similar to: bruteforce protection howto

Displaying 20 results from an estimated 1200 matches similar to: "bruteforce protection howto"

2010 May 02
2
boot Debian on a RouterStation Pro
Can anyone post a howto/doc, help about booting a Debian on a RouterStation Pro?:\ https://forum.openwrt.org/viewtopic.php?pid=108415#p108415 I still didn't manage to boot from it. Or any other "normal distro" :\ Thank you.. p.s.: a little more detailed howto:\
2010 Mar 27
3
"internet connection tester script"
Why doesn't my "internet-connection" script work? When I plug the ethcable out, it just waits...and waits...and waits... The script: http://pastebin.com/AE9U1qdL
2010 Jul 29
3
ip address from range script
TEST-A.txt: list of ip address ranges [AS/isp's in a country] TEST-B.txt: list of ip addresses I just need to know, if an ip in the TEST-B.txt is in a range of TEST-A.txt cat "TEST-A.txt" 63.31.63.0/24;9007;44536 64.65.0.0/19;9000;8263 62.64.14.0/21;9001;6852 cat "TEST-B.txt" 63.31.63.2 64.66.5.4 63.31.63.66 62.64.14.231 output: 63.31.63.0/24;9007;44536 63.31.63.2
2010 May 21
2
GRUB Hard Disk Error
I've got two pendrives. I want to install a Debian on them. RAID1. Ok... ... After I installed it in RAID1, it works perfectly, ok! :) When I pull out one of the pendrive [good pendrive], it still boots up, hurrah :) But: ... When I pull out the other pendrive [i plug in the first one i tried] it say's: GRUB hard disk error What can I do? I already tried: grub-install /dev/sdc
2010 Feb 03
3
how to find out promiscuous mode
How can I find out that someone is using it's network card in promiscuous mode in a subnet? Thank you!
2010 May 23
2
tricky perl question - ascending order
or maybe in bash.. script/"one liner" e.g.: input: http://pastebin.com/raw.php?i=pMZPEsMZ i want to make this output from it: http://pastebin.com/raw.php?i=kH8VxT0A So from the input, i want to make an ascendant order, how many things are under a "SOMETHING-XX" Does anyone has any "perl magic" in the pocket, how to do this? :D Thank you very, very much..:\
2010 Jul 03
5
text to html
input: http://pastebin.com/raw.php?i=MqPXZwc3 output: http://pastebin.com/raw.php?i=8QCkp4yv it will be a long day.. :D could someone please help with it? i have to make a "one liner" that get's the input, and gives the mentioned output.
2010 Jul 13
2
os that rather uses the gpu?
Does someone know a distribution/operating system, that rather uses the GPU for "working", not the CPU? [by default] Or this solution is still in the "beginning part"? Thanks for any tips, link, suggestions.
2010 Jul 08
2
slow down dd - how?
How can I slow down dd? I don't want to slow down the pc, when generating a big file [~40 GByte]. Does ionice work properly? Thank you for any help! :\
2010 Apr 10
1
is skype using encryption?
Can someone [same subnet, e.g.: with a hub, not switch..] sniff my skype password when i'm using Skype? Is it encrypted? Thank you for the info
2010 Jul 13
1
os that rather uses the gpu?
Does someone know a distribution/operating system, that rather uses the GPU for "working", not the CPU? [by default] Or this solution is still in the "beginning part"? Thanks for any tips, link, suggestions. _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2010 Nov 27
1
sed with several lines, how?
hyphen's [ - ] are just for marking the start/end of a pattern, but there are _not in_ the pattern! "OUTPUT" is what i want after "seding" the PATTERN#X's so i for e.g.: need the first, and second "magic" sed "FIRSTMAGIC" PATTERN#1 sed "SECONDMAGIC" PATTERN#2 PATTERN#1: ----------------------------------- SOMETEXT#1
2009 Aug 20
5
protecting multiuser systems from bruteforce ssh attacks
Hello, What is the best way to protect multiuser systems from brute force attacks? I am setting up a relatively loose DenyHosts policy, but I like the idea of locking an account for a time if too many attempts are made, but to balance this with keeping the user from making a helpdesk call. What are some policies/techniques that have worked for this list with minimal hassle? Thanks! -Eugene
2015 Feb 04
1
Another Fedora decision
On 02/03/2015 03:44 PM, Always Learning wrote: > There should be a basic defence that when the password is wrong 'n' > occasions the IP address is blocked automatically and permanently > unless it is specifically allowed in IP Tables. As has been mentioned, fail2ban does this. However, the reason you want a password that is not easily bruteforced has nothing to do with this,
2010 Jan 10
2
obsd as dom0?
Is it possible? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2010 Oct 18
2
escape .c files to html code with bash how?
i need to encode .c files to html, like on this website: http://centricle.com/tools/html-entities/ i tried to write a bash script for it: http://pastebin.com/raw.php?i=mZKAw4c5 but it's not working very well :D does anyone has a script, that does this? thank you :\
2015 Feb 21
2
"PermitRootLogin no" should not proceed with root login
Steps to reproduce: 1) PermitRootLogin no in sshd_config 2) login with "root" user from other host Present behaviour: 1) it asks for password 3 times and only then close the connection. 2) cpu consumption during bruteforce "attacks". Expected behaviour: Immediate disconnect/login fail Workaround is to change ssh port, or ban IP after some login fails, or limit IP that can
2015 Feb 04
4
Another Fedora decision
On 02/04/2015 02:08 PM, Lamar Owen wrote: > > 3.) Attacker uses a large graphics card's GPU power, harnessed with > CUDA or similar, to run millions of bruteforce attempts per second on > the exfiltrated /etc/shadow, on their computer (not yours). > 4.) After a few hours, attacker has your password (or at least a > password that hashes to the same value as your password),
2007 Jan 10
3
Newbie question on file source
Hi, Please correct me if I''m wrong but it seems to me that in the case of a remote file source the path must contain the plain filename after the module and paths with directory elements are not supported. What I wanted is the following: +++++ fileserver.conf +++++ [system] path /services/puppet/common/ allow * +++++ site.pp +++++++++++++ file {
2020 Oct 26
0
SV: Looking for a guide to collect all e-mail from the ISP mail server
Good luck with all that coding. I have four years now of running my own email server. Zero hacks. I keep the attack surface to a minimum. Less is more. One thing you don't want to do is write your own code. This stuff is always way harder than you think. Worse yet you run alpha generation code because you are the only one using it. All software has bugs. What you need is a mass of users