similar to: Question.

Displaying 20 results from an estimated 700 matches similar to: "Question."

2004 Aug 10
1
Your mail to Firewalls-Book-Info
This pre-recorded message is being sent in response to your recent email to Firewalls-Book-Info. Building Internet Firewalls, Second Edition =========================================== by Elizabeth D. Zwicky, Simon Cooper, and D. Brent Chapman Published by O'Reilly & Associates 2nd Edition June 2000 894 Pages ISBN 1-56592-871-7 List price $49.95 Available through the Internet at a
2002 Nov 08
2
Hosts files
Hi, I have put entries into the "hosts" file for all the machines which need to connect to our Samba server. Everything seems to be working correctly but I'm curious.... can anyone tell me what the other files "hosts.deny" and "hosts.allow" are for. Thanks Mike
2007 Dec 27
3
Grandtream Conference issue
Hi, I'm using Grandstream IP phone GXP2000, with Asterisk 1.4.15 I'm using g729 codec and want to use only this codec for the calls. My normal calls are going fine. But issue is coming when I'm using the conference from the Line1 and Line2 Option. When I'm initiating the conference at that time, IP phone is sending the G711ulaw for the conference call, while in my phone I've
2008 Sep 01
3
bin/121684: : dump(8) frequently hangs
Any progress here? Does anyone know if this will be fixed in 7.1 latest, or should we start looking for different backup solution (in this case I would suggest to remove dump from the source tree - having a backup tool that doesn't work is worse than having none). After upgrading we basically cannot backup our servers. Shouldn't this issue be on
2011 Aug 11
0
encrypted LVM for dom0?
Running fresh install of wheezy. dom0 is encrypted using LVM. After xen hypervisor starts, I then get to select my wheezy kernel. After starting that, it dies. Screen is black. Can''t see/do anything. Anyone ever managed to run xen on an encrypted dom0? Thanks -- http://www.glumbert.com/media/shift http://www.youtube.com/watch?v=tGvHNNOLnCk "This officer''s men seem to
2011 Jun 03
1
networking in xen
Hi, Question on setting up networking in xen. I want to do the following on my laptop: dom0 is attached to eth0 and ath0. dom1 is going to by my virtual firewall for all my virtual machines. So I assume 3 interfaces, a bridge to eth0, ath0 and a virtual interface? dom2 and so on will route all their traffic through dom1 (through the virtual interface) I''ve read the documentation a
2015 Sep 07
2
Build rpm package for R-MKL
I want to create a clean .rpm package for R built with MKL and ICC. I follow Fedora instrcutions[0] to create the package. As a base, I use the R-3.2.2.src.rpm. I am left with this error: ------------------------------------------ installing R info pages ... updating '/usr/share/info/dir' ... make[1]: Leaving directory '/home/poisonivy/rpmbuild/BUILD/R-3.2.2/doc/manual' + mv
2014 Sep 03
2
Group Policy Objects
I was trying to update the group policy with gpupdate /force and was getting an error message saying can't connect to \\example.local\sysvol\example.local\Polices...etc So when I tried to navigate there I could not see the Polices folder. I ran samba-tool ntacl sysvolreset and tried again, rebooted...still nothing. Then instead of using example.local, I just used the IP, 192.168.0.3 and then
1998 Jun 14
14
SSH w/ttysnoop
I was wondering if anyone here has or knows how to implement ttysnoop w/ssh ?
2019 Oct 29
2
Security Policies
Hello, I just started working with CentOS and I want to say it's a great OS. The only issue is that I no longer see the lists of Security polices during the installation and I would like to know how to install them in Centos 8
2015 Aug 20
2
loop unrolling introduces conditional branch
Hi, I want to use loop unrolling pass, however, I find that loop unrolling will introduces conditional branch at end of every "unrolled" part. For example, consider the following code *void foo( int n, int array_x[])* *{* * for (int i=0; i < n; i++)* * array_x[i] = i; * *}* Then I use this command "opt-3.5 try.bc -mem2reg -loops -loop-simplify -loop-rotate -lcssa
2007 Dec 26
1
"Securing OpenSSH" link it to "Banner Files"
Hi, I would like to add a small section about "Banners" to "Securing OpenSSH" and then link it to the "Banner Files". Any objections ? or is this a task for the author ? Kind regards Mats Ref.: http://wiki.centos.org/HowTos/Network/SecuringSSH http://wiki.centos.org/TipsAndTricks/BannerFiles
2005 Dec 01
2
exploiting kernel
Hi, Can kernel's freeBSD exploited by tools hacking ? If true, can I know how to fix this problem, and what tools can do that. Thanks alot
2019 Apr 24
3
firewalld configuration for securing SSH
HI all, 1st time contributor here. I was using the guide on securing SSH, and noticed that the firewall-cmd snippets for filtering by requests per time seem somewhat outdated. From what I can tell the given snippets, relay arguments directly down to iptables, and do not cover both IPv4 and v6. (and in fact when attempting to extend to v6 the firewall would fail to reload). I came up with an
2000 Aug 02
4
RDF Metadata Specification
I've put together the first attempt to defining an RDF metadata vocabulary for use with the CD Index/MusicBrainz/OggVorbis. If you care about metadata issues, please take a look at: http://www.cdindex.org/MM I've included a section for video specific stuff, but everything that I originally had in there is being covered by the MM:Contributors section. The Contributors stuff will allow
2017 Jul 06
2
Rebuid the Corrupt default Group Policy
Hello Marc, > Hi Anantha, > > Am 06.07.2017 um 10:02 schrieb Anantha Raghava via samba: >> Is there any way we can rebuild corrupt Default Domain Policy and >> Default Domain Controller Policy. > What is broken? Entire Default Domain and Default Domain Controller Policies along with other Polices that we had built are broken. >> In windows AD we can use dcgpofix
2007 Sep 13
4
SSH contribution?
List, Whilst I'm in the mood for contributing stuff, here's another little howto I wrote on securing SSH that has proved popular in the past: http://forums.pcper.com/showthread.php?t=433216 If you feel it is suitable and you would like me to contribute it to the CentOS wiki, just set up a page in the appropriate area and I'll be happy to add it. Regards, Ned
2014 Oct 02
3
Securing SSH --> Change ports
In there you are almost telling people that security through obscurity is a good way. That might sometimes be true but in this case it could mean that you would be handing passwords and other data out. When you start SSH on port 22 it is done with root privileges because the root user is the only one that can use ports below 1024. Root is the only user that can listen to that port or do
2008 Jul 25
2
Securing serial ports - fax modems
I have already deployed a fax server and am about to deploy a backup system for this host at our off-site facility. It struck me that I have given no thought to securing the serial port to unauthorized access. The modem is a Multi-Tech MT5634ZBA which supports data as well as fax. So this poses the same type of risk, if not to the same degree, as an ssh or telnet port but without the
2002 May 09
2
still problems with password-expiration
Hi folks, I knew this was recently discussed but I still couldn't get it to work. I still have the problem that the users on the W2K-Clients get the message about the password going to expire in 5 days when joining the Samba-PDC-Domain. Even if the users change the password, this message keeps coming... I have no idea what to do to avoid this message... Funny thing is, the password DOES NOT