search for: encryptors

Displaying 15 results from an estimated 15 matches for "encryptors".

Did you mean: encryptor
2010 Nov 04
1
Calling a method directly from a test => no method error
I''m trying to get a test to pass and keep getting a "no method error" I''m using the routines from Chapter 8 of "Security on Rails" and can''t get the test to pass. I keep getting "no method error" for decrypt. Can someone help me with the correct "address" for decrypt so I can call it directly. Here is the routine definition:
2012 Jan 27
0
Warden - how to setup custom encryptor
I`m writting sinatra app and i would like to setup encryption in Warden like i did it in devise when i used Rails. module Devise module Encryptors class Md5 < Base def self.digest(password, stretches, salt, pepper) str = [password].flatten.compact.join Digest::MD5.hexdigest(Digest::MD5.hexdigest(str)) end end end end Where I can setup this module ?? How to set Warden to use MD5 encrypt...
2011 Oct 13
3
[LLVMdev] LLC ARM Backend maintainer
> The ARM Holdings emulator does this; I used it with great success to > profile an Advanced Encryption Standard encryptor a while back. It is indeed a useful piece of kit. We do a lot of our internal regression tests on it, and also run LLVM's regression tests every night on it (as well as PlumHall, EEMBC and SpecInt). Unfortunately it's not exactly software we can give away or
2009 Feb 25
3
FLAC support for Android?
Thanks for the info, Dave. Speed is a very important feature, but there might be some risk choosing the FFmpeg decoder. They've had trouble with their encoder in the past, which tells me it's possible your users might one day run into a valid FLAC that the FFmpeg decoder won't handle correctly. A better suggestion might be to start with libFLAC, optimize as needed, and
2011 Oct 13
0
[LLVMdev] LLC ARM Backend maintainer
Well how about as a strawman... taking some options from http://en.wikipedia.org/wiki/List_of_ARM_microprocessor_cores and http://en.wikipedia.org/wiki/List_of_applications_of_ARM_cores LLVM Supports: ARMv4T -> ARM7TDMI ARMv5TE -> ARM926EJ-S -> XScale ARMv6 -> ARM1136J(F)-S ARMv6ZK -> ARM1176JZ(F)-S ARMv7A -> Cortex-A8 Cortex-A9 ARMv7M -> Cortex-M3
2011 Oct 13
0
[LLVMdev] LLC ARM Backend maintainer
On Thu, Oct 13, 2011 at 10:00 AM, Joe Abbey <jabbey at arxan.com> wrote: > However, we don't have testing resources to test both our product and LLVM > on a host of target boards.  We have some chumbys, beagleboards, iPhones, > iPod Touches, tables, Android Phones, etc.  And most of those are already > booked solid with our own regression tests (most of which are based on
2013 Jan 07
9
Devise Admin View password
Hi Everyone i am using devise for authentication for my app. Is there any way, Admin user can view other users password as normal string. Without storing there password as string in database? Please advise. -- You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email to
2010 Aug 09
0
Devise :current_password validations and checking (how???)
Hi Guys, In my devise applications in Rails 3, I created a separate form under my SettingsController class of which it handles the ''Change Password'' of the User Model, so i can manipulate the current_user in the SettingsController. Now, I followed the set-up in the Devise/Views on how to update the form using ''Change password'' and either way update User for
2011 Oct 13
1
[LLVMdev] LLC ARM Backend maintainer
On Thu, Oct 13, 2011 at 11:25 AM, Joe Abbey <jabbey at arxan.com> wrote: > LLVM Supports: > ARMv4T  -> ARM7TDMI > ARMv5TE -> ARM926EJ-S >         -> XScale > ARMv6   -> ARM1136J(F)-S > ARMv6ZK -> ARM1176JZ(F)-S > ARMv7A  -> Cortex-A8 >            Cortex-A9 > ARMv7M  -> Cortex-M3 Does the LLVM code generator generate Thumb code in addition to
2011 Oct 13
6
[LLVMdev] LLC ARM Backend maintainer
Admittedly we're very interested in becoming ARM backend maintainers as our product heavily relies on LLVM. However, we don't have testing resources to test both our product and LLVM on a host of target boards. We have some chumbys, beagleboards, iPhones, iPod Touches, tables, Android Phones, etc. And most of those are already booked solid with our own regression tests (most of which
2012 Oct 05
24
Building an On-Site and Off-Size ZFS server, replication question
Good morning. I am in the process of planning a system which will have 2 ZFS servers, one on site, one off site. The on site server will be used by workstations and servers in house, and most of that will stay in house. There will, however, be data i want backed up somewhere else, which is where the offsite server comes in... This server will be sitting in a Data Center and will have some storage
1998 Jun 29
2
Re: A switch? A router? What am I looking for??
At 01:59 PM 6/29/98 +0000, Kokoro Security Administrator wrote: >Hello everyone - > >I am looking for the name of a piece of hardware, and don''t know what it >is called. I am told that there exists such a thing (a switch? a router? >a special hub?) that will only send me traffic that is destined for me. simple definitions: --router: looks at a layer 3 address (such as
2007 Apr 10
7
equalize / ecmp not working as expected in 2.6 vs 2.4
Hi, With kernel 2.4 I was able to use equalize to send our outgoing packets to two different routers (our isp supports this setup), like this: ip route add default src ip.a.dd.rr equalize nexthop via <router1> weight 1 nexthop via <router2> weight 1 The two routes were used equally on a per packet basis, not per flow or per cached route, but per packet, each line has 800k upload
2004 Jun 05
50
[Bug 877] ssh 3.8.1p1 client cannot disable encryption with "-c none"
http://bugzilla.mindrot.org/show_bug.cgi?id=877 Summary: ssh 3.8.1p1 client cannot disable encryption with "-c none" Product: Portable OpenSSH Version: 3.8.1p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo:
1998 Jun 30
1
Patched Qpopper2.5 release Notification. (fwd)
...amples listed. All the examples listed correspond to violations of (an implied) security policy, *not* missing security in depth. I *like* security in depth. When I have the luxury, I have one vendors' firewall on the perimeter, another vendor's firewall for the interior, and specify file encryptors and end-to-end encryption on administrative traffic. Belts and suspenders are good things, when money/convenience is outweighed by the risk/value computation. What I'd like to point out (that is often missed) is that security implementations must follow from the security policy -- not vice ve...