Displaying 6 results from an estimated 6 matches for "oooohhh".
2005 May 09
3
ANNOUNCEMENT : AreskiCC V2.2 - Asterisk CallingCard Application
Dear All,
Here the version 2.2 a new version of your dear CallingCard Software !!!
http://www.areski.net/areskicc-doc-v2/
Many new features have been added and several enhancements made!
Newest features :
- A new re-build rate-engine
- LCR & LCD management (OOOOHHH YESSSSS)
- Billing Increment
- Progressive Rate
- Scheduled Rates (days of the weeks)
- Expiration rates
- Buy rates configuration
- importation ratecard from csv file
- Simultaneous access for same card
- SIP/IAX Friends Management
- Generate conf file for SIP/IAX Friends
- Reload Asteri...
2011 Sep 13
0
[LLVMdev] Strategy for leveraging llvm optimizations in vm
On 9/13/11 9:22 AM, Michael Clagett wrote:
> Oooohhh! That's interesting. Does the optimizer just work around
> these inline fragments? Is there documentation for this facility?
CC'ing the mailing list.
The inline assembly feature is described in the LLVM Language Reference
Manual (http://llvm.org/docs/LangRef.html). I'm not r...
2006 Mar 09
4
Stop users accessing methods.
Hello all.
Is there a way to stop users from being able to access a controllers
methods without affecting the ability of other controllers to use them?
i.e
FooController
def secret
#Stuff
end
end
BarController
def index
redirect_to :controller => ''foo'', action => ''secret'', :id => ''007''
end
end
But directly
2011 Sep 13
4
[LLVMdev] Strategy for leveraging llvm optimizations in vm
Hi --
I'm still very much a newbie with llvm, but am looking (hopefully) to use it to compile into native intel code a set of source that is a combination of byte codes for my own custom vm and intel code that has been coded in assembly language directly.
In an earlier exchange, I already discovered that llvm does not do any optimizations on intel assembly language code. This would be an
2010 Apr 10
21
What happens when unmirrored ZIL log device is removed ungracefully
...nd "zpool add" a new log device.
Next:
1. Created a pool, with unmirrored log device.
2. Started benchmark of sync writes, verified the log device getting
heavily used.
3. Yank out both power cords.
4. While the system is down, also remove the log device.
(OOoohhh, that''s harsh.) I created a situation where an unmirrored log
device is known to have unplayed records, there is an ungraceful shutdown,
*and* the device disappears. That''s the absolute worst case scenario
possible, other than the whole building burning down. Anyway, the system...
2013 May 24
5
Utility to scan for unpassworded SSH privkeys?
Hey all,
Let's make an assumption:
1) I am a root user on a system.
2) I don't want said system being used as a jumping-off point if either a
user account or the root account is compromised.
Given an unencrypted private key, plus a known_hosts file, plus
bash_history, it's a pretty easy avenue of attack once you're in the front
door. And it's happened before*.
Thus,