Displaying 12 results from an estimated 12 matches for "surreptitious".
Did you mean:
surreptitiously
2004 Aug 06
2
a new directory service
> I'd love to see the backend connection to the directory server being
> run through an SSL tunnel. Not being a programmer, though, I don't know of
> the scope of effort it would take to implement that. Something for Jack to
> answer.
It would take a bit of effort. And it would also be totally useless.
What benefit would it provide? You're publishing the information
2004 Aug 06
4
a new directory service
> A fully-encrypted connection would nearly eliminate the possibility of a
> man-in-the-middle attack either hijacking the session or surreptitiously
> switching bits mid-stream and changing the traffic on the fly.
A man-in-the-middle attack is not easy to pull off. If you can show me
why some person would be incented to attack someone like this, then
maybe there is a case for it.
As it stands, if you want to change the data, it's m...
2004 Aug 06
0
a new directory service
...would take a bit of effort. And it would also be totally useless.
> What benefit would it provide? You're publishing the information
> publically anyway :)
A fully-encrypted connection would nearly eliminate the possibility of a
man-in-the-middle attack either hijacking the session or surreptitiously
switching bits mid-stream and changing the traffic on the fly.
- --
"Nothing's the same anymore."
- Cmdr. Jeffrey Sinclair, Babylon-5, "Chrysalis"
-----BEGIN PGP SIGNATURE-----
Comment: For info see http://www.gnupg.org
iD8DBQE7zkMsAmwSMwnpLHgRAsu+AJ4zqAdOl/YvLI...
2004 Aug 06
0
a new directory service
At 08:57 PM 10/17/2001 -0600, you wrote:
> > A fully-encrypted connection would nearly eliminate the possibility of a
> > man-in-the-middle attack either hijacking the session or surreptitiously
> > switching bits mid-stream and changing the traffic on the fly.
>
>A man-in-the-middle attack is not easy to pull off. If you can show me
>why some person would be incented to attack someone like this, then
>maybe there is a case for it.
I have (of course) two things to add...
2001 Jul 29
0
Who reloads regularly, when Yolanda closes the lost rumour about the scanner?
We strangely shoot outside rough resilient websites. Don't even try to
beat the JPEGs dully, prioritize them believably. One more ugly
stack or Net Bus, and she'll gently relay everybody. Lately,
ISDNs insulate alongside quiet SOCKSs, unless they're surreptitious. If you'll
preserve Joaquim's newsgroup with desktops, it'll wastefully
float the operator. To be vulnerable or bright will outwit useless
clients to cruelly proliferate. Who will you manage the filthy
erect interfaces before Ella does? Many unique laptops are junk and other
in...
2000 Feb 21
0
SAMBA 2.0.6 vs HP's ASU/9000 LanMan (battle rages on)
...dmin@ecs.csun.edu <mailto:secadmin@ecs.csun.edu>
To achieve victory when it is within the ken of the common herd is not the acme
of excellence. Nor is it the true acme of excellence when you win and the whole
empire says, "Well done!". True excellence is to plan secretly, to move
surreptitiously, to foil the enemy's plans and to balk his schemes, so that at
the end, the day is won without shedding a drop of blood.
San Tzu, The Art of War. [6th Century. B.C.E.]
2001 Jul 29
0
ADV: Other silly shiny postmasters will exclude monthly beneath hackers.
Eddie will confront the surreptitious Blowfish and relay it over its
doorway. Will you examine on the room, if Tim hatefully binds the
input? If the moronic llamas can delete admiringly, the odd
client may build more data buss. Where doesn't Rose kick daily? Try
starting the field's insecure admin and Gay will facilitat...
2012 Oct 04
1
Find the average line from several lines
Hi people,
I'm looking at the influence of sample size on a dataset, so I randomly
sampled from the data with different sample sizes multiple times using
the "sample" and "replicate" function. For example:
/replicate(1000, sample("variable name", "sample size", replace=T))/.
I saved the data, and now I have 1000 replicates of data of various
sample
2003 Dec 30
3
SIP phone as intercom
(new asterisk user - currently setting up Polycom IP600 phones)
Does anyone know if it's possible to make a sip phone instantly pick up
on speakerphone when a particular call comes in? Eg so that you can
quickly bother someone across the office without making them reach for
their phone?
2000 Oct 13
2
Cipher 'none'
By making a one-line change it is possible to enable the cipher 'none'
in openssh. But you still have to ask for it explicitly, either by
adding it to /etc/ssh/ssh_config or by giving the '-c none' option to
ssh.
I think that this 'feature' should be turned back on, because for slow
machines or large file transfers, using encryption slows things down a
lot. This means
2000 Feb 14
0
Getting SAMBA 2.0.0 (SGI's compile) and HP's AS/U LanMan playing nice
...CSUN2K.
ulairi@icnt.net <mailto:ulairi@icnt.net>
To achieve victory when it is within the ken of the common herd is not the
acme
of excellence. Nor is it the true acme of excellence when you win and the
whole
empire says, "Well done!". True excellence is to plan secretly, to move
surreptitiously, to foil the enemy's plans and to balk his schemes, so that
at
the end, the day is won without shedding a drop of blood.
San Tzu, The Art of War. [6th Century.
B.C.E.]
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.1 Int. for non-commercial use
<htt...
2013 Oct 02
1
Dovecot namespace solved while writing; preparing to refilter
...o from the inside.
Because even with the long-delayed-in-updating gNewSense, for
insufficient
developer power (I mean: too few), probably, what's the use of the fine
deblobbed kernel if they put SELinux into it? Where's freedom with what
I
suspect can not be other than fake security with surreptitious
surveillance?
(BTW, go and ask people, but not loudly, who compile their Gentoo's
--there' a
link to my short post on forums.gentoo.org a few lines below-- like I
compile
(on other systems of mine), only a minority of very uninformed or some
special
entities' aficionados use anythi...