Displaying 20 results from an estimated 43 matches for "devious".
2014 May 09
3
v2.2.13.rc1 vs. Pigeonhole
...eader - framed' SUCCEEDED
4: Test 'Addheader - folded' SUCCEEDED
5: Test 'Addheader - newlines' FAILED: wrong first header content in
redirected mail
6: Test 'Addheader - implicit keep' SUCCEEDED
7: Test 'Addheader - UTF 8' SUCCEEDED
8: Test 'Addheader - devious characters' SUCCEEDED
FAIL: 1 of 8 tests failed.
I tried this with the latest Pigeonhole from Mercurial:
- dovecot-2-2-pigeonhole-3b6917a4807c
and also with the older:
- dovecot-2-2-pigeonhole-e111a2393a92
Both versions are quitting during "make check" with the same error when
comp...
2018 Apr 19
6
Down C6 ALL without torrent ?
On Thu, 19 Apr 2018, Valeri Galtsev wrote:
> On Wed, April 18, 2018 8:36 pm, Always Learning wrote:
>> Hi,
>>
>> I have a machine with a BIOS that does not permit DVD installation. It
>> accepts everything else including some old superseded media types.
>>
>> Is it possible to download C6 combined parts 1 and 2 not using Torrent ?
>>
>> I have an
2018 Apr 19
1
Down C6 ALL without torrent ?
> > Can we also challenge this "torrents are untrustworthy" attitude.
>
> Having, successfully so far, resisted/repelled several devious
> attacks from the Russians, I am keen to maintain a clean, and thus
> secure, system as possible.
If you don't trust the sha256 hashes, there's no reason to trust a
download using https.
--
Yves Bellefeuille
<yan at storm.ca>
2006 Jul 14
1
Micro-pump is cool idea for future computer chips
Micro-pump is cool idea for future computer chips
http://www.studyandjobs.com/Micro_pump.html
or visit
http://www.studyandjobs.com/IT_study.htm
Regards
2005 Sep 09
3
Constant pinging from muon.cygnus-1.org
Can someone in this icecast list tell me why, after steaming a shoutcast
server for some time, a 69.46.29.165 ip address has started and keeps pinging
my port 8000 every couple of seconds 24 hours a day 7 days a week?
It's from muon.cygnus-1.org, and the isp is hivelocity.net or hivelocity
ventures corporation. Funny, whenever my shoutcast server comes alive, that
same 69.46.29.165
2012 Feb 15
0
[LLVMdev] LLVM GHC Backend: Tables Next To Code
...Since the jmp is a fixed 2 bytes (0xEB, tablesize), all references to the table can still be done with trivial pc/RIP-relative addressing within the closure, and you just need one pointer for both the table and the closure data.
If you want to get extra special and tricky, you could be even more devious by storing "Main_main1_info + 2 + table size" as the canonical pointer. If you jump to *that* when dispatching to the closure, then you completely avoid the runtime overhead of the extra unconditional jump and get exactly the same code you're getting with GHC's native code genera...
2012 Feb 15
2
[LLVMdev] LLVM GHC Backend: Tables Next To Code
...e jmp is a fixed 2 bytes (0xEB, tablesize), all references to the table can still be done with trivial pc/RIP-relative addressing within the closure, and you just need one pointer for both the table and the closure data.
>
> If you want to get extra special and tricky, you could be even more devious by storing "Main_main1_info + 2 + table size" as the canonical pointer. If you jump to *that* when dispatching to the closure, then you completely avoid the runtime overhead of the extra unconditional jump and get exactly the same code you're getting with GHC's native code genera...
2002 Apr 01
4
path to find ssh-rand-helper
...that in doing so I won't be opening up a huge security
hole.
My brief reading of the code suggests that in entropy.c:seed_rng() the
ssh-rand-helper is run as the original uid (for binaries which were
setuid in the first place of course), so I can't spot any obvious
holes (but I may not be devious enough).
Since almost all the other paths can be overridden in the config (or
with -o), and the config file location can also be controlled from the
command line (-F for ssh, -f for sshd), I can't see any good reason
why the ssh-rand-helper location can't also be...
[ I will then nobble s...
2019 Jun 17
2
[nbdkit PATCH] extents: Cap maximum reply length
A devious plugin can cause an 8-fold increase in the reply size in
relation to the request size, by alternating status every byte of the
request. In the worst case, this can cause the client to reject our
response and kill the connection because the response is too large.
What's more, it consumes a lot o...
2012 Feb 15
0
[LLVMdev] LLVM GHC Backend: Tables Next To Code
...he jmp is a fixed 2 bytes (0xEB, tablesize), all references to the table can still be done with trivial pc/RIP-relative addressing within the closure, and you just need one pointer for both the table and the closure data.
>
> If you want to get extra special and tricky, you could be even more devious by storing "Main_main1_info + 2 + table size" as the canonical pointer. If you jump to *that* when dispatching to the closure, then you completely avoid the runtime overhead of the extra unconditional jump and get exactly the same code you're getting with GHC's native code genera...
2018 Apr 19
0
Down C6 ALL without torrent ?
...l 18, 2018 8:36 pm, Always Learning wrote:
> >> I have an aversion to using anything that comes from unknown sources, as
> >> used by Torrent.
> Can we also challenge this "torrents are untrustworthy" attitude.
Having, successfully so far, resisted/repelled several devious attacks
from the Russians, I am keen to maintain a clean, and thus secure,
system as possible.
> You can be given an ISO from a shady character under a railway bridge,
I'd throw it away unused. Do not want the associated risks.
> Also, why not just make your life easy and do a netinsta...
2011 Apr 13
2
Line plots in base graphics
Am I missing something obvious on how to draw multi-line plots in base graphics?
In ggplot2, I can do:
data(Oxboys, package = "nlme")
library(ggplot2)
qplot(age, height, data = Oxboys, geom = "line", group = Subject)
But in base graphics, the best I can come up with is this:
with(Oxboys, plot(age, height, type = "n"))
lapply(split(Oxboys[c("age",
2000 Jan 14
1
Interesting behaviour of Win2k explorer with Samba 2.0.6
...But when
you examine a drive which is exported from a samba server (we run 2.0.6)
the explorer process starts to burn CPU time. It doesn't generate any
anomalous network traffic, and it's not due to symlink loops. When you
return the focus to a local drive the CPU burning stops.
Is this a devious attempt by our uncle Bill to make samba servers look
much worse than others for Win2k clients, or is this a (known?) protocol
problem with Samba 2.0.6?
Chris
--
Chris Maltby "One man is as good as another. In fact, probably better."
chris@sw.oz.au
2012 Feb 14
3
[LLVMdev] LLVM GHC Backend: Tables Next To Code
Hmm writing a blog post about TNTC is beyond the time I have right now.
Here is some high level documentation of the layout of Heap objects in GHC:
http://hackage.haskell.org/trac/ghc/wiki/Commentary/Rts/Storage/HeapObjects#InfoTables
With TNTC enabled we generate code for closures of this form:
.text
.align 8
.long Main_main1_srt-(Main_main1_info)+0
.long 0
.quad 4294967299
.quad 0
2011 Nov 10
2
parallel BLAS for Ubuntu 11.10
Has anyone succeeded in getting a parallel BLAS, such as Goto's BLAS,
installed on a machine running Ubuntu 11.10?
I currently have the libatlas3gf-base package installed on a machine
with an AMD Athlon X4 processor. I tried to install the
libopenblas-base and libopenblas-dev packages but there seemed to be a
glich related to having both libopenblas and libatlas3gf installed so
that when I
2018 Apr 19
1
Down C6 ALL without torrent ?
...arning wrote:
>
>> >> I have an aversion to using anything that comes from unknown sources, as
>> >> used by Torrent.
>
>> Can we also challenge this "torrents are untrustworthy" attitude.
>
> Having, successfully so far, resisted/repelled several devious attacks
> from the Russians, I am keen to maintain a clean, and thus secure,
> system as possible.
>
>> You can be given an ISO from a shady character under a railway bridge,
>
> I'd throw it away unused. Do not want the associated risks.
>
>> Also, why not just ma...
2006 Mar 09
4
Stop users accessing methods.
Hello all.
Is there a way to stop users from being able to access a controllers
methods without affecting the ability of other controllers to use them?
i.e
FooController
def secret
#Stuff
end
end
BarController
def index
redirect_to :controller => ''foo'', action => ''secret'', :id => ''007''
end
end
But directly
2013 Apr 26
1
Compiling Xapian within a Cocoa project
Hi, folks.
I don't know much about C++, so please excuse my newbie question: I just tried to include Xapian in a dummy Cocoa project, ie created a new project and added the libxapian.a file installed via MacPorts. When I include xapian.h in an Objective-C++ file (either mm or h), the compilation fails with the following message:
=================
In file included from
2006 Oct 23
0
FW: Debug package question
...s quite
likely to feature somewhere in the workings of 'debug' (I can't
remember!) so you might hang the thing altogether. Also, if your own
function happens to call 'apply' (directly or indirectly) you will get
stuck with a lot of debug windows.
A more robust, complicated, and devious way to get what you're after, is
to write a version of 'apply' that automatically calls 'mtrace' on its
function-argument and then invokes the real 'apply'. Something like
this:
mtrace.apply <- function( X, MARGIN, FUN, ...) {
FFF <- FUN # don't know whether...
2011 Nov 08
3
Bug#648029: xen-utils-common: /usr/lib/xen-common/bin/xen-toolstack (and thus /usr/sbin/xm) works with bash, but not dash
...-4.1/bin/xm
+ [ xm != xm ]
-+ exec /usr/sbin/xm
++ exec /usr/lib/xen-4.1/bin/xm
Plainly, the idiom "PATH=FOO command -v bar" does not work with
dash. This seems to work:
local PATH_old
PATH_old="${PATH}"
PATH=FOO
command -v bar
PATH="${PATH_old}"
Or maybe more devious (but untested):
local PATH
PATH=FOO
command -v bar
-- System Information:
Debian Release: 6.0.3
APT prefers stable
APT policy: (500, 'stable'), (400, 'testing'), (300, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-xen-...