search for: mischief

Displaying 20 results from an estimated 45 matches for "mischief".

2009 Apr 17
0
Mischief on legend when size=1 added to geom_line
...= Group),size=1) + theme_bw() Felipe D. Carrillo Supervisory Fishery Biologist Department of the Interior US Fish & Wildlife Service California, USA --- On Fri, 4/17/09, Arthur Burke <burkea at nwrel.org> wrote: > From: Arthur Burke <burkea at nwrel.org> > Subject: Mischief on legend when size=1 added to geom_line > To: ggplot2 at googlegroups.com > Date: Friday, April 17, 2009, 3:11 PM > I have a data frame consisting of a group ID, year, and > percent of > students proficient on a state test. > > df1 <- > > Group Year PctProf...
2014 Jan 09
2
NUT clients - merits of authenticating
...has only one entry: -- [monuser] password = superdupersecret upsmon master -- Is this a security issue if the password is well known ? Searching the mailing list I only found the comment: "All a upsmon slave can do, is delay shutting down for a handful of seconds." ... seems like limited mischief. Any guidance is appreciated. Lonnie
2009 Feb 03
7
The Origins of R
In another thread on this list, various wild allegations have been made, relating to the New York Times article on R. I object both to the subject line and to the content of several of the messages, and will not repeat or quote any of that content. It smacks to me of mischief making. Discussion has centered around the following quote from the NY Times article: ?According to them, the notion of devising something like R sprang up during a hallway conversation. They both wanted technology better suited for their statistics students, who needed to analyze data and...
2014 Jan 11
0
NUT clients - merits of authenticating
...ing clients ? I honestly don't know. Having not written the original code, I see authentication for slave mode as something that is easier to leave in than take out, given that authentication is a little more relevant for the master connections. Also, as you point out below, it does limit the mischief a bit. > On the flip side, since commercial products like NAS drive implementations use fixed, well known user/pass credentials, all clients would need to be configured with such well known credentials if they were all to authenticate with a common user. Why do they need well-known credentials...
2013 Mar 07
1
tracking user activity - Active Directory
Hello, Some mischief happened and I have been asked if I can find out who was logged into their computers within a specific off-hours time frame. My logs for that time frame happened to be running at debug level 3, so I have been looking through them and trying to figure out how to recognize a workstation login. I fi...
2018 Feb 28
2
Wide links and insecure wide links
...;t well distinguished/clarified. *insecure* wide links is much more clear, although the detail you've given helps a lot. What exactly is the "ordinary" "wide links = yes" option going to do (with or without Unix extensions), and how does it compare/how much exposure to mischief does it expose? On 28 February 2018 18:20:02 Jeremy Allison <jra at samba.org> wrote: > On Wed, Feb 28, 2018 at 01:39:09PM +0000, Stilez via samba wrote: >> I'd like to understand reasonably fully,, the difference between the two >> options "wide links" and &qu...
2003 Jan 06
3
ownership permissions on files replaced via scp -- bug or feature?
...e here unless for instance, the -p flag is used, and the user is capable of setting permissions on the resulting file to match the source file. Is this also potentially a security hole? A malicious user with the ability to write to a file might be able to upload a trojaned binary here or some such mischief. -- Jeffrey Layton <Jeff.Layton at bellhowell.com> Bell & Howell MMT -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://lists.mindrot...
2004 Sep 10
3
[Flac-users] Fingerprint Verification Problem
--- "Paino, Christopher L YN1(AW) (CPF N0084)" <PainoCL@cpf.navy.mil> wrote: > If I am understanding FLAC correctly, the internal MD5 sum is (or can > be > )different than the fingerprint file sum. Yes. > The internal sum can be > different > depending on which compression settings are used, while the audio > remains > unchanged. It's the other way
2006 Jan 19
4
Can the session be trusted for Username/password?
I understand that a session is server side, and not externally visible. For this reason can it be used to store a User class (username/ hashed password) safely? Or do I need to check whats in the session against the user table every time I access a controller? Many thanks, P. -- Posted via http://www.ruby-forum.com/.
2016 May 06
4
Resuming the discussion of establishing an LLVM code of conduct
> -----Original Message----- > From: llvm-dev [mailto:llvm-dev-bounces at lists.llvm.org] On Behalf Of Chris > Lattner via llvm-dev > Sent: Thursday, May 05, 2016 4:36 PM > To: Renato Golin > Cc: llvm-dev > Subject: Re: [llvm-dev] Resuming the discussion of establishing an LLVM > code of conduct > > On May 5, 2016, at 4:02 PM, Renato Golin <renato.golin at
2015 Feb 11
0
Another Fedora decision
...was pwned in short order (and the user I was running as was not an administrator equivalent). I suspect that using Adobe Reader on CentOS could be just as dangerous (in terms of user data exfiltration and/or payload delivery for crypto-ransomware). Privilege escalation is not required for much mischief to be done. Random PDFs are and continue to be malware vectors.
2017 Jan 16
0
Remove empty milder folders
...esearch on how to combine those two awk pipes > but this worked, and it was fast. You can collapse all 3 downstream processes doveadm ... | awk '/messages=0$/{print "rm -rf ./" substr($1,9}' >list Needs shell escaping/sanitizing if you don't want to be the victim of mischief (e.g. maildir='X;cd ..;rm -rf *'). Joseph Tam <jtam.home at gmail.com>
2004 Sep 10
0
[Flac-users] Re: Fingerprint Verification Problem
...thing to be concerned about. However, if the recipient's FLAC files pass flac -t but the fingerprints don't match those on the seeder's site, somebody along the way has changed the underlying WAV data. That's a two-edged sword: it stymies a malefactor from altering the WAVs out of mischief, but it also prevents a music lover from adjusting track marks, declicking, or degapping.
2004 Sep 10
1
[Flac-users] Re: Fingerprint Verification Problem
...ut. However, if the recipient's FLAC files pass flac -t but the > fingerprints don't match those on the seeder's site, somebody along > the way > has changed the underlying WAV data. That's a two-edged sword: it > stymies a > malefactor from altering the WAVs out of mischief, but it also > prevents a > music lover from adjusting track marks, declicking, or degapping. I thought once you change the audio it requires a new seed. Josh __________________________________________________ Do you Yahoo!? New DSL Internet Access from SBC & Yahoo! http://sbc.yahoo.c...
2001 Nov 01
1
preexec and netlogon scripts
...;s preexec script completing its output operations before the client gets its login batch file. I am a school network mamager with about 1000 teenage boy users of a new (to all of us) Linux-Samba server. (SuSE6.4 and Samba 2.0.10) I have pre- and post-exec working to record logon & logoff for mischief tracking, custom stats etc. I have logon scripts driven by filespace usage stats, time-of-day restrictions and 'rogues list' entries. These advise the user of the issues affecting their ability to log on, and enforce a client switch-off if necessary. I need to ensure that a user can only...
2008 Mar 29
1
Re: If you think getting Windows games working in Wine is hard .
...need any of the compatibility libraries. So there was binary compatibility there. I have had far far worse. Loki installers when they were new would do stupid things as having the application only able to run as root until you corrected permissions. So that being wrong was normal Loki. God of mischief was a good name for that companies installers. Most fun is not getting old linux binarys to work in Linux. Its getting like other Unix binaries to work in Linux. Yes doable but a nightmare in custom kernel modules.
1997 Jul 19
3
Security question
Given the following situation: I have 2 different home directories. If a user logs on to 'home directory 1', can that particular user browse into 'home directory 2' or other directories? The reason for this question is that I need a server on which can be accessed by the corporate staff and by the personel. However, the personel may not be able to gain acces to financial and
2018 Feb 28
2
Wide links and insecure wide links
I'd like to understand reasonably fully,, the difference between the two options "wide links" and "allow insecure wide links" in smb.conf. The docs make them sound very similar but as there are obvious security implications for anything to do with symlink scope, it's important to know what each of them allows/blocks and where they differ. Interestingly, only the
2004 Oct 29
0
Re: Trusting and trusted domain (home mapping) problem
...; concerns in this. >> > I always thought that people avoid posing their config files due to > liability problems (don't want their users to know that they have > problems) than due to security concerns.. But, I can be wrong and > probably this information could be used for mischief. But be warn that > smbd logs usually have more information than config files. > > It's fine with me if you don't want to post your config on the list as > long as you post the solution to your problem afterwards. :) > > Igor > > >
2006 Jan 30
3
handling NA by mean replacement
Hello I am sorry fuch such a stupid question. Suppose I have a table of data having a lot of NAs and I want to replace those NAs by the mean of the column before NA replacement. How is it possible to do that efficiently ? Thanks in advance, Julie -- Julie Bernauer Yeast Structural Genomics http://www.genomics.eu.org