search for: illicit

Displaying 17 results from an estimated 17 matches for "illicit".

Did you mean: elicit
2014 Feb 04
0
Statistician at UNODC Vienna (Fwd: Statistiker für consultancy gesucht)
..., the consultant will: 1. Draw spatial samples for the satellite image survey in Afghanistan according to the instructions provided by SASS based on existing R scripts; 2. Improve the technical implementation and documentation in R of the existing spatial models and sampling methods used in SASS illicit crop surveys with applications in Afghanistan; 3. Carry out research and assist in the preparation of statistical inputs on area estimation methods for inclusion in UNODC illicit crop reports and studies; statistical inputs include preparation of input data, quality assessments, treatment of missi...
2001 Oct 27
1
2.4.7p1 protocol differences?
Hi all, rsync-2.4.6 has been running for quite a while with no problems, until about a week ago when for some reason it blocked on the same host ever time. I use it to backup about thirty hosts to my backup server, but for some reason it's illiciting that blocking bug that some people experience with 2.4.6. So, I upgraded the client side with 2.4.7, but it complained of protocol differences. I certainly can't upgrade all 30 hosts to 2.4.7p1, especially when it's not production-ready yet. The host that it's blocking on isn't...
2015 Feb 10
6
Another Fedora decision
On Tue, 2015-02-10 at 15:04 -0700, Warren Young wrote: > > On Feb 9, 2015, at 12:12 PM, John R Pierce <pierce at hogranch.com> wrote: > > > > On 2/9/2015 11:06 AM, Always Learning wrote: > >> The third item was a 16.1 MB PDF of 1,344 pages. A quick scan of the PDF > >> shows every page appears to be readable. 11 pages devoted to BASH. > >>
2015 Feb 11
0
Another Fedora decision
...and fire up acroread? > 3. The Russian's web site is that of a devote cyclist. I?m a devout cyclist, too, yet you?ve apparently decided I?m an enemy. What makes this other guy unimpeachable? I could care less that he?s Russian, or a cyclist. What I care is that he?s purposely providing illicit goods. That?s enough for me to distrust what he?s providing. This Russian cyclist doesn?t even have to be the source of the evil. Chances are that he didn?t buy this PDF from an official source and offer it directly. It?s far more likely that he?s just another step in the chain back to the orig...
1999 Jan 01
1
RE: timeslab
Hi Troels, Its in the incoming directory: ftp://ftp.ci.tuwien.ac.at/incoming Try this for a nice demo: > library(timeslab) > arma(alpha, beta, x, 2, 4, 3, 0.2,500, 30,0) Bernd On 01-Jan-99 Troels Ring wrote: > Hi Johannes Wuebben and a happy new year. > Where did you actually put the timeslab ? > Yours > > Troels Ring, MD > Department of Nephrology
2008 Jan 04
4
What's up with the mailing list spam?
Just this morning I've gotten 3 or 4 pieces of spam on the CentOS mailing list. -- -matt
1999 Sep 21
0
problems with win98/smbd/automount and DNS lookups
...ating from the solaris machine. The only solution is to kill the rogue smbd processes and restart the automountd all is then fine until it starts all over again (about 1 month later). Any advice would be gratefully received as our network admin are convinced that we are compiling domain lists for illicit purposes and are threatening to cut us off. Mark Neil ----------------------------------- Mark Neil Department Of Engineering Science University Of Oxford Parks Road Oxford OX1 3PJ Tel +44-1865-273044 FAX +44-1865-273905 -----------------------------------
2007 Feb 20
1
CHINA: Donation Scheme and Quality Community Development
G'Day All, We have been supporting linux as a side business for a while (because we use that skill set in our own value chain internally) and we are now going to start targeting the wider local Chinese market and not just the foreign companies and joint ventures. As such we expect to see tremendous growth in this market segment this year due to the quickly dwindling support of local
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2007 Aug 25
0
Protecting Your Search Engine Rankings
...ale. These sites have not been penalized, and their links may grow in value and popularity. However, do make sure that you closely monitor these kind of links to ascertain that at some point they do not sustain a penalty once you have linked up to them from your links page. Another evil trick that illicit webmasters use to artificially boost their link popularity is the use of hidden text. Search engines usually use the words on web pages as a factor in forming their rankings, which means that if the text on your page contains your keywords, you have more of an opportunity to increase your search en...
2001 Nov 20
3
Is anybody else gettting these?
.... Tim?" ----- Forwarded by Tim Conway/LMT/SC/PHILIPS on 11/19/2001 10:35 AM ----- Tim Conway 11/19/2001 10:34 AM To: htmlmail@debsupport.de cc: Subject: RE: Secure connection to testor refused ! Classification: Unclassified Please go perform an illicit act upon yourself. Your sanctimonius preaching sickens me. I do not control the format to which my messages are converted as they leave our corporate intranet, If I had my choice, I would be using pine/smtp, rather than Lotus Notes. If you don't want to see mail from me, unsubscribe from t...
2014 Jan 06
4
Can we trust RedHAt encryption tools?
Recently I have been deeply troubled by evidence revealing the degree to which U.S. based corporations (well actually all resident in any of the so-called 5-eyes countries) appear to have rolled over and assumed the position with respect to NSA inspired pressure to cripple public key encryption and facilitate intrusions into their software products. This has engendered in me a significant degree
2006 Feb 13
4
DRM and Ogg Vorbis ??
Dear all, I would like to know whether it is possible to use any DRM scheme with Ogg-Vorbis ? My idea would be to distribute music commercially and be able guarantee to artists that they won't be copied freely. Thanks for your advice. Regards, Ulrich ulrich@bbtest.roxr.com -------------- next part -------------- An HTML attachment was scrubbed... URL:
2015 Nov 11
2
[PATCH] instmem/gk20a: use DMA API CPU mapping
Commit 69c4938249fb ("drm/nouveau/instmem/gk20a: use direct CPU access") tried to be smart while using the DMA-API by managing the CPU mappings of buffers allocated with the DMA-API by itself. In doing so, it relied on dma_to_phys() which is an architecture-private function not available everywhere. This broke the build on several architectures. Since there is no reliable and portable
2004 Oct 14
16
Squid as a transparent proxy
Hi, I followed the instructions in the section "Squid (transparent) Running on the Firewall" on http://www.shorewall.net/Shorewall_Squid_Usage.html to setup Squid transparently on a Linux gateway. My net is as follows: loc subnet --- fw Linux Gateway --- ADSL router 192.168.1.0/24 192.168.1.92 (eth1) WAN.WAN.WAN.2 (gw = WAN.WAN.WAN.WAN (eth0) 192.168.1.92) (gw =
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Forwarded message: > From full-disclosure-admin@lists.netsys.com Wed Apr 21 11:49:12 2004 > To: full-disclosure@lists.netsys.com > From: Darren Bounds <dbounds@intrusense.com> > Subject: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability > Date: Tue, 20 Apr 2004 18:19:58 -0400 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > >