Displaying 17 results from an estimated 17 matches for "illiciting".
Did you mean:
eliciting
2014 Feb 04
0
Statistician at UNODC Vienna (Fwd: Statistiker für consultancy gesucht)
Dear List,
please find here an interesting job opportunity at the UNODC (SASS) in Vienna. If you are interested contact directly Ms. Irmgard Zeiler (Irmgard.ZEILER at unodc.org).
good luck
Matteo Mattiuzzi
>>> Irmgard ZEILER <Irmgard.ZEILER at unodc.org> 02/03/14 5:02 PM >>>
Dear all,
I would like to kindly ask your assistance in my search for a consultant (short
2001 Oct 27
1
2.4.7p1 protocol differences?
Hi all,
rsync-2.4.6 has been running for quite a while with no problems, until
about a week ago when for some reason it blocked on the same host ever
time.
I use it to backup about thirty hosts to my backup server, but for some
reason it's illiciting that blocking bug that some people experience with
2.4.6. So, I upgraded the client side with 2.4.7, but it complained of
protocol differences. I certainly can't upgrade all 30 hosts to 2.4.7p1,
especially when it's not production-ready yet.
The host that it's blocking on isn't eve...
2015 Feb 10
6
Another Fedora decision
On Tue, 2015-02-10 at 15:04 -0700, Warren Young wrote:
> > On Feb 9, 2015, at 12:12 PM, John R Pierce <pierce at hogranch.com> wrote:
> >
> > On 2/9/2015 11:06 AM, Always Learning wrote:
> >> The third item was a 16.1 MB PDF of 1,344 pages. A quick scan of the PDF
> >> shows every page appears to be readable. 11 pages devoted to BASH.
> >>
2015 Feb 11
0
Another Fedora decision
> On Feb 10, 2015, at 4:28 PM, Always Learning <centos at u64.u22.net> wrote:
>
> 2. PDFs can be created by *NON-ADOBE* software.
And SWFs can be generated by non-Adobe software, and JARs can be generated by non-Oracle software. What?s your point? Is it that only Evil Corporations can create software that can be used for evil purposes?
Are you back on the ?F/OSS software is
1999 Jan 01
1
RE: timeslab
Hi Troels,
Its in the incoming directory:
ftp://ftp.ci.tuwien.ac.at/incoming
Try this for a nice demo:
> library(timeslab)
> arma(alpha, beta, x, 2, 4, 3, 0.2,500, 30,0)
Bernd
On 01-Jan-99 Troels Ring wrote:
> Hi Johannes Wuebben and a happy new year.
> Where did you actually put the timeslab ?
> Yours
>
> Troels Ring, MD
> Department of Nephrology
2008 Jan 04
4
What's up with the mailing list spam?
Just this morning I've gotten 3 or 4 pieces of spam on the CentOS mailing list.
--
-matt
1999 Sep 21
0
problems with win98/smbd/automount and DNS lookups
Does anyone know what is going on with the following:-
A windows 98 machine maps several directories from a samba (2.0.0) server on a
Solaris 2.6 machine.
Twice now the win98 machine has locked up on opening the "my computer" icon,
simultaneously several smbd processes have appeared on the solaris machine
(initiated by that win 98 machine).
log.smbd reports a single error:-
2007 Feb 20
1
CHINA: Donation Scheme and Quality Community Development
G'Day All,
We have been supporting linux as a side business for a while (because
we use that skill set in our own value chain internally) and we are
now going to start targeting the wider local Chinese market and not
just the foreign companies and joint ventures.
As such we expect to see tremendous growth in this market segment
this year due to the quickly dwindling support of local
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display
system so that users can be sure that what they see on screen is what
they are supposed to see, and that no-one can eavesdrop on what''s being
displayed?
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display
system so that users can be sure that what they see on screen is what
they are supposed to see, and that no-one can eavesdrop on what''s being
displayed?
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2007 Aug 25
0
Protecting Your Search Engine Rankings
Your website''s ranking on search engines is a vital element of your
overall marketing campaign, and there are ways to improve your link
popularity through legitimate methods. Unfortunately, the Internet is
populated by bands of dishonest webmasters seeking to improve their link
popularity by faking out search engines.
The good news is that search engines have figured this out, and are
2001 Nov 20
3
Is anybody else gettting these?
I keep getting these smarmy sermons from somebody's mail account. I
include my response to it below, though from its message, it probably
won't be read.
Tim Conway
tim.conway@philips.com
303.682.4917
Philips Semiconductor - Longmont TC
1880 Industrial Circle, Suite D
Longmont, CO 80501
Available via SameTime Connect within Philips, n9hmg on AIM
perl -e 'print pack(nnnnnnnnnnnn,
2014 Jan 06
4
Can we trust RedHAt encryption tools?
Recently I have been deeply troubled by evidence revealing the degree to which
U.S. based corporations (well actually all resident in any of the so-called
5-eyes countries) appear to have rolled over and assumed the position with
respect to NSA inspired pressure to cripple public key encryption and
facilitate intrusions into their software products. This has engendered in me
a significant degree
2006 Feb 13
4
DRM and Ogg Vorbis ??
Dear all,
I would like to know whether it is possible to use any DRM scheme
with Ogg-Vorbis ?
My idea would be to distribute music commercially and be able
guarantee to artists that they won't be copied freely.
Thanks for your advice.
Regards,
Ulrich
ulrich@bbtest.roxr.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2015 Nov 11
2
[PATCH] instmem/gk20a: use DMA API CPU mapping
Commit 69c4938249fb ("drm/nouveau/instmem/gk20a: use direct CPU access")
tried to be smart while using the DMA-API by managing the CPU mappings of
buffers allocated with the DMA-API by itself. In doing so, it relied
on dma_to_phys() which is an architecture-private function not
available everywhere. This broke the build on several architectures.
Since there is no reliable and portable
2004 Oct 14
16
Squid as a transparent proxy
Hi,
I followed the instructions in the section "Squid
(transparent) Running on the Firewall" on
http://www.shorewall.net/Shorewall_Squid_Usage.html to
setup Squid transparently on a Linux gateway. My net
is as follows:
loc subnet --- fw Linux Gateway --- ADSL router
192.168.1.0/24 192.168.1.92 (eth1) WAN.WAN.WAN.2
(gw = WAN.WAN.WAN.WAN (eth0)
192.168.1.92) (gw =
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Forwarded message:
> From full-disclosure-admin@lists.netsys.com Wed Apr 21 11:49:12 2004
> To: full-disclosure@lists.netsys.com
> From: Darren Bounds <dbounds@intrusense.com>
> Subject: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability
> Date: Tue, 20 Apr 2004 18:19:58 -0400
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>