search for: devious

Displaying 20 results from an estimated 43 matches for "devious".

2014 May 09
3
v2.2.13.rc1 vs. Pigeonhole
...eader - framed' SUCCEEDED 4: Test 'Addheader - folded' SUCCEEDED 5: Test 'Addheader - newlines' FAILED: wrong first header content in redirected mail 6: Test 'Addheader - implicit keep' SUCCEEDED 7: Test 'Addheader - UTF 8' SUCCEEDED 8: Test 'Addheader - devious characters' SUCCEEDED FAIL: 1 of 8 tests failed. I tried this with the latest Pigeonhole from Mercurial: - dovecot-2-2-pigeonhole-3b6917a4807c and also with the older: - dovecot-2-2-pigeonhole-e111a2393a92 Both versions are quitting during "make check" with the same error when comp...
2018 Apr 19
6
Down C6 ALL without torrent ?
On Thu, 19 Apr 2018, Valeri Galtsev wrote: > On Wed, April 18, 2018 8:36 pm, Always Learning wrote: >> Hi, >> >> I have a machine with a BIOS that does not permit DVD installation. It >> accepts everything else including some old superseded media types. >> >> Is it possible to download C6 combined parts 1 and 2 not using Torrent ? >> >> I have an
2018 Apr 19
1
Down C6 ALL without torrent ?
> > Can we also challenge this "torrents are untrustworthy" attitude. > > Having, successfully so far, resisted/repelled several devious > attacks from the Russians, I am keen to maintain a clean, and thus > secure, system as possible. If you don't trust the sha256 hashes, there's no reason to trust a download using https. -- Yves Bellefeuille <yan at storm.ca>
2006 Jul 14
1
Micro-pump is cool idea for future computer chips
Micro-pump is cool idea for future computer chips http://www.studyandjobs.com/Micro_pump.html or visit http://www.studyandjobs.com/IT_study.htm Regards
2005 Sep 09
3
Constant pinging from muon.cygnus-1.org
Can someone in this icecast list tell me why, after steaming a shoutcast server for some time, a 69.46.29.165 ip address has started and keeps pinging my port 8000 every couple of seconds 24 hours a day 7 days a week? It's from muon.cygnus-1.org, and the isp is hivelocity.net or hivelocity ventures corporation. Funny, whenever my shoutcast server comes alive, that same 69.46.29.165
2012 Feb 15
0
[LLVMdev] LLVM GHC Backend: Tables Next To Code
...Since the jmp is a fixed 2 bytes (0xEB, tablesize), all references to the table can still be done with trivial pc/RIP-relative addressing within the closure, and you just need one pointer for both the table and the closure data. If you want to get extra special and tricky, you could be even more devious by storing "Main_main1_info + 2 + table size" as the canonical pointer. If you jump to *that* when dispatching to the closure, then you completely avoid the runtime overhead of the extra unconditional jump and get exactly the same code you're getting with GHC's native code genera...
2012 Feb 15
2
[LLVMdev] LLVM GHC Backend: Tables Next To Code
...e jmp is a fixed 2 bytes (0xEB, tablesize), all references to the table can still be done with trivial pc/RIP-relative addressing within the closure, and you just need one pointer for both the table and the closure data. > > If you want to get extra special and tricky, you could be even more devious by storing "Main_main1_info + 2 + table size" as the canonical pointer. If you jump to *that* when dispatching to the closure, then you completely avoid the runtime overhead of the extra unconditional jump and get exactly the same code you're getting with GHC's native code genera...
2002 Apr 01
4
path to find ssh-rand-helper
...that in doing so I won't be opening up a huge security hole. My brief reading of the code suggests that in entropy.c:seed_rng() the ssh-rand-helper is run as the original uid (for binaries which were setuid in the first place of course), so I can't spot any obvious holes (but I may not be devious enough). Since almost all the other paths can be overridden in the config (or with -o), and the config file location can also be controlled from the command line (-F for ssh, -f for sshd), I can't see any good reason why the ssh-rand-helper location can't also be... [ I will then nobble s...
2019 Jun 17
2
[nbdkit PATCH] extents: Cap maximum reply length
A devious plugin can cause an 8-fold increase in the reply size in relation to the request size, by alternating status every byte of the request. In the worst case, this can cause the client to reject our response and kill the connection because the response is too large. What's more, it consumes a lot o...
2012 Feb 15
0
[LLVMdev] LLVM GHC Backend: Tables Next To Code
...he jmp is a fixed 2 bytes (0xEB, tablesize), all references to the table can still be done with trivial pc/RIP-relative addressing within the closure, and you just need one pointer for both the table and the closure data. > > If you want to get extra special and tricky, you could be even more devious by storing "Main_main1_info + 2 + table size" as the canonical pointer. If you jump to *that* when dispatching to the closure, then you completely avoid the runtime overhead of the extra unconditional jump and get exactly the same code you're getting with GHC's native code genera...
2018 Apr 19
0
Down C6 ALL without torrent ?
...l 18, 2018 8:36 pm, Always Learning wrote: > >> I have an aversion to using anything that comes from unknown sources, as > >> used by Torrent. > Can we also challenge this "torrents are untrustworthy" attitude. Having, successfully so far, resisted/repelled several devious attacks from the Russians, I am keen to maintain a clean, and thus secure, system as possible. > You can be given an ISO from a shady character under a railway bridge, I'd throw it away unused. Do not want the associated risks. > Also, why not just make your life easy and do a netinsta...
2011 Apr 13
2
Line plots in base graphics
Am I missing something obvious on how to draw multi-line plots in base graphics? In ggplot2, I can do: data(Oxboys, package = "nlme") library(ggplot2) qplot(age, height, data = Oxboys, geom = "line", group = Subject) But in base graphics, the best I can come up with is this: with(Oxboys, plot(age, height, type = "n")) lapply(split(Oxboys[c("age",
2000 Jan 14
1
Interesting behaviour of Win2k explorer with Samba 2.0.6
...But when you examine a drive which is exported from a samba server (we run 2.0.6) the explorer process starts to burn CPU time. It doesn't generate any anomalous network traffic, and it's not due to symlink loops. When you return the focus to a local drive the CPU burning stops. Is this a devious attempt by our uncle Bill to make samba servers look much worse than others for Win2k clients, or is this a (known?) protocol problem with Samba 2.0.6? Chris -- Chris Maltby "One man is as good as another. In fact, probably better." chris@sw.oz.au
2012 Feb 14
3
[LLVMdev] LLVM GHC Backend: Tables Next To Code
Hmm writing a blog post about TNTC is beyond the time I have right now. Here is some high level documentation of the layout of Heap objects in GHC: http://hackage.haskell.org/trac/ghc/wiki/Commentary/Rts/Storage/HeapObjects#InfoTables With TNTC enabled we generate code for closures of this form: .text .align 8 .long Main_main1_srt-(Main_main1_info)+0 .long 0 .quad 4294967299 .quad 0
2011 Nov 10
2
parallel BLAS for Ubuntu 11.10
Has anyone succeeded in getting a parallel BLAS, such as Goto's BLAS, installed on a machine running Ubuntu 11.10? I currently have the libatlas3gf-base package installed on a machine with an AMD Athlon X4 processor. I tried to install the libopenblas-base and libopenblas-dev packages but there seemed to be a glich related to having both libopenblas and libatlas3gf installed so that when I
2018 Apr 19
1
Down C6 ALL without torrent ?
...arning wrote: > >> >> I have an aversion to using anything that comes from unknown sources, as >> >> used by Torrent. > >> Can we also challenge this "torrents are untrustworthy" attitude. > > Having, successfully so far, resisted/repelled several devious attacks > from the Russians, I am keen to maintain a clean, and thus secure, > system as possible. > >> You can be given an ISO from a shady character under a railway bridge, > > I'd throw it away unused. Do not want the associated risks. > >> Also, why not just ma...
2006 Mar 09
4
Stop users accessing methods.
Hello all. Is there a way to stop users from being able to access a controllers methods without affecting the ability of other controllers to use them? i.e FooController def secret #Stuff end end BarController def index redirect_to :controller => ''foo'', action => ''secret'', :id => ''007'' end end But directly
2013 Apr 26
1
Compiling Xapian within a Cocoa project
Hi, folks. I don't know much about C++, so please excuse my newbie question: I just tried to include Xapian in a dummy Cocoa project, ie created a new project and added the libxapian.a file installed via MacPorts. When I include xapian.h in an Objective-C++ file (either mm or h), the compilation fails with the following message: ================= In file included from
2006 Oct 23
0
FW: Debug package question
...s quite likely to feature somewhere in the workings of 'debug' (I can't remember!) so you might hang the thing altogether. Also, if your own function happens to call 'apply' (directly or indirectly) you will get stuck with a lot of debug windows. A more robust, complicated, and devious way to get what you're after, is to write a version of 'apply' that automatically calls 'mtrace' on its function-argument and then invokes the real 'apply'. Something like this: mtrace.apply <- function( X, MARGIN, FUN, ...) { FFF <- FUN # don't know whether...
2011 Nov 08
3
Bug#648029: xen-utils-common: /usr/lib/xen-common/bin/xen-toolstack (and thus /usr/sbin/xm) works with bash, but not dash
...-4.1/bin/xm + [ xm != xm ] -+ exec /usr/sbin/xm ++ exec /usr/lib/xen-4.1/bin/xm Plainly, the idiom "PATH=FOO command -v bar" does not work with dash. This seems to work: local PATH_old PATH_old="${PATH}" PATH=FOO command -v bar PATH="${PATH_old}" Or maybe more devious (but untested): local PATH PATH=FOO command -v bar -- System Information: Debian Release: 6.0.3 APT prefers stable APT policy: (500, 'stable'), (400, 'testing'), (300, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-xen-...