search for: evading

Displaying 20 results from an estimated 99 matches for "evading".

2013 Aug 20
0
Xen Security Advisory 59 (CVE-2013-3495) - Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Xen Security Advisory CVE-2013-3495 / XSA-59 version 4 Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts UPDATES IN VERSION 4 ==================== Public release. Extensive changes to Description, Vulnerable Systems and Mitigation. Additional technical information has been
2007 Feb 05
2
application 'allway sync' evades sticky bit?!
Hi, am running: Redhat EL4.4 i386, Samba 3.0.23d from Sernet, ext3 fs Samba as PDC Someone's got the idea to have one big share with access managed by directory's sticky bit. This works perfectly well when normal XP or W2k clients work with their explorer. But: With 'allway sync', an app to synchronize for example between laptop and fileserver the program is somehow able to
2007 Oct 09
6
PCI-X SATA RAID Controllers
Hello All, What would be the lists recommendation for an 8 port controller with native support for Centos 5.0? Currently have a 3ware 9650SE which does not... Cheers Steve
2007 Jan 24
2
A spec where interaction-based testing breaks down... (at least for now)
...ected results. The only benefit of the current approach (that I can see) is that the behavior is explicit. If you''ve just got the results, you have to mentally link them to the query. Anyway I''m just sort of stuck on this one. I think there''s a much better way that is evading me. Pat
2018 Apr 19
3
Xen BOF at Debconf 18
I am going to submit a proposal for a Xen BOF at DC18. Here is my first cut at a draft abstract: Title: Xen in Debian BoF Format: workshop with 25 min slot The Xen packages in Debian are in need of some work, including some tidying up, upstreaming of some Makefile patches, and updating to new versions. There is a large outstanding bug list. Also with the demise of Alioth and the
2006 Feb 09
9
RMagick on OS X - HOW
Hello all. I''m a seasoned system administrator and have no fear of building source packages on a variety of platforms, but RMagick has, until recently, evaded all of my attempts to building it on my PowerBook. Someone else just mentioned that they had trouble with RMagick on OS X (Intel, don''t really know if my advice will help) so I decided to post a HOWTO to the list. I
2016 Feb 18
1
centos7 :: ks.cfg :: customisation of sshd
On 02/18/2016 10:27 AM, Mike - st257 wrote: > ( You forgot to escape the space before 60000 in the first sed expression > you provided. ) True, but you shouldn't need to escape spaces at all: sed -i 's/#Port 22/Port 60000/; s/#PermitRootLogin yes/PermitRootLogin yes/' > Though I will note there is some sort of syntax error with the > PermitRootLogin sed expression
2017 Jun 11
0
libsmbclient: poor performance using SMB2/3
Hello, I use libsmbclient from Python, using pysmbc: https://pypi.python.org/pypi/pysmbc (its a very thin wrapper around libsmbclient). When setting "client max protocol" in smb.conf to SMB2 (or higher), libsmbclient then switches to SMB2 if the server supports it. Performance of opendir() remains much the same, but calling stat() is about 40 times slower when using SMB2. Time taken
2003 Aug 01
1
SIP with an iptables fiewall
Am I the only person in the * world who can't get a sip connection through an iptables firewall? I've got everything else working fine. Xten <-> PSTN, Xten <-> Analog, IAX <-> IAX, but exten => 3733,1,Dial(SIP/fred@somewhere.com) ; evades me, ngrep @ port 5060 says the INVITES go out but how do I get something back? -- Dave Cotton <dcotton@linuxautrement.com>
2016 Jun 20
3
https and self signed
On Sat, June 18, 2016 18:39, Gordon Messmer wrote: > On 06/18/2016 02:49 PM, James B. Byrne wrote: >> On Fri, June 17, 2016 21:40, Gordon Messmer wrote: >>> https://letsencrypt.org/2015/11/09/why-90-days.html >> With respect citing another person's or people's opinion in support >> of >> your own is not evidence in the sense I understand the word to
2010 Dec 14
1
Modifying values outside a function using "apply".
I am sure this si a simple problem but the solution is evading me. I have a list of matrices all with the same number of columns but different number of rows. The first two columns label the row. The labels are allways the same for the same row numbers, just some matricies have more rows. For example using 3 column matrices... > q.1 <- function(r){r...
2016 Oct 18
2
Xen in stretch - 4.7 or 4.8 ?
Hi. I was wanting an initial opinion from the Release Team, about the Xen packages. Currently they are in bad shape in stretch and I intend to fix them ASAP. The question is whether I should move to Xen 4.7, or Xen 4.8. Xen 4.8 is currently at RC2 and seems in pretty good shape. I think it's more probable than not that we'll have Xen 4.8.0 by the Debian freeze date, but this is by no
2019 Feb 12
2
[PATCH 09/13] xen init script: move init_dom0 into xenstored start
Hans van Kranenburg writes ("[PATCH 09/13] xen init script: move init_dom0 into xenstored start"): > This little xen-init-dom0 program is present in both our 4.8 and 4.11 > packages, so there's no need to keep the if else code. Also, it only > makes sense to run it after starting xenstored, and not all other times > start is called. I think xen-init-dom0 is not in jessie
2016 Jun 20
0
https and self signed
...10 year lifetime. If you consider that "short term" then I fear that nothing is suitable in your opinion. > But hey, what is my time worth in comparison to the security those > certificates provided? SECURITY that was trivially evaded in the end. Fixing your clock is not "evading" security. > Exactly what mindless person or committee of bike-shedders decided > that software should be distributed so that copies of it expire? Expiration is a fundamental aspect of x509 certificates. Do you understand x509 at all?
2015 Jun 15
2
[PATCH v2 2/2] drm/nouveau: add GEM_SET_TILING staging ioctl
On Mon, Jun 15, 2015 at 04:09:29PM +0900, Alexandre Courbot wrote: > From: Ari Hirvonen <ahirvonen at nvidia.com> > > Add new NOUVEAU_GEM_SET_TILING ioctl to set correct tiling > mode for imported dma-bufs. This ioctl is staging for now > and enabled with the "staging_tiling" module option. > > Signed-off-by: Ari Hirvonen <ahirvonen at nvidia.com> >
2019 Feb 12
2
[PATCH 06/13] sysconfig.xencommons.in: Strip and debianize
Hans van Kranenburg writes ("[PATCH 06/13] sysconfig.xencommons.in: Strip and debianize"): > Strip all options that are for stuff we don't ship, which is 1) > xenstored as stubdom and 2) xenbackendd, which seems to be dead code > anyway. [1] > > It seems useful to give the user the option to revert to xenstored > instead of the default oxenstored if they really
2007 May 05
3
Issue with adding existing EFI disks to a zpool
I spend yesterday all day evading my data of one of the Windows disks, so that I can add it to the pool. Using mount-ntfs, it''s a pain due to its slowness. But once I finished, I thought "Cool, let''s do it". So I added the disk using the zero slice notation (c0d0s0), as suggested for performance reasons....
2016 Feb 17
3
centos7 :: ks.cfg :: customisation of sshd
Hi! I want to change the sshd port at install for centos7 but i am not sure if i am on the good track (and it is time expensive to make many try-outs).. So, i would be grateful if someone with experience can spot if i have problems with my planning.. (the actual purpose is that after installation i have access for my ansible provisioning) first make sure ssh is started services
2006 May 20
7
Polymorphic, many-to-many, self-referential data model
...kes precedence or whatever. It doesn''t matter what I''ve tried, the result sets are always giving me the "Element" relationship of Container to Ownership, not the direct parental relationship. Any clues? -- We can evade reality, but we cannot evade the consequences of evading reality. -- Ayn Rand
2005 Apr 12
1
Cumulative Points and Confidence Interval Manipulation in barplot2
R-Users, I am working with gplots (in gregmisc bundle) plotting some posterior probabilities (using barplot2) of harvest bag limits for discrete data (x-axis from 0 to 12, data is counts) and I ran into a couple of questions whose solutions have evaded me. 1) When I create and include the confidence intervals, the lower bound of the confidence intervals for several of the posterior probabilities