search for: ___r

Displaying 4 results from an estimated 4 matches for "___r".

Did you mean: ___
1998 May 25
0
Circumventing write protect on ZIPDISKS.
...ng a needle to do the eject and inserting > the read-only disk. Done. > AFAIK there hasn''t been a published way to hack the protection in > software, but I see no reason to trust them. Regards, Roger. -- If it''s there and you can see it, it''s REAL |___R.E.Wolff@BitWizard.nl | If it''s there and you can''t see it, it''s TRANSPARENT | Tel: +31-15-2137555 | If it''s not there and you can see it, it''s VIRTUAL |__FAX:_+31-15-2138217 | If it''s not there and you can''t see it, it''s...
1998 Mar 09
2
Towards a solution of tmp-file problems.
...written code? - What would get more testing: a patch for 2.1.x or 2.0.x? - How many people would get bitten by the functionality change of symlinks with $s in them? Suggestions for another character? Regards, Roger Wolff. -- If it''s there and you can see it, it''s REAL |___R.E.Wolff@BitWizard.nl | If it''s there and you can''t see it, it''s TRANSPARENT | Tel: +31-15-2137555 | If it''s not there and you can see it, it''s VIRTUAL |__FAX:_+31-15-2138217 | If it''s not there and you can''t see it, it''s...
1998 Mar 11
4
Re: Towards a solution of tmp-file problems
...ng a file, to make sure you ignore the right symlinks, you''ll have to readlink and follow the link yourself. This is a case of "code duplication" (kernel/web deamon) which can be expected to lead to trouble. -- If it''s there and you can see it, it''s REAL |___R.E.Wolff@BitWizard.nl | If it''s there and you can''t see it, it''s TRANSPARENT | Tel: +31-15-2137555 | If it''s not there and you can see it, it''s VIRTUAL |__FAX:_+31-15-2138217 | If it''s not there and you can''t see it, it''s...
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms