search for: mistress

Displaying 20 results from an estimated 28 matches for "mistress".

Did you mean: distress
2020 Jan 13
3
Adding SNI support to SSH
...gert -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress Gert Doering - Munich, Germany gert at greenie.muc.de -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 3614 bytes Desc: not available URL: <http://lists.mindrot.org/pipermail/opens...
2019 Jan 24
2
sftp Vs scp
...gert -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress Gert Doering - Munich, Germany gert at greenie.muc.de
2023 Feb 20
1
fseek/fgetc puzzle
Darren Tucker wrote in <CALDDTe39k4UFJWBvts5HWbbhHO+Vw9OAP0zBhu-Hje-2aR9+xA at mail.gmail.com>: J?rg Schilling convinced me in 2017 Readd removed fflush()/fseek() in between read and write.. The behave:record_a_resend-2 test failed on Solaris 5.10 and 5.11, messages in *record* where separated by four \n / U+000A instead of two. It turns out that the effective sequence
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
For many years I've been running ssh reverse tunnels on portable Linux, OpenWRT, Android etc. hosts so they can be accessed from a server whose IP is stable (I call such a server a "nexus host"). Increasingly there's a problem with brute force attacks on the nexus host's tunnel ports. The attack is forwarded to the portable tunneling host, where it fails, but it chews up
2005 Jan 14
0
Re: Grandstream Bugetone 101 & mw
...e said: >> Haha....well the MWI is the blinking blue LCD. The message button >> is "reserved for future use" Hang in there. There will soon to be some >No the message button call the number you configure in the web >interface. Presumably voicemail, but could be your mistress. Then it's easy to get voicemail checking to work... Thanks! Aldo
2011 Mar 06
1
installing 32 bit wine on 64 bit computer help
Hi, I'm following the below instructions to install 32bit wine in 64bit fedora, and don't know in which folder I need to run the ./configure command. The yum install part went fine as far as I know, but I need to find where the configure script is located. Thanks //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
2019 Feb 23
3
Possible bug: SSH doesn't prefer host keys listed in SSHFP records while connecting.
Well, known_hosts isn't exactly trusted input, since it's usually composed of the keys you first encounter, without any additional checking, as opposed to (hopefully) correctly signed SSHFP records. On Sat, Feb 23, 2019 at 10:22 PM Peter Stuge <peter at stuge.se> wrote: > > Yegor Ievlev wrote: > > > I think it's a very bad idea to have the client start treating
2018 Jul 06
2
Does anyone use UsePrivilegedPort=yes or setuid ssh(1) ?
On 6 July 2018 at 17:24, Gert Doering <gert at greenie.muc.de>wrote: [...] > I think we have one customer connection where their firewall admin > thinks "it is more secure that way" - read, we can't ssh in if we come > from high ports. > > OTOH, thanks for the pointer with ProxyCommand - it's a very specific > niche problem with a viable workaround, so I
2018 Jul 06
2
Does anyone use UsePrivilegedPort=yes or setuid ssh(1) ?
Hi. Does anyone use UsePrivilegedPort or have ssh(1) setuid, and if so for what use case? ssh(1) has had code in it to support installing setuid root since approximately forever, however OpenBSD has not shipped it in that configuration since 2002 (and I suspect these days no vendor does). As far as I can tell, all of the reasons for this no longer apply: - setuid root was needed to bind to a
2011 Mar 06
3
Help ! Need to run IE on 64 bit machine
Hi Everyone, I don't know what the hell I am doing and would appreciate some explicit instructions please. I have fedora 14 installed on a 64 bit laptop and want to run any version of internet explorer so I can access to some websites that won't work in firefox or google chrome. I just installed wine today by typing "yum install wine", and downloaded IE 8 for 32 bit XP and
2005 Aug 04
1
some thoughts on outlier detection, need help!
Dear listers: I have an idea to do the outlier detection and I need to use R to implement it first. Here I hope I can get some input from all the guru's here. I select distance-based approach--- step 1: calculate the distance of any two rows for a dataframe. considering the scaling among different variables, I choose mahalanobis, using variance as scaler. step 2: Let k be the number of
2019 Feb 20
4
[Bug 2971] New: Prevent OpenSSH from advertising its version number
On 02/20/2019 07:51 AM, Mark D. Baushke wrote: > There are too just many cases where both OpenSSH interoperating with > itself as well as other SSH implementations have needed this version > number to properly deal with bugs in the code via negitations. FWIW, and without dismissing the possibility of fingerprinting a server in other ways, the fact that clients that *can* pass
2020 Apr 03
0
C8 and backup solution
...ist of modified files to rsync using the "--files-from" > option so it doesn't have to walk the entire tree again. > > Good luck! > > -- > Karl Vogel / vogelke at pobox.com / I don't speak for the USAF or my company > > The best setup is having a wife and a mistress. Each of them will assume > you're with the other, leaving you free to get some work done. > --programmer with serious work-life balance issues Hi Karl, thank you for your answer. I'm trying ssh scripted rsync using a faster cypher like you suggested and seems that transfer on 10GB...
2020 Jan 11
3
Why are the arguments supplied for the command run through ssh interpreted by shell before they are passed to the command on the server side?
I do think it's a problem that, as far as I can see, the exact behaviour of ssh command interpretation isn't explained anywhere in its man pages, even though it seems like the only possibility if you understand the protocol. ssh(1) just says "If command is specified, it is executed on the remote host instead of a login shell", but that doesn't provide any hint about what
2020 Jan 13
3
Adding SNI support to SSH
Ciao Luca, Luca Filipozzi <lfilipoz at emyr.net> writes: >> [ ... ] > Neat. I do something similar: in order to circumvent obnoxious airport / > coffee shop firewalls that block non-HTTPS traffic, I configured haproxy > to offer 'SSH over HTTPS'. haproxy terminates the HTTPS connection > (which is SNI-aware) while sshd on the target machine terminates the >
2012 Feb 02
4
an unusual use for R
I thought some of you might be amused by this. In my non-work time, I'm an avid weaver and teacher of weaving. I'm working on a project involving creating many detailed weaving patterns, so I wrote R code to automate it. Details here: http://stringpage.com/blog/?p=822 If the overlap between R users and avid tablet weavers turns out to be >> 1, I'll polish it up and turn it
2020 Jun 16
2
Deprecation of scp protocol and improving sftp client
scp may be an ugly protocol, but it works, works nicely from a command line, and is quite convenient. FTP (and, presumably, sftp) is not nearly as convenient. Why do you think your recommendation to "use sftp instead" keeps falling on the deaf ear? Usability, perhaps? Perhaps it's time to stop preaching to people about what they should use, but instead - if you really want a change
2019 Jan 24
3
sftp Vs scp
I almost never use bare 'scp' or 'sftp' anymore; I start with either 'rsync' or, if 'rsync' is not present and not installable on one end or the other, the "tar-over-bare-ssh" approach: ``` tar cf - localpath | ssh remote.host 'cd remotepath && tar xvf -' ``` I'd be in favor of one of the following: 1. 'scp' goes away, and
2006 Jan 02
4
Bookmarking a page inside r-project.org
By way of review, most large Web sites allow the user to create *bookmarks* which link to pages inside the Web site. However, here, the pages have one of just two URL's: http://www.r-project.org and http://cran.r-project.org The reason is the way HTML *frames* are used in setup of the Web site. It would be very helpful if the Web site were revised so that many if not most pages had
2009 Apr 03
4
Bug in yum Logwatch reporting
I've been noticing yum updates on several servers I manage over the last few weeks, which I know I didn't perform and could not explain until this morning. At first I suspect a break-in, but found no other evidence or reason an intruder would run the yum updates I was viewing. Yum updates are logged in /var/log/yum.log, which is what Logwatch scans. Seems that the format of the log