Displaying 10 results from an estimated 10 matches for "totalitarianism".
2016 May 06
3
Resuming the discussion of establishing an LLVM code of conduct
On 6 May 2016 at 20:39, Lang Hames via llvm-dev <llvm-dev at lists.llvm.org> wrote:
> For what it's worth it's definitely the line that caused me the most
> concern. In the least charitable reading it could be seen as applying "LLVM
> community standards" to contributors' private lives, which would be a big
> departure from our current culture.
Indeed, a
2016 Mar 21
5
Need help with code generation
On 21 March 2016 at 17:20, James Molloy via llvm-dev
<llvm-dev at lists.llvm.org> wrote:
> Rafael,
>
> How can a high quality product crash by design? I understand the lack of
> structured error handling, and I understand asserting (which in release mode
> would be silent) on internal errors. But on an input? How can an application
> be taken seriously when crashes are
2008 Jul 28
3
Shell script - ping
hi,
how to write a scripts which launches 10 pings to different
destinations at execution of single shell scripts
please help me any ideas
regards,
Gopinath
2004 Jul 11
1
Cannot login to PDC after upgrade
...er.fsf.org | X against HTML mail
the most useful idiot | / \
----------------------------------------------------------
What difference does it make to the dead, the orphans,
and the homeless, whether the mad destruction is brought
under the name of totalitarianism or the holy name of
liberty and democracy?
--Gandhi
----------------------------------------------------------
gpg --keyserver keys.indymedia.org --recv-key F65A739E
----------------------------------------------------------
-------------- next part --------------
A non-text attachment was scr...
2008 Oct 21
3
CentOS 4.7 Server CD - update frontpage
Perhaps with the release of the CentOS 4.7 Server CD
the frontpage at www.centos.org could be updated to
reflect this new development rather than 4.4?
Here is the announcement for those who missed it
http://lists.centos.org/pipermail/centos-announce/2008-October/015328.html
Spike.
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam
2000 May 20
2
hmac format?
I was looking at the the way that ssh calculates an hmac, and I
noticed that the ordering is a little strange - it does hash(key+message).
Shouldn't this rather be hash(message+key)? In the former situation, it
could be possible for an attacker to append something to the end of the
data being sent. The attacker would be able to calculate a valid hmac
without knowing the key. For instance,
2003 Apr 01
2
predict in Pspline package (PR#2714)
...rial University of Newfoundland Office: SN-2093
St. John's, NL, A1B 3X9 phone: (709) 737-3239
CANADA fax: (709) 737-3018
What difference does it make to the dead, the orphans, and the
homeless, whether the mad destruction is brought under the name of
totalitarianism or the holy name of liberty and democracy? - Gandhi
2009 Jan 28
2
For Whom the Gaza Bell Tolls -- Part 1 and 2 -- Obamas Mideast Jewish Wet Dream Team
For Whom the Gaza Bell Tolls -- Part 1
By Edmund Connelly for The Occidental Observer
January 16, 2008
?The Israelis can kill whomever they want whenever they want.?
--Paul Craig Roberts
I sometimes think that it?s pointless for Americans to talk much about recent events in Gaza because we know how it will play out ? America will do absolutely nothing to interfere with the
ongoing massacre.
2009 Jan 28
2
For Whom the Gaza Bell Tolls -- Part 1 and 2 -- Obamas Mideast Jewish Wet Dream Team
For Whom the Gaza Bell Tolls -- Part 1
By Edmund Connelly for The Occidental Observer
January 16, 2008
?The Israelis can kill whomever they want whenever they want.?
--Paul Craig Roberts
I sometimes think that it?s pointless for Americans to talk much about recent events in Gaza because we know how it will play out ? America will do absolutely nothing to interfere with the
ongoing massacre.
2003 Sep 24
4
unified authentication
Howdy list,
Sorry if this is a frequently discussed topic,
or an off-topic question, but I couldn't find much
info about my question by performing quick searches
in the archives, and my question is pretty tightly
related to security...
Background:
===========
I have a number of FreeBSD machines. Most are 4.x,
but a few are 5.x (mainly the testing/devel machines).
I also have a single Red