Displaying 5 results from an estimated 5 matches for "jsdi".
Did you mean:
jedi
2009 Jun 04
5
Problem installing RCS on SXCE
I was shocked to find no RCS on SXCE 107. I needed it to update some
RCS archives I had copied over.
No problem - go to sunfreeware and copy it over. No OpenSolaris branch?
The Solaris 10 package should work.
Only the package install appears to complete and does not - as
documented only in a log file, not on my screen.
OK then, the source for RCS should be easily compiled and installed, I
2009 Mar 12
6
How to auto-start and -stop xVM domains?
I''m trying to figure out what the CURRENT requirements are for
configuring the xVM domains to start at boot-time and stop on shutdown.
The closest to current I''ve seen is
http://opensolaris.org/os/community/xen/docs/xVM_lowres.pdf
which does not address the problem, and
http://opensolaris.org/os/community/xen/docs/xvm-ktde-20070917.pdf
which states:
*
1998 Mar 12
1
tmp files problem
Hi
It seems that the problem is that you wish to make private
for the user, some files, which, for other purposes, should yet
remain possibly shared.
This problem, for my own, is typically a resource-sharing
problem, and may be simply solved in a password-like way.
That is, each temp file should be generated with a randomized
name.
It has been said that this implies 1) modifying shell
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional
CC to linux-security. By the time I got around to do another
"moderation round" this one was the latest. Everyone is keeping good
context, so I think you all will be able to follow the discussion. --REW]
>>>>> <seifried@seifried.org> writes:
>> The only thing I can see coming out
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most
relevant information is near the top, but it''s all quite good... :-)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
There is no intrinsic difference between algorithm and data, the
same information can be viewed as data in one context and as
algorithm in another. Why then do so many people claim that
encryption algorithms