Displaying 20 results from an estimated 266 matches for "immun".
Did you mean:
immune
2012 Jun 13
1
Indexing Grouped Data
I need help in indexing grouped data. In this excample (df1 data), the first child had a first immunization at age 2. The second child had the first, second and third immunization at age 5,10, and 12, the third child had first and second immunization at age 4 and 6 and the fourth child had the first immunization at age 2. I have df1 and I need to create df2 with and "ind' variable that in...
2019 Sep 15
2
[PATCH nbdkit v2] common/bitmap: Don't fail on realloc (ptr, 0)
v1 was here:
https://www.redhat.com/archives/libguestfs/2019-September/msg00100.html
In v2 I've changed the patch so it avoids calling realloc at all in
this case.
The patch is a bit longer this way. But I don't see any other
alternative if we are to avoid having a "realloc wrapper" of some kind
that we use everywhere, which I guess we should avoid because it makes
plugins
2015 Jul 29
2
Fedora change that will probably affect RHEL
...015, at 4:37 PM, Nathan Duehr <denverpilot at me.com> wrote:
>> Equating this to ?vaccination? is a huge stretch.
>
> Why?
It's not just an imperfect analogy it really doesn't work on closer scrutiny.
Malware itself is not a good analog to antigens. Vaccinations provide
immunity to only certain kinds of antigens, and only specific ones at
that. Challenge-Response, which is what a login password is, is about
user authentication it is not at all meant or designed to provide
immunity from malware. That we're trying to use it to prevent
infections is more like putting o...
2004 Jun 01
2
GLMM(..., family=binomial(link="cloglog"))?
I'm having trouble using binomial(link="cloglog") with GLMM in
lme4, Version: 0.5-2, Date: 2004/03/11. The example in the Help file
works fine, even simplified as follows:
fm0 <- GLMM(immun~1, data=guImmun, family=binomial, random=~1|comm)
However, for another application, I need binomial(link="cloglog"),
and this generates an error for me:
> fm0. <- GLMM(immun~1, data=guImmun, family=binomial(link="cloglog"),
random=~1|comm)
Error in getClass(thi...
2015 Jul 29
0
Fedora change that will probably affect RHEL
...gt;
> It's not just an imperfect analogy it really doesn't work on closer scrutiny.
Every analogy will break down if you look too closely. The question is, is it a *useful* analogy?
> ...a login password is...about
> user authentication...not...meant or designed to provide
> immunity from malware.
Fine. If you want to be picky, a better analogy to a good password and reasonable limits on SSH logins is a healthy integument and healthy cell walls.
Has that changed any of the conclusions about bad passwords? No. Therefore we have succeeded in clarifying nothing except our...
2018 May 21
0
Re: Virtio-net drivers immune to Nethammer?
On Sat, May 19, 2018 at 12:42:14AM +0000, procmem wrote:
> Hi I'm a privacy distro maintainer investigating the implications of the
> newly published nethammer attack [0] on KVM guests particularly the
> virtio-net drivers. The summary of the paper is that rowhammer can be
> remotely triggered by feeding susceptible* network driver crafted
> traffic. This attack can do all kinds
2007 Mar 06
3
Time Change: Centos-immune?
hey all,
I perused my inbox looking for this subject, but not finding it,
-anything I need to keep my server farm of 60 centos servers (that all
run ntp) going smoothly during this next time change on March 11?
I noticed on the w2k side my IT staff have to do some scrambling, heh,
but that's expected.
Any action required?
-karlski
2000 Feb 24
1
Making password driven SSH 'immune' to MTM attacks.
...le. The most difficult aspect of the implimentation is that
the SRP negoiated secret should be xored into the key used for SSH channel
encryption (this would be rekeying because the ssh encrypted channel is
already established at authentication time).
This would make passworded SSH almost entirely immune to active MTM in the
common case, while not reducing security at all (with the excpetion of
potential implimentation bugs). This would also provide improved
compatibility for systems that are using both SSH and SRP (for other
services perhaps, or clients that can't use strong encryption).
Thi...
2018 May 19
5
Virtio-net drivers immune to Nethammer?
Hi I'm a privacy distro maintainer investigating the implications of the
newly published nethammer attack [0] on KVM guests particularly the
virtio-net drivers. The summary of the paper is that rowhammer can be
remotely triggered by feeding susceptible* network driver crafted
traffic. This attack can do all kinds of nasty things such as modifying
SSL certs on the victim system.
* Susceptible
2015 Jul 28
3
Fedora change that will probably affect RHEL
> On Jul 28, 2015, at 11:27, Warren Young <wyml at etr-usa.com> wrote:
>
> On Jul 25, 2015, at 6:22 PM, Bob Marcan wrote:
>>
>> 1FuckingPrettyRose
>> "Sorry, you must use no fewer than 20 total characters."
>> 1FuckingPrettyRoseShovedUpYourAssIfYouDon'tGiveMeAccessRightFuckingNow!
>> "Sorry, you cannot use punctuation."
2015 Jul 26
1
Get term from document by position
...ug with some example outputs that are unrelated to the search string?
Here is the example (see attachment).
This example does the following:
1)First, it indexes text from the "text.txt" file (see attachment) (actually, this is the text of the following book: "Abbas, Lichtman. Basic immunology").
2)Next, it searches for the "extracellular microbe" string and generates snippet.
Xapian::Snipper generates the following snippet:
"? ? 1 I * I I Andre , Lichtma SECOND EDITION B Q ? If1 Immun logy Functions and Disorders of the Immune System NOT FOR SALE...
2009 Apr 19
2
covariance
Does anyone know a way to calculate the covariances between two
arrays/matrices x and y, row by row. i.e. var(x[n,],y[n,]) for all n ?
Benjamin Chain
Division of Infection and Immunity
Windeyer Building
UCL, 46 Cleveland St.
London W1T 4JF
Fax 00 44 20 7679 9301
2006 Sep 23
2
Need to detect event: a user move a message to a “spam folder” (for antispam filter)
I?m writing an immune system based antispam filter.
I need to detect when a user move a message to her spam folder (to
inform the filter). I
I found ?cmd_copy? in imap library so I detect the copy event. But at
this level I wasn?t able to find info about which mail and which user
copy this message.
My question...
2010 Sep 18
2
Ac1dB1tch3z Vs Linux Kernel x86_64 0day
Are there any 64bit CentOS5 kernels available that are immune against
the exploit mentioned in the subject? Turning off 32bit support is no
option to me..
Gerhard Schneider
P.S.: Source code can be found at
http://seclists.org/fulldisclosure/2010/Sep/268 and is working "well" on
2.6.18-194.11.3.el5.centos.plus
--
Gerhard Schneider
Institute of L...
2013 Apr 04
0
Strategic Research Bioinformatician required, Cardiff, UK.
Dear All,
We (The Cardiff Institute of Infection and Immunity) are very keen to
appoint a bioinformatician with a range of opportunities from 'simple' array
analysis to aiding in the programming and analysis of novel data platforms.
This is an Institutional, not just a project specific, appointment centred
on the high quality Internationally-recogn...
2015 Jul 30
0
Fedora change that will probably affect RHEL
...trictions that require locks and safety mechanisms on all sorts of things. How many of those locks would continue to be provided as a matter of course if those laws and provisions did not exist?
>> I don?t see why we can?t take some responsibility for this mess and try to build up some herd immunity.
>
> Because there is no such thing when it comes to computers.
Pay more attention to history.
Once upon a time, we had the likes of Blaster, Code Red and Nimda, which continuously flooded the internet with traffic intended to find exploitable holes in Microsoft OSes. They kept finding...
2009 May 31
2
renaming column names
...error message, but the column names don''t change because
when I then type :
colnames(data)
I get the same set of names as before, so the assignment doesnt seem to have
worked.
Any ideas or suggestions gratefully received.
Benny Chain
Benjamin Chain
Division of Infection and Immunity
Windeyer Building
UCL, 46 Cleveland St.
London W1T 4JF
Fax 00 44 20 7679 9301
[[alternative HTML version deleted]]
2010 Oct 29
2
faster fsck ?
...is under heavy load its availability is important.
>From time to time we "crash" this server (don't ask why ...) but then fsck is running for over 20-30 minuts.
The question is: is there any other _stable_ filesystem (xfs ?, jfs ?) which we can use instead of ext3
which is (quite) immune to crashes and whose fsck is "faster" (by design) then in ext3 ?
Regards
Przemek
----------------------------------------------
Chcesz wi??cej zarabia??? Zmie?? prac?? na lepsz?
!
http://linkint.pl/f2822
2016 Oct 12
2
Samba-tool password expiration and service accounts
..., do you have any ideas on how to preserve
security with password rotation for the users while also allowing service
accounts (password never expires) to exist?
-If I am not correct, does this indicate a problem with my Samba
installation or am I missing a setting to make the service accounts immune
to samba-tool password rules?
Thanks!
-Brandon
2007 Jun 03
1
Dovecot waking every 50ms when doing nothing
Hi,
My laptop runs a local IMAP server so that I'm immune from breaking my
mail client, and when playing around with powertop I discovered that
Dovecot (in particular imap-login) wakes up every 1000ms and then every
50ms even when no clients are connected. A bit of stracing shows this:
gettimeofday({1180875699, 667917}, NULL) = 0 <0.000010>
poll(...