search for: totalitarianism

Displaying 10 results from an estimated 10 matches for "totalitarianism".

2016 May 06
3
Resuming the discussion of establishing an LLVM code of conduct
On 6 May 2016 at 20:39, Lang Hames via llvm-dev <llvm-dev at lists.llvm.org> wrote: > For what it's worth it's definitely the line that caused me the most > concern. In the least charitable reading it could be seen as applying "LLVM > community standards" to contributors' private lives, which would be a big > departure from our current culture. Indeed, a
2016 Mar 21
5
Need help with code generation
On 21 March 2016 at 17:20, James Molloy via llvm-dev <llvm-dev at lists.llvm.org> wrote: > Rafael, > > How can a high quality product crash by design? I understand the lack of > structured error handling, and I understand asserting (which in release mode > would be silent) on internal errors. But on an input? How can an application > be taken seriously when crashes are
2008 Jul 28
3
Shell script - ping
hi, how to write a scripts which launches 10 pings to different destinations at execution of single shell scripts please help me any ideas regards, Gopinath
2004 Jul 11
1
Cannot login to PDC after upgrade
...er.fsf.org | X against HTML mail the most useful idiot | / \ ---------------------------------------------------------- What difference does it make to the dead, the orphans, and the homeless, whether the mad destruction is brought under the name of totalitarianism or the holy name of liberty and democracy? --Gandhi ---------------------------------------------------------- gpg --keyserver keys.indymedia.org --recv-key F65A739E ---------------------------------------------------------- -------------- next part -------------- A non-text attachment was scr...
2008 Oct 21
3
CentOS 4.7 Server CD - update frontpage
Perhaps with the release of the CentOS 4.7 Server CD the frontpage at www.centos.org could be updated to reflect this new development rather than 4.4? Here is the announcement for those who missed it http://lists.centos.org/pipermail/centos-announce/2008-October/015328.html Spike. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam
2000 May 20
2
hmac format?
I was looking at the the way that ssh calculates an hmac, and I noticed that the ordering is a little strange - it does hash(key+message). Shouldn't this rather be hash(message+key)? In the former situation, it could be possible for an attacker to append something to the end of the data being sent. The attacker would be able to calculate a valid hmac without knowing the key. For instance,
2003 Apr 01
2
predict in Pspline package (PR#2714)
...rial University of Newfoundland Office: SN-2093 St. John's, NL, A1B 3X9 phone: (709) 737-3239 CANADA fax: (709) 737-3018 What difference does it make to the dead, the orphans, and the homeless, whether the mad destruction is brought under the name of totalitarianism or the holy name of liberty and democracy? - Gandhi
2009 Jan 28
2
For Whom the Gaza Bell Tolls -- Part 1 and 2 -- Obama’s Mideast Jewish Wet Dream Team
For Whom the Gaza Bell Tolls -- Part 1 By Edmund Connelly for The Occidental Observer January 16, 2008 ?The Israelis can kill whomever they want whenever they want.? --Paul Craig Roberts I sometimes think that it?s pointless for Americans to talk much about recent events in Gaza because we know how it will play out ? America will do absolutely nothing to interfere with the ongoing massacre.
2009 Jan 28
2
For Whom the Gaza Bell Tolls -- Part 1 and 2 -- Obama’s Mideast Jewish Wet Dream Team
For Whom the Gaza Bell Tolls -- Part 1 By Edmund Connelly for The Occidental Observer January 16, 2008 ?The Israelis can kill whomever they want whenever they want.? --Paul Craig Roberts I sometimes think that it?s pointless for Americans to talk much about recent events in Gaza because we know how it will play out ? America will do absolutely nothing to interfere with the ongoing massacre.
2003 Sep 24
4
unified authentication
Howdy list, Sorry if this is a frequently discussed topic, or an off-topic question, but I couldn't find much info about my question by performing quick searches in the archives, and my question is pretty tightly related to security... Background: =========== I have a number of FreeBSD machines. Most are 4.x, but a few are 5.x (mainly the testing/devel machines). I also have a single Red