Displaying 4 results from an estimated 4 matches for "___r".
Did you mean:
___
1998 May 25
0
Circumventing write protect on ZIPDISKS.
...ng a needle to do the eject and inserting
> the read-only disk. Done.
> AFAIK there hasn''t been a published way to hack the protection in
> software, but I see no reason to trust them.
Regards,
Roger.
--
If it''s there and you can see it, it''s REAL |___R.E.Wolff@BitWizard.nl |
If it''s there and you can''t see it, it''s TRANSPARENT | Tel: +31-15-2137555 |
If it''s not there and you can see it, it''s VIRTUAL |__FAX:_+31-15-2138217 |
If it''s not there and you can''t see it, it''s...
1998 Mar 09
2
Towards a solution of tmp-file problems.
...written code?
- What would get more testing: a patch for 2.1.x or 2.0.x?
- How many people would get bitten by the functionality change
of symlinks with $s in them? Suggestions for another character?
Regards,
Roger Wolff.
--
If it''s there and you can see it, it''s REAL |___R.E.Wolff@BitWizard.nl |
If it''s there and you can''t see it, it''s TRANSPARENT | Tel: +31-15-2137555 |
If it''s not there and you can see it, it''s VIRTUAL |__FAX:_+31-15-2138217 |
If it''s not there and you can''t see it, it''s...
1998 Mar 11
4
Re: Towards a solution of tmp-file problems
...ng a
file, to make sure you ignore the right symlinks, you''ll have to
readlink and follow the link yourself. This is a case of "code
duplication" (kernel/web deamon) which can be expected to lead to
trouble.
--
If it''s there and you can see it, it''s REAL |___R.E.Wolff@BitWizard.nl |
If it''s there and you can''t see it, it''s TRANSPARENT | Tel: +31-15-2137555 |
If it''s not there and you can see it, it''s VIRTUAL |__FAX:_+31-15-2138217 |
If it''s not there and you can''t see it, it''s...
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most
relevant information is near the top, but it''s all quite good... :-)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
There is no intrinsic difference between algorithm and data, the
same information can be viewed as data in one context and as
algorithm in another. Why then do so many people claim that
encryption algorithms