Displaying 20 results from an estimated 200 matches similar to: "VoIP Abuse to Twitter (real time VoIP Abuse)"
2009 Jul 20
0
No subject
uses for the compromised accounts - one is to get to expensive
destinations - e.g. mobiles in eastern european/african destinations, and
the other would appear to be pure fraud - e.g. 10 concurrent calls to what
looks like a mobile in a country with a dubious telecom infrastructure -
which is obviously a destination that charges a high interconnect fee, so
one theory is that it's the
2010 Oct 21
5
SIP Blacklisting
Hi,
Given the recent increase in SIP brute force attacks, I've had a little idea.
The standard scripts that block after X attempts work well to prevent you actually being compromised, but once you've been 'found' then the attempts seem to keep coming for quite some time. Older versions of sipvicious don't appear to stop once you start sending un-reachables (or straight
1997 Feb 18
0
Abuse of the syslog facility
Any unpriveledged user can abuse the syslog facility in an interesting
way. The following example is a good one that can put misleading
information in the logs.
-------------------------------
#include <syslog.h>
void main(void){
const char *mesg1 = "hda: read_intr: status=0x59 { SeekComplete
DataRequest Error } { UncorrectableError }, CHS=157/2/9, sector=2826\0";
const char
2007 Jul 26
0
abuse
-------------- next part --------------
A non-text attachment was scrubbed...
Name: abuse.pdf
Type: application/pdf
Size: 3600 bytes
Desc: not available
Url : http://lists.linux-foundation.org/pipermail/virtualization/attachment=
s/20070726/e09498ee/abuse.pdf
2004 Jun 05
0
Spamcop abuse reports for openssh-unix-dev messages
Would the person(s) who is reporting the occasional spam messages
relayed through this list to Spamcop please refrain from doing so, or
unsubscribe?
You were warned that the list is open when you subscribed *and* that
a small amount of spam would make it through as a result.
As a result of this: my friend, who has generously dontated the use of a
co-located server to act as a relay for this
2005 Jun 21
0
[sourceforge.net abuse] New JAVA application server for Asterisk - OrderlyCalls
Matt,
Sourceforge.net is exclusively for hosting software whose licensing
terms meet the OSI's definition of Open Source:
http://opensource.org/docs/definition.php
Your licensing terms include the following, which is not compliant
with the OSI definition:
Usage Restrictions
In addition to the restrictions of the LGPL, the following
restrictions apply: ... OrderlyCalls may not be
2010 Sep 30
0
Friday 12 Noon EDT: VoIP Abuse Project
By popular request, we've convinced someone from the VoIP Abuse
Project to join us tomorrow at noon on VUC. I think many of you will
be interested in this topic, so please come by, join in and ask
questions.
http://vuc.me for all connection info and links to VoIP Abuse Project
A couple of other features and announcements are scheduled after that
segment, including an Astricon update and
2019 Aug 06
0
[PATCH 09/15] mm: don't abuse pte_index() in hmm_vma_handle_pmd
pte_index is an internal arch helper in various architectures,
without consistent semantics. Open code that calculation of a PMD
index based on the virtual address instead.
Signed-off-by: Christoph Hellwig <hch at lst.de>
---
mm/hmm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/mm/hmm.c b/mm/hmm.c
index 03d37e102e3b..2083e4db46f5 100644
--- a/mm/hmm.c
+++
2005 Feb 27
0
[abuse #255766] Systems Support Online Autoreply
***** This an automatic response to confirm that we have
received your recent report regarding a Network Abuse or
Security incident involving an IKANO Communications
Branded
partner, and are taking the following actions to resolve
the issue. *****
The subject of your e-mail was:
Postmaster, Ġėţ ready for
2005 Feb 27
0
RE: Abuse, Fèèl youngèr and Bètter Hèrbal Way (verification)
You are receiving this reply because you just emailed one of us at EDSON Internet and we are protecting ourselves from receiving junk mail. Please read the below, action is required on your part:
Edson Internet has been in business for over 10 years and because of that we get over 4000 junk mails a day! Therefore, we have implemented this system to be more responsive to you. I hope you will
2016 Jan 29
0
Abuse of a private glibc symbol in R 3.2.3
Here is my log from 'make check' using an Intel i5 64-bit processor -
http://pastebin.com/raw/N6SYAuFX
Here is Isaac's log from 'make check' using an Intel Atom 32-bit
processor - http://pastebin.com/raw/sey6DEk9
We are both on Alpine Linux, which uses the musl libc. http://www.musl-libc.org/
Thank you very much.
On Thu, Jan 28, 2016 at 9:54 AM, Alba Pompeo <albapompeo
2013 May 06
0
[LLVMdev] Do we abuse the "nsw" flag
This has come up before, and we just added -fwrapv to work around the problem:
http://lists.cs.uiuc.edu/pipermail/llvm-commits/Week-of-Mon-20110131/115969.html
Are you compiling without -fwrapv?
Cameron
On May 6, 2013, at 4:55 PM, Shuxin Yang <shuxin.llvm at gmail.com> wrote:
> Hi, There:
>
> Clang fails to compile 254.gap @ CPU2000int suite. The symptom is that executable
2023 Jun 09
1
[RESEND 09/15] drm/nouveau/nvkm/engine/gr/gf100: Demote kerneldoc abuse
Fixes the following W=1 kernel build warning(s):
drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:1044: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst
Cc: Ben Skeggs <bskeggs at redhat.com>
Cc: Karol Herbst <kherbst at redhat.com>
Cc: Lyude Paul <lyude at redhat.com>
Cc: David Airlie <airlied
2009 Aug 13
1
[PATCH libguestfs] tests: increase likelihood that heap abuse triggers failure
This takes advantage of glibc's MALLOC_PERTURB_.
If you develop on glibc-based systems and don't yet set this via your
shell's init scripts, add something like this to e.g., .bashrc:
export MALLOC_PERTURB_=$(($RANDOM % 255 + 1))
This change ensures that it's enabled for anyone running "make check"
and in particular for koji.
There's probably documentation
2023 Aug 24
1
[PATCH 05/20] drm/nouveau/nvkm/engine/gr/gf100: Demote kerneldoc abuse
Fixes the following W=1 kernel build warning(s):
drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:1044: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst
Signed-off-by: Lee Jones <lee at kernel.org>
---
Cc: Ben Skeggs <bskeggs at redhat.com>
Cc: Karol Herbst <kherbst at redhat.com>
Cc: Lyude Paul
2006 Sep 23
0
Bug#388925: logcheck-database: [annoying_notes] Abuse of debconf note(s)
Package: logcheck-database
Version: N/A
Severity: normal
Hello,
As announced in
http://lists.debian.org/debian-devel/2006/09/msg00630.html, this bug
report is part of a mass bug filing campaign about the "abuse" of
debconf templates of type "note".
First of all, in case you fixed you package in the short timeframe
that happned between my announcement and this bug report,
2000 Aug 31
0
Re: R-Gnome. I don't want abuse!
I'm getting some abuse for asking about R-Gnome and I don't think it is
fair. I did not create that project, I was just asking how it was going
and whether that other project would help out.
Now I'm getting some email that says some of you don't want a GUI
interface because you think interfaces like that are inconvenient. OK.
I agree, in most cases. I think GUIs for model
2004 Sep 10
0
Re: Abuse - Unauthorized Subscription - b3ta (KMM1269769V1758L0KM)
Hello,
Thank you for writing to Yahoo! Groups.
We were able to investigate the situation that you've described and
found that your email address is currently not subscribed to the group
you mentioned. If you continue to receive messages from the group please
send us a copy of the full headers for one of the messages you receive.
Without a copy of the full headers we will be unable to
2004 Apr 26
2
Index abuse
How resilient is Dovecot's indexing mechanism? (seeing as it's been
extensively re-vamped I guess this question may have different answers for
0.99 & 1.0).
To put it in context, I'm playing with server-side automatic maintenance
scripts for things like deleting messages more than x days old from folders
a, b, c, etc. (using Maildir layout). So far I'm just zapping files in
2010 Jul 22
3
My Switch is being attacked using sip scanner tool (Service Abuse Attack)
An attacker is scanning my Asterisk Switch to gain illegitimate access to
VoIP call functionality.
Using a sip scanning tool, *it* sends REGISTERs with random identities. And
when it discovers one identity subscribed in my switch, it tries to
authenticate with random passwords using this user name.
For the moment, I have replaced this account. And also blocked the IP it has
used but each time