Displaying 20 results from an estimated 60 matches for "loophol".
Did you mean:
loophole
2006 Mar 13
5
DSD Approved Products
Hi,
I am considering installing several `servers' in a facility that needs
to conform
with the products listed at: DSD Approved Products
http://www.dsd.gov.au/infosec/evaluation_services/epl/dap.html
As far as i can see freebsd performs above and beyond, for all the required
criteria in the act. Can we see freebsd listed as an approved product in the
near future?
Best Regards,
Jason - RF
2005 Mar 13
2
Samba3 in W2k AD, W98 clients need password for Samba share
Hello everybody,
I've setup a file server with Debian GNU/Linux (Sarge) and Samba v3.0.10
with ACL, Kerberos etc... so I can join the Windows 2000 domain. I can
use users from domain on file server without problems and Windows 2000,
XP clients can access Samba shares.
But when I try to connect to \\fs from Windows 98 client (in domain) it
requests password from me (\\fs\IPC$). I have
2020 Aug 20
3
submission message quota
...o what I could achieve with Postfix and
policyd.
More specifically, the quota I am most interested in, is limiting the
number of messages a single account can send within a given timeframe.
Ideally, I'd also like to limit the number of total recipients within a
given timeframe, to mitigate the loophole of adding multiple recipients
to a single message.
Example: account Y is allowed to send 500 messages per 60 minutes, with
a maximum of 2000 recipients overall.
What would be the best path to take?
Thanks!
Gerry
2006 Mar 20
1
winbind - security hole?
...n any single workstation,
he can modify the mapping at will to get root access to the entire
domain. The only remedy I can see is to disallow root access on all
workstations (which is a very undesirable fact).
Are I am missing something, or is there a different setup possible to
omit this security loophole?
Regards,
Roland
2006 Sep 21
1
validity testing as part of '@<-'
...w' method then fails somewhat deep
in a subsequently-called coercion method.
library(Matrix)
test <- Matrix(1:4+0.1, nrow = 2, dimnames = list(letters[1:2],
LETTERS[1:2]))
test at Dimnames <- list(1:100)
test
direct slot access (without a validity check) seems an easily
accessible loophole to S4 object "guarantees".
franklin parlamis
2005 Jun 29
7
4.1 beta for Alpha platform
Hi all,
I have tried to install this beta release on PWS 433
au but I can not boot /kernels/vmlinux.gz image. Error
is: "unsupported compressed image". Is not posible to
install under this Alpha model??
Thank you.
__________________________________________________
Correo Yahoo!
Espacio para todos tus mensajes, antivirus y antispam ?gratis!
Reg?strate ya -
2004 Aug 10
2
WiFi phone radiation regulation?
...of 2.2dBi, we're talking about
22.2dBm - that's nearly 200mW of power radiating out of the phone. At
2.4GHz, it has higher penetration power than cells phones.
My question:
Does anyone know if cell phone SAR rules apply to WiFi phones as well?
Over here in Singapore, there seems to be a loophole. As long as your
equipment is in 2.4GHz, approval is not required if Tx power is <200mW.
2016 May 06
2
Resuming the discussion of establishing an LLVM code of conduct
...t will behoove each member treat others with respect and
to oppose unacceptable actions. When the enforcement of such standards
comes from the genuine conviction, and not simply from a document, it
strenghtens the community as a whole. Pointing to a document only
invites searching for potential loopholes.
-Krzysztof
--
Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum,
hosted by The Linux Foundation
2009 Nov 11
4
Sessions
I''m an experienced programmer, but new to Rails.
I would like to echo an unanswered question I''ve recently read
elsewhere.
Can any recommend an overview of get/post, cookies, sessions, etc.,
and how Ruby on Rails interacts with all of this?
I''m interested in understanding how to harden a Rails application
Regards
--
Dave
2006 Feb 22
15
Fixtures and Relationships
...ailures, as there is no way to
say "which" fixtures to load first.
Within an actual functional or unit test case, you could simply load them in
the proper order, but I''m not doing any tests yet, but simply using the
fixture data for development purposes.
Either there is a major loophole in this process, or, I''m totally
approaching this wrong. I''m voting for the latter :)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://wrath.rubyonrails.org/pipermail/rails/attachments/20060222/579afeb9/attachment.html
2017 Jan 19
2
Multiple GPL violations including Samba in Auralic products
...t of the open
source code project in the community are full of bugs, I am pretty
regret about this."
Here's proof they use 3.6.23:
Server Comment
--------- -------
ARIES-1L9YS2O8 Samba 3.6.23
It's obvious they are using various loopholes to avoid sharing the GPL
source code used in their products, and they only share the kernel,
nothing else.
They probably also violate busybox, as their embedded linux platform
runs a dropbear (SSH-2.0-dropbear_2012.55), but the root password is
not known, so the only way to know what other packag...
2015 Dec 04
3
Running sshd with Privilege Seperation drops connection on password change
...??bash???pstree
? ??sshd???sshd
??systemd-logind
??systemd-udevd
??upstart-file-br
??upstart-socket-
??upstart-udev-br
If I disable Privilege Seperation ("UsePrivilegeSeperation no") in sshd config then the problem goes away but that opens up a security loophole where the process is running at root privilege even prior to authentication.
What do you guys think? Have others come across this? Is there a patch available for this?
Thanks,
Kam
2013 Nov 25
3
Sysinux 6 will not boot ISOs on BIOS (i.e. pre-UEFI) systems
...x.bin (4.07) to a really high LBA address and boot
>> without any issue. (Load LBA: 2048034 (0x001f4022)) ~4G
>
> This is riddling, given the statement of hpa that the
> boot images are identical up to the point where Carl's
> boot procedure fails.
> There seems to be some loophole in the identity.
>
> Another possibility could be that not the whole address
> range above 128 MB is poisonous, but only particular
> intervals.
> Gerardo: did you really try 4.07 with exactly the same boot
> image LBA as 6.02 ?
Yes, same LBA offset for isolinux.bin for 4.07 an...
2016 May 06
4
Resuming the discussion of establishing an LLVM code of conduct
...others with
> respect and to oppose unacceptable actions. When the enforcement
> of such standards comes from the genuine conviction, and not
> simply from a document, it strenghtens the community as a whole.
> Pointing to a document only invites searching for potential loopholes.
>
> -Krzysztof
>
> --
> Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum,
> hosted by The Linux Foundation
> _______________________________________________
> LLVM Developers mailing list
> llvm-dev at lists.llvm.org <ma...
2016 Nov 03
2
RFC #2: Improving license & patent issues in the LLVM community
...PE
> 2. Transfer ownership of the relevant patent(s) to the NPE
> 3. Contribute code to LLVM that infringes the patent, safely abiding by
> the terms that they’re licensing all of the patents that they own.
> 4. Watch the NPE sue everyone and laugh.
>
There are literally attempts at loopholes one could play with literally
every legal scenario ever, no matter what is done.
I'll go further:
It's literally not possible to have a GPL compatible license and avoid some
of these loopholes.
That is the price we pay
>
> The Apache 2 License does nothing to prevent this, though...
2013 Nov 25
2
Sysinux 6 will not boot ISOs on BIOS (i.e. pre-UEFI) systems
On 11/25/2013 08:40 AM, Thomas Schmitt wrote:
> Hi,
>
> Ady wrote:
>> I guess that being isolinux.bin 4.07 smaller than 32KiB (24KiB),
>> while isolinux.bin 6.02 being bigger (42KiB), and with the addition
>> of multiple alternative boot images in the same ISO, the chances of
>> isolinux.bin being located on a higher sector in the media seem to be
>>
2015 Dec 16
2
Running sshd with Privilege Seperation drops connection on password change
Hi Darren/Damien,
Sorry for responding so late. Still hope we can get this sorted out.
Yes I am indeed using PAM for ssh authentication and disabling priv seperation is a no-go for us since it opens up a security loophole.
From what I can see in ptree and auth logs, when the child passwd process returns with SIGCHLD, the parent sshd process terminates.
Sshd logs are as follows as requested at DEBUG3 verbosity. They indicate the ssh, followed by the password change and finally termination of connection:
Dec 16 22...
2019 Feb 25
2
funnel shift, select, and poison
...d shifted by
some amount).
Eg, if in pseudo IR we have:
%funnel_shift = fshl %x, %y, %sh ; this is problematic because either x or
y can be poison, but we may not touch the poison when sh==0
%rotate = fshl %x, %x, %sh ; if x is poison, the op is unquestionably
producing poison; there's no sh==0 loophole here
On Mon, Feb 25, 2019 at 1:12 PM Nuno Lopes <nunoplopes at sapo.pt> wrote:
> Thanks Sanjay!
>
> I did a quick study of these funnel shifts:
> The generic lowering to SDAG is correct for the optimization below. It
> actually stops poison if shift amount is zero:
>...
2016 Nov 02
3
RFC #2: Improving license & patent issues in the LLVM community
> On Nov 1, 2016, at 12:21 PM, Joerg Sonnenberger via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
> On Mon, Sep 12, 2016 at 09:16:47AM -0700, Chris Lattner via llvm-dev wrote:
>> The goals of this effort are outlined in the previous email but, in short, we aim to:
>> - encourage ongoing contributions to LLVM by preserving low barrier to entry for contributors.
2019 Feb 25
3
funnel shift, select, and poison
...; Eg, if in pseudo IR we have:
> %funnel_shift = fshl %x, %y, %sh ; this is problematic because either x or
> y
> can be poison, but we may not touch the poison when sh==0
> %rotate = fshl %x, %x, %sh ; if x is poison, the op is unquestionably
> producing poison; there's no sh==0 loophole here
>
>
>
> On Mon, Feb 25, 2019 at 1:12 PM Nuno Lopes <nunoplopes at sapo.pt> wrote:
> Thanks Sanjay!
>
> I did a quick study of these funnel shifts:
> The generic lowering to SDAG is correct for the optimization below. It
> actually stops poison if shift amount...