search for: hackabl

Displaying 20 results from an estimated 47 matches for "hackabl".

Did you mean: hackable
2004 Mar 03
3
FreeBSD source auto patcher script
...ed to called it Quickpatch for some reason even though because its source based its not necessarily the least bit quick at all :) I had kept it for my self for a while but I was recently provoked to release it as it could do greater good being out there on the net, because its in Perl its quite hackable for custom needs. http://www.roq.com/projects/quickpatch/ It has the ability to do a range of different update tasks. These features include the ability to easily verify (using PGP) any and all advisories, easy setup and use of CVSUP for source and ports tree updates. Ability to extract all t...
2007 Jan 26
2
Attention FreeBSD Gurus
...l].pack(''a16a240'')] end end end I''d like to know the following from the FreeBSD crew: 1) Are there any potential malicious potentials to this? I don''t assume any intent, but would like to know if I need to rush out a fix if there''s a hackable problem with this (even theoretical). 2) What would be the un-ghetto way to do this same check? Thanks a bunch. -- Zed A. Shaw, MUDCRAP-CE Master Black Belt Sifu http://www.zedshaw.com/ http://www.awprofessional.com/title/0321483502 -- The Mongrel Book http://mongrel.rubyforge.org/ http://www.l...
2016 Jan 21
3
Need to refactor relocation handlers in ELF LLD
...ed, because readers may want to know not only what is to be done but also why we want to do that for what. My bar for readability may be a little bit high, but I strongly believe that that will eventually increase overall productivity. I really need help from LLD developers to keep it readable and hackable. I'd greatly appreciate any patch to reduce complexity. Thanks! -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20160121/8dc8b268/attachment.html>
2003 Jul 09
1
Asterisk as SIP <-> PSTN gateway
Hi, I'm new to Asterisk and have a couple of basic questions. We're interested in using * simply as a SIP <-> PSTN gateway using a T400P connected to one or more ISDN PRI lines (instead of using a Cisco box which would cost more and come with no hackable source code :-) First, is Asterisk's SIP stack up to date and fully functional with respect to the SIP protocol? Are there any known limitations that would cause problems in this application? Is there a general 'to-do' list for SIP support? E.g., it doesn't seem that chan_sip.c s...
2010 Jun 15
4
Dashboard or Foreman
Hi Guys, I''m reading about dashboard and foreman, and I''m wondering if there is anyone who made a comparison of the two? Can anyone help me decide which one to use? It feels like foreman is ''ahead'' for now? cheers, Walter Heck Engineer @ OlinData (http://olindata.com) -- You received this message because you are subscribed to the Google Groups "Puppet
2016 Jan 21
2
Need to refactor relocation handlers in ELF LLD
...I expect that the cost of iterating over them a few times is marginal. > My bar for readability may be a little bit high, but I strongly believe > that > > that will eventually increase overall productivity. I really need help > from > > LLD developers to keep it readable and hackable. I'd greatly appreciate > any > > patch to reduce complexity. Thanks! > > Thanks a lot for the work at making lld easier to understand. > > I was away from coding and catching up on code review, but I agree > that this is important and will try to improve things a bit i...
2006 Feb 15
3
Fwd: Which ATA device do you recommend?
---------- Forwarded message ---------- From: Marco Mouta <marco.mouta@gmail.com> Date: Feb 15, 2006 1:58 PM Subject: Which ATA device do you recommend? To: asterisk-users-request@lists.digium.com Hello, I'm developing a Voip Solution for a client, which ATA SIP do you recommend? there are some ATA devices fully tested with Asterisk? I hope that Asterisk experient users could give me
2008 Mar 13
2
Loading an array of MiddleMen
Hi, I am currently working on a project that requires multiple rails applications (lets call them consumers, since they will consume requests) to exposes long running services that will be executed from a management rails application (the producer of the requests). To do this BackgrounDrb was installed on all the consumers and the producer. BackgrounDrb was configured to on each of the consumers
2009 Feb 27
11
building a phone
...et is "skype phones" such as USB handsets from yealink. Far from an optimal design, but a driver already exists. == Ease of Use: A phone must be usable. The target device must be something my mom can use. However that does not mean it must be easy to program. It must be programmable and hackable. But I can live with a complicated user interface for that. If such phones become successful and useful, better interfaces will eventually be written. -- Tzafrir Cohen icq#16849755 jabber:tzafrir.cohen at xorcom.com +972-50-7952406 mailto:tzafrir.cohen at x...
2015 Jul 30
1
Fedora change that will probably affect RHEL
...ies to run). For that comparison, repository = store. > What is the inconvenience of encrypting your device compared to the > security? Zero vs a ton more secure (either when turned off and data > is at rest or a remote kill that makes it very fast to effectively > wipe all data) Or a hackable remote kill that allows an attacker to wipe you device out from under you. Or now the inconvenience of losing access to the encrypted volume because you forgot the exact spelling of that ten word seventy-five character passphrase and you're locked out and no data recovery tool out there w...
2007 Aug 16
3
e c30ac536947f7330943f8de9c33f70ef2d5994e7
e, elemental, is a stack for the data web there are 4 components: earth, air, fire, water earth is a pure-ruby RDF triple-store, with a fs backend. no dependencies on 3rd party databases, just add filesystem (tm). theres also a ram backend built with the Mongrel URI-classifier trie as the primitive datastructure. from these two it should be easy to extrapolate how to write a memcached/hadoop
2006 Jun 07
7
Tunneling in capistrano twice
...The default recipe expects you to be able to access your web server directly from your local machine. On our web server, for security purposes, it is only possible to ssh to it through one particular ip (which is also a remote machine.) The capistrano source is so compact and tidy it looks very hackable. But rather than messing around I thought I''d ask first if anyone else has any ideas? Cheers Henry
2019 Aug 02
0
[OT] odd network question
...;m some kind of special/hot target, or else everybody gets this kind > of crap and may not even know it. The raw internet is a very noisy, nasty place. That's why we have firewalls! FYI, telnet (as you realise) is old, but the old machines that are still running it are eminently and easily hackable - it may be your IP has got on a list of old SGI boxes. 8080 probes are looking for open web proxies, 5060 is looking for open voip systems and so on. > > But the one thing I mean to ask about here is the very first item, > 140,750 attempts at port 48825. What the heck is port 48825? I...
2004 Aug 06
1
liveice sending horrible static noise?
Ah... mixice has nothing to do with liveice, does it? The reason you have to put -x in the LAME arguments in mixice is because LAME is set up to be big-endian by default. The x86 architecture is little-endian, though. I'm using liveice to encode the stream... and being on a big-endian powerpc machine, I've tried all I can to disable that byte-swapping option in LAME, which
2005 Feb 10
1
WAS: Strategy for a stable IAXy NOW: IAXy vs old P-3
John Novack wrote: >And the only IAX2 box made is the Digium one, with it's current shortcomings ? >From reading through the archives, it seems there is currently no way to reset to factory default, no >written MAC address on an individual box, and some other instabilities requiring frequent resets. Yeah, there's the rub. Dunno if it's worth it, I'm willing to give it
2007 Sep 18
0
Bug labs
...abs.net <http://www.buglabs.net/> They are looking to introduce a modular set of 'devices' that fit together and along with supporting software will allow you to create your own 'opensource hardware mashups'. So the core 'base unit' is a fully programmable and "hackable" Linux computer, equipped with a fast CPU, 128MB RAM, built-in WiFi, rechargeable battery, USB, Ethernet, and a small LCD with button controls.
2011 Sep 17
0
lunamark 0.2
I'm pleased to announce the release of lunamark 0.2. This is a complete rewrite of the 2009 version, with a new API. I am very grateful to Hans Hagen, who resurrected the project for use in ConTeXt and made major improvements in the efficiency and performance of the code. Lunamark is a lua library and command-line program for conversion of markdown to other textual formats. Currently HTML,
2012 Jan 01
0
(no subject)
...same version or almost), this makes me wonder if there's a security breach at this company, like if they store customers' passwords in a place that's been hacked. (Of course it could also be that whatever attacker found an exploit, was just scanning that company's address space for hackable machines, and didn't happen to scan the address space of the other hosting companies.) So, following people's suggestions, the machine is disconnected and hooked up to a KVM so I can still examine the files. I've found this file: -rw-r--r-- 1 root root 1358 Oct 21 17:40 /home/file.pl...
2020 Nov 16
0
no shared cipher openssl
...their sending MTA's limited STARTTLS cipher/protocol repertoire. > -------------- > > When this thread went around I looked at my logs and found some no > auth complaints on my dovecot log. I believe they were trying to use > the sslv3 to hack my server. Or at least see if it is hackable. Since > my email server is a personal one and the attack was from a hosting > company, I blocked server IP space. > > The weird thing I get your error now myself but not consistently. Here > is an example. > ------------------------------- > Nov 16 04:18:37 imap-login: Info:...
2019 Aug 02
5
[OT] odd network question
I know this is OT, but I'm not sure where else to ask. I can hope for fogiveness! :) My home router sends its logs to the rsyslog on my desktop system, and from there I can learn all kinds of interesting (or disturbing) things. I've written a really horrid shellscript (about 20 things piped together with a temp file in the middle) to give me the count of DROP events for specific incoming