
0
[LLVMdev] hackers lab discussion item
I'm really interested to discuss the problem of running LLVM multiple
times on the same function in order to guide later tries.
In looking at things briefly earlier, it seemed that this was safe to do
as long as you didn't let asm printer get called on the result.
I.e. you could throw early results away with impunity.
It seems that by precompiling a function to get some information
2001 Jul 29
0
ADV: Other silly shiny postmasters will exclude monthly beneath hackers.
Eddie will confront the surreptitious Blowfish and relay it over its
doorway. Will you examine on the room, if Tim hatefully binds the
input? If the moronic llamas can delete admiringly, the odd
client may build more data buss. Where doesn't Rose kick daily? Try
starting the field's insecure admin and Gay will facilitate you! The
analyst furiously learns the dense cafe. Many
2001 Sep 21
1
NEWS on this SOUND PROBLEM !!!!! details !!!! CODERS WANTED ! HACKERS WANTED !
this is the problem !!!
----------
08068c60:Call winmm.mixerGetLineControlsA(00008000,405c2090,00000000)
ret=00403117
08068c60:Ret winmm.mixerGetLineControlsA() retval=00000000 ret=00403117
08068c60:Call winmm.mixerGetControlDetailsA(00008000,405c6c18,00000000)
ret=004033f4
08068c60:Ret winmm.mixerGetControlDetailsA() retval=00000000
ret=004033f4
08068c60:Call kernel32.TlsGetValue(00000001)
2004 Jul 08
0
R: VoIP hackers gut Caller ID
> hi...
>
> here in Italy is almost impossible to set an
> invalid cid, if is out of your allowed space.
> ie. if you have X numbers on your PRI,
> you can only set one of these. nothing more.
> on bri you simply cannot do nothing.
>
> just my 2 cents.
In Switzerland CLI is also impossible to spoof - by default. If you ask the BRI/PRI provider, and you have an ISDN
2014 Apr 23
3
hackers celebrate this day: openssh drops security! was: Re: heads up: tcpwrappers support going away
On 23 April 2014 21:43, mancha <mancha1 at zoho.com> wrote:
> On Wed, Apr 23, 2014 at 12:26:58PM -0700, Iain Morgan wrote:
>> A slightly better solution would be a PAM module that uses the same
>> syntax as libwrap. Possibly someone has already written such a module.
>
> Possibly, but only for platforms which use for PAM.
Pam is executed so late in the chain that any
2005 Feb 14
3
Hackers on my Web server
I have discovered that a gamer has hacked into my web server through a
backdoor left open by my predecessor. I have closed the door, but when I
try to delete the folders left behind I receive "Access Denied", or when
I try to take ownership I receive "Unable to Find File...". I have
removed most of the files to obtain enough space to continue operations
but would like to remove
2007 Aug 29
2
Recoding multiple columns consistently
Hi,
I have a dataframe that contains pedigree information;
that is individual, sire and dam identities as separate
columns. It also has date of birth.
These identifiers are not numeric, or not sequential.
Obviously, an identifier can appear in one or two columns,
depending on whether it was a parent or not. These should
be consistent.
Not all identifiers appear in the individual column - it
is
2007 May 04
1
Any UPS hardware hackers ?
And now for something completely different... :-) And yes, it's
off-topic to this particular forum as it's not about NUT development.
<ducking>
Is there anyone around here who knows his way inside the hardware of
an APC Smart-UPS? The APC support division will not reveal _any_
details or service information, and the only descriptive documentation
I've found on the Web is in