search for: loosest

Displaying 7 results from an estimated 7 matches for "loosest".

Did you mean: looses
2012 Apr 15
1
[LLVMdev] Representing -ffast-math at the IR level
...precise as normal, but might do odd things for NaNs or Infty, etc.) - I'd suppose this is a strictest "fast" option. - algebraic-equivalence - The compiler might do anything that is algebraically the same (even if the numerics could be quite different) - This is probably the loosest "fast" option. -Hal > > So that metadata would be able to say "fast", "fast, but no fma > allowed", "strict, but fma allowed", I.e. metadata should be a > base-level + optional set of adjustments from the list above. > > And, again, I t...
2008 Nov 14
2
performance problem with access database
Hello I have problem with a access application, when I try to start the application then I must wait 5 minutes ago before he started. I do this from a WinXp Workstation to a Linux Debian Etch and samba 3.0.24 installation. What can I do for better performance. best regards pat
2012 Jun 05
1
best way to access samba shares remotely without VPN
Hi all, I'm wondering what is the best way to access samba shares securely over the net. I saw sslbridge and davenport but they don't seem to be managed properly. I was thinking of using webdav via https. I dont want to use VPN as im using openvpn and it is not support well with Mac iOS and OSX client. webdav is supported well. Regards J
2020 Apr 22
0
Recommendations on intrusion prevention/detection?
...mised ;) * Re-used passwords where data is exposed from another site's breach (Users WANT to re-use passwords, this is where 2FA shines) * Weak Passwords (Users like using weak passwords, so implement password restrictions) Hackers are still brute forcing in incredible numbers, using the loosest 1012 passwords.. (or smaller subset of about 64 patterns) if you have a user with a <username|domain>NNNN password, a < 8 char numeric, or the one of the following, it is only a matter of time before it is compromised. 000000 111111 123123 123456 12345678 222222 333333 444444 555555 66...
2020 Apr 22
6
Recommendations on intrusion prevention/detection?
Dear all, what are the key strategies for intrusion prevention and detection with dovecot, apart from installing fail2ban? It is a pity that the IMAP protocol does not support 2 factor authentication, which seems to stop 90% of intrusion attempts in their tracks. Without it, if someone has obtained your password and reads your mail without modifying it, you will hardly ever notice. Is there a
2012 Apr 14
0
[LLVMdev] Representing -ffast-math at the IR level
On Sun, Apr 15, 2012 at 1:02 AM, Duncan Sands <baldrick at free.fr> wrote: > Hi Dmitry, > > > The kinds of transforms I think can reasonably be done with the current >> information are things like: x + 0.0 -> x; x / constant -> x * (1 / >> constant) if >> constant and 1 / constant are normal (and not denormal) numbers. >> >> The
2012 Apr 14
4
[LLVMdev] Representing -ffast-math at the IR level
Hi Dmitry, > The kinds of transforms I think can reasonably be done with the current > information are things like: x + 0.0 -> x; x / constant -> x * (1 / constant) if > constant and 1 / constant are normal (and not denormal) numbers. > > > The particular definition is not that important, as the fact that this > definition exists :) I.e. I think we need a