search for: nakada

Displaying 5 results from an estimated 5 matches for "nakada".

2006 Sep 23
8
svn problems
I can consistently segfault the 0.10.4 gem, so I''m trying to get the subversion version working with hopes towards tracking the problem down. I have a fresh SVN checkout but: a) the version (in ferret.rb) claims to be 0.9.6; and b) Ferret::Index::FieldInfos and a couple other classes are missing at run time. It looks like this is because they''re not exported in the C
2004 Nov 11
3
File.nopen alpha
Hi all, I''ve committed an alpha version of File.nopen (native open) to win32-file. This is a wrapper for CreateFile(). A quick synopsis: * File.nopen(file,access_mode,share_mode,creation_mode,flags) * * A ''native'' open method. This uses CreateFile() behind the scenes instead of * the _open() function. This allows much greater flexibility when it comes * to
2006 Jun 09
0
Ruby-GetText-Package-1.6.0
...n''t need to call bindtextdomain in each files. # A textdomain belong to a file in previous version. # And a message is looked up in the file which called # GetText functions only. Thanks to: babie, charlie, Nobuhiro IMAI, Hiroyuki Iwatsuki, Yingfeng, Marco Lazzeri, Nobu Nakada, Gudao Luo, markus koller, and others. Website ------- http://rubyforge.org/projects/gettext/ * Download http://rubyforge.org/frs/?group_id=855&release_id=2856 * Ruby-GetText-Package HOWTOs http://www.yotabanana.com/hiki/ruby-gettext-howto.html * Ruby-GetText-Package HOWTO for Ruby on R...
2006 Jun 18
7
[Fwd: Ruby Win32-Service]
Thoughts? Dan -------------- next part -------------- An embedded message was scrubbed... From: "Patrick Hurley" <phurley at gmail.com> Subject: Ruby Win32-Service Date: Sun, 18 Jun 2006 12:46:01 -0400 Size: 2863 Url: http://rubyforge.org/pipermail/win32utils-devel/attachments/20060618/cc346796/attachment.eml
2011 Oct 11
18
WineHQ database compromise
Hi, I am sad to say that there was a compromise of the WineHQ database system. What we know at this point that someone was able to obtain unauthorized access to the phpmyadmin utility. We do not exactly how they obtained access; it was either by compromising an admins credentials, or by exploiting an unpatched vulnerability in phpmyadmin. We had reluctantly provided access to phpmyadmin to the