search for: highc

Displaying 14 results from an estimated 14 matches for "highc".

Did you mean: high
2019 Jan 23
3
sftp Vs scp
Damien, Reading the various articles about https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt have caused me to question the wisdom of using scp. Your observation: > Date: Tue, 22 Jan 2019 13:48:34 +1100 (AEDT) > From: Damien Miller <djm at mindrot.org> > Subject: Re: Status of SCP vulnerability > > "Don't use scp with untrusted
2017 Jul 31
0
[PATCH v11 03/10] daemon: utils: New functions unix_canonical_path, utf16le_to_utf8 and tests.
...r outbuf (Char.chr ((c land 0x3f) lor 0x80)) + ) + in + loop (len-1) c + in + + (* Loop over the input UTF16-LE characters. *) + let is_high_surrogate c = c >= 0xd800 && c < 0xdc00 + and is_low_surrogate c = c >= 0xdc00 && c < 0xe000 + and surrogate_value highc lowc = + 0x1_0000 + (highc - 0xd800) * 0x400 + lowc - 0xdc00 + in + + let len = String.length instr in + let rec loop i = + if i+1 >= len then () + else ( + let c = Char.code instr.[i] + (Char.code instr.[i+1] lsl 8) in + + let wc, skip = + (* High surrogate - must c...
2019 Jan 24
5
sftp Vs scp
On Jan 24 03:47, Malcolm wrote: > Quoting Chris High <highc at us.ibm.com>: > > > caught my eye. Do you see any 'advantage' to using sftp with an untrusted > > server? If so, any thoughts about making an easy way to disable scp both > > client and server side when doing an installation? > > SFTP allows file resume,...
2017 Jul 21
10
[PATCH v10 00/10] Reimplement inspection in the daemon.
v9 was here: https://www.redhat.com/archives/libguestfs/2017-July/msg00139.html This depends on these three series (the first two being single minor patches): https://www.redhat.com/archives/libguestfs/2017-July/msg00207.html https://www.redhat.com/archives/libguestfs/2017-July/msg00209.html https://www.redhat.com/archives/libguestfs/2017-July/msg00215.html There is no substantive change. I
2017 Jul 17
12
[PATCH v9 00/11] Reimplement inspection in the daemon.
This depends on the patch series "[PATCH 00/27] Reimplement many daemon APIs in OCaml." (https://www.redhat.com/archives/libguestfs/2017-July/msg00098.html) v8 was posted here: https://www.redhat.com/archives/libguestfs/2017-June/msg00274.html v9: - I split up the mega-patch into a more reviewable series of smaller, incremental patches. There are some other changes vs v8, but
2017 Jul 31
16
[PATCH v11 00/10] Reimplement inspection in the daemon.
v10: https://www.redhat.com/archives/libguestfs/2017-July/msg00245.html No actual change here, but I rebased and retested. Also this series now does not depend on any other patch series since everything else needed is upstream. Rich.
2017 Jun 19
29
[PATCH v7 00/29] Reimplement inspection in the daemon.
v6 was posted here: https://www.redhat.com/archives/libguestfs/2017-June/msg00103.html and this requires the utilities refactoring posted here: https://www.redhat.com/archives/libguestfs/2017-June/msg00169.html Inspection is now complete[*], although not very well tested. I'm intending to compare the output of many guests using old & new virt-inspector to see if I can find any
2017 Jun 15
45
[PATCH v6 00/41] Refactor utilities, reimplement inspection in the daemon.
v5: https://www.redhat.com/archives/libguestfs/2017-June/msg00065.html Since v5, this now implements inspection almost completely for Linux and Windows guests. Rich.
2017 Jun 21
45
[PATCH v8 00/42] Refactor utilities and reimplement inspection.
v7 was: https://www.redhat.com/archives/libguestfs/2017-June/msg00169.html https://www.redhat.com/archives/libguestfs/2017-June/msg00184.html I believe this addresses all comments received so far. Also it now passes a test where I compared about 100 disk images processed with old and new virt-inspector binaries. The output is identical in all cases except one which is caused by a bug in blkid
2007 May 08
0
Security.html is out of date.
Openssh team; It has come to my attention that the information at: http://www.openssh.org/security.html does not include any security issues for openssh beyond 3.7. While I do appreciate that the the security information is highlighted at release publication, eg: http://lists.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html many folks are going to go to the main site,
2012 Oct 09
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 10/15/2012)
I am out of the office until 10/15/2012. On vacation, access to LN will be spotty at best. Will be out Friday AFTERNOON 10/5 through 10/14, returning to the office Monday 10/15. Specific issue coverage: Eliminate Synchronized Passwords (ESP) - Diane Moos/Long Beach/IBM Topics related to IAM's picking up of Pre-production ID Provisioning from SSO-SMD - Doug Barlett/Rochester/IBM
2012 Nov 21
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 12/03/2012)
I am out of the office until 12/03/2012. Vacation 1/2 day, starting 1pm ET 11/20 Vacation day 11/21 (may attend an SSAE16 crit sit meeting, otherwise not available) US Holiday 11/22 Site Holiday 11/23 Sun: Travel to Schaumberg Ill Nov 25 business, generally not available. Mon-Fri Off site crit sit meeting for SSAE16 9am-9pm. I will do my best to respond, but most items will have to wait until
2012 Dec 09
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 12/10/2012)
I am out of the office until 12/10/2012. Out sick through Friday 12/7, Dr's orders. Expect to return Monday 12/10. 11/23 - 24 no cover. 11/26-30 -self - cover - call 720 395 9374 and leave a message. I will return your call w/in one business day. Specific issue coverage: Questions regard AG sudo deployment, including questions about sudo templates? Sudo Deployment AG/Hartford/IBM,
2013 Mar 06
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 03/07/2013)
I am out of the office until 03/07/2013. Out sick today. Sudo review items - Sudo Deployment AG/Hartford/IBM, SSAE16 'hot topic' items - Pat Brady Issues requiring immediate management attention may be referred to my manager, Harish Dindigal/Whippany/IBM Note: This is an automated response to your message "openssh-unix-dev Digest, Vol 119, Issue 6" sent on 03/06/2013