Displaying 20 results from an estimated 78 matches for "monadic".
Did you mean:
monad
2006 Apr 03
1
Microsoft Monad Shell
Not sure if this has application for R but Microsoft's new Monad shell
is now in public beta. I have not looked at it myself but I wonder
if the tools that are required to create Windows R packages
could be replaced by this?
----
The Monad team has recently released Monad Beta 3.1 to Microsoft Download
Center and we're working diligently towards a release of Monad 1.0! As
adoption of
1999 Nov 10
0
Re: undocumented bugs - nfsd
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote:
> After reading lcamtuf's posts I decided write this one. Few months ago one
> of my friends - digit - found bug in linux nfsd daemon. I made example
> sploit about IV 1999. Now in distributions is new nfsd and nowhere was
> information about security weaknes of old version!
Well, one gets used to people
1999 Aug 26
2
[RHSA-1999:030-01] Buffer overflow in cron daemon
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in cron daemon
Advisory ID: RHSA-1999:030-01
Issue date: 1999-08-25
Updated on:
Keywords: vixie-cron crond MAILTO
Cross references:
---------------------------------------------------------------------
1. Topic:
A buffer overflow exists in crond, the cron
2010 Dec 12
1
R <-> Haskell
I'd like to develop, if there is not one already, an interface between R
code and Haskell code, to allow R code to call Haskell (compiled) code, and
vice-versa. But in the interest of not reinventing the wheel, does anyone
on this list know of existing bindings for Haskell code?
There is support for loading plugins in Haskell, and for an eval() like set
of functions provided by the Haskell
2013 Jun 22
1
Bug#713349: xen-api-libs: FTBFS: ocamlfind: Package `type-conv' not found
Source: xen-api-libs
Version: 0.5.2-3
Severity: serious
Tags: jessie sid
User: debian-qa at lists.debian.org
Usertags: qa-ftbfs-20130620 qa-ftbfs
Justification: FTBFS on amd64
Hi,
During a rebuild of all packages in sid, your package failed to build on
amd64.
Relevant part:
> make[2]: Entering directory `/?PKGBUILDDIR?/stdext'
> ocamlfind ocamlc -I ../xml-light2 -I ../stdext -I
1996 Nov 19
0
Yet another attempt at /tmp spoof protection
-----BEGIN PGP SIGNED MESSAGE-----
Hi all,
Prompted by Mark''s discussion of the transname patch I''ve put together
an experimental patch to the Linux nfsd that supports something I''ve named
CDFs for lack of a more appropriate name. They''re not real CDFs, and in
particular, they won''t let you manage stuff like shared /etc directories
for diskless
1999 Nov 19
2
[RHSA-1999:055-01] Denial of service attack in syslogd
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Denial of service attack in syslogd
Advisory ID: RHSA-1999:055-01
Issue date: 1999-11-19
Updated on: 1999-11-19
Keywords: syslogd sysklogd stream socket
Cross references: bugtraq id #809
---------------------------------------------------------------------
1. Topic:
A
1998 Aug 28
0
Linux UNFSD Security Problems
I've got egg on my face... There is a nasty security hole in the
User-space NFS servers. If you are running an NFS server, please
upgrade as soon as possible to the latest release,
nfs-server-2.2beta35.tar.gz, which can be found at
ftp://linux.mathematik.tu-darmstadt.de/pub/linux/people/okir
All previous releases are vulnerable.
<Taking off his okir hat and putting on his caldera
1997 Sep 22
1
rwhod is naive
It seems that when you send rwhod an rwho packet, it blindly assumes
you are who the packet says you are. That is to say, it looks as if
any host can inject false rwho data for any other host.
I''m not convinced this is worth fixing. Opinions?
--
- David A. Holland | VINO project home page:
dholland@eecs.harvard.edu | http://www.eecs.harvard.edu/vino
1997 Feb 13
0
Avoiding setuid applications
Hi there,
some of the recent holes discussed on this list, and David Holland''s
suggestion for a utmp manager daemon got me thinking. I ended up coding
a sample program that demonstrates how a `resource manager'' can be used
to allow applications access to certain resources while not giving them
any privileges.
The sample program is a primitve modem manager that hands out open
2013 Dec 02
6
Bug#731166: Error: Syntax error: 'end' expected
Package: xen-api-libs
I cannot backport xen-api-libs to an oldstable system. It fails with:
$ dpkg-buildpackage -rfakeroot -us -uc
dpkg-buildpackage: source package xen-api-libs
dpkg-buildpackage: source version 0.5.2-3.1
dpkg-buildpackage: source changed by St?phane Glondu <glondu at debian.org>
dpkg-buildpackage: host architecture amd64
dpkg-source --before-build xen-api-libs-0.5.2
1997 Jul 22
0
ld.so vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
ld.so Vulnerability
A buffer overflow problem was reported on bugtraq affecting the
ELF and a.out program loaders on Linux. This problem can possibly be
exploited by malicious users to obtain root access.
On Linux, programs linked against shared libraries execute some code
contained in /lib/ld.so (for a.out binaries) or /lib/ld-linux.so (for
ELF
1998 Oct 14
0
The poisoned NUL byte
Summary: you can exploit a single-byte buffer overrun to gain root privs.
When, half a day after releasing version 2.2beta37 of the Linux nfs server,
I received a message from Larry Doolittle telling me that it was still
vulnerable to the root exploit posted to bugtraq, I was ready to quit
hacking and start as a carpenter...
Tempting as that was, I didn''t, and started looking for the
2012 Apr 26
2
What's the different between XAPI and Xenopsd ?
Hi everyone,
I have some question about the Xenopsd.
I’ve read the wiki document but cannot understand where to use it,
Is this different with XAPI ? What’s the main work for?
Can anyone describe it more clearly about it?
Thanks a lot!!
_______________________________________________
Xen-users mailing list
Xen-users@lists.xen.org
http://lists.xen.org/xen-users
2000 May 31
1
[RHSA-2000:005-05] New majordomo packages available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New majordomo packages available
Advisory ID: RHSA-2000:005-05
Issue date: 2000-01-20
Updated on: 2000-05-31
Product: Red Hat Powertools
Keywords: majordomo
Cross references: N/A
2017 Jun 02
2
NFS mount on Centos 7 crashing
On 2/6/2017 10:40 ??, Philippe BOURDEU d'AGUERRE wrote:
> Reverting to rpcbind-0.2.0-38.el7 solves the problem for me
Thank you very much Philippe,
I notice that I have upgraded to rpcbind-0.2.0-38.el7_3.x86_64 on May 26.
Have you checked if this bug/behavior has been reported or should we
file a bug report?
Nick
1999 Nov 10
0
[RHSA-1999:053-01] new NFS server pacakges available (5.2, 4.2)
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: new NFS server packages available (5.2, 4.2)
Advisory ID: RHSA-1999:053-01
Issue date: 1999-11-11
Updated on: 1999-11-11
Keywords: nfs-server PATH_MAX NAME_MAX rpc.nfsd
Cross references: Bugtraq id #782
---------------------------------------------------------------------
1.
2017 Sep 22
2
NFS mount on Centos 7 crashing
On 2/6/2017 1:46 ??, Nikolaos Milas wrote:
> After a bit of search, I found the associated reports:
>
> https://bugs.centos.org/view.php?id=13351
> https://bugzilla.redhat.com/show_bug.cgi?id=1454876
>
> No solution yet, but -as a workaround- it seems that -at least- nfs
> problems are indeed solved with downgrading.
I have been working fine with CentOS 7.3, since I
1997 Oct 20
1
LPRng security
Hi all,
I just looked into LPRng to see to what extent it is affected by the
problems recently reported for the BSD lpd. It seems that it is fairly
safe from those mentioned in the SNI advisory.
> Problem 1: File creation
>
> Individuals with access to the line printer daemon from a privileged
> port on a valid print client can tell lpd to create a file, providing
> the name of
2008 Jul 17
0
[LLVMdev] SSA or not SSA?
On Thu, Jul 17, 2008 at 6:34 AM, Matthieu Moy <Matthieu.Moy at imag.fr> wrote:
> Patrick Meredith <pmeredit at uiuc.edu> writes:
>
>> Memory is what the i32* points too. The i32* itself is in a
>> register. You can store to it as many times as you want, but you
>> can't change the address, because that would violate SSA.
>
> Thanks,
>
> For the