Displaying 20 results from an estimated 8000 matches similar to: "Security advice, please"
2008 Jul 09
2
OT: anything in CentOS 5.2 that uses opendns.com when browsing web?
I believe this is completely OT, but I want to be positive. I have a fully
up to date CentOS 5.2 box. During the past week, when surfing with Firefox
(and today, while testing with Konqueror), frequently, especially when DNS
is slow, I am seeing references to opendns.com At times, I end up on
opendns.com web pages, instead of at the web site I'm trying to get to. My
ISP, the phone company,
2004 Sep 06
3
iaxy vs sipura
I need a cheap simple adaptor for analog phones to use with Asterisk. It
should be some kind of "configure and forget" type of device, to use at
the office, or just throw it in a road warrior's bag and use it while
travelling, to call back to the "mothership".
I can't decide between iaxy and sipura. Can you guys help? Which one
would you use? (and why?)
I feel that iaxy
2009 Jun 09
3
OT: Viewer for .docx M$ WORD files?
Is there a Viewer for .docx M$ WORD files? If so, where can I get
it? This file type cannot be opened with OpenOffice.org 2.3. TIA!
2009 Jul 12
3
sFTP (client) RPM for CentOS 5.3 (32 bit) and/or putty-tools
I installed gFTP but apparently it does not handle the sFTP protocol.
I also installed the FireFTP Add On for the Firefox browser, but when
I tried to connect to the server, it says that I need putty-tools. I
have the rpmforge and epel repositories configured but yum did not
find putty-tools. Is there an RPM for a client program for gFTP or
putty-tools? If so, in which repository? TIA!
1443
2018 Jan 19
1
Leaflet maps. Nudging co-incident markers
I have a dataset showing points, with a category for each point and its location.
I simply want to display my points, in a way that users can toggle the points on and off by category.
Where I have two objects in the same category I'd like to display them nudged to appear as two distinct, but very close points.
I have made reproduceable example (the places are not real), which is loosely
2009 Mar 23
1
Security advice, please
On Tuesday 23 December 2008 15:38:17 Warren Young wrote:
> Michael Simpson wrote:
> >> GRC reports that ports are stealthed
> >
> > Try www.auditmypc.com or nmap-online.com rather than grc to look for open
> > ports
>
> What advantages do they have, in your opinion?
>
> >> there a better way than opening port 143?
> >
> > ssh tunnelling?
2009 May 14
6
Dealing with brute force attacks
Over the weekend one of our servers at a remote location was
hammered by an IP originating in mainland China. This attack was
only noteworthy in that it attempted to connect to our pop3 service.
We have long had an IP throttle on ssh connections to discourage
this sort of thing. But I had not considered the possibility that
other services were equally at risk. Researching this on the web
does
2017 Mar 14
2
Hotel ethernet via nmcli
Here I sit in my hotel room with my Cubie armv7 server with Centos7.
They have an ethernet cable here, so most likely I will not need to
resort to putting a WiFi USB dongle and trying to master nmcli.
But I have to web authenticate to their portal with my personal
information. Is that possible with a text web browser? I seem to
recall that Centos has one. What to install?
Of course,
2017 Nov 27
1
Failed attempts
And if you're really security conscious consider using port knocking (knock server - amazingly easy to set up. Or use fwknop, a little more difficult to set up but not much. Finally, for the hard core who really like pain - write the iptables rules yourself).
----- Original Message -----
From: "Pete Biggs" <pete at biggs.org.uk>
To: "centos" <centos at
2003 Jul 18
1
VoIP in hotels
Our company can offer VoIP to premises and domestic users and bill the
premises as a whole. We need something to enable the hotel owner to bill
each guest in a hotel in real time. What solutions do exist presently?
(PS: Our radius (and every telephony equipment outside the hotel) does not
recognise which room in the hotel initiated the international (VoIP) call,
so that's the main problem
2007 Nov 22
4
Port 631 closed, not hidden
I have the firewall turned on my CentOS 5 box, but GRC is
reporting that 631 is closed instead of stealthed. If the
firewall isn't configured to allow that, then why might that
be happening?
Miark
2017 Mar 21
1
Centos7 USB wifi recommendation
On 03/21/2017 11:50 AM, John R Pierce wrote:
> On 3/21/2017 5:02 AM, ken wrote:
>>>
>> Those have worked for me as well. Their range, however, is a third
>> or half as much as a normal wifi device.
>>
>
> in general, the back of a server, buried under all the cables, and
> right up against the metal box is a lousy place for an RF antenna...
>
My
2017 Nov 27
8
Failed attempts
hi All,
I happened to login to one of my servers today and saw 96000 failed login
attempts. shown below is the address its coming from. I added it to my
firewall to drop.
Failed password for root from 123.183.209.135 port 14299 ssh2
FYI - others might be seeing it also.
Jerry
2014 Jun 16
4
iptables question
I'm running fail2ban to attempt to block malicious brute-force password
dictionary attacks against ssh. They seem to be rolling through a block of ip
addresses as the source to defeat this kind of screening, so I've set some ip
addresses to be blocked in iptables. Here is the output of iptables -L (edited):
Chain INPUT (policy ACCEPT)
target prot opt source destination
2024 Jul 04
4
Request for a Lockdown option
Jochen Bern <Jochen.Bern at binect.de> writes:
> (And since you mention "port knocking", I'd like to repeat how fond I
> am of upgrading that original concept to a single-packet
> crypto-armored implementation like fwknop.)
I am reluctantly considering to use some kind of port knocking mechanism
on some machines, however I really don't want to carry around shared
2015 Jul 28
5
Fedora change that will probably affect RHEL
On Tue, Jul 28, 2015 at 11:27 AM, Warren Young <wyml at etr-usa.com> wrote:
> Much of the evil on the Internet today ? DDoS armies, spam spewers, phishing botnets ? is done on pnwed hardware, much of which was compromised by previous botnets banging on weak SSH passwords.
>
> Your freedom to use any password you like stops at the point where exercising that freedom creates a risk
2005 Jun 28
1
Linksys WRT54GP2-NA settings for performance and low bandwidth?
So I'm using a WRT54GP2-NA when I travel, as I travel alot, to give me a phone at my hotel rooms, etc. During the day or late at night the thing works great - best ATA I've ever used.
However, in the mid-evening (when many business travellers are at the hotel room doing work), the outgoing audio channel gets so choppy that the person on the other end can't make me out clearly.
2013 Aug 22
3
Logging passwords on auth failure/dealing with botnets
Hi,
Since upgrading our mail servers to Postfix/Dovecot, we've seen a rather large increase in botnet brute force password attacks. I guess our old servers were too slow to suit their needs.
Now, when they hit upon a valid user, it's easy to see what passwords they are trying (we've enabled auth_debug_passwords and set auth_verbose_passwords = plain). We can easily have log
2010 Aug 29
1
Ignorant question on pam_shield
I've seen pam_shield recommended several times
for protecting against malicious login attempts;
but I'm not quite clear if this requires one
to be already running some pam-based software?
Also, I'm running shorewall,
and would prefer a shorewall based protection,
but the advice I read on googling for this
seemed excessively complicated.
--
Timothy Murphy
e-mail: gayleard /at/
2009 Jun 24
10
good small registrar?
Greetings,
What are some registrars that members of this list have had good experience
with? I was stepping through the godaddy checkout process, and being
opted-in to a dozen different upsell features just left a bad impression.
But I have no clue who else to go with.
-Eugene
-------------- next part --------------
An HTML attachment was scrubbed...
URL: