Displaying 19 results from an estimated 19 matches for "wonka".
Did you mean:
wonky
2001 Jun 29
1
a litte note from willy wonka
Um Pah Lum Pah, Du Pi Dee Doo,
Proprietary formats will make a slave of you.
Um Pah Lum Pah, Du Pi Dee Dee,
Best to be wise and not use M P 3.
What do you get when you make an M P 3?
Besides artifacts and patent roytalties?
It's not to late to open your mind.
Use Ogg Vorbis Don't
Fall
Be
Hind.
Don't you pay those Ger-er-mans.
You could live in Happiness too! Like the
Ogg
Vor
2010 Jan 10
0
[LLVMdev] Using a function from another module
...=============================================================
michaelMuller = mmuller at enduden.com | http://www.mindhog.net/~mmuller
-----------------------------------------------------------------------------
Scnozwangers? Vermicious Knids? What kind of rubbish is that?
- Mr. Salt, "Willy Wonka and the Chocolate Factory"
=============================================================================
2010 Jan 10
3
[LLVMdev] Using a function from another module
On Sun, Jan 10, 2010 at 12:38 PM, Garrison Venn <gvenn.cfe.dev at gmail.com> wrote:
> Won't passing llvm::Function* around vs strings (function names), also work, at code generation time,
> without the need for a module A dec to module B impl. mapping?
>
> Garrison
Nope. You cannot place a call instruction into one module whose
callee is a Function from another module. You
2009 Aug 06
2
20 second delays when accessing Samba on Fedora 11
...AndX Request, NTLMSSP_AUTH, User: xxx/yyy from my PC
Then it asks me for username/password and I can access the share.
There isn't anything unique in my smb.conf compared to before (when it
worked well with Fedora 6). Highlights are below.
workgroup = HOME
server string = Wonka
netbios name = Wonka
interfaces = lo eth1
security = user
passdb backend = tdbsam
[homes]
comment = Home Directories
browseable = no
writable = yes
[Miscellaneous]
path = /media/home/public/Miscellaneous
writeable...
2006 Feb 11
2
Route all LAN traffic through eth2 and keep web/mail traffic on eth0
Hi,
I have the following config:
1 PC with 3 NICs, that shares internet connection to LAN.
eth0 uses a public IP ($public_ip_1)
eth1 uses a private IP ($private_ip)
eth2 uses a public IP ($public_ip_2)
I have a webserver and a mailserver accesible by $public_ip_1 (eth0)
I have a LAN with all terminals using private IPs, and $private_ip (eth1) as
gateway.
$public_ip_1 and $public_ip_2 are from
2006 Feb 10
2
Search from has_many?
Hi,
In my application I have bots that have_many packs. Usually there is
just a big list with each bot and its packs. I''d like to add a filter
that shows only bots with packs matching a keyword (and only the
matching packs from those bots). I have sincerely no idea how to do this
properly.
The following works, but I doubt it''s really the proper way of doing
this:
class
2012 Sep 12
1
[LLVMdev] [Patch] Metadata nodes and C API
Hi Anthony,
You need to send patches to the llvm-commits mailing list to get them
reviewed and committed.
-Dave
-- Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted
by The Linux Foundation
> -----Original Message-----
> From: llvmdev-bounces at cs.uiuc.edu [mailto:llvmdev-bounces at cs.uiuc.edu]
> On Behalf Of Anthony Bryant
> Sent: Wednesday, September
2015 Jul 03
6
boot... round 2
Hi,
poma wrote:
> - "unsigned char c;" does not solve the problem
>
> - "c >= 0 && c <= ' '" solves the problem for the current git
What the ... ?!?
My proposal of "(c >= 0 ... )" was only made to avoid the need
for a type change of variable "c".
Both proposals should be equivalent ... on the first morning
glimpse they
2003 May 28
2
SSH1 security with Kerb5
Hi,
I am trying to decide if it is worth the time to test the Kerberos support in a port I am working on of Openssh 3.5p1.
Does using Kerb5 with SSH1 solve the security problems inherent in protocol 1 and bring it up to par with the security level of SSH2 or are there other issues that Kerb5 authentication won't help for SSH1?
Thanks,
Greg Lambert
---------------------------------
Do
2003 Jun 27
3
Kerberos Support in OpenSSH
Dear Sir and Madam:
I'm writing to you on behalf of the MIT Kerberos team and several
other parties interested in the availability of Kerberos
authentication for the SSH protocol.
We recently noticed that the OpenSSH developers had added support for
the kerberos-2 at ssh.com user authentication mechanism. We are
delighted but we believe additional steps are necessary, as explained
2003 Sep 16
5
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/buffer.adv
1. Versions affected:
All versions of OpenSSH's sshd prior to 3.7 contain a buffer
management error. It is uncertain whether this error is
potentially exploitable, however, we prefer to see bugs
fixed proactively.
2. Solution:
Upgrade to OpenSSH
2018 May 20
0
You say #nothing... I say "Hello. Hello! Hello?" Moving forward with this will stop this violence, it will also stop murder, and then death. (... in that order)
...?
<http://isiti.gq/lists/lt.php?id=YUgBAAFQGAFSXB1QWlQKVF0F>
Simmons, Wilder and Roddenberry
? and with those names the key ?s' of the Simulator, Wild Thing's
singing Heart is the Earth with the ?how? the end and the beginning are
symbolically Saturnalian.
Wilder connects to Willy Wonka (which ties to the Promised Land of flowing
chocolate milk and honies
<http://isiti.gq/lists/lt.php?id=YUgMAANVGAFSXB1QWlQKVF0F>
? remember there is NO ZY
<http://isiti.gq/lists/lt.php?id=YUgCBwZXGAFSXB1QWlQKVF0F>
) and another religious reference encoded in names, the Ka? the body of
C...
2018 Jul 18
0
ET Y M OSO C A TOAY. Moscow. Hypo-X-Us .... TO DAY ... & AND Y Msg o' Pi ... "e, Ya!" ... at the crossroads of Secord, Oli North and ... Ved
...y and child and parent that unite a great many words for
places and names important to religion and the story under the auspieces of
the concepts of Ka and Ba that connect Egyptian mythological concepts of
body and spirit to modern places like the Bahamas and stories of the
Promised Land like Willy Wonka and maybe even names like Picard and Riker
and Kirk and Uhura. The "a" was originally "alive" as in Johnny 5 and "in
the /progenitor/ Universe" in reality. Rather than Ho and Ha; of which I
really see almost no difference in preference of connotation and
significantly...
2006 Nov 13
2
Traffic monitor per IP
Hi,
I´ve been using iptraf for real time traffic monitoring and it works fine.
But I would like to know if anyone knows other package to monitor traffic
per IP in real time, without requiring each IP''s MAC address as I have some
terminals behind a router that hides their MAC. Cacti/MRTG works like this
but not in real time.
Thanks for your ideas.
Regards,
Edo
2005 Jul 02
0
Question regarding iptables marks for HTB
Hi,
Currently I´m using the following iptables rule to mark packets in order to
shape traffic:
iptables -A PREROUTING -i eth2 -t mangle -p tcp -s 192.168.1.50/32 -j MARK
--set-mark 50
So my question is, is there a limit in the numbers that can be used as
marks? And also, can only numbers be used as marks?
How about:
iptables -A PREROUTING -i eth2 -t mangle -p tcp -s 192.168.1.50/32 -j MARK
2005 Jul 06
1
Mark all traffic except browsing
Hi,
I´d like to create two classes for HTB, one of them to limit traffic for
everything except browsing and the other to limit traffic only for browsing.
How can I mark all traffic except the one related to browsing with iptables?
Currently I mark all traffic related to one IP with:
iptables -A PREROUTING -i eth2 -t mangle -p tcp -s $IP_ADDRESS -j MARK
--set-mark 10
Should I use three rules
2005 Aug 05
0
Real time traffic monitor like iptraf
Hi,
Just wondering, how you guys monitor traffic per ip to test if the traffic
shaping is working?
iptraf works great but no new version is available, and most ip accounting
projects (MRTG & Friends) update its graphics on a per minute process. So
I´d like to know which project you use to monitor bandwidth use in real
time.
Regards,
Edo
2003 Mar 12
3
Warnings with and without r2q
Hi everyone,
My HTB script is showing me those "r2q change" warnings. I read that I
should test with r2q values to gain accuracy and stop the warnings but I
made some tests with r2q and with burst and I still get the warnings. Any
ideas on this issue will be very helpful. The script seems to be working as
the bandwidth for the IPs is being shaped.
The NIC works at 100mbit and the