Displaying 20 results from an estimated 26 matches for "debunked".
Did you mean:
debugged
2010 Mar 17
2
Is samba right for me?
I am currently a college student looking for ways to prepare myself for any
Server Administration job once I get out of college.
I've been going back and worth between Freenode IRC channels (#linux and
##windows) trying to decide what to learn.
On one hand, we have Windows Server 2008 R2, people in #linux keep on
telling me to just go ahead and use it because "samba can't provide
2010 Nov 17
1
Lexical Scope: How does it work?
Let me start by saying that I am a fan of lexical scoping as a way of
increasing confidence in your execution models. I am hoping to move
from the now thoroughly debunked "wackyscope" model that used to plague
many programming languages over to proper lexical scoping in my puppet
configs. I''m just having trouble finding documentation of how this
works for puppet.
I understand that a lexically-scoped puppet config would need to use
parameterized...
2002 May 22
3
Want to help Wine project?
This message is for those who wants to help Wine
project but do not know where to start.
We need contributors of a wide range of skills.
The minimal requirements are:
access to a computer with Linux (or other Unix-like
system) where you can use Wine.
We have a lot of tasks which are relatively easy to
do.
The fact that these tasks are easy does not mean they
are not important.
Examples of the
2007 Sep 25
0
[EVENT] Asterisk and VoIP in enterprise
Hi,
I'm sending this mail here as I think it is of interest for at least
europeans amongst you. The event presented below is not
commercially-oriented, but really of interest for professional
Asterisk users.
in two weeks (9&10 october), the event "Asterisk and VoIP in
enterprise" will take place in Brussels, Belgium.
It is organised by Profoss ( http://www.profoss.eu ) to
2011 Jan 04
1
See also: Myths 6 and 8.... there is not Myths 6 and 8!
While waiting for a compilation I was reading Debunking Wine Myths (http://wiki.winehq.org/Debunking_Wine_Myths#head-b7ba8535e8210369749ee2940a7f2bceac4d8ea2)...
Nice read (there are really some crazy people....) until Myth 14 where I read: ``See also: Myths 6 and 8.'' There is not Myth 6 and 8! It is a mistake or some kind of joke?
In the latter case... care to explain?
2001 Dec 17
3
benchmarks
http://www.xent.com/FoRK-archive/apr99/0265.html
read this.. how this is posible??
2015 Nov 11
4
UPnP support in tinc
...Google search for "pf cone nat"
returns somewhat depressing results: apparently it's not even possible
to configure pf to act as an EIM-NAT, and people asking for such an
option are basically being told to go away with demonstrably weak
security-related arguments (which can easily be debunked by pointing
out that NATs and firewalls have different goals, and that providing
endpoint-independent mapping does not preclude endpoint-dependent
*filtering*, which would still allow UDP hole punching to work). But I
digress.
So, I'm afraid there's still work to be done to ensure that tin...
2015 Nov 12
0
UPnP support in tinc
...quot;pf cone nat" returns somewhat depressing results:
> apparently it's not even possible to configure pf to act as an
> EIM-NAT, and people asking for such an option are basically being told
> to go away with demonstrably weak security-related arguments (which
> can easily be debunked by pointing out that NATs and firewalls have
> different goals, and that providing endpoint-independent mapping does
> not preclude endpoint-dependent *filtering*, which would still allow
> UDP hole punching to work).
Yes, and they are not RFC 4787 compliant.
> The only way we can try...
2012 Mar 23
2
wiki - vnc -gerald and walsh, update?
...about
the ssh, but it references only another vnc server.
so, is the only way to get an ssh connection is to download a windows
vncserver, and connect with that to the vncserver on my linux box? (box
is on the internet, not local)
anyway, this helpful how to really saves a lot of time, really debunked
a lot of myths about not needing a desktop installed (which was really
furstrating trying to make it work without one).
Centos 6 is a bit different in that one file...and it would be great to
know how to connect though ssh with a viewer.
still, it freaking works!!
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files
a while ago (before it got damaged) and I'd like to get FLAC files.
`cdparanoia' extracted most of the data from the CD, but there are some
holes due to the damages.
How could I fill those holes in my FLAC files using the Vorbis files?
Stefan
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files
a while ago (before it got damaged) and I'd like to get FLAC files.
`cdparanoia' extracted most of the data from the CD, but there are some
holes due to the damages.
How could I fill those holes in my FLAC files using the Vorbis files?
Stefan
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files
a while ago (before it got damaged) and I'd like to get FLAC files.
`cdparanoia' extracted most of the data from the CD, but there are some
holes due to the damages.
How could I fill those holes in my FLAC files using the Vorbis files?
Stefan
2011 Feb 04
3
[LLVMdev] CPS
Hi everybody,
I'd like to try implementing a pass that transforms all functions (and
function calls, returns, etc.) to CPS, so that TCO can get rid of all
(or most of) the function calling overhead (because, as you probably
know, the side effect of using CPS is that all function calls become
tail calls).
That being said, and since I'm pretty new to LLVM, I'd like to ask a
couple
2004 Sep 09
2
UDP routing issues with multiple NICs
...ugh NIC2 will not catch the packets because the source address, at the time, is 0.0.0.0.
If I force a specific IP to be routed through NIC2, then that IP can connect successfuly to the server over NIC2.
I''m looking for possible solutions, but so far have only found one to have it later debunked. I have considered NAT, and determined that it won''t work. I can''t DNAT from IP2 to IP1, for reasons still not entirely known to me. For some reason DNAT from IP2 to IP1 doesn''t get any sort of response from the server. Even after I have removed ALL firewall rules. I can...
2016 Feb 08
7
Utility to zero unused blocks on disk
DBAN is obsolete. NIST 800-88 for some time now says to use secure erase or
enhanced security erase or crypto erase if supported.
Other options do not erase data in remapped sectors.
Chris Murphy
2004 Sep 30
2
FXO/FXS card
Hi, I thought I remember seeing somewhere on the Asterisk website a card
that had 16 ports fxo or fxs, that was user selectable with straps on the
card. Am I going crazy, I can't seem to find it now.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20040930/86c8ae69/attachment.htm
2017 Aug 07
3
Has For bucle be impooved in R
Hi!
I am doing a lapply and for comparaison and I get that for is faster than lapply.
What I have done:
n<-100000
set.seed(123)
x<-rnorm(n)
y<-x+rnorm(n)
rand.data<-data.frame(x,y)
k<-100
samples<-split(sample(1:n),rep(1:k,length=n))
res<-list()
t<-Sys.time()
for(i in 1:100){
modelo<-lm(y~x,rand.data[-samples[[i]]])
2008 Mar 03
5
on the philosophical aspects of a specification
a specification will _eventually_ be used, by someone,
to tell the user they are doing things "wrong", won't it?
and doesn't that turn markdown's genesis upside-down?
heck, next thing you know we'll be telling them to r.t.f.m.
i would prefer that implementers get more sophisticated
about teasing out the user's intent in "ambiguous" cases.
of course,
2016 Jun 02
0
[ANNOUNCE] nftables 0.6 release
Hi!
The Netfilter project proudly presents:
nftables 0.6
This release contains many accumulated bug fixes and new features
availale up to the Linux 4.7-rc1 kernel release.
New features
============
* Rule replacement: You can replace any rule from the unique 64-bits
handle. You have to retrieve the handle from the ruleset listing.
# nft list ruleset -a
table ip filter {
chain
2004 Aug 03
0
Fw: Digium FXO Interfaces don't support groundstart???
A thought occurred to me to on how to further quantify the impact of "glare"
on a properly dimensioned trunk group and debunk the ground start glare
concern. A cursory traffic analysis clarifies:
1. Assume you have a two-way trunk group, dimensioned for average busy
hour, average busy season for P01 grade of service, Erlang B or Poison
distribution.
2. Further assume that the