Displaying 5 results from an estimated 5 matches for "nakada".
2006 Sep 23
8
svn problems
I can consistently segfault the 0.10.4 gem, so I''m trying to get the
subversion version working with hopes towards tracking the problem down.
I have a fresh SVN checkout but:
a) the version (in ferret.rb) claims to be 0.9.6; and
b) Ferret::Index::FieldInfos and a couple other classes are missing at
run time. It looks like this is because they''re not exported in the C
2004 Nov 11
3
File.nopen alpha
Hi all,
I''ve committed an alpha version of File.nopen (native open) to
win32-file. This is a wrapper for CreateFile(). A quick synopsis:
* File.nopen(file,access_mode,share_mode,creation_mode,flags)
*
* A ''native'' open method. This uses CreateFile() behind the scenes
instead of
* the _open() function. This allows much greater flexibility when it
comes
* to
2006 Jun 09
0
Ruby-GetText-Package-1.6.0
...n''t need to call bindtextdomain in each files.
# A textdomain belong to a file in previous version.
# And a message is looked up in the file which called
# GetText functions only.
Thanks to:
babie, charlie, Nobuhiro IMAI, Hiroyuki Iwatsuki, Yingfeng,
Marco Lazzeri, Nobu Nakada, Gudao Luo, markus koller,
and others.
Website
-------
http://rubyforge.org/projects/gettext/
* Download
http://rubyforge.org/frs/?group_id=855&release_id=2856
* Ruby-GetText-Package HOWTOs
http://www.yotabanana.com/hiki/ruby-gettext-howto.html
* Ruby-GetText-Package HOWTO for Ruby on R...
2006 Jun 18
7
[Fwd: Ruby Win32-Service]
Thoughts?
Dan
-------------- next part --------------
An embedded message was scrubbed...
From: "Patrick Hurley" <phurley at gmail.com>
Subject: Ruby Win32-Service
Date: Sun, 18 Jun 2006 12:46:01 -0400
Size: 2863
Url: http://rubyforge.org/pipermail/win32utils-devel/attachments/20060618/cc346796/attachment.eml
2011 Oct 11
18
WineHQ database compromise
Hi,
I am sad to say that there was a compromise of the WineHQ database system.
What we know at this point that someone was able to obtain unauthorized
access to the phpmyadmin utility. We do not exactly how they obtained
access; it was either by compromising an admins credentials, or by
exploiting an unpatched vulnerability in phpmyadmin.
We had reluctantly provided access to phpmyadmin to the