search for: berne

Displaying 20 results from an estimated 238 matches for "berne".

Did you mean: bernd
2010 Feb 10
0
1st Swiss Puppet Users Group meeting - February the 18th - Berne, Switzerland
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all I forward an invitation to join the first swiss puppet user group meeting in Berne, Switzerland. It will take place on Thursday, February the 18th at 7 PM. The idea is to kick off meetings on a regular basis at different locations within Switzerland to exchange, learn, discuss and have fun. So stay tuned for further events. cu there! cheers pete ### Thursday, February the 18th...
2007 Apr 30
1
mirror's choice when installing a package for R-2.5.0 (PR#9643)
Hello, Just a quick message to say that, ------------------------------------------------------------------------ ------- when choosing (with or without the tcltk window) "Bern 1 (swiss)" as CRAN mirror to install a package (function install.packages) for R-2.5.0, the list of available packages for osx seems not complete: AMORE, AdaptFit, AlgDesign, AnalyzeFMRI, SemiPar,
2010 Nov 15
0
Next SPUG Meeting 17.11.2010 - Bern (CH)
Hi the Swiss Puppet User Group (SPUG) [1] will meet the next time this Wednesday around 19 o''clock in Bern [2]. Please note that you should announce yourself to the hosters so that you can get in. If you have any cool things to present to the local puppet community: Bring your slides! Cu there! ~pete [1] http://spug.ch [2]
2008 Jun 25
1
confidence bounds using contour plot
Hello I'm trying to calculate 2d confindence bounds into a scatterplot using the function "kde2d" (package MASS) and a contour plot. I found a similar post providing a solution - unfortunatly I do not realy understand which data I have to use to calculated the named "quantile": Post URL: http://tolstoy.newcastle.edu.au/R/help/03b/5384.html > (...) > >> Is
2019 Mar 15
3
prompt to update a host key
On Fri, Mar 15, 2019 at 09:10:26AM +0000, Jochen Bern wrote: > Imagine sysadminning a boatload of VMs getting IPs from a dynamic pool, a la > > $ for ADDR in $CUSTOMER_1_RANGE $CUSTOMER_2_RANGE... ; do > > ping -c 1 -w 2 $ADDR >/dev/null 2>&1 && ssh root@$ADDR do_urgent_fix > > done > > , and it mightn't be that much of a niche anymore ... And
2020 Feb 12
2
Identify multiple users doing reverse port FWD with their pubkeys
Hi Jochen, On Wed, 12 Feb 2020 at 00:16, Jochen Bern <Jochen.Bern at binect.de> wrote: > > On 02/11/2020 07:07 PM, Cl?ment P?ron wrote: > > - I have X devices (around 30) and one SSH server > > - Each of them have a unique public key and create one dynamic reverse > > port forwarding on the server > > - All of them connect with the same UNIX user (I don't
2024 Mar 28
3
Compounding global and individual settings in ssh-config files?
Hello everyone, my workplace has gotten the idea of centrally maintaining a file in ssh_config syntax so that employees do not need to discover every new machine and configure it on their own. Since it's a case of "let's get started now, and properly think it through later", right now, a typical entry might look like > Host [product]-[Customer] > Hostname
2009 Jul 23
1
help with randomisation test...
Dear R-people, I hope asking this is not too cheeky, but I do have a R Problem. I hope that some of you like to play around with R and can help me. Its like this. I have several plant species (A,B,C) and 10 replicates per species. 5 plants per species are damaged, 5 not. I let a caterpillar feed on each plant and measured the growth of the caterpillars on control plants (CR) and on damaged
2023 Feb 20
1
(Open)SSH as a TOTP *Token*?
On Mon, 20 Feb 2023 at 20:03, Jochen Bern <Jochen.Bern at binect.de> wrote: > A quick question, if I may: Today, I heard a rumour that "ssh" can be > used as a TOTP *token* (i.e., accept or generate a secret for a > configuration and generate TOTP codes from there on out, to be entered > into some *other* software requesting them for 2FA). I'm not aware of any way
2011 Feb 08
2
as.Date
Hi everybody, I have a strange behavior of the as.Date() function. For example: as.Date(36525, origin="1900-01-01'") I would expect to get 2000-01-01. But R gives me [1] "2070-01-01" I tried with several origins but the results are still the same. It seems that the origin does not apply and remains 1970-01-01. Does anyone can give me a hint how to
2009 Oct 14
3
post-hoc test with kruskal.test()
Dear R users, I would like to know if there is a way in R to execute a post-hoc test (factor levels comparison, like Tukey for ANOVA) of a non-parametric analysis of variance with kruskal.test() function. I am comparing three different groups. The preliminary analysis using the kruskal-wallis-test show significance, but I still don''t know the relationship and the significance level
2016 Nov 17
5
Good email client to use with Dovecot?
On Thu, 17 Nov 2016 14:11:45 +0100 Jochen Bern <Jochen.Bern at binect.de> wrote: > On 11/17/2016 08:48 AM, Steve Litt wrote: > > When I use an email client, its purpose is as a window into my > > Dovecot IMAP, and as a mechanism to reply to and send emails. I > > don't do filtering or calendaring on my email client (filtering via > > procmail direct to
2009 Apr 08
1
Genstat into R - Randomisation test
Hello everybody, I have a question. I would like to get a correlation between constitutive and induced plant defence which I messured on 30 plant species. So I have table with Species, Induced defence (ID), and constitutive defence (CD). Since Induced and constitutive defence are not independant (so called spurious correlation) I should do a randomisation test. I have a syntax of my
2023 Feb 25
1
ssh host keys on cloned virtual machines
On Fri, Feb 24, 2023 at 10:01 AM Jochen Bern <Jochen.Bern at binect.de> wrote: > > On 24.02.23 12:58, Keine Eile wrote: > > does any one of you have a best practice on renewing ssh host keys on > > cloned machines? > > I have a customer who never thought about that, while cloning all VMs > > from one template. Now all machines have the exact same host key. >
2018 May 16
3
end-to-end encryption
On 05/16/2018 06:07 AM, Aki Tuomi wrote: >> On 15 May 2018 at 22:43 Gandalf Corvotempesta <gandalf.corvotempesta at gmail.com> wrote: >> Is possible to implement and end-to-end encryption with dovecot, where >> server-side there is no private key to decrypt messages? > > You could probably automate this with sieve and e.g. GnuPG, which would mean > that all your
2014 May 05
2
Broken IMAPS Connects Create Lingering imap-login Processes
Hello everyone, we are running a central server (CentOS 6.5, dovecot-2.0.9-7.el6 with a small patch to disable the IMAP CREATE command, and openssl-1.0.1e-16.el6_5.7) and distribute standard client software to customer( site)s. The clients do IMAPS connects in regular intervals (no IDLE, no lingering logins) and authenticate with certs issued by a dedicated PKI ("auth_ssl_username_from_cert
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
On 25.04.24 17:15, openssh-unix-dev-request at mindrot.org digested: > Subject: how to block brute force attacks on reverse tunnels? > From: Steve Newcomb <srn at coolheads.com> > Date: 25.04.24, 17:14 > > For many years I've been running ssh reverse tunnels on portable Linux, > OpenWRT, Android etc. hosts so they can be accessed from a server whose > IP is stable
2002 Jan 08
3
write.table - format
Hello there I ` m a newbie in R and have a question about the output of write.table My command looks like this: write.table(datatr$V1[data.chull],file="outr.txt", quote = FALSE, sep = "\t") In the outputfile (outr.txt) I have an "x" in the left corner and a new row with numbers for each column(1,2,3...). I just want the values in my file. What should I change in
2002 Aug 23
3
y-axis with "break"
Dear R-users I would like to draw a barplot with a special y-axis. Most of my data points are in the range from -50 to 50, apart from one value that is 550. I would now like to have a y-axis from -50 to 50, then a "break" and the "rest" of the y-axis, let's say from 500 to 600. In order to make clear what I'm trying to do, I attached a figure. Is it possible to do
2017 Oct 25
1
authenticate as userA, but get authorization to user userB's account
Jochen Bern <Jochen.Bern at binect.de> (Mi 25 Okt 2017 14:44:26 CEST): ? > > additional account within the mail client (thunderbird) they use. From > > users perspective it is exactly what they want. But I dislike the idea > > of sharing the password. > > For what reason exactly? It not being personalized, too easy to leak, > potentially not expiring ever, ... ?