search for: circumvention

Displaying 20 results from an estimated 33 matches for "circumvention".

2017 May 13
0
Circumvention of authentication when using fallback mounts
...which mount they came from. > But suppose now that we use a wildcard to configure not just two, but N > private mounts, i.e. /mount*, so that the mount name is fully determined > by the source client. In this scenario, we cannot use a common fallback > mount any more without possible circumvention of authentication. > > Latter scenario is useful when the N mounts carry private audio, and > fall back to one stream of 'fallback' music. Yes. It also applies in case you have manual configuration for multiple mount sharing the same fallback. > Is there any way to make this...
2003 Jun 06
1
bugtraq re: remote client address restriction circumvention
does anyone have a comment to make about this? (cert picked it up and we're being asked for a vendor response) http://www.securityfocus.com/archive/1/324016/2003-06-03/2003-06-09/0 do we have an "official" response yet? thanks, wendy -- wendy palm Cray Open Software Development, Cray Inc. wendyp at cray.com, 651-605-9154
2017 May 12
2
Circumvention of authentication when using fallback mounts
...We could simply configure two separate fallbacks. But suppose now that we use a wildcard to configure not just two, but N private mounts, i.e. /mount*, so that the mount name is fully determined by the source client. In this scenario, we cannot use a common fallback mount any more without possible circumvention of authentication. Latter scenario is useful when the N mounts carry private audio, and fall back to one stream of 'fallback' music. Is there any way to make this scenario work? Thanks, Michael
2017 May 13
0
Circumvention of authentication when using fallback mounts
Good evening, On Sat, 2017-05-13 at 16:11 +0200, Michael Franzl wrote: > On 05/13/2017 03:12 PM, Philipp Schafft wrote: > > Basically the client structure would need to keep track of which sources > > the client was attached to in form of a stack. This is important as > > there can be fallbacks of fallbacks (and there are valid reasons to > > build something like that).
2017 May 13
2
Circumvention of authentication when using fallback mounts
On 05/13/2017 03:12 PM, Philipp Schafft wrote: > Basically the client structure would need to keep track of which sources > the client was attached to in form of a stack. This is important as > there can be fallbacks of fallbacks (and there are valid reasons to > build something like that). A pure 'original mount' thing may result in > unexpected behavior. That being even
2013 Apr 03
0
[LLVMdev] RFC: Bug fix releases for 3.3 and beyond
...ew target features (!), and in light of this the above statement could be extended to "get new C API and target features into a packaged release in a timely fashion", which seems awfully close to simply being a way for code owners to push new code into "official dot-releases" in circumvention of our release schedule. While having such a side-channel may be pragmatically useful I can't help but feel that it is a bit hackish and would be better addressed by improving the automation of our release process (and the infrastructure supporting it) to enable a faster release schedule. -- S...
2013 Apr 03
2
[LLVMdev] RFC: Bug fix releases for 3.3 and beyond
...res (!), and in light of this the above statement could be > extended to "get new C API and target features into a packaged release in a > timely fashion", which seems awfully close to simply being a way for code > owners to push new code into "official dot-releases" in circumvention of > our release schedule. While having such a side-channel may be pragmatically > useful I can't help but feel that it is a bit hackish and would be better > addressed by improving the automation of our release process (and the > infrastructure supporting it) to enable a faster rel...
2011 Apr 07
5
R licence
Hi, is it possible to use some statistic computing by R in proprietary software? Our software is written in c#, and we intend to use http://rdotnet.codeplex.com/ to get R work there. Especially we want to use loess function. Thanks, Best regards, Stanislav [[alternative HTML version deleted]]
2011 Feb 10
1
"Error in plot.window(...) : invalid 'xlim' value" from plot(...par(new = TRUE))
...rts daily, too.) I actually first noticed the behavior on my desktop machine at work; it is also running FreeBSD stable/8, but only updated as of 30 Jan 2011 -- and the problem did not exist last week. So I don't believe this is because of a change in FreeBSD. For now, I'm (also) open to circumventions, so I can avoid complaints about the graphs that weren't updated at work, but I'd like to resolve the issue. (And yes, I fully understand that what needs to be fixed is my understanding of how to use the tools.) Thanks! Peace, david -- David H. Wolfskill r at catwhisker.org Deprivin...
2013 Apr 03
3
[LLVMdev] RFC: Bug fix releases for 3.3 and beyond
On Wed, Apr 03, 2013 at 02:51:05PM -0500, Krzysztof Parzyszek wrote: > On 4/3/2013 2:36 PM, Tom Stellard wrote: > > > >I don't think the length of the release cycle really matters too much. > > It does. Someone has to do the work---the effort goes to either to > the ongoing development or to the maintenance releases. A short > release cycle generally means less
2013 Apr 03
0
[LLVMdev] RFC: Bug fix releases for 3.3 and beyond
...this the above statement could > be > > extended to "get new C API and target features into a packaged release > in a > > timely fashion", which seems awfully close to simply being a way for code > > owners to push new code into "official dot-releases" in circumvention of > > our release schedule. While having such a side-channel may be > pragmatically > > useful I can't help but feel that it is a bit hackish and would be better > > addressed by improving the automation of our release process (and the > > infrastructure supporting i...
2004 Aug 06
3
[fred@vonlohmann.com: Re: pho: How Live365 fights back...]
...rt may NEVER reach the fair use question for digital streams. According to at least one court, all you have to do is embed a "no copy" bit in your stream (even if the stream itself is unencrypted and in the clear), and anyone who builds software that ignores the bit is liable for unlawful circumvention, *even if the recording would otherwise have been fair use.* See Real Networks v. Streambox, 2000 WL 127311 (W.D.Wash. Jan.18, 2000). Anyone want to venture a guess on whether Live365's <smirk> sophisticated <\smirk> anti-copying measure, detailed below, qualifies as a "techno...
2007 Oct 18
2
Softphone that emulates Skype API ?
There's a large number of gadgets one can buy that work with Skype through the API. One of the things I'm interested right now is the ability to properly use a mobile phone headset with a SIP/IAX softphone. Is there an softphone that emulates the Skype API? Are there legal implications in writing an softphone that emulates the Skype API? Should I just give up and buy a Siemens DECT
2002 Feb 20
1
Urgent information (legal stuff) about the future of SAMBA
I am sending you this email because of an incident which threatens the very existance of Samba. Earlier today, the bnetd project was shut down to the DMCA. Since bnetd is alot like Samba, I figured you would be interested. Bnetd is a server that pretends to be a battle.net server (starcraft multiplayer). This server was created by reverse engineering the communcations protocol, just like Samba
2012 Mar 03
2
Skyrim ThuuMic on 1.4rc6
...nderstand their documentation to make sure I know what I'm doing - it didn't go well, so I'm posting here. There was something about Visual Basic Power Packs (which I have no idea about) being required, .NET 4 required (which I understand doesn't work right now except under special circumventions), and that it relies heavily on the Windows Speech Recognition thing (of which there is a Linux alternative, I think, but I doubt is compatible). Since the installer forces some of these things... Would appreciate any tips from local experts... Or anyone who understands this better than I do, rea...
2004 May 15
1
problem connecting as a user. (fwd)
I have samba-3.0.4 openldap-2.1.29 smbldap-tools-0.8.4-1 When connecting with an XP client, which I have logged in as administrator, and browsing the network neighbourhood I cannot connect as administrator and it allows me to connect as 'nobody' What can I do to fix this, or does anyone have any helpful hints. <snip> [2004/05/15 14:20:54, 2] auth/auth.c:check_ntlm_password(312)
2001 Oct 06
2
OT: CD anti-copying techniques, and their pervasiveness (was: Re: More on CD anti-copying techniques)
...companies doing this when it goes full scale. Compatibility is a great seller--however, given that it's nearly impossible to get a refund on one of these so-called "broken" (not that I disagree...) CDs, what do we have to voice our disgust other than more elaborate ripping/protection circumvention techniques? > I'm not paranoid that the entire world is becoming corporate and all. I have > absolute faith that this "anti-pirating technique" will be broken quite > quickly and everything will return to business as usual. It'll be circumvented eventually, but that doe...
2017 Jan 15
0
Panic: file istream-zlib.c: ...assertion failed: (ret == -1) / core dump on signal 6 / zlib
...file. Example file: # file In_2014.gz In_2014.gz: gzip compressed data, was "In_2014", last modified: Wed Dec 2 10:53:22 2015, from Unix This happens with any gz Files. That's why I tried to sort out any problem else before submitting this. Directly connecting to dovecot imap (circumvention imapproxy) shows the same error. This setup was in place for 4 years with another server: It did not occur with dovecot 2.2.25 an up-imapproxy1.2.7 (Horde 5.2.12/imp5.2.16) on FreeBsd9.3-p55 (my old server). (I did not update to 2.2.27 on the last server as the maintainer just removed the...
2015 Aug 11
0
Announce: OpenSSH 7.0 released
...ate other users. Reported by Moritz Jodeit. * sshd(8): Portable OpenSSH only: Fixed a use-after-free bug related to PAM support that was reachable by attackers who could compromise the pre-authentication process for remote code execution. Also reported by Moritz Jodeit. * sshd(8): fix circumvention of MaxAuthTries using keyboard- interactive authentication. By specifying a long, repeating keyboard-interactive "devices" string, an attacker could request the same authentication method be tried thousands of times in a single pass. The LoginGraceTime timeout in sshd(8) and a...
2004 Aug 06
0
[fred@vonlohmann.com: Re: pho: How Live365 fights back...]
...gt; the fair use question for digital streams. According to at least one court, > all you have to do is embed a "no copy" bit in your stream (even if the > stream itself is unencrypted and in the clear), and anyone who builds > software that ignores the bit is liable for unlawful circumvention, *even if > the recording would otherwise have been fair use.* See Real Networks v. > Streambox, 2000 WL 127311 (W.D.Wash. Jan.18, 2000). > > Anyone want to venture a guess on whether Live365's <smirk> sophisticated > <\smirk> anti-copying measure, detailed below, qua...