Displaying 3 results from an estimated 3 matches for "legitam".
Did you mean:
legitim
2005 Feb 09
12
Harvesting and Dictionary attacks
Is there a way to listen on port 25 for repeated dictionary attacks to
harvest email
address and blacklist that Ip with shorewall?
Thanks,
Mike
2008 Sep 29
0
[LLVMdev] Architecture Dependency of LLVM bitcode (was Re: compile linux kernel)
...target code to
deal with endianness in a target independent way. (Ok, you could
potentially write code that detected endiannes at runtime and chose
multiversioned code based on that, but that is ugly and optimization
prohibiting).
redundant, but greatly simplifying:
iptr aliased type. There are legitamate cases where you want to
perform arithmetic and comparisons on pointers that the semantics of
GEP make illegal so the only way to do so in a target independent way
is to either cast to an int you hope is >= than any pointer, or
violate the GEP semantics (which is generally works).
GBP instruc...
2008 Sep 29
5
[LLVMdev] Architecture Dependency of LLVM bitcode (was Re: compile linux kernel)
On 29.09.2008, at 11:53, Jonathan S. Shapiro wrote:
> Watching this thread, it occurs to me that the "V" in "LLVM" is
> creating
> confusion. So far as I know, LLVM is the first project to use
> "virtual"
> to refer to the instruction set of the intermediate form. I understand
> why this labeling made sense (sort of), but it was unfortunate. The