Displaying 20 results from an estimated 1064 matches for "prot".
Did you mean:
port
2009 Sep 19
3
Replacing values in dataframes
...NAD:
> NAD[1:3,1:3]
Sample.Id Main.abs..1 Main.abs..2
148 10a 0.04836 0.04994
167 11a_1109 0.32245 0.36541
173 11b_1109 0.29293 0.32815
What I want to do is to replace the Sample.Id with a corresponding number.The number i have in another file,called Prot.amount
> Prot.amount[1:3,1]
10a 11a_1109 11b_1109
15.516 38.248 42.297
> row.names(NAD)<-(NAD[,1])
> NAD$Sample.Id <- replace(NAD$Sample.Id, NAD$Sample.Id=="10a",Prot.amount["10a",1])
> NAD[1:3,1:3]
Sample.Id Main.abs..1 Main.a...
2013 Jan 11
2
weird merge()
Hi,
I have some protein array data, each array in a separate text file. So I read them in and try to combine them into a single data frame by using merge(). see code below (If you download the attached data files into a specific folder, the code below should work):
fls<-list.files("C:\\folder_of_download"...
2004 Aug 05
9
Not able to access website
...atus. Was hoping to know what
logfile it is writing it to.
Thanks in advance,
Elmer
-=-=-=-=-=-=-=-=-=-
Shorewall-2.0.7 Status at hilo.webmerch.com - Wed Aug 4 18:10:30 PDT
2004
Counters reset Wed Aug 4 18:03:52 PDT 2004
Chain INPUT (policy DROP 4 packets, 1208 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
65 8740 eth0_in all -- eth0 * 0.0.0.0/0
0.0.0.0/0
1747 1...
2019 Jan 15
0
Cannot access other computers on LAN
...ngth 64
15:28:46.738332 IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id 1584,
seq 5, length 64
15:28:47.756378 IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id 1584,
seq 6, length 64
'iptables -L -vn' yields:
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
799 156K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
22 1592 INPUT_direct all -- * * 0.0.0.0/0
0.0.0.0/0
22 1592 INPUT...
2004 Sep 22
2
IPSEc versus Multipath routing
...od at IPTABLES, but shorewall makes it easy for me)
is it perhaps a routing issue that I may have missed?
I''ve come to this conclusion.
/etc/shorewall/tcrules
############################################################################
##
#MARK SOURCE DEST PROTO PORT(S) CLIENT USER
1 0.0.0.0/0 202.37.230.93 udp 500
2 0.0.0.0/0 203.96.213.101 udp 501
1 fw 0.0.0.0/0 udp 500
2 fw 0.0.0.0/0 udp 501
# POR...
2005 Feb 28
1
Mail server on DMZ
.../8 dev lo scope link
default via 213.58.230.49 dev eth1
[root@bassinka log]#
[root@bassinka log]#shorewall status
Shorewall-2.0.1 Chain at bassinka - Fri Feb 25 10:33:16 WET 2005
Counters reset Thu Feb 24 17:57:46 WET 2005
Chain INPUT (policy DROP 9 packets, 1024 bytes)
pkts bytes target prot opt in out source
destination
592 34399 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
299K 333M eth1_in all -- eth1 * 0.0.0.0/0
0.0.0.0/0
490K...
2016 Sep 15
1
Finalizer execution order question
Given an externalptr object 'pool' which protects an R object 'prot':
# SEXP prot = (a dynamically updated list with handles)
SEXP pool = R_MakeExternalPtr(p, R_NilValue, prot);
R_RegisterCFinalizerEx(pool, fin_pool, TRUE);
WRE explains that 'prot' remains in existence as long as 'pool' is
around. Does this als...
2005 Mar 07
10
DNS Name problem with mail server on LAN
.../8 dev lo scope link
default via 213.58.230.49 dev eth1
[root@bassinka log]#
[root@bassinka log]#shorewall status
Shorewall-2.0.1 Chain at bassinka - Fri Feb 25 10:33:16 WET 2005
Counters reset Thu Feb 24 17:57:46 WET 2005
Chain INPUT (policy DROP 9 packets, 1024 bytes)
pkts bytes target prot opt in out source
destination
592 34399 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
299K 333M eth1_in all -- eth1 * 0.0.0.0/0
0.0.0.0/0
490K...
2023 Jan 06
3
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
.....8bc01071474ab7 100644
--- a/arch/arm/mm/dma-mapping.c
+++ b/arch/arm/mm/dma-mapping.c
@@ -984,7 +984,8 @@ __iommu_create_mapping(struct device *dev, struct page **pages, size_t size,
len = (j - i) << PAGE_SHIFT;
ret = iommu_map(mapping->domain, iova, phys, len,
- __dma_info_to_prot(DMA_BIDIRECTIONAL, attrs));
+ __dma_info_to_prot(DMA_BIDIRECTIONAL, attrs),
+ GFP_KERNEL);
if (ret < 0)
goto fail;
iova += len;
@@ -1207,7 +1208,8 @@ static int __map_sg_chunk(struct device *dev, struct scatterlist *sg,
prot = __dma_info_to_prot(dir, attrs);
- ret = iommu...
2023 Jan 06
3
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
.....8bc01071474ab7 100644
--- a/arch/arm/mm/dma-mapping.c
+++ b/arch/arm/mm/dma-mapping.c
@@ -984,7 +984,8 @@ __iommu_create_mapping(struct device *dev, struct page **pages, size_t size,
len = (j - i) << PAGE_SHIFT;
ret = iommu_map(mapping->domain, iova, phys, len,
- __dma_info_to_prot(DMA_BIDIRECTIONAL, attrs));
+ __dma_info_to_prot(DMA_BIDIRECTIONAL, attrs),
+ GFP_KERNEL);
if (ret < 0)
goto fail;
iova += len;
@@ -1207,7 +1208,8 @@ static int __map_sg_chunk(struct device *dev, struct scatterlist *sg,
prot = __dma_info_to_prot(dir, attrs);
- ret = iommu...
2023 Jan 06
3
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
.....8bc01071474ab7 100644
--- a/arch/arm/mm/dma-mapping.c
+++ b/arch/arm/mm/dma-mapping.c
@@ -984,7 +984,8 @@ __iommu_create_mapping(struct device *dev, struct page **pages, size_t size,
len = (j - i) << PAGE_SHIFT;
ret = iommu_map(mapping->domain, iova, phys, len,
- __dma_info_to_prot(DMA_BIDIRECTIONAL, attrs));
+ __dma_info_to_prot(DMA_BIDIRECTIONAL, attrs),
+ GFP_KERNEL);
if (ret < 0)
goto fail;
iova += len;
@@ -1207,7 +1208,8 @@ static int __map_sg_chunk(struct device *dev, struct scatterlist *sg,
prot = __dma_info_to_prot(dir, attrs);
- ret = iommu...
2019 Jan 15
2
Cannot access other computers on LAN
Hello Julien,
Am Tue, 15 Jan 2019 09:30:23 +0100
schrieb Julien dupont <marcelvierzon at gmail.com>:
> In that case I see:
> IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id2135, seq1, length 64
> IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id2135, seq2, length 64
> IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id2135, seq3, length 64
>
> Packet goes
2003 Feb 25
0
Shorewall Setup.
Hello Tom and others on the list.
Tom - you might recall that the other day (night) I had problems with my
axip setup (protocol 93) and we made some changes to the policy, zones and
interfaces files. You added ''peers and tunl+''
Following that change nothing seemed to work. In fact you wanted to see
the shorewall status file, among other things.
Well - tonight, I carefully put things together and find...
2004 Sep 24
10
hopeless - smb over bridged firewall
Dear List!
I use a shorewall 2.0.8 on a Debian sarge system. I use a DSL connection
to the Internet (ppp0 - eth1 to the modem) and a bridge to the local
lan. The bridged config i''ve made with bridge.html from the shorewall
site. The Bridge is between local net and a openvpn tap device. This
works. I ccan make tunnels, and a can make a lot of things through the
firewall. I can get a list
2004 Nov 29
2
SFTP
...ields-svr00 shorewall]#
Matthew Hodgett
-------------- next part --------------
[H[2JShorewall-2.0.10 Status at shields-svr00.shields.shieldssecurity.com - Mon Nov 29 18:47:40 WIT 2004
Counters reset Mon Nov 29 18:19:40 WIT 2004
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
63 8700 eth0_in all -- eth0 * 0...
2003 Feb 27
3
Unknown commments in shorewall status.
...ort=1559 use=1
tcp 6 3 TIME_WAIT src=44.135.34.201 dst=44.135.85.30 sport=1557
dport=23 src=44.135.85.30 dst=44.135.34.201 sport=23 dport=1557 [ASSURED]
use=1
---
Ted Gervais
Coldbrook Nova Scotia
Canada B4R1A7
-------------- next part --------------
44.137.28.48 via 62.238.66.67 dev tunl0 proto static onlink
24.224.173.0/24 dev eth0 proto kernel scope link src 24.224.173.220
192.168.0.0/24 dev eth1 proto kernel scope link src 192.168.0.1
127.0.0.0/8 dev lo scope link
44.0.0.0/8 via 24.138.74.225 dev tunl0 proto static onlink
default via 24.224.173.1 dev eth0
--------------...
2007 Feb 03
1
Marks not working...
...en try to match that mark either in NAT OUTPUT or POSTROUTING
I don''t seem to get the expected result.
Any help or clue would be more than welcome.
root@droopy:~/firewall > iptables-view -t mangle
Chain PREROUTING (policy ACCEPT 33890 packets, 16M bytes) num pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 24751 packets, 12M bytes) num pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 9146 packets, 4557K bytes) num pkts bytes target prot opt in out source destination
Chain O...
2019 Jun 13
8
[PATCH v4 0/5] iommu/amd: Convert the AMD iommu driver to the dma-iommu api
Convert the AMD iommu driver to the dma-iommu api. Remove the iova
handling and reserve region code from the AMD iommu driver.
Change-log:
V4:
-Rebase on top of linux-next
-Split the removing of the unnecessary locking in the amd iommu driver into a seperate patch
-refactor the "iommu/dma-iommu: Handle deferred devices" patch and address comments
v3:
-rename dma_limit to dma_mask
-exit
2019 Jun 13
8
[PATCH v4 0/5] iommu/amd: Convert the AMD iommu driver to the dma-iommu api
Convert the AMD iommu driver to the dma-iommu api. Remove the iova
handling and reserve region code from the AMD iommu driver.
Change-log:
V4:
-Rebase on top of linux-next
-Split the removing of the unnecessary locking in the amd iommu driver into a seperate patch
-refactor the "iommu/dma-iommu: Handle deferred devices" patch and address comments
v3:
-rename dma_limit to dma_mask
-exit
2013 Jul 08
6
Getting nwfilter to work on Debian Wheezy
...ested in the documentation (
http://libvirt.org/formatnwfilter.html#nwfwriteexample ), *incoming*
ICMP works (but not outgoing), and inbound SSH traffic is blocked,
together with outbound DNS.
The linked rules produce the following iptables chains:
> Chain INPUT (policy ACCEPT)
> target prot opt source destination
> libvirt-host-in all -- 0.0.0.0/0 0.0.0.0/0
> ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
> ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
> ACCEPT udp --...