similar to: OT - 'IP' Security and Capturing Software

Displaying 20 results from an estimated 600 matches similar to: "OT - 'IP' Security and Capturing Software"

2006 Jul 09
2
Johnny's site hacked?
Or is it some sort of inside joke? http://www.hughesjr.com/ If it's a bona fide hack, I'd be curious to know how the culprit got in. The the distro's maintainer has gotten burgled one would think that a lot of other systems are at risk. Cheers,
2009 Nov 02
4
Frequency
BAYESIAN INFERENCES FOR MILKING TEMPERAMENT IN CANADIAN HOLSTEINS Hi All, I have a data set "x" with several variables. Sample of the data is shown below V1 v2 v3 v4 5 6 9 10 3 4 7 10 4 6 10 18 I want the frequency of each data point sorted by their occurrence. Below is the output that I want 10 =3 6=2 4=2 9=1 5=1 7=1 3=1 How do
2011 Mar 14
2
proportional symbol map ggplot
Hello, we want to plot a proportional symbol map with ggplot. Symbols' area should have the same proportions as the scaled variable. Hereby an example we found on http://www.r-bloggers.com/bubble-chart-by-using-ggplot2/ . In this example we see the proportions of the symbols' area are different from the proportions of the scaled variable: crime <-
2004 Feb 15
6
Rooted system
Howyd all? Seems that I have been routed. Possibly by a physical B&E, but who knows? Probably some of you do.... anyways, some politically sensitive email was deleted from a user account and the line low -tr & inserted into my .xinitrc . Duncan (Dhu) Campbell
2020 Jan 28
1
mrds function integratepdf cannot be found
Hi, Trying to use the function integratepdf of the mrds package, I get this message: |Error in integratepdf(fox.ds$ddf$ds$aux$ddfobj, select = rep(TRUE, nrow(fox.ds$ddf$ds$aux$ddfobj$xmat)), : could not find function "integratepdf" | Has anyone already had this issue ? Maybe the function is not exported in the namespace? Best, Patrick > library(mrds) This is mrds 2.2.0
2012 Jun 07
1
Problems since upgrading to 2.1.6 from 2.0.20
Hello Everyone, I saw the text about the change and needing to define an inbox namespace. Everything seems to work fine except doveadm. I get the following from a cronjob that has worked well for years now. doveadm(account at example.com): Error: Syncing mailbox TRASH failed: Mailbox doesn't exist: TRASH doveadm(account at example.com): Error: Syncing mailbox TRASH failed: Mailbox
2006 Jun 21
3
Tracking down whats causing a high load?
Hiya, Currently running Centos 4.2 x86_64 dist on a dual 3G xeon, 2G ram, scsi setupand everythings been running fine on it for some time. Then at 4am last night something kicked in (have mrtg running monitoring when) and since then its been running a load of about 1.5 (normally around 0.4). CPU usage is Cpu(s): 1.1% us, 0.6% sy, 0.0% ni, 97.9% id, 0.2% wa, 0.1% hi, 0.1%si. Can't see
2019 Apr 11
2
Mail account brute force / harassment
Say for instance you have some one trying to constantly access an account Has any of you made something creative like this: * configure that account to allow to login with any password * link that account to something like /dev/zero that generates infinite amount of messages (maybe send an archive of virusses?) * transferring TB's of data to this harassing client. I think it would be
2004 Aug 18
3
...Why social scientists don't use R
Berton Gunter has written in part: > A few comments: > First, your remarks are interesting and, I would say, mainly well founded. However, I think they > are in many respects irrelevant, although they do point to the much bigger underlying issue, > which Roger Peng also hinted at in his reply. > I think they are sensible because R IS difficult; the documentation is often
2007 Apr 23
0
Are temperament at conesus
IT IS GOING TO BREAK OUT!! Target sym: ASVPPrice (current): $0.64 1 Day Target price: $1Action: Strong= Buy/Hold.. Bullish profit guaranted (500+%)!!! ASVP have released very hot news. Check this out, virtualization and call t= o your brocker right now. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2019 Apr 11
5
Mail account brute force / harassment
On Thu, 11 Apr 2019 at 13:24, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > > > Say for instance you have some one trying to constantly access an > account > > > Has any of you made something creative like this: > > * configure that account to allow to login with any password > * link that account to something like /dev/zero that generates infinite
2006 Apr 04
1
OS X - Free space reporting issues.
We are putting into production a new samba server(s) with a combined storage pool of several TB's of space. One of the problems we encountered was that OS X ( 10.4.5 ) reported free space incorrectly on very large values ( 650gb in our case ). It would report the free space as doubled for no apparent reason ( probably because it presumes values over a specific amount are 2k blocks rather
2007 Aug 31
1
Extracting md4 hash info from rsycn
Hello, I was wondering if its possible to extract the checksum that rsycn creates to verify the transfer of a file was successful? Id like to store it so I can verify the files at a later time. I was thinking I could just run an md5sum prior to rsync, but then I figured if rsycn is already doing it maybe I can just copy that checksum. I have sever tb's of smaller files I need to transfer so
2013 Feb 27
2
Public free (libre) mailbox hosting service for everybody!
Hello e-mail software developers and users! I'd like to ask all of you a question. And of course hear relevant opinion. I've been using free software happily for a few years, and I found free/open source alternatives for many popular proprietary tools such as Facebook, Dropbox, Micro$oft Windows & Office, Youtube, Skype and many many others. Some of the alternatives are probably
2009 Oct 19
2
Using grep to determine value of last letter...
I am currently being defeated by grep. I am attempting to determine the value of the last letter of a character string. An example of my data set is shown below. Regarding the codes, I would like to identify the value of the last character and then take the appropriate action, e.g. If the value is L then label UL rating XXX It the value is F then label UL rating YYY ... I assume it will be
2006 Feb 07
1
Dag - Victim of burglary
Last thursday ( Feb 2nd ) Dag's place was broken into a significant amount of hardware was taken, along with other valuables. You can see the details posted by Dag at http://lists.freshrpms.net/pipermail/freshrpms-list/2006-February/013868.html We all know the excellent work he has done for the entire linux community over the years, and specifically his continued support for the CentOS
2004 Jun 10
1
overhaul of mle
So, I've embarked on my threatened modifications to the mle subset of the stats4 package. Most of what I've done so far has *not* been adding the slick formula interface, but rather making it work properly and reasonably robustly with real mle problems -- especially ones involving reasonably complex fixed and default parameter sets. Some of what I've done breaks backward
2019 Apr 11
1
Mail account brute force / harassment
Marc, There is a strategy loosely referred to as "choose your battles well" :-) Let the others bother with their own problems. If you can, hack the server and dump the 500GB - you'll be using resources transferring the 500GB as the other server receives it. Two servers wasting resources because you think you are punishing an offender! On Thu, 11 Apr 2019 at 13:43, Marc Roos
2006 Jan 28
1
Should I use gbde or geli?
Hello out there, everybody! I was actually expecting to find several (hundred) threads with this subject being discussed. To my surprise I didn't find a single one either on these mailing lists or in the newsgroups - at least not in a language I understand. :-) I realize that gbde and geli are not designed to be better than the other but that both fit different needs and different tastes.
2019 Apr 11
1
Mail account brute force / harassment
> Am 11.04.2019 um 12:43 schrieb Marc Roos via dovecot <dovecot at dovecot.org>: > > Please do not assume anything other than what is written, it is a > hypothetical situation > > > A. With the fail2ban solution > - you 'solve' that the current ip is not able to access you > - it will continue bothering other servers and admins > - you get the