Displaying 20 results from an estimated 800 matches similar to: "Keylogger question"
2011 Oct 26
1
Re: Keylogger question
micdhack wrote:
> My wow account was hacked and since i logged in more from ubuntu than windows i wanted to ask if it is possible a keylogger to be installed through wine and if it could start automatically to monitor the system each time linux starts or each time i start some wine application.
> By the way i used antivirus to scan linux and wine directories and nothing was found
In my
2011 Oct 18
1
Re: Keylogger question
A little old but common topic, but still want to share my opinion here. First of all, you need to detect and find out that if you really have a keylogger on your computer. There are several ways to detect a keylogger, from simply reviewing the processes running on the computer to use a mac os spy detection program.
Step 1 Open the Activity Monitor to check for unknown process. This system tool
2011 Oct 27
0
Re: Keylogger question
Martin Gregorie wrote:
> On Wed, 2011-10-26 at 02:38 -0500, isobella wrote:
>
> > In my experience, the keylogger (http://www.microkeylogger.com) is invisible, and it run with other
> > applicatioons. What's more, most keyloggers are undetectable. While, I
> > know a very simple way to detect it. Type CTRL + ALT + DELETE, it will
> > open your Task Manager,
2011 Nov 01
0
do I really need the keylogger for my computer?
My children have a great interested in my computer, they always delete my important files by accident, and my friends recommend me a keylogger (http://www.microkeylogger.com/), and I'm really worried about my working files, what should I do, could you guys give me some advice please~
2017 Sep 23
5
Different users having same home/mail_location?
Hello,
Will I be breaking something if I have two users share the same home
and/or mail_location (maildir format) in dovecot? Mail will only be
delivered to the primary user, the other would be used every now and
then to login via imap (webmail).
This would be on a CentOS 7 box running dovecot from the packaging
system, i.e. dovecot-2.2.10-8.el7 currently. The reason I'd like to do
this
2017 Sep 23
1
Different users having same home/mail_location?
Hello Peter,
I'm using a virtual users model in dovecot where all the mail is stored
under the same OS user account anyway, so file/dir permissions won't be
a problem. The system users I was referring to are actually completely
separate user accounts at the moment with their own uid/gid (and
passwordless sudo between them), but I guess they could use same uid/gid
and just have
2010 Jun 23
6
LMTP SIZE Option
Hi Timo,
Are there any plans to support the SIZE option in the lmtp server?
Paul
2008 Jul 31
1
combinations with replications
Dear all,
Is there a way to compute and list all combinations with replication of two
elements in sets of 8 elemnts?
For example, I've two elements, 0 and 1, and I would to get all possible
combinations with replication such as, for example, 00000000, 00000001,
00000010, and so on. They are 2^8 and it's very hard to list handly!!
Thank you
Marina
--
View this message in context:
2004 Feb 05
1
Lockdown ready for testing
Hi group
As promised some months ago, I'm letting you know that lockdown is now ready for testing. Please don't study the code to much, I know it is a mess and therefore a rewrite is on it's way. But feel free to take a look at the features offered, how you use them and the default settings.
When lockdown is ready for production usage, I'll release version 1.0. I guess that will
2003 Jul 26
5
suid bit files + securing FreeBSD
Hello everybody,
I'm a newbie in this list, so I don't know if it's the appropriate place
for my question. Anyway, I'd be happy to find out the solution.
Please, has anyone simple answer for:
I'm looking for an exact list of files, which:
1. MUST have...
2. HAVE FROM BSD INSTALLATION...
3. DO NOT NEED...
4. NEVER MAY...
...the suid-bit set.
Of course, it's no problem to
2010 Sep 28
2
Sieve during read or login?
I was wondering if anyone thought of applying filters to email post
delivery, pre-read.
Basically the idea would be to head off Spam, Malware or Phishing for
already delivered email. Malware would probably be the least likely
target, as (knock on wood) user workstations would be updated, but a
targeted phishing scam would not create a public signature that would
be downloaded, yet an
2019 Aug 17
3
Giving full administrator privileges through sudo on production systems
Why did you say it is wrong to give full admin privileges to random users?
--
An old man doll... just what I always wanted! - Clara
2007 Aug 18
2
Forwarding calls, passing Caller ID (or not)
There was a discussion a while back about how to pass Calller ID, when forwarding, as either the calling number, or the forwarding number.
Had something to do with "scams" IIRC, but could not find in browsing the archives.
So, is it in the docs? Starting point or full tilt would be appreciated.
joe a.
2017 Apr 06
1
Lock Screen in Gnome and using keyboard
Hello,
I need to reconfigure Gnome in CentOS for avoiding that a normal user
could lock screen using task bar option and/or "Super L" key (Windows
Key + L). How could I configure Gnome? I need to do that in several
computers, so I can't do "login" in X environment of each computer, but
I need to reconfigure executing from command line (multiple SSH
connections).
2006 Oct 18
1
Whereis Pessulus?
Hi all,
I'm mounting a LTSP server whith CentOS 4.4. The default desktop will be
Gnome. I'm looking for lockdown tool and I think Pessulus maybe a good
option, but I don't found it with yum.
?Is Pessulus included in CentOS?
?Another lockdown tools as alternatives?
Thanks in advance.
--
Jordi Espasa Clofent
PGP id 0xC5ABA76A #http://pgp.mit.edu/
FSF Associate Member id 4281
2004 Apr 07
2
Requiring multiple auth mechanisms
I looked around for a while, but couldn't find any code for requiring multiple
authentication mechanisms in openssh. So I wrote an implemention.
I thought at first I should change the PasswordAuthentication,
PubkeyAuthentication, etc. keywords to allow no/yes/required. But there's some
funky stuff in auth2.c with respect to keyboard interactive auth that would make
this kind of
2004 Dec 30
2
VoiceConduits is a scam
I've paid them, tried to provision numbers, e-mailed support, instant
messaged support, and got nowhere.
I highly recommend everyone stays away from this provider.
2007 Jan 03
5
I don't see my messages
Hi all,
Recently I've suffered a problem with my SMTP service provider. It seems
the SMTP server allows open relay, so my account is lockdown by CentOS
list policy.
Because of that I desubscribe my last account and re-subscribe in CentOS
list with the present gmail account.
I can send any messages in the list, but the curious problem is I don't
see my own messages
????
I can see my
2006 Jul 19
11
Hosting a Ruby App From Home - Approach?
Hi,
Any advice/comments on the potential for hosting some personal Ruby
applications from home? (i.e. for learning, sharing with friends etc)
Would the basic concept be:
* Need to buy a static IP address from you ISP
* By a domain name and point it to the static IP address
* Run Apache as the front end web server
- Q: What basic lockdown/security steps should one take?
* Perform a PORT
2024 Jul 03
4
Request for a Lockdown option
Dear OpenSSH developers,
Thanks a lot for your work on OpenSSH. We use it a lot and it is very helpful for our daily work. Would it be possible to have a lockdown option as a workaround in case of a remotely exploitable problem in ssh. This may help react to compromised keys/passwords, configuration issues, software bugs or other problems for example when Debian broke ssh .
My Idea would be