Displaying 20 results from an estimated 50 matches for "untrustworthy".
Did you mean:
trustworthy
2008 Mar 21
0
Fwd: Is select() untrustworthy on Windows when used with handles from popen3?
Any ideas?
Dan
---------- Forwarded message ----------
From: Steve Shreeve <steve.shreeve at gmail.com>
Date: Thu, Mar 13, 2008 at 10:51 AM
Subject: Is select() untrustworthy on Windows when used with handles
from popen3?
To: djberg96 at gmail.com
Dan,
Thanks for your work on the win32util modules.
I''ve created an expect-like library that allows one to easily script
interactions with non-GUI applications. Everything works great when
connecting to the targ...
2018 Apr 19
6
Down C6 ALL without torrent ?
...rces, as
>> used by Torrent.
>
> Paul, you can go directly to the mirror server I maintain, it allows
> direct download of DVD images:
>
> http://bay.uchicago.edu/centos
>
> You may prefer mirror geographically closer to you.
Can we also challenge this "torrents are untrustworthy" attitude.
You can be given an ISO from a shady character under a railway bridge, and as
long as the ISO matches the checksums you can source directly from the CentOS
https site (https://wiki.centos.org/Manuals/ReleaseNotes/CentOS7), it's as
good as any other copy that's ever been in...
2018 Apr 19
1
Down C6 ALL without torrent ?
> > Can we also challenge this "torrents are untrustworthy" attitude.
>
> Having, successfully so far, resisted/repelled several devious
> attacks from the Russians, I am keen to maintain a clean, and thus
> secure, system as possible.
If you don't trust the sha256 hashes, there's no reason to trust a
download using https.
--
Yv...
2003 Nov 04
1
Ignoring Errors in Simulations
...actanal(Data, factors = 1, rotation = "none") :
Unable to optimize from these starting value(s)
Although I increasing the number of starting values attempted would
(presumably) help reduce the number or errors, I'm looking for a way that
they are ignored and these (likely) untrustworthy results identified.
Thanks for any thoughts,
Ken
2017 Dec 24
2
OpenSSH key signing service?
Besides ssh.com?s PrivX product, has anyone created a web service that can be used to issue temporary certkeys to authenticated users?
Any pointers appreciated!
jd
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2393 bytes
Desc: not available
URL:
2017 Oct 13
8
Status of OpenSSL 1.1 support
Hi,
more or less a year ago Kurt Roeckx provided an initial port towards the
OpenSSL 1.1 API [0]. The patch has been left untouched [1] and it has
been complained about a missing compat layer of the new vs the old API
within the OpenSSL library [2].
This is how I reconstructed the situation as of today and I am not
aware of any progress in regard to the newer library within the OpenSSH
project.
2014 Mar 01
2
Complete GSOC idea
Hi everyone,
I am thinking of working on the
following ideas for my GSOC proposal based on my discussions with Olly and
my own understanding. Rather than focusing on an entire perftest module, I
have decided to focus on implementing performance tests for weighting
schemes based on a wikipedia dump and in addition to that, build a
framework to measure the
2013 Sep 03
3
Is virsh blockcommit supported? Thanks a lot
I had test the command virsh blockcommit, but it failed, with the libvirt version 1.1.0, and qemu version 1.6.0.
Is this feature being developing? Thanks
root at cvk-31:/vms/images# virsh -v
1.1.0
root at cvk-31:/vms/images# qemu-img -V
qemu-img version 1.6.0, Copyright (c) 2004-2008 Fabrice Bellard
usage: qemu-img command [command options]
root at cvk-31:/vms/images# virsh blockcommit Vmtest
2009 Feb 13
10
[Bug 1554] New: No feedback when configuration file permissions are set incorrectly.
https://bugzilla.mindrot.org/show_bug.cgi?id=1554
Summary: No feedback when configuration file permissions are
set incorrectly.
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Cygwin on NT/2k
Status: NEW
Severity: minor
Priority: P3
Component: ssh
AssignedTo:
2005 Sep 22
3
anova on binomial LMER objects
...a bug, or am I doing something fundamentally wrong? If anova
doesn't work with lmer is there a way to perform hypothesis tests on
fixed effects in an lmer model? I was going to just delete terms and
then do liklihood ratio tests, but according to Pinheiro & Bates (p. 87)
that's very untrustworthy. Any suggestions?
I'm using R 2.1.1 on windows XP and lme4 0.98-1
Any help will be much appreciated.
many thanks
Robert
###############################
The data are somewhat like this
#setting up the dataframe
bm.surv<-data.frame(
house=rep(1:10, each=6),...
2015 Oct 14
3
tcp wrappers Question..
hey folks, I keep seeing this on the internet
"The user name lookup feature of TCP Wrappers uses identd to identify
the username of the remote host. By default, this feature is disabled,
as identd may appear hung when there are a large number of TCP connections."
but I cant seem to find out how/where to enable said feature.
Jason
2018 Apr 19
0
Down C6 ALL without torrent ?
On Thu, 2018-04-19 at 09:40 +0100, John Hodrien wrote:
> > On Wed, April 18, 2018 8:36 pm, Always Learning wrote:
> >> I have an aversion to using anything that comes from unknown sources, as
> >> used by Torrent.
> Can we also challenge this "torrents are untrustworthy" attitude.
Having, successfully so far, resisted/repelled several devious attacks
from the Russians, I am keen to maintain a clean, and thus secure,
system as possible.
> You can be given an ISO from a shady character under a railway bridge,
I'd throw it away unused. Do not want the...
2015 Jul 10
1
Error while executing dovecot
Hello All,
I am trying to execute dovecot by below command
/opt/app/dovecot/latest/sbin/dovecot -c /opt/app/dovecot/latest/etc/dovecot/dovecot.conf
I am getting below error
doveconf: Fatal: Error in configuration file /opt/app/dovecot/latest/etc/dovecot/dovecot.conf: default_login_user doesn't exist: dovenull
please guide me to resolve this.
Thanks and Regards,
Sachin
2013 Sep 03
0
Re: Is virsh blockcommit supported? Thanks a lot
...you have to use it correctly. In
particular, your backing chain MUST label the backing format of all
backing files in the image metadata, or you must set
'allow_disk_format_probing' to 1 in /etc/libvirt/qemu.conf (be aware
that doing so is a security risk if you use any raw images and have
untrustworthy guests).
> root@cvk-31:/vms/images# virsh blockcommit Vmtest /vms/images/Vmtest1 --base /vms/image
> s/Vmtest1_base --top /vms/images/Vmtest1_base_1 --wait --verbose ;echo $?
> error: invalid argument: top '/vms/images/Vmtest1_base_1' in chain for '/vms/images/Vmtest1' has...
2017 Mar 06
1
can we override "if" in R?
...order to handle massive amounts of genetic data (by the standards of the day). Everything worked pretty nicely, ie I could "methodize" just about everything I needed--- except if-statements, which would fail to respect eg my definitions of NA. [ The precise details elude me, but if() was untrustworthy. ] To use 'if()', I had to remember to "typecast", which was prone to "user error".
Whether this kind of thing is worth the "risk", is another matter.
cheers
Mark
Mark Bravington
CSIRO Marine Lab
Hobart
Australia
________________________________________...
2011 Oct 25
1
ssh-agent use in different security domains
Consider this topology
domain1-server1 domain2-server2
| |
laptop - domain1-server1 ---- domain2-server1
Laptop has two ssh identities, domain1 and domain2.
I don't wish to store identity locally in any of the servers. As far
as I understand, there isn't any way to limit ssh-agent to allow only
signing
2018 Apr 19
1
Down C6 ALL without torrent ?
...t 09:40 +0100, John Hodrien wrote:
>
>> > On Wed, April 18, 2018 8:36 pm, Always Learning wrote:
>
>> >> I have an aversion to using anything that comes from unknown sources, as
>> >> used by Torrent.
>
>> Can we also challenge this "torrents are untrustworthy" attitude.
>
> Having, successfully so far, resisted/repelled several devious attacks
> from the Russians, I am keen to maintain a clean, and thus secure,
> system as possible.
>
>> You can be given an ISO from a shady character under a railway bridge,
>
> I'd th...
2004 Dec 28
2
Wildcard remote looping
...e had a pair of Cisco 2600's on
either end but now with the zaptel ppp it is going down every couple of
minutes for 15 intervals.
The phone company says the line is good to the smartjacks but says they
were unable to loop up the asterisk boxes at either end. (And there is
a fairly long and untrustworthy cat 5 extension from the smart jacks to
the asterisk boxes.)
Thanks
Mark Farver
1997 May 05
0
Re: Re: Re: Buffer Overflows: A Summary
...du/~daw/janus/
That page is a bit out of date. We''ve currently achieved success at jailing
pre-existing untrusted code like the Netscape web browser (and all its helper
apps, and any Java stuff it may run, etc.). We''ve also gotten some
preliminary results with using this to jail untrustworthy daemons, such
as sendmail. More work is ongoing.
What''s the catch? Well, simply put, the kernel must support a significantly
fine-grained process tracing mechanism to enable one to write an effective
warden tool. Solaris 2.x includes sufficient support, but Linux currently
does *not*....
2018 Apr 19
3
Down C6 ALL without torrent ?
Hi,
I have a machine with a BIOS that does not permit DVD installation. It
accepts everything else including some old superseded media types.
Is it possible to download C6 combined parts 1 and 2 not using Torrent ?
I have an aversion to using anything that comes from unknown sources, as
used by Torrent.
Thank you.
--
Regards,
Paul.
England, EU. England's place is in the