similar to: Asterisk and VOIP was Re: CentOS for non-tech user

Displaying 20 results from an estimated 40000 matches similar to: "Asterisk and VOIP was Re: CentOS for non-tech user"

2009 Sep 30
2
Asterisk and VOIP was Re: CentOS for non-tech user
-----Original Message----- From: Brian Mathis The difference is that CentOS is a general-purpose OS that can be used for many things, and has a much bigger installed base. That makes it more of a target and would likely be included in scanning tools. A custom OS running on a PBX might also have vulnerabilities, but it's also probably not a big target because of the diversity of systems
2009 Oct 01
0
Asterisk and VOIP was Re: CentOS for non-tech user
Chan Chung Hang Christopher <christopher.chan at bradbury.edu.hk> wrote: >> Ah, well, if you want to keep the landlines, then yeah, I guess asterisk is the way to go. If your goal is to replace keyline systems, then asterisk definitely has that kind of support which, it appears, even Cisco's solution does not (from the mouth of Datacraft Asia personnel selling the school
2015 Feb 05
2
Another Fedora decision
On Thu, Feb 5, 2015 at 4:39 PM, Valeri Galtsev <galtsev at kicp.uchicago.edu> wrote: > >> >> Yes, /etc/shadow would have always been readable only by root by >> default. The interesting question here is whether an intruder did >> it, clumsily leaving evidence behind, or whether it is just a local >> change from following some bad advice about things that
2015 Feb 05
0
Another Fedora decision
On Thu, February 5, 2015 5:07 pm, Les Mikesell wrote: > On Thu, Feb 5, 2015 at 4:39 PM, Valeri Galtsev > <galtsev at kicp.uchicago.edu> wrote: >> >>> >>> Yes, /etc/shadow would have always been readable only by root by >>> default. The interesting question here is whether an intruder did >>> it, clumsily leaving evidence behind, or whether it
2015 Feb 05
6
Another Fedora decision
On Thu, 2015-02-05 at 16:39 -0600, Valeri Galtsev wrote: > >>> > >>> -rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow > Be it me, I would consider box compromised. All done on/from that box > since probable day it happened compromised as well. If there is no way to > establish the day, then since that system originally build. With full > blown sweeping up
2015 Feb 05
0
Another Fedora decision
On Thu, February 5, 2015 4:29 pm, Les Mikesell wrote: > On Thu, Feb 5, 2015 at 4:19 PM, Keith Keller > <kkeller at wombat.san-francisco.ca.us> wrote: > >>> On C5 the default appears to be:- >>> >>> -rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow >> >> It is much more likely that someone has screwed up your system. I think >> even
2015 Feb 05
0
Another Fedora decision
On Thu, February 5, 2015 5:23 pm, Always Learning wrote: > > On Thu, 2015-02-05 at 16:39 -0600, Valeri Galtsev wrote: > >> >>> >> >>> -rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow > >> Be it me, I would consider box compromised. All done on/from that box >> since probable day it happened compromised as well. If there is no way >>
2005 Feb 09
2
full-d] Administrivia: List Compromised due to Mailman Vulnerability (fwd)
Sorry for the cross post, but this is an important one potentially affecting all recipients. This just crossed the Full Disclosure mailman moderated mailing list. It bears a careful read, and thought about whether a response is needed. The implication is that if there is any use of a mailman password in common with a password you 'care' about, you need to take appropriate action at
2008 May 22
0
/home/putnopvut/asa/AST-2008-007/AST-2008-007: AST-2008-007 Cryptographic keys generated by OpenSSL on Debian-based systems compromised
Asterisk Project Security Advisory - AST-2008-007 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Asterisk installations using cryptographic keys | | | generated
2011 Dec 22
0
[PATCH] Security: Mitigate possible privilege escalation via SG_IO ioctl (CVE-2011-4127, RHBZ#757071)
From: "Richard W.M. Jones" <rjones at redhat.com> CVE-2011-4127 is a serious qemu & kernel privilege escalation bug found by Paolo Bonzini. http://seclists.org/oss-sec/2011/q4/536 An untrusted guest kernel is able to issue special SG_IO ioctls on virtio devices which qemu passes through to the host kernel without filtering or sanitizing. These ioctls allow raw sectors from
2009 Sep 24
7
CentOS for non-tech user
I'm thinking of giving CentOS to a non-tech user for her new desktop. He needs are small. She has been used to Mozilla for both mail and browsing, so equivalents there are not a problem. She needs grip and lame, for her mp3s - again no problem. In fact the only problem I can see is that gwenview doesn't appear to have the kipi-plugins. I can see libkipi listed, but no plugins,
2015 Jul 06
0
ntpd new version
RedHat/CentOS does not upgrade packages based on version numbers. Please read https://access.redhat.com/security/updates/backporting Understanding this is essential to running a RedHat/CentOS server. ? Brian Mathis @orev On Mon, Jul 6, 2015 at 7:04 AM, Vijendra Agarwal (vijagarw) < vijagarw at cisco.com> wrote: > Hi All, > Currently CentOS site contains the below version of
2004 Oct 23
1
rssh: pizzacode security alert
PIZZACODE SECURITY ALERT program: rssh risk: low[*] problem: string format vulnerability in log.c details: rssh is a restricted shell for use with OpenSSH, allowing only scp and/or sftp. For example, if you have a server which you only want to allow users to copy files off of via scp, without providing shell access, you can use rssh to do that. Additioanlly, running rsync, rdist, and cvs are
2017 Oct 17
0
Junda-tech
On Oct 17, 2017, at 8:48 AM, LLSJ Kr?ger <llsjk at lakruger.za.org> wrote: > Results of 'lsusb -vvv -d 3344:' [...] > wDescriptorLength 136 > Report Descriptors: > ** UNAVAILABLE ** > Can you please re-run lsusb, possibly as root, to grab the contents of the "Report Descriptors" section? (Running "usbhid-ups"
2017 Apr 05
1
Timezone and date
> Date: Wednesday, April 05, 2017 13:15:19 -0400 > From: Brian Mathis <brian.mathis+centos at betteradmin.com> > > On Tue, Apr 4, 2017 at 9:22 PM, Jerry Geis <jerry.geis at gmail.com> > wrote: > >> When I do the date +%Z I get the timezone. Which currently is EDT. >> >> I am sending information to another system, that says EDT is not a >>
2013 Aug 26
0
[LLVMdev] Adding diversity for security (and testing)
Hi Stephen, > Greetings LLVM Devs! > > I am a PhD student in the Secure Systems and Software Lab at UC > Irvine. We have been working on adding randomness into code generation > to create a diverse population of binaries. This diversity prevents > code-reuse attacks such as return-oriented-programming (ROP) by > denying the attacker information about the exact code layout.
1996 Nov 26
0
Major Security Vulnerabilities in Remote CD Databases
XMCD is a popular unix audio cd-player with a unique feature that it will query remote databases over the Internet to determine the title, group, and song list for cds that are being played. The remote database of compact discs has become quite popular and is now supported by several Windows based cd players as well, including EasyCD2, DiscPlay, MyCDPLayer, and WinMCD. XMCD source is available
2012 Jan 01
0
(no subject)
(Tried sending this before but it doesn't look like it went through; apologies if you're seeing it twice.) OK, a second machine hosted at the same hosting company has also apparently been hacked. Since 2 of out of 3 machines hosted at that company have now been hacked, but this hasn't happened to any of the other 37 dedicated servers that I've got hosted at other hosting
2014 Dec 19
2
Asymmetric encryption for very large tar file
On Fri, Dec 19, 2014 at 2:40 PM, Brian Mathis <brian.mathis+centos at betteradmin.com> wrote: > > > GPG is really what you want to be using for this. OpenSSL is a general > toolkit that provide a lot of good functions, but you need to cobble some > things together yourself. GPG is meant to handle all of the other parts of > dealing with files. > > I will expand on
2014 Dec 19
0
Asymmetric encryption for very large tar file
On Fri, Dec 19, 2014 at 3:48 PM, Les Mikesell <lesmikesell at gmail.com> wrote: > On Fri, Dec 19, 2014 at 2:40 PM, Brian Mathis > <brian.mathis+centos at betteradmin.com> wrote: > > > > > > GPG is really what you want to be using for this. OpenSSL is a general > > toolkit that provide a lot of good functions, but you need to cobble some > > things