Displaying 4 results from an estimated 4 matches for "1024bits".
2000 Jul 05
1
some problems reading rsa/dsa keys
...s
RSAAuthentication yes
FallBackToRsh no
IdentityFile ~/.ssh2/identification
Port x
Protocol 2
$ cat .ssh/identification
IdKey joe_dsa_1024
So, why doesn't the damn thing read the correct key? The key was generated
by ssh-2.0.13, it's a generic 1024bits DSA.
Thanks,
Emmanuel
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20000705/d4fbc3d7/attachment.html
2004 Aug 06
2
buffer size from source to ice/shoutcast
Hello,
I've built my own source for ICE/SHOUTcast, and it works pretty well except for one thing. After tuning into the server and listening for an 60-90 minutes you may hear a song skip ahead 30-90 seconds. I think I know why this is happening but I'mnot sure how to fix it.
I think this is happening because my source is sending a little bit too much data to ICE/SHOUTcast. My formula
2003 May 15
3
ssl still not working
hi,
I'm just download the latest cvs and try to use imaps. in mozilla I've
got the following message window:
-----------------------------
mail.int.bppiac.hu received a message with incorrect Message
Authentication Code. If the error occurs frequently, contact the website
administrator.
-----------------------------
and there is only one OK button:-)
and this happens always. what can be
2004 Aug 06
0
buffer size from source to ice/shoutcast
...;
> buffersize = bitrate * 1024 / 8
> send buffer
> wait 1 second
> repeat
>
> So..broadcasting at 128kbs means I send a buffer of 16384 bytes per
> second.
>
Well you have to realise the kilobit definition used with mp3 is 1kbit =
1000bits/sec (Microsoft uses 1kbit=1024bits for it's media formats
incidently).
But your algorithm will suffer because sending the data will take a
non-negligible time -
better algorithm is
tart = time();
sent = 0;
while(1){
sent += send_chunk();
delta = time() - start;
my_bitrate = sent *8 / delta;
if(my_bit...