Displaying 20 results from an estimated 100 matches for "undermin".
Did you mean:
undermine
2012 Sep 07
3
GPL as the main reason why Xapian might not get the widespread success it deserves?
...se question has been discussed in 2003 and
in 2007, extensively. Back then, the conclusion seem to have been that
in-process usage is not possible for most use-cases and that instead, a
network layer/IPC mechanism is required to use Xapian with any non-GPL
software.
I think the project is severely undermining its own potential success. I
see that there are even consulting services available, but which
commercially-orientated project is supposed to ever use Xapian?
Has there ever been a motion to finally relicense Xapian to LGPL to make
it easier to adapt in commercial solutions? Or did I just miss s...
2017 Mar 21
4
Clang -O0 performs optimizations that undermine dynamic bug-finding tools
Hi everyone,
I found that Clang -O0 performs optimizations that undermine dynamic
bug-finding tools.
First, most bug finding tools such as ASan, Valgrind, Dr. Memory, Mudflap,
Purify and Safe Sulong (on which I am working) rely on detecting errors
during the execution of the program. They either insert additional checks
during compile-time or during run-time which are...
2011 Jun 01
2
[LLVMdev] Fw: Thinking about "whacky" backends
...tures complicating the
IR. They prefer to see bitcasts and logical operators over unions and
bitfields.
An alternative is to introduce these features, but add a target
lowering phase that strips them from the IR and replaces them with the
target-dependent equivalent. The downside here is that it undermines
the "single IR" LLVM approach. OTOH, it's a lot like running mem2reg
before doing optimizations.
Reid
2015 Nov 02
4
How to prevent registers from spilling?
...nt values
from ever spilling from registers to the stack. I've looked for code or
documentation on how to do this but haven't found anything, apologies if
this has already been done.
Recent security research has shown that protection schemes such as CFI
(that might otherwise be secure) are undermined by sensitive values
spilling to the stack. When security-critical values spill from registers
to the stack, they can be read and overwritten by an attacker with
arbitrary memory read or write capabilities. See "Losing Control" from CCS
2015 for more details on this sort of attack:
https...
2010 Jun 03
5
auth socket goes away on reload
...[dd.dd.dd.dd]:
SASL LOGIN authentication failed: Connection lost to authentication server
Jun 3 00:23:02 xxx postfix/smtpd[14930]: lost connection after AUTH
from unknown[dd.dd.dd.dd]
Is there an obvious way around this? I know I could somehow merge the
changes into the running sqlite db but that undermines the simplicity of
the design I have. Maybe a patch to reopen the db if it's replaced? Or
perhaps I should just switch to a different db format -- that's probably
the quickest/easiest solution. Any other ideas? There are about 20k
entries to deal with.
Thanks,
David
2009 Oct 18
2
[LLVMdev] [cfe-dev] Developer meeting videos up
...LLVM users. The
presentations clearly reveal no confidential Apple information; in
fact, they were presented in front of a large number of external
participants. While we appreciate Apple's continued support of LLVM
and of the Developers' Meeting, the goodwill generated is being
undermined by this policy to withhold important technical information
from other LLVM users, and for little benefit to Apple.
--Vikram Adve
----------------------------------------------------------------------
VIKRAM S. ADVE
Associate Professor, Computer Science E-MAIL: vadve at cs.uiuc.edu...
2004 Aug 24
1
VPN Pass through documentation
Dear shorewall users:
I am going to implement VPN IPSEC pass through. Got shorewall as the
main firewall interfacing the internet. I found Tom''s documentation on
how to do it. The question is: there''s an argument that VPN pass through
(pass through NAT) will undermine the importance of AH (source: freeswan
site). Is it true?
------------------------
Lito Kusnadi
2015 Apr 02
1
sssd-ad cannot be installed with sernet samba
...o think outside your own
setup. We know the rules, we know the wiki. I don't know the answer. I
try to introduce something which may give a clue as to why we would need
to do what the poster asks. Please try to give younger people an
opportunity to voice their opinions. We are not trying to undermine
anyone's authority. Thanks.
B.
2007 Apr 02
1
Kernel timer frequency and HTB
...affect the network adapter performance. Is a high
frequency going to have bad effects on interrupts handling? Has anybody
any suggestions about this issue?
I have some warnings about HTB quantums being too big, but as i
understand, those should only affect the precision of the shaping
without undermining the shaping completely.
Thank you a lot.
jack
2014 May 14
1
RFE: please add Return-Path: to sieve sent mail headers
...s, only use one that will never auto-respond to *anything*:
Yep, those using different <> null senders should be aware, that there
envelope sender rewritings, such as BATV and SRS0, that make the address
unique each time by adding hashed timestamps or something like that. Those
rewritings undermine the vacation database.
I hope that those implementations generate an unique address per day and
not per message. :-)
> http://tools.ietf.org/html/rfc3834#section-3.3
>
> Specifically:
>
> The primary purpose of the MAIL FROM address is to serve as the
> destination for deli...
2001 Feb 15
0
The SSH trademark issue part #1
Hi,
I usually stay away from issues like this, basically because I'm not a
lawyer (and don't want to be one), and I don't have a real interest in
these issues.
Quoting Tatu :
> We also have a trademark pending on the Secure Shell mark
This seriously undermines the IETF standard draft. It's the same as
registering 'milk' as a trademark. Both Secure and Shell are common used
words, so this trademark doesn't make sense to me.
I personally also find it strange that this trademark issue has been
playing for 6 years now, and nobody complaine...
2017 Aug 11
1
is a self signed certificate always invalid the first time?
On 08/10/2017 04:41 PM, Frank-Ulrich Sommer wrote:
> I can't see any security advantages of a self signed cert. I
then you fail to understand the history, like when Microsoft's certs
were undermined because the third party authentication agency gave the
keys to 2 guys that knocked on the door and asked for them...
--
So many immigrant groups have swept through our town
that Brooklyn, like Atlantis, reaches mythological
proportions in the mind of the world - RI Safir 1998
http://www.mrbrk...
2010 Jan 28
3
Repost: [patch] Automatically add keys to agent
...t results, set BatchMode=yes by default in
~/.ssh/config so that you will never ever ever be prompted
legitimately; the connection will simply fail until you remember
to ssh-add. Therefore any time you are ever prompted when ssh'ing
somewhere, you are being messed with.
Your patch undermines 2). If it became a standard practice to
"transparently add a passphrase to the agent the first time a key is
used", then people will get used to the behavior that they sometimes
have to enter their passphrase when ssh'ing somewhere, and sometimes
don't. That will make them mor...
2014 Dec 15
2
How serious are we about not wanting to see...
Personally, I am agnostic. I've just read thru Centos documentation that
there is a big effort to remove all upstream personalities from Centos.
Personally, I don't see why RH is doing this. I would think that it
undermines RH. But I'm still new/old to all of this. It used to be the big
argument was between Unix from Berkeley(4.? I think) and SysIII/V. Always
always battles for turf.
Clayton
>-----Original Message-----
>From: centos-bounces at centos.org [mailto:centos-bounces at centos.org] On
>Behal...
2012 Nov 12
0
[LLVMdev] RFC: Code Ownership
...will just come out in the wash.
However another take on the whole code owner thing is that the code owner is
the person who has the final say on what goes in and what doesn't, so it is
important for the code owner to be the über guru (and having other people
override their decisions would just undermine their authority and the whole
code owner system). Personally I don't really buy this, but I can understand
the concern.
Maybe Chris should give his take on the whole code owner thing?
Ciao, Duncan.
2006 Aug 23
11
i18n friendly, plugable Rails Core
In my work with a simple localization plugin, i''m running into a lot of
places in the Rails core, where text and other localization specific
information is hardcoded.
I''ve included some examples in the bottom of this post.
It''s hard for an outsider to know, if the hardcoded values are a result
of inconsistency in code, or "by design". I hope that we can have
2009 Oct 19
0
[LLVMdev] [cfe-dev] Developer meeting videos up
...e
> presentations clearly reveal no confidential Apple information; in
> fact, they were presented in front of a large number of external
> participants. While we appreciate Apple's continued support of LLVM
> and of the Developers' Meeting, the goodwill generated is being
> undermined by this policy to withhold important technical information
> from other LLVM users, and for little benefit to Apple.
>
> --Vikram Adve
>
> ----------------------------------------------------------------------
> VIKRAM S. ADVE
> Associate Professor, Computer Science...
2012 Nov 12
6
[LLVMdev] RFC: Code Ownership
On 11/11/2012 11:58 PM, Chris Lattner wrote:
>> Is there a particular sub-system size that makes sense to mark as owned? I have been
>> reworking the library call simplification infrastructure recently and will be happy
>> to sign up as an owner for that.
>
> I think that "directory level" is the right granularity. If you're interested in signing
> up
2011 Oct 26
3
Hypercall by DomU Application
Hi,
I am working on a security architecture. In this architecture, the
application in DomU has to communicate directly with the hypervisor. But as
I can see, the xen architecture allows only DomU kernel to raise a
hypercall. I am planning to enable application to communicate with xen
directly. I am assuming, setting up a trap gate with Ring-3 access should do
the trick. I have few questions
2006 Jul 02
4
Ruby on Rails + DB2
Received this link from a regular email blast, it may interest some of
you. I guess RoR is starting to gain more traction :-)
http://www-128.ibm.com/developerworks/db2/library/techarticle/dm-0606dumbill/?ca=dnw-723
Cheers
Mohit.