search for: ccse

Displaying 5 results from an estimated 5 matches for "ccse".

Did you mean: case
2005 Feb 22
2
Corrupt Database and couldn't map SID.
..._idmap_get_id_from_sid(475) rid_idmap_get_id_from_sid: no suitable range available for sid: S-1-5-32-545 [2005/02/22 12:30:00, 0] sam/idmap_rid.c:rid_idmap_get_id_from_sid(475) rid_idmap_get_id_from_sid: no suitable range available for sid: S-1-5-32-545 Any help is appreciated !! Josh Konkol, CCSE CNE MCSE Technical Research Specialist .~. GuideOne Insurance /V\ /( )\ ^^-^^ samba@guidemail.com
2015 Jul 31
1
Fedora change that will probably affect RHEL
...ility of vendor installed trojans on hosts that may never be connected to an external network and adopting an infrastructure that depends upon such behaviour. Ones risk tolerance varies according to the perceived value of the asset to be protected. The problem that Google, Amazon, NSA, FSB, GCHQ, CCSE and the rest pose to the average person is that the average person has no idea of how to value pervasive recording of their private activities. Thus there is no basis upon which they may form a reasonable risk assessment. Therefore no reasonable estimation of the acceptable cost for prevention ca...
2006 May 31
14
Linux router performance
Hi, I wonder about the performance of a Linux box used as router (I guest I''m not the first :). Althought I know it mainly depends on the hardware, I''m trying to find some references on the topic or comparations with other routing solutions (FreeBSD box used as router, Cisco, etc). For example, http://facweb.cti.depaul.edu/jyu/Publications/Yu-Linux-TSM2004.pdf (althought is
2005 Mar 04
0
Winbind Daemon dying
...E: 11 stack frames: #0 [0x80492a30] #1 [0x8043d17a] #2 [0x80440044] #3 [0x80437396] #4 [0x804380be] #5 [0x8043444a] #6 [0x804347f4] #7 [0x80434d76] #8 [0x804358f6] #9 [0xc01df7bc] #10 [0x80433b54] Sorry for the long post. Any help is appreciated !! Josh Konkol, CCSE CNE MCSE Technical Research Specialist .~. GuideOne Insurance /V\ /( )\ ^^-^^ samba@guidemail.com
1998 Oct 13
5
compare / contrast of linux fw and others
Hi, I was wondering how a linux box configured as a firewall stacked up against some of the commercial products like checkpoint-1 and gauntlet. Can someone direct me to a good book or online doc that compares linux to some other firewall methods? Mind you, I''m not talking about a firewall in the classical sense, ie ip forwarding turned off and used as a proxy, but the typical Linux box