Displaying 20 results from an estimated 47 matches for "hackable".
2004 Mar 03
3
FreeBSD source auto patcher script
...ed to called it Quickpatch for some reason even though because its
source based its not necessarily the least bit quick at all :) I had
kept it for my self for a while but I was recently provoked to release
it as it could do greater good being out there on the net, because its
in Perl its quite hackable for custom needs.
http://www.roq.com/projects/quickpatch/
It has the ability to do a range of different update tasks. These
features include the ability to easily verify (using PGP) any and all
advisories, easy setup and use of CVSUP for source and ports tree
updates. Ability to extract all th...
2007 Jan 26
2
Attention FreeBSD Gurus
...l].pack(''a16a240'')]
end
end
end
I''d like to know the following from the FreeBSD crew:
1) Are there any potential malicious potentials to this? I don''t assume any intent, but would like to know if I need to rush out a fix if there''s a hackable problem with this (even theoretical).
2) What would be the un-ghetto way to do this same check?
Thanks a bunch.
--
Zed A. Shaw, MUDCRAP-CE Master Black Belt Sifu
http://www.zedshaw.com/
http://www.awprofessional.com/title/0321483502 -- The Mongrel Book
http://mongrel.rubyforge.org/
http://www.li...
2016 Jan 21
3
Need to refactor relocation handlers in ELF LLD
...ed, because readers may want to know not only what is to be done but
also why we want to do that for what.
My bar for readability may be a little bit high, but I strongly believe
that that will eventually increase overall productivity. I really need help
from LLD developers to keep it readable and hackable. I'd greatly
appreciate any patch to reduce complexity. Thanks!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20160121/8dc8b268/attachment.html>
2003 Jul 09
1
Asterisk as SIP <-> PSTN gateway
Hi,
I'm new to Asterisk and have a couple of basic questions.
We're interested in using * simply as a SIP <-> PSTN gateway using
a T400P connected to one or more ISDN PRI lines (instead of using
a Cisco box which would cost more and come with no hackable source
code :-)
First, is Asterisk's SIP stack up to date and fully functional
with respect to the SIP protocol? Are there any known limitations
that would cause problems in this application? Is there a general
'to-do' list for SIP support?
E.g., it doesn't seem that chan_sip.c su...
2010 Jun 15
4
Dashboard or Foreman
Hi Guys,
I''m reading about dashboard and foreman, and I''m wondering if there is
anyone who made a comparison of the two? Can anyone help me decide
which one to use? It feels like foreman is ''ahead'' for now?
cheers,
Walter Heck
Engineer @ OlinData (http://olindata.com)
--
You received this message because you are subscribed to the Google Groups "Puppet
2016 Jan 21
2
Need to refactor relocation handlers in ELF LLD
...I expect that the cost of
iterating over them a few times is marginal.
> My bar for readability may be a little bit high, but I strongly believe
> that
> > that will eventually increase overall productivity. I really need help
> from
> > LLD developers to keep it readable and hackable. I'd greatly appreciate
> any
> > patch to reduce complexity. Thanks!
>
> Thanks a lot for the work at making lld easier to understand.
>
> I was away from coding and catching up on code review, but I agree
> that this is important and will try to improve things a bit in...
2006 Feb 15
3
Fwd: Which ATA device do you recommend?
---------- Forwarded message ----------
From: Marco Mouta <marco.mouta@gmail.com>
Date: Feb 15, 2006 1:58 PM
Subject: Which ATA device do you recommend?
To: asterisk-users-request@lists.digium.com
Hello,
I'm developing a Voip Solution for a client, which ATA SIP do you
recommend? there are some ATA devices fully tested with Asterisk?
I hope that Asterisk experient users could give me
2008 Mar 13
2
Loading an array of MiddleMen
Hi,
I am currently working on a project that requires multiple rails
applications (lets call them consumers, since they will consume
requests) to exposes long running services that will be executed from
a management rails application (the producer of the requests). To do
this BackgrounDrb was installed on all the consumers and the producer.
BackgrounDrb was configured to on each of the consumers
2009 Feb 27
11
building a phone
...et is "skype phones"
such as USB handsets from yealink. Far from an optimal design, but a
driver already exists.
== Ease of Use:
A phone must be usable. The target device must be something my mom can
use. However that does not mean it must be easy to program. It must be
programmable and hackable. But I can live with a complicated user
interface for that. If such phones become successful and useful, better
interfaces will eventually be written.
--
Tzafrir Cohen
icq#16849755 jabber:tzafrir.cohen at xorcom.com
+972-50-7952406 mailto:tzafrir.cohen at xo...
2015 Jul 30
1
Fedora change that will probably affect RHEL
...ies to
run). For that comparison, repository = store.
> What is the inconvenience of encrypting your device compared to the
> security? Zero vs a ton more secure (either when turned off and data
> is at rest or a remote kill that makes it very fast to effectively
> wipe all data)
Or a hackable remote kill that allows an attacker to wipe you device out
from under you. Or now the inconvenience of losing access to the
encrypted volume because you forgot the exact spelling of that ten word
seventy-five character passphrase and you're locked out and no data
recovery tool out there wi...
2007 Aug 16
3
e c30ac536947f7330943f8de9c33f70ef2d5994e7
e, elemental, is a stack for the data web
there are 4 components: earth, air, fire, water
earth is a pure-ruby RDF triple-store, with a fs backend. no dependencies on 3rd party databases, just add filesystem (tm). theres also a ram backend built with the Mongrel URI-classifier trie as the primitive datastructure. from these two it should be easy to extrapolate how to write a memcached/hadoop
2006 Jun 07
7
Tunneling in capistrano twice
...The default recipe expects you to be able to access your web server
directly from your local machine.
On our web server, for security purposes, it is only possible to ssh
to it through one particular ip (which is also a remote machine.)
The capistrano source is so compact and tidy it looks very hackable.
But rather than messing around I thought I''d ask first if anyone else
has any ideas?
Cheers
Henry
2019 Aug 02
0
[OT] odd network question
...;m some kind of special/hot target, or else everybody gets this kind
> of crap and may not even know it.
The raw internet is a very noisy, nasty place. That's why we have
firewalls! FYI, telnet (as you realise) is old, but the old machines
that are still running it are eminently and easily hackable - it may be
your IP has got on a list of old SGI boxes. 8080 probes are looking for
open web proxies, 5060 is looking for open voip systems and so on.
>
> But the one thing I mean to ask about here is the very first item,
> 140,750 attempts at port 48825. What the heck is port 48825? I c...
2004 Aug 06
1
liveice sending horrible static noise?
Ah... mixice has nothing to do with liveice, does it?
The reason you have to put -x in the LAME arguments in mixice is because LAME
is set up to be big-endian by default. The x86 architecture is little-endian,
though.
I'm using liveice to encode the stream... and being on a big-endian powerpc
machine, I've tried all I can to disable that byte-swapping option in LAME,
which
2005 Feb 10
1
WAS: Strategy for a stable IAXy NOW: IAXy vs old P-3
John Novack wrote:
>And the only IAX2 box made is the Digium one, with it's current
shortcomings ?
>From reading through the archives, it seems there is currently no way to
reset to factory default, no >written MAC address on an individual box, and
some other instabilities requiring frequent resets.
Yeah, there's the rub. Dunno if it's worth it, I'm willing to give it
2007 Sep 18
0
Bug labs
...abs.net <http://www.buglabs.net/>
They are looking to introduce a modular set of 'devices' that fit
together and along with supporting software will allow you to create
your own 'opensource hardware mashups'.
So the core 'base unit' is a fully programmable and "hackable" Linux
computer, equipped with a fast CPU, 128MB RAM, built-in WiFi,
rechargeable battery, USB, Ethernet, and a small LCD with button
controls.
2011 Sep 17
0
lunamark 0.2
I'm pleased to announce the release of lunamark 0.2. This is a complete
rewrite of the 2009 version, with a new API. I am very grateful to Hans Hagen,
who resurrected the project for use in ConTeXt and made major improvements in
the efficiency and performance of the code.
Lunamark is a lua library and command-line program for conversion of markdown
to other textual formats. Currently HTML,
2012 Jan 01
0
(no subject)
...same
version or almost), this makes me wonder if there's a security breach at
this company, like if they store customers' passwords in a place that's
been hacked. (Of course it could also be that whatever attacker found an
exploit, was just scanning that company's address space for hackable
machines, and didn't happen to scan the address space of the other hosting
companies.)
So, following people's suggestions, the machine is disconnected and hooked
up to a KVM so I can still examine the files. I've found this file:
-rw-r--r-- 1 root root 1358 Oct 21 17:40 /home/file.pl...
2020 Nov 16
0
no shared cipher openssl
...their sending MTA's limited STARTTLS cipher/protocol repertoire.
> --------------
>
> When this thread went around I looked at my logs and found some no
> auth complaints on my dovecot log. I believe they were trying to use
> the sslv3 to hack my server. Or at least see if it is hackable. Since
> my email server is a personal one and the attack was from a hosting
> company, I blocked server IP space.
>
> The weird thing I get your error now myself but not consistently. Here
> is an example.
> -------------------------------
> Nov 16 04:18:37 imap-login: Info:...
2019 Aug 02
5
[OT] odd network question
I know this is OT, but I'm not sure where else to ask. I can hope for fogiveness! :)
My home router sends its logs to the rsyslog on my desktop system, and
from there I can learn all kinds of interesting (or disturbing) things.
I've written a really horrid shellscript (about 20 things piped together
with a temp file in the middle) to give me the count of DROP events for
specific incoming