search for: malevolence

Displaying 16 results from an estimated 16 matches for "malevolence".

2015 Jun 28
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...or at least no longer >> prevalent. We can at least identify C dialects that provide stronger >> guarantees for the rest. >> >> thanks, >> Peter >> >> >>> This is obviously sort of a twisted logic, and I think that a lot of the >>> "malevolence" attributed to compilers is due to this. It certainly removes >>> many target-dependent checks from the mid-level optimizer though. >
2007 Sep 06
2
FAX machine connect with audiocode SIP device
Dear all I have FAX machine connected with audiocode SIP device i am trying to send fax and when negosiation going on and i start send fax button then my after half page it got stuck in fax machine so is there any codec problem i am useing ulaw/alaw is it fine or not anybody have idea about sending fax with SIP connected device --------------------------------- Ready
2017 Feb 02
2
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 12:18 -0800, Gordon Messmer wrote: > I apologize if my intent was unclear. I was providing you with the text > that you should use in your bug report. I am not explaining the problem > to you, I am showing you a clear way to explain the problem in the bug > report. You should use the appropriate parts of the text I provided, > and basically nothing else.
2017 Aug 17
3
Detecting DoS attacks via SIP
Well, correct me if I'm wrong, but I would say this conversation you have posted is a bit outdated, now fail2ban can be used with asterisk security log https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Event+Logger. On Thu, Aug 17, 2017, 4:53 AM Telium Technical Support <support at telium.ca> wrote: > Keep in mind that the attacks you are seeing in the log are ONLY the
2015 Jun 27
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...of the looseness of ISO C relates to platforms that are no longer relevant, or at least no longer prevalent. We can at least identify C dialects that provide stronger guarantees for the rest. thanks, Peter > This is obviously sort of a twisted logic, and I think that a lot of the > "malevolence" attributed to compilers is due to this. It certainly removes > many target-dependent checks from the mid-level optimizer though. > > -- Sean Silva > > On Fri, Jun 26, 2015 at 1:42 AM, Peter Sewell <Peter.Sewell at cl.cam.ac.uk> > wrote: >> >> As part of a p...
2017 Feb 02
0
Serious attack vector on pkcheck ignored by Red Hat
On 02/02/2017 12:37 PM, Leonard den Ottolander wrote: > So by continuing to have these memory leaks in the binary you are making > it easier for a malevolent local user to mount an attack that might > cause the "desired" privilege escalation. I'm really struggling to explain this more simply and clearly. Privilege escalation means that the attacker gains a privilege they
2007 Jul 06
1
Samba 3.0.25b + Vista Printers
Hello there I've just upgraded our Samba server to 3.0.25b and am still having problems with Windows Vista clients accessing printers. XP/2000 clients continue to work fine - but Vista refuses to connect to Samba printers that have drivers hosted on the Samba server. To clarify, as part of the netlogon batch job, clients attempt to connect to Samba-hosted printer shares, and if they
2017 Aug 15
6
Detecting DoS attacks via SIP
Hi all, Lately, I've seen an increase in the number of attacks against my system from the so-called "Friendly Scanner." When one of these script kiddies targets my server, all I see for symptoms is a few of my trunks become lagged due to server load and a stream of messages on the console that resemble this: [Aug 2 20:27:50] == Using SIP VIDEO CoS mark 6 [Aug 2 20:27:50] ==
2003 Sep 11
2
Blocking spamblocked.earthlink.net
For those who don't know, Greg Houlette sent in a request from an address that doesn't conveniently accept replies. If people can't be bothered to read our replies, we shouldn't be bothered by their requests. Just a note. Maybe a request for a killfile. --Dan
2017 Feb 02
2
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 10:39 -0800, Gordon Messmer wrote: > It took me a while to find the patch that you mentioned, which is > probably why your bugs are being disregarded. It is beyond my control where patches are listed in the Red Hat bugzilla pages. I don't think the Red Hat employee involved should have a hard time finding it in my report. > Open a new bug report and focus on
2015 Jun 30
8
[LLVMdev] C as used/implemented in practice: analysis of responses
...on of undefined behavior turns out to be quite helpful in practice. The rules for integer overflow are another great example (loop optimizations don't work nearly as well without them in many cases). > > This is obviously sort of a twisted logic, and I think that a lot of > the "malevolence" attributed to compilers is due to this. It > certainly removes many target-dependent checks from the mid-level > optimizer though. > This point is correct and important. Exploiting undefined behavior also simplifies the task of creating target-independent optimizers. -Hal >...
2015 Jun 26
3
[LLVMdev] C as used/implemented in practice: analysis of responses
As part of a project to clarify what behaviour of C implementations is actually relied upon in modern practice, and what behaviour is guaranteed by current mainstream implementations, we recently distributed a survey of 15 questions about C, https://goo.gl/AZXH3S. We were asking what C is in current mainstream practice: the behaviour that programmers assume they can rely on, the behaviour
2015 Jul 01
2
[LLVMdev] C as used/implemented in practice: analysis of responses
...s static analyzer would report in an intelligible way on all such situations. Unfortunately this is a really hard problem. -- Sean Silva > > thanks, > Peter > > > >> > >> This is obviously sort of a twisted logic, and I think that a lot of > >> the "malevolence" attributed to compilers is due to this. It > >> certainly removes many target-dependent checks from the mid-level > >> optimizer though. > >> > > > > This point is correct and important. Exploiting undefined behavior also > simplifies the task of crea...
2014 Oct 03
2
CentOS-docs Digest, Vol 95, Issue 2
On 10/03/2014 12:11 AM, centos-docs-request at centos.org wrote: > Send CentOS-docs mailing list submissions to > centos-docs at centos.org > > To subscribe or unsubscribe via the World Wide Web, visit > http://lists.centos.org/mailman/listinfo/centos-docs > or, via email, send a message with subject or body 'help' to > centos-docs-request at centos.org > >
2009 Jan 16
16
Testing arbitrary post action parameters
I am working on our (newly renamed) authentication feature. The current scenario is: Scenario: Non-administrators should not set administrator ability Given I have no users And I add a user named "admin" as an administrator And I add a user named "myuser" as not an administrator When the user named "myuser" authenticates And the user
2000 Feb 02
0
Factor Analysis?
Hello. I have been browsing the R- manual and not seen any direct implementation of Factor analysis. Is there anyone out there who has run Factor Analysis with R? Thanks Michael -- Michael Preminger Forsker / Research Scientist Avdeling for journalistikk, bibliotek- og informasjonsfag / Faculty of Journalism, Library and Information Science H?gskolen i Oslo / Oslo College