search for: exploter

Displaying 11 results from an estimated 11 matches for "exploter".

Did you mean: explorer
2005 Dec 03
0
exploting kernel --thanks
Thanks to all of you who support me in this topic. regards, iwan
1999 Aug 27
0
2.0.38 fixes a glitch
Freshmeat says: Following up to yesterday's Linux 2.0.38 release, Alan Cox sent out a security notice about a remote network DoS vulnerability which is present in all Linux 2.0.x systems. Linux 2.2.x is not affected by this bug. Causing this requires a great deal of skill and probably a reasonably local network access as it is extremely timing dependant. Nevertheless everyone is advised to
1999 Aug 30
0
SECURITY: RHSA-1999:032 Buffer overflows in amd
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overrun in amd Advisory ID: RHSA-1999:032-01 Issue date: 1999-08-30 Keywords: amd am-utils buffer overflow remote exploit - --------------------------------------------------------------------- 1. Topic: New packages of am-utils
2006 Apr 06
2
DOS/Windows Archive bits, and file ownership
...m here...) This will allow the owner to change the archive bits, but no-one else. I believe I've tested, albeit a while back, the "dos filemode" parameter too. IIRC, it would allow you to manually change the archive bits, by going and setting the properties directly - say via Windows Exploter. It wouldn't, however, allow for the applications, at least for those that I tested, to change the archive bits on files unless the user doing the modifications was also the owner. --- I have ways around this, by using "force user" for the whole share, but this really seems like a b...
2007 May 22
0
Speex bit allocation
Ops i meant: --------------------------------------------------------------------------- Wideband bit|Mode ID|LSP|OL pitch|OL Exc gain| --------------------------------------------------------------------------- Fine pitch1| --------------------------------------------------------------------------- Pitch gain1| ---------------------------------------------------------------------------
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overflow in proftpd Advisory ID: RHSA-1999:034-01 Issue date: 1999-08-31 Keywords: proftpd buffer overflow remote exploit - --------------------------------------------------------------------- 1. Topic: proftpd is a ftp server
2005 Aug 31
1
improving vorbis compression with arithmetic coding and by exploiting temporal redundancies
Hi! If you were looking foe a paper about improving vorbis compression by using arithmetic coding and exploiting temporal redundancies (i.e. repeating sound) you might have a look here: http://web.interware.hu/rudas Three ogg vorbis files were compressed losslessly, with compression ratios between 2 - 8 % and compression time about 1/500 realtime (i.e. slow). Theoretical upper bound of the
2007 May 20
1
Speex bit allocation
I would like to know if my vision of things is correct about frame structure. -------------------------------------------------------- Frame header -------------------------------------------------------- Subframe1 header|Subframe1 content| -------------------------------------------------------- Subframe2 header|Subframe2 content| --------------------------------------------------------
1999 Apr 23
0
Forw: new procmail package
___________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Linux/Unix System Administrator | Fax: (630) 840-6345 Computing Division OSS/FSS | email: yocum@fnal.gov .~. L Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I P.O. Box 500 |
1998 Jun 16
2
masquerading
Following Situation: Having an intranet-application that needs to know the ip-Address of the clients before running. Clients anywere in the Internet with any ip-address. So I thought about using masquerading the opposite way than normal. But then anybody could use this application. Dos anybody know how to make it a little bit more secure, like proofing the mac-address of the client, or something
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This is also a reason why Rogier, myself, Alan Cox and others really do not want to have completely open lists that deal with security related aspects of running a system as way too many people just jump to conclusions and give suggestions without doing any reasearch on a subject. -- alex (co-moderator of