search for: illiciting

Displaying 17 results from an estimated 17 matches for "illiciting".

Did you mean: eliciting
2014 Feb 04
0
Statistician at UNODC Vienna (Fwd: Statistiker für consultancy gesucht)
Dear List, please find here an interesting job opportunity at the UNODC (SASS) in Vienna. If you are interested contact directly Ms. Irmgard Zeiler (Irmgard.ZEILER at unodc.org). good luck Matteo Mattiuzzi >>> Irmgard ZEILER <Irmgard.ZEILER at unodc.org> 02/03/14 5:02 PM >>> Dear all, I would like to kindly ask your assistance in my search for a consultant (short
2001 Oct 27
1
2.4.7p1 protocol differences?
Hi all, rsync-2.4.6 has been running for quite a while with no problems, until about a week ago when for some reason it blocked on the same host ever time. I use it to backup about thirty hosts to my backup server, but for some reason it's illiciting that blocking bug that some people experience with 2.4.6. So, I upgraded the client side with 2.4.7, but it complained of protocol differences. I certainly can't upgrade all 30 hosts to 2.4.7p1, especially when it's not production-ready yet. The host that it's blocking on isn't eve...
2015 Feb 10
6
Another Fedora decision
On Tue, 2015-02-10 at 15:04 -0700, Warren Young wrote: > > On Feb 9, 2015, at 12:12 PM, John R Pierce <pierce at hogranch.com> wrote: > > > > On 2/9/2015 11:06 AM, Always Learning wrote: > >> The third item was a 16.1 MB PDF of 1,344 pages. A quick scan of the PDF > >> shows every page appears to be readable. 11 pages devoted to BASH. > >>
2015 Feb 11
0
Another Fedora decision
> On Feb 10, 2015, at 4:28 PM, Always Learning <centos at u64.u22.net> wrote: > > 2. PDFs can be created by *NON-ADOBE* software. And SWFs can be generated by non-Adobe software, and JARs can be generated by non-Oracle software. What?s your point? Is it that only Evil Corporations can create software that can be used for evil purposes? Are you back on the ?F/OSS software is
1999 Jan 01
1
RE: timeslab
Hi Troels, Its in the incoming directory: ftp://ftp.ci.tuwien.ac.at/incoming Try this for a nice demo: > library(timeslab) > arma(alpha, beta, x, 2, 4, 3, 0.2,500, 30,0) Bernd On 01-Jan-99 Troels Ring wrote: > Hi Johannes Wuebben and a happy new year. > Where did you actually put the timeslab ? > Yours > > Troels Ring, MD > Department of Nephrology
2008 Jan 04
4
What's up with the mailing list spam?
Just this morning I've gotten 3 or 4 pieces of spam on the CentOS mailing list. -- -matt
1999 Sep 21
0
problems with win98/smbd/automount and DNS lookups
Does anyone know what is going on with the following:- A windows 98 machine maps several directories from a samba (2.0.0) server on a Solaris 2.6 machine. Twice now the win98 machine has locked up on opening the "my computer" icon, simultaneously several smbd processes have appeared on the solaris machine (initiated by that win 98 machine). log.smbd reports a single error:-
2007 Feb 20
1
CHINA: Donation Scheme and Quality Community Development
G'Day All, We have been supporting linux as a side business for a while (because we use that skill set in our own value chain internally) and we are now going to start targeting the wider local Chinese market and not just the foreign companies and joint ventures. As such we expect to see tremendous growth in this market segment this year due to the quickly dwindling support of local
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2007 Aug 25
0
Protecting Your Search Engine Rankings
Your website''s ranking on search engines is a vital element of your overall marketing campaign, and there are ways to improve your link popularity through legitimate methods. Unfortunately, the Internet is populated by bands of dishonest webmasters seeking to improve their link popularity by faking out search engines. The good news is that search engines have figured this out, and are
2001 Nov 20
3
Is anybody else gettting these?
I keep getting these smarmy sermons from somebody's mail account. I include my response to it below, though from its message, it probably won't be read. Tim Conway tim.conway@philips.com 303.682.4917 Philips Semiconductor - Longmont TC 1880 Industrial Circle, Suite D Longmont, CO 80501 Available via SameTime Connect within Philips, n9hmg on AIM perl -e 'print pack(nnnnnnnnnnnn,
2014 Jan 06
4
Can we trust RedHAt encryption tools?
Recently I have been deeply troubled by evidence revealing the degree to which U.S. based corporations (well actually all resident in any of the so-called 5-eyes countries) appear to have rolled over and assumed the position with respect to NSA inspired pressure to cripple public key encryption and facilitate intrusions into their software products. This has engendered in me a significant degree
2006 Feb 13
4
DRM and Ogg Vorbis ??
Dear all, I would like to know whether it is possible to use any DRM scheme with Ogg-Vorbis ? My idea would be to distribute music commercially and be able guarantee to artists that they won't be copied freely. Thanks for your advice. Regards, Ulrich ulrich@bbtest.roxr.com -------------- next part -------------- An HTML attachment was scrubbed... URL:
2015 Nov 11
2
[PATCH] instmem/gk20a: use DMA API CPU mapping
Commit 69c4938249fb ("drm/nouveau/instmem/gk20a: use direct CPU access") tried to be smart while using the DMA-API by managing the CPU mappings of buffers allocated with the DMA-API by itself. In doing so, it relied on dma_to_phys() which is an architecture-private function not available everywhere. This broke the build on several architectures. Since there is no reliable and portable
2004 Oct 14
16
Squid as a transparent proxy
Hi, I followed the instructions in the section "Squid (transparent) Running on the Firewall" on http://www.shorewall.net/Shorewall_Squid_Usage.html to setup Squid transparently on a Linux gateway. My net is as follows: loc subnet --- fw Linux Gateway --- ADSL router 192.168.1.0/24 192.168.1.92 (eth1) WAN.WAN.WAN.2 (gw = WAN.WAN.WAN.WAN (eth0) 192.168.1.92) (gw =
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Forwarded message: > From full-disclosure-admin@lists.netsys.com Wed Apr 21 11:49:12 2004 > To: full-disclosure@lists.netsys.com > From: Darren Bounds <dbounds@intrusense.com> > Subject: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability > Date: Tue, 20 Apr 2004 18:19:58 -0400 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > >