Displaying 20 results from an estimated 1000 matches similar to: "about the database hack"
2003 Dec 12
3
SIPURA Breaches Contract
Hi list,
Well I really didn't want to see things get to this point,
but Sherman at Sipura along with their President Jan F.
leave me no other choice.
SIPURA has been provided a letter from our attorney for
Breach of Contract and damages. They have yet to respond.
A quick background.
1. Sherman (SIPURA's Director of Marketing), stated that
we would do a join press release for the Oct
2016 Jul 04
2
SSH multi factor authentication
On Sun, 3 Jul 2016, Stephen Harris wrote:
> On Sun, Jul 03, 2016 at 09:19:43PM -0500, Bruce F Bading wrote:
> > One, the Google Authenticator (OTP authentication).
>
> On its own, this is not 2FA. It's single factor ("something you
> have").
>
> A combination of Google Authenticator _and_ password is 2FA. This is
> easy to do with PAM.
Agreed
>
2008 Aug 08
3
Multivariate regression with constraints
Hi all,
I am running a bivariate regression with the following:
p1=c(184,155,676,67,922,22,76,24,39)
p2=c(1845,1483,2287,367,1693,488,435,1782,745)
I1=c(1530,1505,2505,204,2285,269,1271,298,2023)
I2=c(8238,6247,6150,2748,4361,5549,2657,3533,5415)
R1=I1-p1
R2=I2-p2
x1=cbind(p1,R1)
y1=cbind(p2,R2)
fit1=lm(y1~-1+x1)
summary(fit1)
Response 2:
Coefficients:
Estimate Std. Error t value
2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;)
We have a prospective client who is asking us what our policy is in the event
of unauthorized access. Obviously you fix the system(s) that have been
compromised, but what steps do you take to mitigate the effects of a breach?
What is industry best practice? So far, searches haven't produced anything
that looks consistent, except maybe identity monitoring
2019 Apr 03
1
TFA authentication in dovecot, using XMPP and RFC 4226
Hello,
I would like to implement some kind of two factors authentication, in
Dovecot.
I am thinking about using the post login script, to check for unusual
behaviour, like say, a different country / IP address or an unusual
hour.
I already wrote a simple shell script that check these factors, but
now, I have some options for the following, and I need to know your
opinion if this is feasible or
2015 Apr 07
3
Linux Australia breached, personal details leaked
FYI, folks,
Excerpt:
Linux Australia discovered the breach on March 24 after it noticed
conference management software it uses called Zookeepr started sending a
large number of error reporting emails, Hesketh wrote. A server had been
attacked two days prior.
?It is the assessment of Linux Australia that the individual utilized a
currently unknown vulnerability to trigger a remote buffer overflow
2013 Oct 28
7
Encryption solution for messages at rest
Hi,
We have clients with various security & compliance requirements. Although not required, it would be ideal to have messages encrypted at rest. We already use SSL/TLS to secure the transmission of most email. However, it would be nice to have them encrypted sitting on our server. Is anyone doing this? I think that ideally, rather than full-disk encryption, we should use an encryption that
2006 Jul 04
1
no such user
I have rules like this on my servers:
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ proftpd\[[[:digit:]]+\]:
[._[:alnum:]-]+ \([._[:alnum:]-]+\[[[:digit:].]{7,15}\]\) (- )USER
[-_.[:alnum:]]+: no such user found from [._[:alnum:]-]+
\[[[:digit:].]{7,15}\]\ to [[:digit:].]{7,15}:21$
basically, I just don't care about logins as nonexistent users,
I get so many of those that I don't even
2017 Nov 06
2
How to detect botnet user on the server ?
Hello guys,
Whats is the best way to identify a possible user using a botnet with php
in the server? And if he is using GET commands for example in other server.
Does apache logs outbound conections ?
If it is using a file that is not malicious the clam av would not identify.
Thanks
2005 Jan 24
6
Very Long Expressions
Greetings,
I'm having some difficulties with evaluating very long expressions
(Windows/Linux 2.0.1), as seen below, and would greatly appreciate any
help, thoughts or work arounds. Let's say that I wanted to see what I
would get if I added 1 to itself 498 times. One way of doing this would
be to evaluate the expression 1+1+1+...
> eval(parse(text = paste(rep(1, 498), collapse =
2007 Jul 11
3
Samba and the partitions...
Hi everyone,
I am Daniel from Brazil, today i started as a membership of this list. I
hope learn a lot about samba with you guys...and girls. :-)
My first doubt. Actually is kind of off topic, but i will try.
I will setup HP server. This HP will run Linux with firewall, squid and the
major component will be the SAMBA ! The HP has a 160 GB HD. I will use samba
as PDC with more or less 20 PCs in
2006 Oct 04
3
whacked keyboard behavior CLI
Hi there --- for some reason I am getting really weird keyboard behavior
on the CLI (no xfs or anything running). Centos 4.4 yummed up.
For example if i type "root" to login, I get "rot" or sometimes
"roooooot". Then other times I will have to press a key like 3 times to
get a double character.
Now at first I thought maybe it was the keyboard, but it seems to
2020 Oct 26
1
Socket is busy: Success?
On Mon, 26 Oct 2020, Bananradion wrote:
> Ok! So how can i fix this issue then?
> All works great if I connect ices to port 8086, but I need it to connect to
> 8443 without getting "Socket is busy".
In all honesty, I don't know what that error means adn I've not tried to
use TLS with Icecast.
I guess you could set up two listen sockets on port 8443, one on 127.0.0.1
2007 May 03
3
Semi-OT: useful things to do with XML browsers in phones
Greetings list,
It seems that more and more phones these days are coming with XML mini-browsers. I'd like to have a go at developing something useful to use on them, but in all honesty, most of our customers use their phones to make and take calls and very little else.
So I'm open to suggestions.
What useful applications are you developing for these mini-browsers? What sort of things do
2017 Aug 03
2
Fedora bugs and EOL [was Re: CentOS users: please try and provide feedback on Fedora] Boltron
On Thu, Aug 03, 2017 at 03:25:36PM +0200, hw wrote:
> >In all honesty, I wouldn't want Libreoffice running in a container
> >and I can't imagine why you'd want an xterm in its own container.
> It was only an example. The point of doing that is to use different versions of
> xterm and of emacs as come by default. How else would I do that when non-default
>
2016 Jan 26
1
What to do when you've been hacked?
On Monday, January 25, 2016 11:56:19 AM Warren Young wrote:
> On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com>
wrote:
> > We have a prospective client who is asking us what our policy is in the
> > event of unauthorized access.
>
> Tell them you use the Mr. Miyagi defense: ?Don?t get hit.?
>
> Your prospective client sounds like they?re
2014 Nov 26
4
Wiki-edit-request
On 26 November 2014 at 17:28, Akemi Yagi <amyagi at gmail.com> wrote:
> On Wed, Nov 26, 2014 at 9:18 AM, Christoph Galuschka
> <tigalch at tigalch.org> wrote:
>> Hi Alan,
>>
>> Am 26.11.2014 um 16:13 schrieb Alan Bartlett:
>>>
>>> On 26 November 2014 at 10:23, Michael Beck <eliteknipser at gmail.com> wrote:
>
>>> According to
2010 Jul 21
1
Compiling in Xcode
On 2010-07-21, at 2:24 AM, Brian Willoughby <brianw at sounds.wa.com>
wrote:
> The flac sources are distributed in a configuration that is designed
> primarily for building from the command-line. I seem to recall that
> there might have been an Xcode project in there at some point, but
> if there was, it never worked well. In all honesty, I may be
> getting
2011 Feb 22
1
Domain controller could not be contacted
I recently upgrade a Samba server, that was happily acting as a PDC for a
school, from 3.2 to 3.4.7. This was done via an upgrade to Ubuntu (from 9.04
to 10.04LTS). Of course, the Ubuntu upgrade caused a bunch of issues, most
of which were managed without undue stress. The remaining issues are with
Samba's configuration.
This is a fairly simple Samba configuration using the TDB password
2017 Aug 02
4
Fedora bugs and EOL [was Re: CentOS users: please try and provide feedback on Fedora] Boltron
On 08/02/2017 10:57 AM, hw wrote:
>
> It probably makes sense under the assumption that you do pretty much
> everything in one container or another and that it doesn?t bother you
> having to switch between all the containers to do something. That would
> require something like a window manager turned into a container manager,
> and it goes towards turning away from an operating