Displaying 5 results from an estimated 5 matches for "ccse".
Did you mean:
case
2005 Feb 22
2
Corrupt Database and couldn't map SID.
..._idmap_get_id_from_sid(475)
rid_idmap_get_id_from_sid: no suitable range available for sid: S-1-5-32-545
[2005/02/22 12:30:00, 0] sam/idmap_rid.c:rid_idmap_get_id_from_sid(475)
rid_idmap_get_id_from_sid: no suitable range available for sid: S-1-5-32-545
Any help is appreciated !!
Josh Konkol, CCSE CNE MCSE
Technical Research Specialist
.~. GuideOne Insurance
/V\
/( )\
^^-^^ samba@guidemail.com
2015 Jul 31
1
Fedora change that will probably affect RHEL
...ility of vendor installed trojans on hosts that may never be
connected to an external network and adopting an infrastructure that
depends upon such behaviour.
Ones risk tolerance varies according to the perceived value of the
asset to be protected. The problem that Google, Amazon, NSA, FSB,
GCHQ, CCSE and the rest pose to the average person is that the average
person has no idea of how to value pervasive recording of their
private activities. Thus there is no basis upon which they may form a
reasonable risk assessment. Therefore no reasonable estimation of the
acceptable cost for prevention ca...
2006 May 31
14
Linux router performance
Hi,
I wonder about the performance of a Linux box used as router (I guest I''m
not the first :). Althought I know it mainly depends on the hardware, I''m
trying to find some references on the topic or comparations with other
routing solutions (FreeBSD box used as router, Cisco, etc). For example,
http://facweb.cti.depaul.edu/jyu/Publications/Yu-Linux-TSM2004.pdf
(althought is
2005 Mar 04
0
Winbind Daemon dying
...E: 11 stack frames:
#0 [0x80492a30]
#1 [0x8043d17a]
#2 [0x80440044]
#3 [0x80437396]
#4 [0x804380be]
#5 [0x8043444a]
#6 [0x804347f4]
#7 [0x80434d76]
#8 [0x804358f6]
#9 [0xc01df7bc]
#10 [0x80433b54]
Sorry for the long post. Any help is appreciated !!
Josh Konkol, CCSE CNE MCSE
Technical Research Specialist
.~. GuideOne Insurance
/V\
/( )\
^^-^^ samba@guidemail.com
1998 Oct 13
5
compare / contrast of linux fw and others
Hi,
I was wondering how a linux box configured as a firewall stacked up
against some of the commercial products like checkpoint-1 and gauntlet.
Can someone direct me to a good book or online doc that compares linux
to some other firewall methods?
Mind you, I''m not talking about a firewall in the classical sense, ie
ip forwarding turned off and used as a proxy, but the typical Linux box