Displaying 20 results from an estimated 99 matches for "evading".
2013 Aug 20
0
Xen Security Advisory 59 (CVE-2013-3495) - Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2013-3495 / XSA-59
version 4
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
UPDATES IN VERSION 4
====================
Public release.
Extensive changes to Description, Vulnerable Systems and Mitigation.
Additional technical information has been
2007 Feb 05
2
application 'allway sync' evades sticky bit?!
Hi,
am running:
Redhat EL4.4 i386, Samba 3.0.23d from Sernet, ext3 fs
Samba as PDC
Someone's got the idea to have one big share with access managed by
directory's sticky bit.
This works perfectly well when normal XP or W2k clients work with their
explorer.
But: With 'allway sync', an app to synchronize for example between
laptop and fileserver the program is somehow able to
2007 Oct 09
6
PCI-X SATA RAID Controllers
Hello All,
What would be the lists recommendation for an 8 port controller with
native support for Centos 5.0? Currently have a 3ware 9650SE which does
not...
Cheers
Steve
2007 Jan 24
2
A spec where interaction-based testing breaks down... (at least for now)
...ected results.
The only benefit of the current approach (that I can see) is that the
behavior is explicit. If you''ve just got the results, you have to
mentally link them to the query.
Anyway I''m just sort of stuck on this one. I think there''s a much
better way that is evading me.
Pat
2018 Apr 19
3
Xen BOF at Debconf 18
I am going to submit a proposal for a Xen BOF at DC18.
Here is my first cut at a draft abstract:
Title: Xen in Debian BoF
Format: workshop with 25 min slot
The Xen packages in Debian are in need of some work, including some
tidying up, upstreaming of some Makefile patches, and updating to
new versions. There is a large outstanding bug list.
Also with the demise of Alioth and the
2006 Feb 09
9
RMagick on OS X - HOW
Hello all.
I''m a seasoned system administrator and have no fear of building
source packages on a variety of platforms, but RMagick has, until
recently, evaded all of my attempts to building it on my PowerBook.
Someone else just mentioned that they had trouble with RMagick on
OS X (Intel, don''t really know if my advice will help) so I
decided to post a HOWTO to the list.
I
2016 Feb 18
1
centos7 :: ks.cfg :: customisation of sshd
On 02/18/2016 10:27 AM, Mike - st257 wrote:
> ( You forgot to escape the space before 60000 in the first sed expression
> you provided. )
True, but you shouldn't need to escape spaces at all:
sed -i 's/#Port 22/Port 60000/; s/#PermitRootLogin yes/PermitRootLogin yes/'
> Though I will note there is some sort of syntax error with the
> PermitRootLogin sed expression
2017 Jun 11
0
libsmbclient: poor performance using SMB2/3
Hello,
I use libsmbclient from Python, using pysmbc: https://pypi.python.org/pypi/pysmbc (its a very thin wrapper around libsmbclient).
When setting "client max protocol" in smb.conf to SMB2 (or higher), libsmbclient then switches to SMB2 if the server supports it. Performance of opendir() remains much the same, but calling stat() is about 40 times slower when using SMB2.
Time taken
2003 Aug 01
1
SIP with an iptables fiewall
Am I the only person in the * world who can't get a sip connection
through an iptables firewall?
I've got everything else working fine.
Xten <-> PSTN, Xten <-> Analog, IAX <-> IAX, but
exten => 3733,1,Dial(SIP/fred@somewhere.com) ;
evades me, ngrep @ port 5060 says the INVITES go out but how do I get
something back?
--
Dave Cotton <dcotton@linuxautrement.com>
2016 Jun 20
3
https and self signed
On Sat, June 18, 2016 18:39, Gordon Messmer wrote:
> On 06/18/2016 02:49 PM, James B. Byrne wrote:
>> On Fri, June 17, 2016 21:40, Gordon Messmer wrote:
>>> https://letsencrypt.org/2015/11/09/why-90-days.html
>> With respect citing another person's or people's opinion in support
>> of
>> your own is not evidence in the sense I understand the word to
2010 Dec 14
1
Modifying values outside a function using "apply".
I am sure this si a simple problem but the solution is evading me.
I have a list of matrices all with the same number of columns but different
number of rows. The first two columns label the row. The labels are
allways the same for the same row numbers, just some matricies have more
rows.
For example using 3 column matrices...
> q.1 <- function(r){r...
2016 Oct 18
2
Xen in stretch - 4.7 or 4.8 ?
Hi. I was wanting an initial opinion from the Release Team, about the
Xen packages. Currently they are in bad shape in stretch and I intend
to fix them ASAP.
The question is whether I should move to Xen 4.7, or Xen 4.8. Xen 4.8
is currently at RC2 and seems in pretty good shape. I think it's more
probable than not that we'll have Xen 4.8.0 by the Debian freeze date,
but this is by no
2019 Feb 12
2
[PATCH 09/13] xen init script: move init_dom0 into xenstored start
Hans van Kranenburg writes ("[PATCH 09/13] xen init script: move init_dom0 into xenstored start"):
> This little xen-init-dom0 program is present in both our 4.8 and 4.11
> packages, so there's no need to keep the if else code. Also, it only
> makes sense to run it after starting xenstored, and not all other times
> start is called.
I think xen-init-dom0 is not in jessie
2016 Jun 20
0
https and self signed
...10 year lifetime. If you consider
that "short term" then I fear that nothing is suitable in your opinion.
> But hey, what is my time worth in comparison to the security those
> certificates provided? SECURITY that was trivially evaded in the end.
Fixing your clock is not "evading" security.
> Exactly what mindless person or committee of bike-shedders decided
> that software should be distributed so that copies of it expire?
Expiration is a fundamental aspect of x509 certificates. Do you
understand x509 at all?
2015 Jun 15
2
[PATCH v2 2/2] drm/nouveau: add GEM_SET_TILING staging ioctl
On Mon, Jun 15, 2015 at 04:09:29PM +0900, Alexandre Courbot wrote:
> From: Ari Hirvonen <ahirvonen at nvidia.com>
>
> Add new NOUVEAU_GEM_SET_TILING ioctl to set correct tiling
> mode for imported dma-bufs. This ioctl is staging for now
> and enabled with the "staging_tiling" module option.
>
> Signed-off-by: Ari Hirvonen <ahirvonen at nvidia.com>
>
2019 Feb 12
2
[PATCH 06/13] sysconfig.xencommons.in: Strip and debianize
Hans van Kranenburg writes ("[PATCH 06/13] sysconfig.xencommons.in: Strip and debianize"):
> Strip all options that are for stuff we don't ship, which is 1)
> xenstored as stubdom and 2) xenbackendd, which seems to be dead code
> anyway. [1]
>
> It seems useful to give the user the option to revert to xenstored
> instead of the default oxenstored if they really
2007 May 05
3
Issue with adding existing EFI disks to a zpool
I spend yesterday all day evading my data of one of the Windows disks, so that I can add it to the pool. Using mount-ntfs, it''s a pain due to its slowness. But once I finished, I thought "Cool, let''s do it". So I added the disk using the zero slice notation (c0d0s0), as suggested for performance reasons....
2016 Feb 17
3
centos7 :: ks.cfg :: customisation of sshd
Hi! I want to change the sshd port at install for centos7 but i am not sure
if i am on the good track (and it is time expensive to make many try-outs)..
So, i would be grateful if someone with experience can spot if i have problems
with my planning.. (the actual purpose is that after installation i have access
for my ansible provisioning)
first make sure ssh is started
services
2006 May 20
7
Polymorphic, many-to-many, self-referential data model
...kes precedence or
whatever. It doesn''t matter what I''ve tried, the result sets are always
giving me the "Element" relationship of Container to Ownership, not the
direct parental relationship.
Any clues?
--
We can evade reality, but we cannot evade the consequences of evading reality.
-- Ayn Rand
2005 Apr 12
1
Cumulative Points and Confidence Interval Manipulation in barplot2
R-Users,
I am working with gplots (in gregmisc bundle) plotting some posterior
probabilities (using barplot2) of harvest bag limits for discrete data
(x-axis from 0 to 12, data is counts) and I ran into a couple of
questions whose solutions have evaded me.
1) When I create and include the confidence intervals, the lower bound
of the confidence intervals for several of the posterior probabilities