search for: breakabl

Displaying 20 results from an estimated 31 matches for "breakabl".

Did you mean: breakable
2006 Mar 09
3
Karanbir CentOS REPO - Breakability?
How many of you have tried out the KBS CentOS Fedora Extras rebuilds? In my case i enabled his misc and extras repo on a test machine and - it proceeded to install apt that nuked the dag and centos list files. - It also installed a very new version of wine, wine-devel and wine-tools that broke my wine apps. the centOS rpms from winehq work like champs. The winetools 0.9.3 rpm as linked from
2007 Jan 09
10
Writing a breakable loop? If it gets a match it should stop.
I''m trying to write a function that will accept a rails URL, and see if it matches one of my Rights. Rights are just controller URLs, so I can manage access at the controller level (don''t need action level). What I''m trying to do is take the url passed, and see if its access controlled. If it is, the method should stop and return true, if not it will return false. This
2017 Mar 09
1
another SMTP auth question
...~ca/email/auth.html that explains it simply (for simple minds, like mine) but it appears to be old-ish. So, I'm wondering if the recommendation of using: define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl is still appropriate, since MD5 is known to be breakable. Are there other hash mechanisms that can be used in SMTP for this purpose? Also, if someone can help me understand the syntax, I'd appreciate it: does EXTERNAL mean some external tool not specified here? if so, how is it specified? what such tools would be appropriate? is there something mo...
2023 Nov 06
1
non-linear regression and root finding
...pHm(SID, pK1, pK2, pK3) # data: data.frame(pHobs = pHobs, SID = SID) # pK1 pK2 pK3 # -1.000 2.966 7.606 # residual sum-of-squares: 0.001195 # # Number of iterations to convergence: 15 # Achieved convergence tolerance: 1.49e-08 (Unfortunately, your code seemed to have a lot of non-breakable spaces, which confuse R's parser and make it harder to copy&paste it.) I think that your function can also be presented as a degree-5 polynomial in H, so it should also be possible to use polyroot() to obtain your solutions in a more exact manner. -- Best regards, Ivan
2007 Jul 12
1
WWW::Mechanize::Link.inspect needs some TLC
...change: --- mechanize/inspect.rb~ 2007-07-12 10:55:20.375000000 -0700 +++ mechanize/inspect.rb 2007-07-12 11:42:58.203125000 -0700 @@ -40,6 +40,7 @@ } } end + alias :inspect :pretty_inspect end class Link @@ -49,6 +50,7 @@ q.breakable; q.pp href } end + alias :inspect :pretty_inspect end class Form lib $ I get these much better results: (rdb:1) p page.links[0].inspect.size 138 (rdb:1) p page.body.size 3441 (rdb:1) p page.inspect.size 2172 Is this patch reasonable or have I missed somethin...
2023 Nov 06
2
non-linear regression and root finding
...a.frame(pHobs = pHobs, SID = SID) > # pK1 pK2 pK3 > # -1.000 2.966 7.606 > # residual sum-of-squares: 0.001195 > # > # Number of iterations to convergence: 15 > # Achieved convergence tolerance: 1.49e-08 > > (Unfortunately, your code seemed to have a lot of non-breakable spaces, > which confuse R's parser and make it harder to copy&paste it.) > > I think that your function can also be presented as a degree-5 > polynomial in H, so it should also be possible to use polyroot() to > obtain your solutions in a more exact manner. >
2024 Oct 21
2
Security of ssh across a LAN, public key versus password
...hings' like special characters, mixed case, etc. Thus I > suppose they'll be difficult to guess (or brute force). However > password login can have the same, complex, password strings so I don't > see how using public-key helps and (as I said above) it seems slightly > more breakable. > > It's also **much** more dificult to keep all those keys etc. well > organised. What has brought me to this question is the mixed > collection of RSA and ed25519 keys all over lots of systems getting > very difficult to keep under control, and thus error prone (=insecure)....
2017 Oct 04
0
[ANNOUNCE] xkeyboard-config 2.22
...onetic version Adding Finnish Dvorak layout Add Ladin layout for it and de keyboards Double Russian fixed Possible typo in word "lever" Typo for Dell latitude Choose only one between "behavior" and "behaviour" Typo in "non-breakable space" Spelling fix in guillemets Add Swedish sv_dvorak based on us dvorak-intl fixed nontranslatable description and shortDescription tags Prerelease translations sync Added a bit of explanation for diff, to make it clear Fixed old Hungarian Release...
2009 Oct 05
2
Slightly OT: Vim command (or macro) to replace space under cursor by "  " (without deleting the following word)
Hi, I'm using Vim to edit some static XHTML pages. I have to (manually) check for non-breakable spaces in my text, and eventually replace simple spaces by the following character sequence:   Usually, when I perform the same operation over and over in a text, I do it once, and then repeat it in command mode using [.]. But I can't figure out how to do this here. Here...
2007 Jun 16
1
samba3, nfs mounted directory, and dfs
Hello, I hope this is the right place to ask this one. I've got a FreeBSD 6.2 machine acting as an nfs server. It's exporting a home directory to several machines. On the server that home directory has a symlink in it to another directory on the filesystem. As long as users are on the server they can view the directory symlinked to, but if viewing through samba, they're
2024 Oct 21
7
Security of ssh across a LAN, public key versus password
...all the 'good things' like special characters, mixed case, etc. Thus I suppose they'll be difficult to guess (or brute force). However password login can have the same, complex, password strings so I don't see how using public-key helps and (as I said above) it seems slightly more breakable. It's also **much** more dificult to keep all those keys etc. well organised. What has brought me to this question is the mixed collection of RSA and ed25519 keys all over lots of systems getting very difficult to keep under control, and thus error prone (=insecure). If I went back to all pa...
2015 Mar 09
4
[LLVMdev] LLVM Parallel IR
On 9 March 2015 at 17:30, Tobias Grosser <tgrosser at inf.ethz.ch> wrote: > If my memories are right, one of the critical issues (besides > other engineering considerations) was that parallelism metadata in LLVM is > optional and can always be dropped. However, for > OpenMP it sometimes is incorrect to execute a loop sequential that has been > marked parallel in the source
2010 Oct 05
1
[PATCH] virtio-spec trivial fixes
Hello Rusty, A few trivial fixes on top of virtio-spec-0.8.9 (patch -p0): - grammatical errors - mark '-' in 'avail->flags' as non-breakable hyphen - add a footnote for console device to indicate queues 2 onwards are avl. if a feature was negotiated Amit --- virtio-spec-0.8.9.lyx 2010-10-05 17:26:11.318836266 +0530 +++ virtio-spec-0.8.9-mod.lyx 2010-10-05 19:00:12.829710205 +0530 @@ -1,4 +1,4 @@ -#LyX 1.6.5 created this file. Fo...
2010 Oct 05
1
[PATCH] virtio-spec trivial fixes
Hello Rusty, A few trivial fixes on top of virtio-spec-0.8.9 (patch -p0): - grammatical errors - mark '-' in 'avail->flags' as non-breakable hyphen - add a footnote for console device to indicate queues 2 onwards are avl. if a feature was negotiated Amit --- virtio-spec-0.8.9.lyx 2010-10-05 17:26:11.318836266 +0530 +++ virtio-spec-0.8.9-mod.lyx 2010-10-05 19:00:12.829710205 +0530 @@ -1,4 +1,4 @@ -#LyX 1.6.5 created this file. Fo...
2023 Nov 06
1
non-linear regression and root finding
...) >> #??? pK1???? pK2??? pK3 >> # -1.000?? 2.966? 7.606 >> #? residual sum-of-squares: 0.001195 >> # >> # Number of iterations to convergence: 15 >> # Achieved convergence tolerance: 1.49e-08 >> >> (Unfortunately, your code seemed to have a lot of non-breakable spaces, >> which confuse R's parser and make it harder to copy&paste it.) >> >> I think that your function can also be presented as a degree-5 >> polynomial in H, so it should also be possible to use polyroot() to >> obtain your solutions in a more exact manne...
2000 Feb 28
3
SSH & xauth (fwd)
...#39;ll see that one suggestion for dealing with this, and still allowing X11 forwarding from untrusted clients, is to use the Xnest server, limiting access by the ssh client to that DISPLAY. As I observed at the time, Xnest was probably not designed with this use in mind, and as such is probably ``breakable,'' meaning that a pursuaded party might be able to gain access to the proper display through exploiting weaknesses in the Xnest server. I have not audited the Xnest code to verify that this is or is not the case. I believe at the time, Alan Cox responded with information about using the...
2012 Oct 18
4
Trouble with parentheses in Markdown hyperlinks
How can we improve URL detection in Markdown? I posted a question on Stack Overflow and happened to click a URL in my post. To my surprise, it wasn't functional, and it took three different, nonintuitive manipulations before I achieved a functional URL. Stack Overflow says "not my problem", so I'm deferring to Markdown itself. Here's a
2024 Oct 21
1
Security of ssh across a LAN, public key versus password
...ial characters, mixed case, etc. Thus I > > suppose they'll be difficult to guess (or brute force). However > > password login can have the same, complex, password strings so I don't > > see how using public-key helps and (as I said above) it seems slightly > > more breakable. > > > > It's also **much** more dificult to keep all those keys etc. well > > organised. What has brought me to this question is the mixed > > collection of RSA and ed25519 keys all over lots of systems getting > > very difficult to keep under control, and thus...
2001 Oct 01
5
More on CD anti-copying techniques
Some CDs will include all the songs encoded with Windows Media, removing the the need for ripping. Sounds like it has the potential to stomp out competition from other formats such as MP3 & OGG. http://news.cnet.com/news/0-1005-201-7320279-0.html --- >8 ---- List archives: http://www.xiph.org/archives/ Ogg project homepage: http://www.xiph.org/ogg/ To unsubscribe from this list, send a
2023 Nov 06
2
non-linear regression and root finding
Dear friends - I have a function for the charge in a fluid (water) buffered with HEPES and otherwise only containing Na and Cl so that [Na] - [Cl] = SID (strong ion difference) goes from -1 mM to 1 mM. With known SID and total HEPES concentration I can calculate accurately the pH if I know 3 pK values for HEPES by finding the single root with uniroot Now, the problem is that there is some