search for: prearrang

Displaying 10 results from an estimated 10 matches for "prearrang".

Did you mean: prearrange
2009 Apr 24
4
Long string in crypting
I use a solution to crypt a string that I found using OpenSSL. But the crypted string becomes very long, too long for a varchar 255 to hold it. What can I do to make it shorter? Or should I just use text as column in the mysql db? public_key_file = ''lib/public.pem'' public_key = OpenSSL::PKey::RSA.new(File.read(public_key_file)) @encrypted_string =
2015 Jun 04
2
managing logins for different classes of servers
Our environment has several "classes" of servers, such as "development", "production", "qa", "utility", etc. Then we have all our users. There's no obvious mapping between users and server class. Some users may have access to only one class, some may span multiple classes, etc. And for maximum complexity, some classes of machines use local
2011 Mar 24
4
{OT] Re: Installing IMA (Integrity Measurement Architecture) on CentOS 5.5
Greetings, On 3/24/11, Akemi Yagi <amyagi at gmail.com> wrote: > I should note, however, that they are not for production use. > > Akemi Thanks Akemi very much for your always relevant and brilliant works. </rant> As an Indian, where "veda" repository of knowledge originated, I have always looked at every member of this list as a repository of knowledge.
2015 Jun 04
0
managing logins for different classes of servers
...sers" should be allowed on dev systems, unless they need to look in on what's going on. In a true professional environment, only the admins get to move things to prod; dev can promote in the VCS, and the testers can bring that in, then promote so that the admins can roll that out during a prearranged maintenance window. All of this is easily done. We have the organization-wide AD (sigh), which authenticates, and allows single sign-on, single password. Then there's authorization.... We have a large /etc/password, but if you're not allowed on, your shell is /bin/noLogin. <g>...
2017 Aug 14
2
How does SMB 3.0 encryption work?
...ually compare a fingerprint of the public key, and that key will be cached so that you can be warned if it changes. IPSec (among other options) can simply use a pre-shared key that uses a symmetric cipher. All of these different methods require configuring the client (in one way or another) to prearrange some information that allows it to tell the difference between the real server and an imposter, but I don't see how to do that in my smb.conf, so it makes me wonder whether I'm protected, and google isn't helping. Is it perhaps using your password somehow? Like, if an attacker knew...
2010 Jul 02
1
Progress bars
.../copied so far. Callers are only interested in the ratio of these two numbers when displaying a progress meter. Library changes --------------- On receiving a status message, the library can ignore it, or can: (1) update the total and current fields in the guestfs_h handle, and/or (2) call a prearranged callback function. We would add a way to query these numbers for an existing handle: void guestfs_get_progress (guestfs_h *g, int64_t *total, int64_t *current); Callers can poll this function on any open handle from any thread to retrieve the progress of the currently running call. [Side no...
2006 Feb 08
2
RSYNC via pipe/socket ?
...sh, what *do* they have? It is certainly possible to use rsync over insecure-berkeley-rsh (sometimes called remsh) and over kerberized rsh (v4 or v5), or basically anything with an rsh-like syntax... if you were really clever you could write a shell-script wrapper that called netcat, if you had a prearranged netcat invocation on the other end :-) This ignores the "rsync server" mode, where rsync talks to rsyncd directly and doesn't use an existing remote-shell channel... ---------- so, this gives me some hope that this _could_ possible somehow. unfortunately i don`t have a clue, how...
2006 Oct 27
3
R & gams
At office I have been introduced by another company to new, complex energy forecasting models using gams as the basic software. I have been told by the company offering the models that gams is specialised in dealing with huge, hevy-weight linear and non-linear modelling (see an example in http://www.gams.com/modtype/index.htm) and they say it is almost the only option for doing it. I would
2003 Dec 30
3
A Head Check
Hello, I have been retained by a Building Management Company to install a combined Voice/Data solution for a Tennated Office Space. This space will rent offices, with telephone and internet service to inviduals or small groups of individuals. As fate would have it, the service will be provided in a building where we have a major Pop, with a DS-3 worth of ISDN PRI circuits, 345 megs of
2020 Jan 15
16
[PITCH] Improvements to LLVM Decision Making
Hi Everyone, Numerous people have been bringing up challenges with consensus driven decision making in the LLVM community. After considering this and seeing the frustrations it is causing many people, I think we should make a formal process change to help improve decision making going forward. Here is the outline of the draft proposal