search for: untrustworthy

Displaying 20 results from an estimated 50 matches for "untrustworthy".

Did you mean: trustworthy
2008 Mar 21
0
Fwd: Is select() untrustworthy on Windows when used with handles from popen3?
Any ideas? Dan ---------- Forwarded message ---------- From: Steve Shreeve <steve.shreeve at gmail.com> Date: Thu, Mar 13, 2008 at 10:51 AM Subject: Is select() untrustworthy on Windows when used with handles from popen3? To: djberg96 at gmail.com Dan, Thanks for your work on the win32util modules. I''ve created an expect-like library that allows one to easily script interactions with non-GUI applications. Everything works great when connecting to the targ...
2018 Apr 19
6
Down C6 ALL without torrent ?
...rces, as >> used by Torrent. > > Paul, you can go directly to the mirror server I maintain, it allows > direct download of DVD images: > > http://bay.uchicago.edu/centos > > You may prefer mirror geographically closer to you. Can we also challenge this "torrents are untrustworthy" attitude. You can be given an ISO from a shady character under a railway bridge, and as long as the ISO matches the checksums you can source directly from the CentOS https site (https://wiki.centos.org/Manuals/ReleaseNotes/CentOS7), it's as good as any other copy that's ever been in...
2018 Apr 19
1
Down C6 ALL without torrent ?
> > Can we also challenge this "torrents are untrustworthy" attitude. > > Having, successfully so far, resisted/repelled several devious > attacks from the Russians, I am keen to maintain a clean, and thus > secure, system as possible. If you don't trust the sha256 hashes, there's no reason to trust a download using https. -- Yv...
2003 Nov 04
1
Ignoring Errors in Simulations
...actanal(Data, factors = 1, rotation = "none") : Unable to optimize from these starting value(s) Although I increasing the number of starting values attempted would (presumably) help reduce the number or errors, I'm looking for a way that they are ignored and these (likely) untrustworthy results identified. Thanks for any thoughts, Ken
2017 Dec 24
2
OpenSSH key signing service?
Besides ssh.com?s PrivX product, has anyone created a web service that can be used to issue temporary certkeys to authenticated users? Any pointers appreciated! jd -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 2393 bytes Desc: not available URL:
2017 Oct 13
8
Status of OpenSSL 1.1 support
Hi, more or less a year ago Kurt Roeckx provided an initial port towards the OpenSSL 1.1 API [0]. The patch has been left untouched [1] and it has been complained about a missing compat layer of the new vs the old API within the OpenSSL library [2]. This is how I reconstructed the situation as of today and I am not aware of any progress in regard to the newer library within the OpenSSH project.
2014 Mar 01
2
Complete GSOC idea
Hi everyone, I am thinking of working on the following ideas for my GSOC proposal based on my discussions with Olly and my own understanding. Rather than focusing on an entire perftest module, I have decided to focus on implementing performance tests for weighting schemes based on a wikipedia dump and in addition to that, build a framework to measure the
2013 Sep 03
3
Is virsh blockcommit supported? Thanks a lot
I had test the command virsh blockcommit, but it failed, with the libvirt version 1.1.0, and qemu version 1.6.0. Is this feature being developing? Thanks root at cvk-31:/vms/images# virsh -v 1.1.0 root at cvk-31:/vms/images# qemu-img -V qemu-img version 1.6.0, Copyright (c) 2004-2008 Fabrice Bellard usage: qemu-img command [command options] root at cvk-31:/vms/images# virsh blockcommit Vmtest
2009 Feb 13
10
[Bug 1554] New: No feedback when configuration file permissions are set incorrectly.
https://bugzilla.mindrot.org/show_bug.cgi?id=1554 Summary: No feedback when configuration file permissions are set incorrectly. Product: Portable OpenSSH Version: 5.1p1 Platform: ix86 OS/Version: Cygwin on NT/2k Status: NEW Severity: minor Priority: P3 Component: ssh AssignedTo:
2005 Sep 22
3
anova on binomial LMER objects
...a bug, or am I doing something fundamentally wrong? If anova doesn't work with lmer is there a way to perform hypothesis tests on fixed effects in an lmer model? I was going to just delete terms and then do liklihood ratio tests, but according to Pinheiro & Bates (p. 87) that's very untrustworthy. Any suggestions? I'm using R 2.1.1 on windows XP and lme4 0.98-1 Any help will be much appreciated. many thanks Robert ############################### The data are somewhat like this #setting up the dataframe bm.surv<-data.frame( house=rep(1:10, each=6),...
2015 Oct 14
3
tcp wrappers Question..
hey folks, I keep seeing this on the internet "The user name lookup feature of TCP Wrappers uses identd to identify the username of the remote host. By default, this feature is disabled, as identd may appear hung when there are a large number of TCP connections." but I cant seem to find out how/where to enable said feature. Jason
2018 Apr 19
0
Down C6 ALL without torrent ?
On Thu, 2018-04-19 at 09:40 +0100, John Hodrien wrote: > > On Wed, April 18, 2018 8:36 pm, Always Learning wrote: > >> I have an aversion to using anything that comes from unknown sources, as > >> used by Torrent. > Can we also challenge this "torrents are untrustworthy" attitude. Having, successfully so far, resisted/repelled several devious attacks from the Russians, I am keen to maintain a clean, and thus secure, system as possible. > You can be given an ISO from a shady character under a railway bridge, I'd throw it away unused. Do not want the...
2015 Jul 10
1
Error while executing dovecot
Hello All, I am trying to execute dovecot by below command /opt/app/dovecot/latest/sbin/dovecot -c /opt/app/dovecot/latest/etc/dovecot/dovecot.conf I am getting below error doveconf: Fatal: Error in configuration file /opt/app/dovecot/latest/etc/dovecot/dovecot.conf: default_login_user doesn't exist: dovenull please guide me to resolve this. Thanks and Regards, Sachin
2013 Sep 03
0
Re: Is virsh blockcommit supported? Thanks a lot
...you have to use it correctly. In particular, your backing chain MUST label the backing format of all backing files in the image metadata, or you must set 'allow_disk_format_probing' to 1 in /etc/libvirt/qemu.conf (be aware that doing so is a security risk if you use any raw images and have untrustworthy guests). > root@cvk-31:/vms/images# virsh blockcommit Vmtest /vms/images/Vmtest1 --base /vms/image > s/Vmtest1_base --top /vms/images/Vmtest1_base_1 --wait --verbose ;echo $? > error: invalid argument: top '/vms/images/Vmtest1_base_1' in chain for '/vms/images/Vmtest1' has...
2017 Mar 06
1
can we override "if" in R?
...order to handle massive amounts of genetic data (by the standards of the day). Everything worked pretty nicely, ie I could "methodize" just about everything I needed--- except if-statements, which would fail to respect eg my definitions of NA. [ The precise details elude me, but if() was untrustworthy. ] To use 'if()', I had to remember to "typecast", which was prone to "user error". Whether this kind of thing is worth the "risk", is another matter. cheers Mark Mark Bravington CSIRO Marine Lab Hobart Australia ________________________________________...
2011 Oct 25
1
ssh-agent use in different security domains
Consider this topology domain1-server1 domain2-server2 | | laptop - domain1-server1 ---- domain2-server1 Laptop has two ssh identities, domain1 and domain2. I don't wish to store identity locally in any of the servers. As far as I understand, there isn't any way to limit ssh-agent to allow only signing
2018 Apr 19
1
Down C6 ALL without torrent ?
...t 09:40 +0100, John Hodrien wrote: > >> > On Wed, April 18, 2018 8:36 pm, Always Learning wrote: > >> >> I have an aversion to using anything that comes from unknown sources, as >> >> used by Torrent. > >> Can we also challenge this "torrents are untrustworthy" attitude. > > Having, successfully so far, resisted/repelled several devious attacks > from the Russians, I am keen to maintain a clean, and thus secure, > system as possible. > >> You can be given an ISO from a shady character under a railway bridge, > > I'd th...
2004 Dec 28
2
Wildcard remote looping
...e had a pair of Cisco 2600's on either end but now with the zaptel ppp it is going down every couple of minutes for 15 intervals. The phone company says the line is good to the smartjacks but says they were unable to loop up the asterisk boxes at either end. (And there is a fairly long and untrustworthy cat 5 extension from the smart jacks to the asterisk boxes.) Thanks Mark Farver
1997 May 05
0
Re: Re: Re: Buffer Overflows: A Summary
...du/~daw/janus/ That page is a bit out of date. We''ve currently achieved success at jailing pre-existing untrusted code like the Netscape web browser (and all its helper apps, and any Java stuff it may run, etc.). We''ve also gotten some preliminary results with using this to jail untrustworthy daemons, such as sendmail. More work is ongoing. What''s the catch? Well, simply put, the kernel must support a significantly fine-grained process tracing mechanism to enable one to write an effective warden tool. Solaris 2.x includes sufficient support, but Linux currently does *not*....
2018 Apr 19
3
Down C6 ALL without torrent ?
Hi, I have a machine with a BIOS that does not permit DVD installation. It accepts everything else including some old superseded media types. Is it possible to download C6 combined parts 1 and 2 not using Torrent ? I have an aversion to using anything that comes from unknown sources, as used by Torrent. Thank you. -- Regards, Paul. England, EU. England's place is in the