search for: jsdi

Displaying 5 results from an estimated 5 matches for "jsdi".

Did you mean: jedi
2009 Jun 04
5
Problem installing RCS on SXCE
I was shocked to find no RCS on SXCE 107. I needed it to update some RCS archives I had copied over. No problem - go to sunfreeware and copy it over. No OpenSolaris branch? The Solaris 10 package should work. Only the package install appears to complete and does not - as documented only in a log file, not on my screen. OK then, the source for RCS should be easily compiled and installed, I
2009 Mar 12
6
How to auto-start and -stop xVM domains?
I''m trying to figure out what the CURRENT requirements are for configuring the xVM domains to start at boot-time and stop on shutdown. The closest to current I''ve seen is http://opensolaris.org/os/community/xen/docs/xVM_lowres.pdf which does not address the problem, and http://opensolaris.org/os/community/xen/docs/xvm-ktde-20070917.pdf which states: *
1998 Mar 12
1
tmp files problem
Hi It seems that the problem is that you wish to make private for the user, some files, which, for other purposes, should yet remain possibly shared. This problem, for my own, is typically a resource-sharing problem, and may be simply solved in a password-like way. That is, each temp file should be generated with a randomized name. It has been said that this implies 1) modifying shell
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional CC to linux-security. By the time I got around to do another "moderation round" this one was the latest. Everyone is keeping good context, so I think you all will be able to follow the discussion. --REW] >>>>> <seifried@seifried.org> writes: >> The only thing I can see coming out
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms