search for: credible

Displaying 20 results from an estimated 130 matches for "credible".

2017 Jun 30
[Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
...Dario ------- Messaggio inoltrato ------- Da: stan <stanl-fedorauser at> Reply-to: Community support for Fedora users <users at> A: users at Oggetto: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible? Data: Thu, 29 Jun 2017 15:51:43 -0700 Wikileaks released a document about an attack against CentOS / Rhel. Here's the text, there are some docs there also. OutlawCountry 29 June, 2017 Today, June 29th 2017, WikiLeaks publishe...
2017 Jun 30
[Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
> Do you know this? "For operational use, shell access is assumed, and root privileges are required." It's not much of a secret that you can mess with a system if you have root access... Yves Bellefeuille <yan at>
2010 Aug 03
This is a question of clarification. IN 2009 Higgins, Thompson and Spiegelhalter (J R Statist Soc A 172:137-159) gave WinBUGs code to get credible intervals from random effects meta analysis for the prediction interval of a new study. It appears that the predict.rma function creates approximate credible intervals (pending a function revision by the author) for that purpose. Is my assumption correct? Nathan -- Nathan Pace, MD, MStat Departm...
2004 Jan 03
STOP THIS THREAD New to asterisk? RUN... don't walk.
Hi All, Can we stop this thread pl. This lady has no intentions to learn asterisk. She is just a troll and wasting our time. With her corporate attitude, what she expects is support that available with paid commercial products. Her company has enough money to buy commercial products, let she go there. Hey lady, whoever u are, dont waste our time. this is not for u. Lets move on to something
2011 Mar 20
Question about "extracting" unwanted e-mails from mdbox
Imagine the following scenario Last Saturday, 3:00 AM a big phishing attack hits our e-mail inboxes. Spamassassin does not mark them as spam, and our 50.000+ users have in their mdbox a very credible phishing attack. What doveadm-fu could I use to delete (or move to spam) that e-mail from each user INBOX (let?s imagine the Subject or a Header is known)? I repeat: already delivered e-mail, how to filter/prune it. Regards Maria
2019 Nov 14
how to know when a system is compromised
...IPS logs, I have logwatch setup and mailing daily summaries to me and I dive deeper into logs if something looks suspicious. What am I missing or not looking at that you security gurus are looking at? I subscribe to the centos and SANS newsletters, and I try to keep current on all technology with credible sources of articles online and with the Lynda library. What other sources of information do you use to stay current about the latest threats and technology updates? I appreciate the feedback. Chris
2009 Mar 16
the effect of blocking on the size of confidence intervals - analysis using lme and lmer
...s its possible to use lme without a random term, or alternatively with a trivial random term? - Is the overall approach: use of blocking factors to reduce the residual varaince, and hence to decrease the width of the confidence intervals valid? Using lmer, alternatively to the calculation of CIs, credible intervals can be calculated: > m1.sample = mcmcsamp( m1.lmer, n =10000 ) > = apply( m1.sample, 2, function(x)quantile(x, prob=c(.025,0.975))) >[,"methodFTREES"] 2.5% 97.5% 0.2405115 0.4424920 ... >[,"methodFTREES"] 2.5% 97.5% 0.2...
2005 Aug 12
Concerning reading of SAS-files
Hi! I'm trying to start a credibility estimation study with a coule of data sets that are created for SAS. The data sets are saved as ".sas7bndx" and ".sas7bdat". I've tried reading them to R with the function 'read.xport' but this returns the error message 'Error in lookup.xport(file) : unable to open file'. Are there any other functions that one
2007 Dec 07
Sendmail: timeout waiting for input from local during Draining Input
...'d as of Tuesday). This was a full-pave install, although we did copy the from the original system. Now I get a lot of this in my logs: Dec 7 11:47:38 mail sendmail[20117]: lB7Gl6w0020116: timeout waiting for input from local during Draining Input The only thing even remotely credible is a Sendmail Known Bugs page which suggests it is a chatty local delivery agent, but since this is happening with outbound messages I don't think I believe this. Does anyone have any ideas what Sendmail is trying to tell me here? -- /\oo/\ / /()\ \ David Mackintosh |...
2018 Sep 26
Which is the best open source ecommerce platform?
Good afternoon from Singapore, There are far too many choices when it comes to open source ecommerce solutions. Are there any credible rankings of open source ecommerce platforms? Which open source ecommerce solution do you think is the best and tell me why. Thank you. ===BEGIN SIGNATURE=== Turritopsis Dohrnii Teo En Ming's Academic Qualifications as at 30 Oct 2017 [1] &lt...
2020 Oct 26
Looking for a guide to collect all e-mail from the ISP mail server
On 10/26/20 11:09 AM, Gregory Heytings wrote: >>> I too would strongly advise you to use Google Workspace (the recent >>> new name for G Suite, previously known as Google Apps).? It's cheap, >>> very reliable, and has all features you can dream of, including an >>> autoresponder.? It's unrealistic to think that it's possible to beat
2009 Jan 26
[OT] Anyone on-list using a Barracuda Spam Firewall?
Normally I don't like posting on this list for off-topic info, but I need to know "un-biased" opinions regarding Barracuda's Spam Firewall as we're looking to get one soon where I work and I want to know any pros/cons before I stake my credibility on it for our spam fighting. If you've had good or bad experiences with one of these devices, please contact me _off_
2005 May 26
Re: Demonizing generic Linux issues as Fedora Core-only issues -- why I hate these meta-discussions ...
From: "Bryan J. Smith <b.j.smith at>" > You are indeed correct (I must have been looking at the RHEL3 dir**) First off, that's now 2 strikes for me. Small ones considering the context well outside of the points, but still it hurts my credibility. This is one of the things I hate about meta-discussions, at least how I approach them. Sometimes I just need to learn
2011 Apr 24
random roundoff?
...quot; << endl; mat3 = matmult(mat1,mat2); I get a difference of the order 1.0e-15 depending on whether the cerr line does or does not end in "endl" as shown. I am imagining that there is some "randomness" in the roundoff that depends on the I/O situation. Is this credible? Any other suggestions? Thanks for your help, Mike.
2005 Apr 16
[LLVMdev] New primitive type for 32/64 compatibility?
On Sat, 16 Apr 2005, Mike Hearn wrote: > To be able to deal with the case of passing long/size_t into functions, > shouldn't there be a first class type that has indeterminate width decided > only at native code generation time? Adding something like this would certainly be possible, but I'm not sure it's really appropriate. The problem is that 'long' varies in
2004 Apr 17
Network Magazine 04/04/04 Article pg 19 (Free IP Telephony PBXs?)
* Brethren, It's a sad day in our community. Please join me in a moment of silence for the death of responsible journalism. Silence.....................good enough. This article goes on to tell about Pingtel's announcement of forming the "first open source community aimed at creating SIP based servers".
2020 Nov 10
SSL alert number 42
This is what I did. I obtained a certificate from this site: They provided 3 files: ? certificate.crt ? private.key which make perfect sense as replacement for the 2 files provided by the distribution. I am guessing that I need somehow to append the 3rd file (ca_bundle.crt) to the first one? In order to raise its credibility? TIA On 11/10/2020
2005 Oct 26
R-help Digest, Vol 32, Issue 26
...5 at 6:00 AM -0500 wrote: Ronaldo, Try Harold's suggestion. The df still won't agree, because lmer (at least in its current version) just puts an upper bound on the df. But that should be OK, because all those t tests are approximations anyways, and you can get better confidence intervals (credible intervals, whatever) by using the mcmcsamp() function that works with lmer() alan > "Doran, Harold" <HDoran at> responded: > > >>There is an issue with implicit nesting in lmer. In your lme() model you nest >>block/irrigation/density/fertili...
2014 Aug 23
[LLVMdev] [cfe-dev] [RFC] Raising LLVM minimum required MSVC version to 2013 for trunk
MSVC survives because there's no effective competition- it's like communications providers in the United States or political parties in China. The alternatives like GCC have no decent development environments for them, and Clang has the bonus of not being mature w.r.t. things like Standard libraries. The reality is, there's nowhere to go *but* MSVC. This stuff is the major reason why
2008 Jul 22
Looking for a more robust Click to Dial/Web Dial solution than AsteriDex (potential for a bounty!)
...allerID gets set when the outbound call to the client is made. I have control over the CallerID that gets sent to the Telco. Please advise, and if someone is looking for a few extra bucks, let me know how much you will charge to develop something like this. I can provide a deposit if you are credible. Thanks in advance!