search for: evad

Displaying 20 results from an estimated 99 matches for "evad".

Did you mean: eva
2013 Aug 20
0
Xen Security Advisory 59 (CVE-2013-3495) - Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Xen Security Advisory CVE-2013-3495 / XSA-59 version 4 Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts UPDATES IN VERSION 4 ==================== Public release. Extensive changes to Description, Vulnerable Systems and Mitigation. Additional technical information has been supplied by the vendor, Intel. ISSUE DESCRIPTION ================= Message Signaled Interrupts (MS...
2007 Feb 05
2
application 'allway sync' evades sticky bit?!
Hi, am running: Redhat EL4.4 i386, Samba 3.0.23d from Sernet, ext3 fs Samba as PDC Someone's got the idea to have one big share with access managed by directory's sticky bit. This works perfectly well when normal XP or W2k clients work with their explorer. But: With 'allway sync', an app to synchronize for example between laptop and fileserver the program is somehow able to
2007 Oct 09
6
PCI-X SATA RAID Controllers
Hello All, What would be the lists recommendation for an 8 port controller with native support for Centos 5.0? Currently have a 3ware 9650SE which does not... Cheers Steve
2007 Jan 24
2
A spec where interaction-based testing breaks down... (at least for now)
...ected results. The only benefit of the current approach (that I can see) is that the behavior is explicit. If you''ve just got the results, you have to mentally link them to the query. Anyway I''m just sort of stuck on this one. I think there''s a much better way that is evading me. Pat
2018 Apr 19
3
Xen BOF at Debconf 18
...r improvements; whether you think I should ask for a 45 min slot; if you are interested enough to want me to get you added as a co-presenter; etc. Regards, Ian. -- Ian Jackson <ijackson at chiark.greenend.org.uk> These opinions are my own. If I emailed you from an address @fyvzl.net or @evade.org.uk, that is a private address which bypasses my fierce spamfilter.
2006 Feb 09
9
RMagick on OS X - HOW
Hello all. I''m a seasoned system administrator and have no fear of building source packages on a variety of platforms, but RMagick has, until recently, evaded all of my attempts to building it on my PowerBook. Someone else just mentioned that they had trouble with RMagick on OS X (Intel, don''t really know if my advice will help) so I decided to post a HOWTO to the list. I generally shy away from fink/darwinports and the like: Why let them do...
2016 Feb 18
1
centos7 :: ks.cfg :: customisation of sshd
...Port 22/Port 60000/; s/#PermitRootLogin yes/PermitRootLogin yes/' > Though I will note there is some sort of syntax error with the > PermitRootLogin sed expression (present in the original you provided). I > spent a moment looking at it and the problem with that second expression > evades me right now. I ran the command he provided and didn't see a problem. What did you see?
2017 Jun 11
0
libsmbclient: poor performance using SMB2/3
...he same, but calling stat() is about 40 times slower when using SMB2. Time taken to open a directory in a share and stat all the files within it: SMB2/3: ~14 seconds SMB1: ~0.34 seconds Here is a comparison when using libsmbclient through pysmbc in a web application (bargate.io): SMB1: https://evad.io/img/smb1.png SMB2/3: https://evad.io/img/smb2.png Is this expected behaviour? Is libsmbclient not meant to be used with SMB2/3? Is there a better way to determine file size and things like modification time rather than call stat() ? Should smbcli be used rather than libsmbclient? I've test...
2003 Aug 01
1
SIP with an iptables fiewall
Am I the only person in the * world who can't get a sip connection through an iptables firewall? I've got everything else working fine. Xten <-> PSTN, Xten <-> Analog, IAX <-> IAX, but exten => 3733,1,Dial(SIP/fred@somewhere.com) ; evades me, ngrep @ port 5060 says the INVITES go out but how do I get something back? -- Dave Cotton <dcotton@linuxautrement.com>
2016 Jun 20
3
https and self signed
...urse this took me a great deal of frustrating effort to discover what had happened to all of my archived copies and how to fix it. In the middle of a system recovery I might add. But hey, what is my time worth in comparison to the security those certificates provided? SECURITY that was trivially evaded in the end. Exactly what mindless person or committee of bike-shedders decided that software should be distributed so that copies of it expire? What security issue was addressed by this decision? What benefit to the public was achieved? When real people suffer real inconvenience and real loss...
2010 Dec 14
1
Modifying values outside a function using "apply".
I am sure this si a simple problem but the solution is evading me. I have a list of matrices all with the same number of columns but different number of rows. The first two columns label the row. The labels are allways the same for the same row numbers, just some matricies have more rows. For example using 3 column matrices... > q.1 <- function(r...
2016 Oct 18
2
Xen in stretch - 4.7 or 4.8 ?
..., in bad shape, we shouldn't release with this. [2] Xen 4.8 support dates are not formally promised yet and will depend on the Xen 4.8.0 release date. Ian. -- Ian Jackson <ijackson at chiark.greenend.org.uk> These opinions are my own. If I emailed you from an address @fyvzl.net or @evade.org.uk, that is a private address which bypasses my fierce spamfilter.
2019 Feb 12
2
[PATCH 09/13] xen init script: move init_dom0 into xenstored start
...the open-coded fallback, from the change to when this is called. Also the latter change seems right and here I am complaining about the former... Thanks, Ian. -- Ian Jackson <ijackson at chiark.greenend.org.uk> These opinions are my own. If I emailed you from an address @fyvzl.net or @evade.org.uk, that is a private address which bypasses my fierce spamfilter.
2016 Jun 20
0
https and self signed
...worked fine. Apple's intermediate certs have a 10 year lifetime. If you consider that "short term" then I fear that nothing is suitable in your opinion. > But hey, what is my time worth in comparison to the security those > certificates provided? SECURITY that was trivially evaded in the end. Fixing your clock is not "evading" security. > Exactly what mindless person or committee of bike-shedders decided > that software should be distributed so that copies of it expire? Expiration is a fundamental aspect of x509 certificates. Do you understand x509 at...
2015 Jun 15
2
[PATCH v2 2/2] drm/nouveau: add GEM_SET_TILING staging ioctl
...s at least a bit of a deterrent. But in the end the policy is still that you can't regress anything if people complain, which means you might end up with a staging ioctl locked down forever. The other part I don't like with this plan is that it looks a bit like it could be easily abused to evade the open source userspace requirement upstream has for new interfaces. Doesn't help that your first staging ioctl doesn't come with links to mesa/hwc/whatever patches attached ;-) Overall I don't think this will help - you need internal branch management anyway, and upstreaming new AB...
2019 Feb 12
2
[PATCH 06/13] sysconfig.xencommons.in: Strip and debianize
...ff > -# > -# Running xenbackendd in debug mode > -#XENBACKENDD_DEBUG=[yes|on|1] We might want this if we ship the driver domains init script too. Ian. -- Ian Jackson <ijackson at chiark.greenend.org.uk> These opinions are my own. If I emailed you from an address @fyvzl.net or @evade.org.uk, that is a private address which bypasses my fierce spamfilter.
2007 May 05
3
Issue with adding existing EFI disks to a zpool
I spend yesterday all day evading my data of one of the Windows disks, so that I can add it to the pool. Using mount-ntfs, it''s a pain due to its slowness. But once I finished, I thought "Cool, let''s do it". So I added the disk using the zero slice notation (c0d0s0), as suggested for performance reaso...
2016 Feb 17
3
centos7 :: ks.cfg :: customisation of sshd
Hi! I want to change the sshd port at install for centos7 but i am not sure if i am on the good track (and it is time expensive to make many try-outs).. So, i would be grateful if someone with experience can spot if i have problems with my planning.. (the actual purpose is that after installation i have access for my ansible provisioning) first make sure ssh is started services
2006 May 20
7
Polymorphic, many-to-many, self-referential data model
...''s access to ownerships gets in the way, or takes precedence or whatever. It doesn''t matter what I''ve tried, the result sets are always giving me the "Element" relationship of Container to Ownership, not the direct parental relationship. Any clues? -- We can evade reality, but we cannot evade the consequences of evading reality. -- Ayn Rand
2005 Apr 12
1
Cumulative Points and Confidence Interval Manipulation in barplot2
R-Users, I am working with gplots (in gregmisc bundle) plotting some posterior probabilities (using barplot2) of harvest bag limits for discrete data (x-axis from 0 to 12, data is counts) and I ran into a couple of questions whose solutions have evaded me. 1) When I create and include the confidence intervals, the lower bound of the confidence intervals for several of the posterior probabilities is below zero, and in those specific cases I only want to show the upper limit for those CI's so they do not extend below the x-axis (as harvest...