search for: jsdy

Displaying 5 results from an estimated 5 matches for "jsdy".

Did you mean: asdy
2009 Jun 04
5
Problem installing RCS on SXCE
...source for RCS should be easily compiled and installed, I used to do it all the time. Except there is no GCC installed. Well, I can get gcc from sunfreeware ... enter a loop. Any suggestions? Thanks. -- /*********************************************************************\ ** ** Joe Yao jsdy@tux.org - Joseph S. D. Yao ** \*********************************************************************/
2009 Mar 12
6
How to auto-start and -stop xVM domains?
...inition of insanity is repeating the same action and expecting the results to be different - but that sure seems to work with a lot of software! [Then again, who says we''re sane?] Thanks again! -- /*********************************************************************\ ** ** Joe Yao jsdy@tux.org - Joseph S. D. Yao ** \*********************************************************************/
1998 Mar 12
1
tmp files problem
Hi It seems that the problem is that you wish to make private for the user, some files, which, for other purposes, should yet remain possibly shared. This problem, for my own, is typically a resource-sharing problem, and may be simply solved in a password-like way. That is, each temp file should be generated with a randomized name. It has been said that this implies 1) modifying shell
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional CC to linux-security. By the time I got around to do another "moderation round" this one was the latest. Everyone is keeping good context, so I think you all will be able to follow the discussion. --REW] >>>>> <seifried@seifried.org> writes: >> The only thing I can see coming out
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms