Displaying 20 results from an estimated 40000 matches similar to: "admin console"
2020 Feb 13
1
admin console
Philipp Schafft, who allow you to publish my private message?
> Remove
>
> -Pete
>
> > On Feb 13, 2020, at 8:46 AM, Philipp Schafft <lion at lion.leolix.org> wrote:
> >
> > ???Good afternoon,
> >
> > please have a look into your MUA setup. You keep breaking threading for
> > this thread (In-Reply-To header is set incorrectly).
> >
2020 Feb 06
2
admin console
2020-01-08 09:59, Marvin Scholz wrote:
> >> On Mon, 2020-01-06 at 10:24 +0000, user wrote:
> >
> > I'm consider to put icecast behind reverse proxy. It is not so easy as I
> > think before. Does anyone have experience with it?
>
> In general putting Icecast behind a reverse proxy is not the best idea as
> some webservers are not really made out of the box
2020 Feb 14
1
Why I responded publicly [WAS: admin console]
> On Thu, 2020-02-13 at 14:59 +0000, user wrote:
> > Philipp Schafft, who allow you to publish my private message?
>
> I could also ask who allowed you to send me unwanted private messages?
At this point any message from Philipp Schafft to me becomes absolutely
unwanted.
> In fact I did not notice it was sent privately until after my reply. It
Notice can be found on third
2013 May 15
1
How to allow AMI access to Originate yet deny Application: System
While doing a security audit on a system I maintain, I stumbled upon an unvalidated use of a variable to compose an Originate request to the local Asterisk instance via AMI. Taking as an example an earlier exploit for FreePBX, I realized that this,
combined with Application: System as an injected value, could allow arbitrary code execution. I am in the process of fixing all instances of this bug
2007 Apr 18
2
[Bridge] IPS HLBR 1.0 released (off-topic)
IPS HLBR - Version 1.0 can detect malicious traffic using regular
expressions
Version 1.0 of Hogwash Light BR, released march 5th 2006, brings two
interesting new features. The first one is the ability of using
regular expressions to detect intrusion attempts and e-mails with
virus or phishing. The second is the use of lists with banned words.
HLBR is an IPS (Intrusion Prevention System) that
2009 Jul 09
0
[LLVMdev] Cray is Hiring!
Hi,
David Greene wrote:
> After the successful launch of the Jaguar machine (the fastest for
> open science, http://www.cray.com/Products/XT/Product/ORNLJaguar.aspx)
> we're working toward the next leap in computational power.
>
Slight off-topic, but when I try to open the above link in Firefox 3 I
get a big fat "Reported Attack Site! This web site at www.cray.com has
been
2009 Jul 09
1
[LLVMdev] Cray is Hiring!
I got those warnings today (and stopped browsing) but not the first
time David sent the message so I suspect the site got infected very
recently.
--Vikram
Associate Professor, Computer Science
University of Illinois at Urbana-Champaign
http://llvm.org/~vadve
On Jul 9, 2009, at 3:19 PM, Paul Melis wrote:
> Hi,
>
> David Greene wrote:
>> After the successful launch of the
2018 Sep 25
1
How to troubleshoot admin auth values in url format http://admin:password@icecast.org:1234
Hello,
I'm asking if there is a way to do extra troubleshooting for admin auth, by
adjusting a config parameter (i.e. loglevel), then looking at log files.
Sometimes I can auth properly when trying to update metadata using a url
with basic auth embedded before the server/hostname, requested from a web
browser like google chrome.
i.e.
http://admin:password at
2016 Apr 14
2
(rfc) too many keys, usecase?
On Thu, 14 Apr 2016, Jakub Jelen wrote:
> On 04/14/2016 01:19 PM, Cristian Ionescu-Idbohrn wrote:
> > There is no /root/.ssh/authorized_keys on remote host, so I have to
> > authenticate with password.
> >
> > On the remote host:
> >
> > # /usr/sbin/sshd -T | egrep permitroot
> > permitrootlogin yes
> >
> > Attempting:
> >
> >
2002 Mar 07
1
OpenSSH Security Advisory (adv.channelalloc)
1. Systems affected:
All versions of OpenSSH between 2.0 and 3.0.2 contain
an off-by-one error in the channel code.
OpenSSH 3.1 and later are not affected.
2. Impact:
This bug can be exploited locally by an authenticated user
logging into a vulnerable OpenSSH server or by a malicious
SSH server attacking a vulnerable OpenSSH client.
3. Solution:
Upgrade to
2002 Mar 07
1
OpenSSH Security Advisory (adv.channelalloc)
1. Systems affected:
All versions of OpenSSH between 2.0 and 3.0.2 contain
an off-by-one error in the channel code.
OpenSSH 3.1 and later are not affected.
2. Impact:
This bug can be exploited locally by an authenticated user
logging into a vulnerable OpenSSH server or by a malicious
SSH server attacking a vulnerable OpenSSH client.
3. Solution:
Upgrade to
2013 Feb 26
1
maximum file descriptor limit - icecast freeze
reflum,
On Thu, 2013-02-21 at 09:29 +0200, R?cker Thomas wrote:
> On 20/02/13 19:38, Alexandru Matei wrote:
> > A week ago I had a blocked icecast server because of the open files. I
> > read some posts about the 1024 fd limit but this is not the case. My
> > stations rarely has 300 listeners. From the log I can see that around
> > 3PM I had 7 listeners on a mount and
2007 Nov 13
1
MOH Codec Issue
Afternoon All,
Today rolled a pre-production box from Trunk back to 1.4.7 (In an attempt to
get a working SCCP channel). During the process Music On Hold appears to
have died (Not, just when calling from a SCCP device, but coming in on SIP
also).
CLI is showing
-- Executing [XXXXXXXX at unauthed-inbound:2]
MusicOnHold("SIP/10.97.1.33-09f0cfc8", "sounds") in new stack
2018 Jun 05
4
Help attack DDOS
Hi.
I have a problem with the icecast. When I activate the service I am having
an exesive consumption in the ip queries. It seems like a DDOS attack. How
can I mitigate this attack?
Thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xiph.org/pipermail/icecast/attachments/20180605/bd03e5eb/attachment.htm>
2018 Jun 05
2
Help attack DDOS
I ask because I only receive attacks when I activate icecast. I can not do
anything at the application level ?. i used ubuntu server 16.04. thanks.
2018-06-05 14:52 GMT-05:00 Alejandro Flores <alex at mordormx.net>:
> I think you should contact to your connectivity provider, hopefully they
> can provide you the Anti DDOS protection.
>
>
> On Tue, Jun 5, 2018 at 2:16 PM,
2007 Sep 15
2
http keep-alive?
I read this in a previous post (
http://rubyforge.org/pipermail/mongrel-users/2006-December/002354.html)
....
First, Mongrel accepts remote clients and creates one Thread for each
request. Mongrel also enforces a single request/response using
Connect:close headers because Ruby only supports 1024 files (so far). If
Mongrel doesn''t do this then people like yourself can write a simple
2007 Jun 05
2
[LLVMdev] Secure Virtual Machine
On 6/5/07, John Criswell <criswell at cs.uiuc.edu> wrote:
>
> To be honest, while I understand your questions, I do not understand the
> context in which you are asking them. Are you asking if LLVM provides
> any facilities to provide these protections, or are you asking if we've
> added any special features to LLVM (or to SVA; our research work based
> on LLVM) to
2018 Jun 05
2
Help attack DDOS
Server software firewall cannot help with ddos attacks.
Basically if those are indeed ddos attacks you’ll have to look into
mitigation solutions which are quite expensive. CloudFlare won’t work as
well since they do not support streaming.
You should consider getting a server at a data center which provide ddos
mitigation, I know that OVH’s mitigation is quite good.
בתאריך יום ג׳, 5 ביוני 2018
2018 Jun 06
1
Help attack DDOS
well, on a large enough scale, it won't matter even if the server drops
them, it will clog the nic way before it even gets to the server..
On Wed, Jun 6, 2018 at 9:40 AM Roman <romeo.r at gmail.com> wrote:
>
> вт, 5 июн. 2018 г., 23:17 Yahav Shasha <yahav.shasha at gmail.com>:
>
>> Server software firewall cannot help with ddos attacks.
>>
>
> I
2013 Jun 21
0
Xen Security Advisory 57 - libxl allows guest write access to sensitive console related xenstore keys
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory XSA-57
version 3
libxl allows guest write access to sensitive console related xenstore keys
UPDATES IN VERSION 3
====================
Public release.
ISSUE DESCRIPTION
=================
The libxenlight (libxl) toolstack library does not correctly set
permissions on