search for: stronger

Displaying 20 results from an estimated 1048 matches for "stronger".

Did you mean: stranger
2015 Feb 06
4
anthem details
On Fri, Feb 6, 2015 at 5:05 PM, John R Pierce <pierce at hogranch.com> wrote: > On 2/6/2015 7:19 AM, Always Learning wrote: >> >> stronger passwords for SQL > > > the hackers had the database administrators user account credentials, and > were coming in through the VPN via said credentials. I doubt stronger > passwords would have mattered. Hmmm, maybe a reasonable argument for the crypto-card type VPNs where the pass...
2016 May 30
2
Need stronger SRTP ciphers (256 bit)
Hi folks, At least several endpoints (soft phone and desk phones) are supporting various 256 bit ciphers for SRTP these days. I *believe* libsrtp has been updated to allow this, and that only the code in Asterisk has not been been updated to allow these stronger ciphers. Would anyone with the know-how be willing/able to submit a patch ? Thank you, Kevin Long
2012 Nov 21
1
Regression: standardized coefficients & CI
I run 9 WLS regressions in R, with 7 predictors each. What I want to do now is compare: (1) The strength of predictors within each model (assuming all predictors are significant). That is, I want to say whether x1 is stronger than x2, and also say whether it is significantly stronger. I compare strength by simply comparing standardized beta weights, correct? How do I compare if one predictor is significantly stronger than the others? I thought about comparing confidence intervals, but if I understand correctly the confi...
2015 Jun 12
2
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
On Fri 2015-06-12 01:52:54 -0400, Mark D. Baushke wrote: > I have communicated with Allen Roginsky on this topic and I have been given permission to post his response. > > In this message below, the 'vendor' was Darren Tucker's generated prime > that used a generator value of 5. > > -- Mark > > From: "Roginsky, Allen" <allen.roginsky at
2005 Mar 30
6
DHCPd Config
I've read a number of articles, googled the web for a few months and now attempting at turning my CentOS box into a gateway for the third time. Configured my dhcpd.conf and other related files and all seems to be working, I can have my M$ desktop leasing an ip address and all. The problem is when I want to go out to the internet I keep on getting the Request Timed out error. I'm pretty
2020 Apr 04
2
Permitted success/failure orderings for atomic compare_exchange
...>From the LLVM reference: "The success and failure ordering <https://llvm.org/docs/LangRef.html#ordering> arguments specify how this cmpxchg synchronizes with other atomic operations. Both ordering parameters must be at least monotonic , the ordering constraint on failure must be no stronger than that on success, and the failure ordering cannot be either release or acq_rel ." The way this operation is implemented in the standard library of the Rust programming language, the combination of release (success) and acquire (failure) is not permitted and will fail at runtime, the prev...
2015 Jun 02
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302 --- Comment #13 from Darren Tucker <dtucker at zip.com.au> --- (In reply to Christoph Anton Mitterer from comment #10) [...] > Even though an attacker cannot (AFAIU??) for a connection to > downgrade to the weaker groups, The server's DH-GEX exchange hash includes the DH group sizes it received from the client. If these are
2011 Mar 19
1
Failure - for a stronger be a comma, for the weak is ending.
Happiness, gladne around in your side. If you received from mother job, be warm hands, that's happiness; If you read the friends in the light of the letter, savour friendship, that's happiness; If you are sitting in a corner, silent music, while convenient, that is happiness. cheap clothing (http://www.ebuybus.com)
2007 Apr 02
1
Stronger security with BSD Firewall and Freeradius
I've seen that is possible to use switch port blocking with freeradius and cisco switches via 802.1X and EAP protocol. Here is more info: http://wiki.freeradius.org/FreeRADIUS_Active_Directory_Integration_HOWTO What if I don't have switch that supports 802.1X or I want that blocking is done by FreeBSD, not the switch. Because FreeBSD is the firewall or gateway to some networks. Is there
2016 Jul 25
2
Unable to execute ldapsearch on samba4 installed in Active Directory mode
...n a Centos 7.2 Linux. I also install phpldapadmin to connect to the domain with the Administrator distinguished name. >From phpldapadmin, i am able to connect as anonymous, but when i try to provide Administrator Distinguished name and password, authentication failed. I received this error : stronger authentication required (8) for user. I then try to use ldapsearch, but i still not success to have great result. $ldapsearch -xLLL -H ldap://localhost:389 -D "cn=Administrator,dc=HPRS,dc=local" -W -b "dc=lab,dc=local" after entering the password, it display the same message...
2015 May 26
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302 --- Comment #4 from Damien Miller <djm at mindrot.org> --- Comment on attachment 2630 --> https://bugzilla.mindrot.org/attachment.cgi?id=2630 Make the DH-GEX fallback group 4k bit. Where did this group come from? IMO it would be best to use one of the standard groups if we're picking another fixed one - logjam attacks aren't
2015 Feb 06
3
anthem details
...y machines, without exception and regardless of any resulting "hardship". I wonder why so-called Computer Experts continue to use third-party closed source software which secretly, and it always has, deposits information on the user's hard disk. Another Lesson to learn: *NO* Flash stronger passwords for SQL encrypt all the data that is not required for indexed searches. There is a war going-on out there and we are the targets ! -- Regards, Paul. England, EU. Je suis Charlie.
2015 Sep 08
2
UB and known bits
...ess? I remember Nuno and/or David Majnemer saying something about this but I don't have it handy. John %0:i32 = var %1:i32 = lshr %0, 1:i32 %2:i32 = addnw 1:i32, %1 infer %2 known from Souper: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx known from compiler: 0xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx llvm is stronger %0:i32 = var (000000000000000xxxxxxxxxxxxxxxxx) %1:i32 = and 65535:i32, %0 %2:i16 = var %3:i32 = zext %2 %4:i32 = mulnw %1, %3 infer %4 known from Souper: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx known from compiler: 0xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx llvm is stronger
2006 Aug 10
0
DHH''s Post on Ruby Talk -- Rails 1.1.6: Stronger fix, backports, and full disclosure
The cat is out of the bag, so here''s the full disclosure edition of the current security vulnerability. With Rails 1.1.0 through 1.1.5 (minus the short-lived 1.1.3), you can trigger the evaluation of Ruby code through the URL because of a bug in the routing code of Rails. This means that you can essentially take down a Rails process by starting something like /script/profiler, as the code
2015 Jul 29
2
Fedora change that will probably affect RHEL
...is about user authentication it is not at all meant or designed to provide immunity from malware. That we're trying to use it to prevent infections is more like putting ourselves into bubbles; and humans put into bubbles for this reason are called immune compromised. So this push to depend on stronger passwords just exposes how "immune compromised" we are in these dark ages of computer security. There are overwhelmingly worse side effects of password dependency than immunization. The very fact SSH PKA by default is even on the table in some discussions demonstrates the level of crap pa...
2013 Sep 26
2
[LLVMdev] on LLVM parser
Hi, Would like to know the parsing strategy used in LLVM - top-down, bottom-up, or any other? -- Rekha -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20130926/329f7027/attachment.html>
2013 Sep 26
0
[LLVMdev] on LLVM parser
...ist in that case. I think it's just recursive descent. C++ with traditional lr is a disaster. I don't think anybody is trying to make that work anymore. You need lots of left context for parsing C++ so LL is more natural. LR was a cheap way to get some left context and made it handle a stronger language class but if you guide your parsing using the symbol table, then LL is stronger and easier to understand.
2019 Feb 12
6
Using SHA256/512 for SQL based password
I have trying to find how to set the dovecot-sql.conf for using SHA256/512.? I am going to start clean with the stronger format, not migrate from the old MD5.? It seems all I need is: driver = mysql connect = host=/var/lib/mysql/mysql.sock dbname=postfix user=postfix password=$Postfix_Database_Password default_pass_scheme = SHAxxx-CRYPT # following should all be on one line. password_query = SELECT username as u...
2019 Mar 06
2
Re: [PATCH nbdkit] Add ssh plugin using libssh.
...or (including a pipe)? > +=head1 AUTHORS > + > +Richard W.M. Jones > + > +Parts derived from Pino Toscano’s qemu libssh driver. Is that a compatible license? Or I guess another way of wording it - what is the license of libssh itself? The resulting ssh plugin may already require a stronger license than what nbdkit proper allows, but the license of the .so plugin being stronger than the license of the .c files does not require the same level of care as when the license of one .c file prevents refactoring code out from there into a looser licensed .c file elsewhere. > +++ b/plugins...
2019 Feb 12
4
Using SHA256/512 for SQL based password
On 2/12/19 6:03 PM, Matthias Fechner via dovecot wrote: > Am 12.02.2019 um 17:05 schrieb Robert Moskowitz via dovecot: >> I have trying to find how to set the dovecot-sql.conf for using >> SHA256/512.? I am going to start clean with the stronger format, not >> migrate from the old MD5.? It seems all I need is: > you maybe would like to have a look to the hashing algo ARGON2I which is > currently recommended for new developments and deployments. Recommended by whom? Can you provide a link? And if I was adventurous about hashe...