similar to: VoIP Abuse to Twitter (real time VoIP Abuse)

Displaying 20 results from an estimated 200 matches similar to: "VoIP Abuse to Twitter (real time VoIP Abuse)"

2009 Jul 20
0
No subject
uses for the compromised accounts - one is to get to expensive destinations - e.g. mobiles in eastern european/african destinations, and the other would appear to be pure fraud - e.g. 10 concurrent calls to what looks like a mobile in a country with a dubious telecom infrastructure - which is obviously a destination that charges a high interconnect fee, so one theory is that it's the
2010 Oct 21
5
SIP Blacklisting
Hi, Given the recent increase in SIP brute force attacks, I've had a little idea. The standard scripts that block after X attempts work well to prevent you actually being compromised, but once you've been 'found' then the attempts seem to keep coming for quite some time. Older versions of sipvicious don't appear to stop once you start sending un-reachables (or straight
1997 Feb 18
0
Abuse of the syslog facility
Any unpriveledged user can abuse the syslog facility in an interesting way. The following example is a good one that can put misleading information in the logs. ------------------------------- #include <syslog.h> void main(void){ const char *mesg1 = "hda: read_intr: status=0x59 { SeekComplete DataRequest Error } { UncorrectableError }, CHS=157/2/9, sector=2826\0"; const char
2007 Jul 26
0
abuse
-------------- next part -------------- A non-text attachment was scrubbed... Name: abuse.pdf Type: application/pdf Size: 3600 bytes Desc: not available Url : http://lists.linux-foundation.org/pipermail/virtualization/attachment= s/20070726/e09498ee/abuse.pdf
2004 Jun 05
0
Spamcop abuse reports for openssh-unix-dev messages
Would the person(s) who is reporting the occasional spam messages relayed through this list to Spamcop please refrain from doing so, or unsubscribe? You were warned that the list is open when you subscribed *and* that a small amount of spam would make it through as a result. As a result of this: my friend, who has generously dontated the use of a co-located server to act as a relay for this
2005 Jun 21
0
[sourceforge.net abuse] New JAVA application server for Asterisk - OrderlyCalls
Matt, Sourceforge.net is exclusively for hosting software whose licensing terms meet the OSI's definition of Open Source: http://opensource.org/docs/definition.php Your licensing terms include the following, which is not compliant with the OSI definition: Usage Restrictions In addition to the restrictions of the LGPL, the following restrictions apply: ... OrderlyCalls may not be
2010 Sep 30
0
Friday 12 Noon EDT: VoIP Abuse Project
By popular request, we've convinced someone from the VoIP Abuse Project to join us tomorrow at noon on VUC. I think many of you will be interested in this topic, so please come by, join in and ask questions. http://vuc.me for all connection info and links to VoIP Abuse Project A couple of other features and announcements are scheduled after that segment, including an Astricon update and
2019 Aug 06
0
[PATCH 09/15] mm: don't abuse pte_index() in hmm_vma_handle_pmd
pte_index is an internal arch helper in various architectures, without consistent semantics. Open code that calculation of a PMD index based on the virtual address instead. Signed-off-by: Christoph Hellwig <hch at lst.de> --- mm/hmm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/hmm.c b/mm/hmm.c index 03d37e102e3b..2083e4db46f5 100644 --- a/mm/hmm.c +++
2005 Feb 27
0
[abuse #255766] Systems Support Online Autoreply
***** This an automatic response to confirm that we have received your recent report regarding a Network Abuse or Security incident involving an IKANO Communications Branded partner, and are taking the following actions to resolve the issue. ***** The subject of your e-mail was: Postmaster, &#288;&#279;&#355; ready for
2005 Feb 27
0
RE: Abuse, Fèèl youngèr and Bètter Hèrbal Way (verification)
You are receiving this reply because you just emailed one of us at EDSON Internet and we are protecting ourselves from receiving junk mail. Please read the below, action is required on your part: Edson Internet has been in business for over 10 years and because of that we get over 4000 junk mails a day! Therefore, we have implemented this system to be more responsive to you. I hope you will
2016 Jan 29
0
Abuse of a private glibc symbol in R 3.2.3
Here is my log from 'make check' using an Intel i5 64-bit processor - http://pastebin.com/raw/N6SYAuFX Here is Isaac's log from 'make check' using an Intel Atom 32-bit processor - http://pastebin.com/raw/sey6DEk9 We are both on Alpine Linux, which uses the musl libc. http://www.musl-libc.org/ Thank you very much. On Thu, Jan 28, 2016 at 9:54 AM, Alba Pompeo <albapompeo
2013 May 06
0
[LLVMdev] Do we abuse the "nsw" flag
This has come up before, and we just added -fwrapv to work around the problem: http://lists.cs.uiuc.edu/pipermail/llvm-commits/Week-of-Mon-20110131/115969.html Are you compiling without -fwrapv? Cameron On May 6, 2013, at 4:55 PM, Shuxin Yang <shuxin.llvm at gmail.com> wrote: > Hi, There: > > Clang fails to compile 254.gap @ CPU2000int suite. The symptom is that executable
2023 Jun 09
1
[RESEND 09/15] drm/nouveau/nvkm/engine/gr/gf100: Demote kerneldoc abuse
Fixes the following W=1 kernel build warning(s): drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:1044: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst Cc: Ben Skeggs <bskeggs at redhat.com> Cc: Karol Herbst <kherbst at redhat.com> Cc: Lyude Paul <lyude at redhat.com> Cc: David Airlie <airlied
2009 Aug 13
1
[PATCH libguestfs] tests: increase likelihood that heap abuse triggers failure
This takes advantage of glibc's MALLOC_PERTURB_. If you develop on glibc-based systems and don't yet set this via your shell's init scripts, add something like this to e.g., .bashrc: export MALLOC_PERTURB_=$(($RANDOM % 255 + 1)) This change ensures that it's enabled for anyone running "make check" and in particular for koji. There's probably documentation
2023 Aug 24
1
[PATCH 05/20] drm/nouveau/nvkm/engine/gr/gf100: Demote kerneldoc abuse
Fixes the following W=1 kernel build warning(s): drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:1044: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst Signed-off-by: Lee Jones <lee at kernel.org> --- Cc: Ben Skeggs <bskeggs at redhat.com> Cc: Karol Herbst <kherbst at redhat.com> Cc: Lyude Paul
2006 Sep 23
0
Bug#388925: logcheck-database: [annoying_notes] Abuse of debconf note(s)
Package: logcheck-database Version: N/A Severity: normal Hello, As announced in http://lists.debian.org/debian-devel/2006/09/msg00630.html, this bug report is part of a mass bug filing campaign about the "abuse" of debconf templates of type "note". First of all, in case you fixed you package in the short timeframe that happned between my announcement and this bug report,
2000 Aug 31
0
Re: R-Gnome. I don't want abuse!
I'm getting some abuse for asking about R-Gnome and I don't think it is fair. I did not create that project, I was just asking how it was going and whether that other project would help out. Now I'm getting some email that says some of you don't want a GUI interface because you think interfaces like that are inconvenient. OK. I agree, in most cases. I think GUIs for model
2004 Sep 10
0
Re: Abuse - Unauthorized Subscription - b3ta (KMM1269769V1758L0KM)
Hello, Thank you for writing to Yahoo! Groups. We were able to investigate the situation that you've described and found that your email address is currently not subscribed to the group you mentioned. If you continue to receive messages from the group please send us a copy of the full headers for one of the messages you receive. Without a copy of the full headers we will be unable to
2004 Apr 26
2
Index abuse
How resilient is Dovecot's indexing mechanism? (seeing as it's been extensively re-vamped I guess this question may have different answers for 0.99 & 1.0). To put it in context, I'm playing with server-side automatic maintenance scripts for things like deleting messages more than x days old from folders a, b, c, etc. (using Maildir layout). So far I'm just zapping files in
2010 Jul 22
3
My Switch is being attacked using sip scanner tool (Service Abuse Attack)
An attacker is scanning my Asterisk Switch to gain illegitimate access to VoIP call functionality. Using a sip scanning tool, *it* sends REGISTERs with random identities. And when it discovers one identity subscribed in my switch, it tries to authenticate with random passwords using this user name. For the moment, I have replaced this account. And also blocked the IP it has used but each time