search for: undermin

Displaying 20 results from an estimated 100 matches for "undermin".

Did you mean: undermine
2012 Sep 07
3
GPL as the main reason why Xapian might not get the widespread success it deserves?
...se question has been discussed in 2003 and in 2007, extensively. Back then, the conclusion seem to have been that in-process usage is not possible for most use-cases and that instead, a network layer/IPC mechanism is required to use Xapian with any non-GPL software. I think the project is severely undermining its own potential success. I see that there are even consulting services available, but which commercially-orientated project is supposed to ever use Xapian? Has there ever been a motion to finally relicense Xapian to LGPL to make it easier to adapt in commercial solutions? Or did I just miss s...
2017 Mar 21
4
Clang -O0 performs optimizations that undermine dynamic bug-finding tools
Hi everyone, I found that Clang -O0 performs optimizations that undermine dynamic bug-finding tools. First, most bug finding tools such as ASan, Valgrind, Dr. Memory, Mudflap, Purify and Safe Sulong (on which I am working) rely on detecting errors during the execution of the program. They either insert additional checks during compile-time or during run-time which are...
2011 Jun 01
2
[LLVMdev] Fw: Thinking about "whacky" backends
...tures complicating the IR. They prefer to see bitcasts and logical operators over unions and bitfields. An alternative is to introduce these features, but add a target lowering phase that strips them from the IR and replaces them with the target-dependent equivalent. The downside here is that it undermines the "single IR" LLVM approach. OTOH, it's a lot like running mem2reg before doing optimizations. Reid
2015 Nov 02
4
How to prevent registers from spilling?
...nt values from ever spilling from registers to the stack. I've looked for code or documentation on how to do this but haven't found anything, apologies if this has already been done. Recent security research has shown that protection schemes such as CFI (that might otherwise be secure) are undermined by sensitive values spilling to the stack. When security-critical values spill from registers to the stack, they can be read and overwritten by an attacker with arbitrary memory read or write capabilities. See "Losing Control" from CCS 2015 for more details on this sort of attack: https...
2010 Jun 03
5
auth socket goes away on reload
...[dd.dd.dd.dd]: SASL LOGIN authentication failed: Connection lost to authentication server Jun 3 00:23:02 xxx postfix/smtpd[14930]: lost connection after AUTH from unknown[dd.dd.dd.dd] Is there an obvious way around this? I know I could somehow merge the changes into the running sqlite db but that undermines the simplicity of the design I have. Maybe a patch to reopen the db if it's replaced? Or perhaps I should just switch to a different db format -- that's probably the quickest/easiest solution. Any other ideas? There are about 20k entries to deal with. Thanks, David
2009 Oct 18
2
[LLVMdev] [cfe-dev] Developer meeting videos up
...LLVM users. The presentations clearly reveal no confidential Apple information; in fact, they were presented in front of a large number of external participants. While we appreciate Apple's continued support of LLVM and of the Developers' Meeting, the goodwill generated is being undermined by this policy to withhold important technical information from other LLVM users, and for little benefit to Apple. --Vikram Adve ---------------------------------------------------------------------- VIKRAM S. ADVE Associate Professor, Computer Science E-MAIL: vadve at cs.uiuc.edu...
2004 Aug 24
1
VPN Pass through documentation
Dear shorewall users: I am going to implement VPN IPSEC pass through. Got shorewall as the main firewall interfacing the internet. I found Tom''s documentation on how to do it. The question is: there''s an argument that VPN pass through (pass through NAT) will undermine the importance of AH (source: freeswan site). Is it true? ------------------------ Lito Kusnadi
2015 Apr 02
1
sssd-ad cannot be installed with sernet samba
...o think outside your own setup. We know the rules, we know the wiki. I don't know the answer. I try to introduce something which may give a clue as to why we would need to do what the poster asks. Please try to give younger people an opportunity to voice their opinions. We are not trying to undermine anyone's authority. Thanks. B.
2007 Apr 02
1
Kernel timer frequency and HTB
...affect the network adapter performance. Is a high frequency going to have bad effects on interrupts handling? Has anybody any suggestions about this issue? I have some warnings about HTB quantums being too big, but as i understand, those should only affect the precision of the shaping without undermining the shaping completely. Thank you a lot. jack
2014 May 14
1
RFE: please add Return-Path: to sieve sent mail headers
...s, only use one that will never auto-respond to *anything*: Yep, those using different <> null senders should be aware, that there envelope sender rewritings, such as BATV and SRS0, that make the address unique each time by adding hashed timestamps or something like that. Those rewritings undermine the vacation database. I hope that those implementations generate an unique address per day and not per message. :-) > http://tools.ietf.org/html/rfc3834#section-3.3 > > Specifically: > > The primary purpose of the MAIL FROM address is to serve as the > destination for deli...
2001 Feb 15
0
The SSH trademark issue part #1
Hi, I usually stay away from issues like this, basically because I'm not a lawyer (and don't want to be one), and I don't have a real interest in these issues. Quoting Tatu : > We also have a trademark pending on the Secure Shell mark This seriously undermines the IETF standard draft. It's the same as registering 'milk' as a trademark. Both Secure and Shell are common used words, so this trademark doesn't make sense to me. I personally also find it strange that this trademark issue has been playing for 6 years now, and nobody complaine...
2017 Aug 11
1
is a self signed certificate always invalid the first time?
On 08/10/2017 04:41 PM, Frank-Ulrich Sommer wrote: > I can't see any security advantages of a self signed cert. I then you fail to understand the history, like when Microsoft's certs were undermined because the third party authentication agency gave the keys to 2 guys that knocked on the door and asked for them... -- So many immigrant groups have swept through our town that Brooklyn, like Atlantis, reaches mythological proportions in the mind of the world - RI Safir 1998 http://www.mrbrk...
2010 Jan 28
3
Repost: [patch] Automatically add keys to agent
...t results, set BatchMode=yes by default in ~/.ssh/config so that you will never ever ever be prompted legitimately; the connection will simply fail until you remember to ssh-add. Therefore any time you are ever prompted when ssh'ing somewhere, you are being messed with. Your patch undermines 2). If it became a standard practice to "transparently add a passphrase to the agent the first time a key is used", then people will get used to the behavior that they sometimes have to enter their passphrase when ssh'ing somewhere, and sometimes don't. That will make them mor...
2014 Dec 15
2
How serious are we about not wanting to see...
Personally, I am agnostic. I've just read thru Centos documentation that there is a big effort to remove all upstream personalities from Centos. Personally, I don't see why RH is doing this. I would think that it undermines RH. But I'm still new/old to all of this. It used to be the big argument was between Unix from Berkeley(4.? I think) and SysIII/V. Always always battles for turf. Clayton >-----Original Message----- >From: centos-bounces at centos.org [mailto:centos-bounces at centos.org] On >Behal...
2012 Nov 12
0
[LLVMdev] RFC: Code Ownership
...will just come out in the wash. However another take on the whole code owner thing is that the code owner is the person who has the final say on what goes in and what doesn't, so it is important for the code owner to be the über guru (and having other people override their decisions would just undermine their authority and the whole code owner system). Personally I don't really buy this, but I can understand the concern. Maybe Chris should give his take on the whole code owner thing? Ciao, Duncan.
2006 Aug 23
11
i18n friendly, plugable Rails Core
In my work with a simple localization plugin, i''m running into a lot of places in the Rails core, where text and other localization specific information is hardcoded. I''ve included some examples in the bottom of this post. It''s hard for an outsider to know, if the hardcoded values are a result of inconsistency in code, or "by design". I hope that we can have
2009 Oct 19
0
[LLVMdev] [cfe-dev] Developer meeting videos up
...e > presentations clearly reveal no confidential Apple information; in > fact, they were presented in front of a large number of external > participants. While we appreciate Apple's continued support of LLVM > and of the Developers' Meeting, the goodwill generated is being > undermined by this policy to withhold important technical information > from other LLVM users, and for little benefit to Apple. > > --Vikram Adve > > ---------------------------------------------------------------------- > VIKRAM S. ADVE > Associate Professor, Computer Science...
2012 Nov 12
6
[LLVMdev] RFC: Code Ownership
On 11/11/2012 11:58 PM, Chris Lattner wrote: >> Is there a particular sub-system size that makes sense to mark as owned? I have been >> reworking the library call simplification infrastructure recently and will be happy >> to sign up as an owner for that. > > I think that "directory level" is the right granularity. If you're interested in signing > up
2011 Oct 26
3
Hypercall by DomU Application
Hi, I am working on a security architecture. In this architecture, the application in DomU has to communicate directly with the hypervisor. But as I can see, the xen architecture allows only DomU kernel to raise a hypercall. I am planning to enable application to communicate with xen directly. I am assuming, setting up a trap gate with Ring-3 access should do the trick. I have few questions
2006 Jul 02
4
Ruby on Rails + DB2
Received this link from a regular email blast, it may interest some of you. I guess RoR is starting to gain more traction :-) http://www-128.ibm.com/developerworks/db2/library/techarticle/dm-0606dumbill/?ca=dnw-723 Cheers Mohit.