search for: wonka

Displaying 19 results from an estimated 19 matches for "wonka".

Did you mean: wonky
2001 Jun 29
1
a litte note from willy wonka
Um Pah Lum Pah, Du Pi Dee Doo, Proprietary formats will make a slave of you. Um Pah Lum Pah, Du Pi Dee Dee, Best to be wise and not use M P 3. What do you get when you make an M P 3? Besides artifacts and patent roytalties? It's not to late to open your mind. Use Ogg Vorbis Don't Fall Be Hind. Don't you pay those Ger-er-mans. You could live in Happiness too! Like the Ogg Vor
2010 Jan 10
0
[LLVMdev] Using a function from another module
...============================================================= michaelMuller = mmuller at enduden.com | http://www.mindhog.net/~mmuller ----------------------------------------------------------------------------- Scnozwangers? Vermicious Knids? What kind of rubbish is that? - Mr. Salt, "Willy Wonka and the Chocolate Factory" =============================================================================
2010 Jan 10
3
[LLVMdev] Using a function from another module
On Sun, Jan 10, 2010 at 12:38 PM, Garrison Venn <gvenn.cfe.dev at gmail.com> wrote: > Won't passing llvm::Function* around vs strings (function names), also work, at code generation time, > without the need for a module A dec to module B impl. mapping? > > Garrison Nope. You cannot place a call instruction into one module whose callee is a Function from another module. You
2009 Aug 06
2
20 second delays when accessing Samba on Fedora 11
...AndX Request, NTLMSSP_AUTH, User: xxx/yyy from my PC Then it asks me for username/password and I can access the share. There isn't anything unique in my smb.conf compared to before (when it worked well with Fedora 6). Highlights are below. workgroup = HOME server string = Wonka netbios name = Wonka interfaces = lo eth1 security = user passdb backend = tdbsam [homes] comment = Home Directories browseable = no writable = yes [Miscellaneous] path = /media/home/public/Miscellaneous writeable...
2006 Feb 11
2
Route all LAN traffic through eth2 and keep web/mail traffic on eth0
Hi, I have the following config: 1 PC with 3 NICs, that shares internet connection to LAN. eth0 uses a public IP ($public_ip_1) eth1 uses a private IP ($private_ip) eth2 uses a public IP ($public_ip_2) I have a webserver and a mailserver accesible by $public_ip_1 (eth0) I have a LAN with all terminals using private IPs, and $private_ip (eth1) as gateway. $public_ip_1 and $public_ip_2 are from
2006 Feb 10
2
Search from has_many?
Hi, In my application I have bots that have_many packs. Usually there is just a big list with each bot and its packs. I''d like to add a filter that shows only bots with packs matching a keyword (and only the matching packs from those bots). I have sincerely no idea how to do this properly. The following works, but I doubt it''s really the proper way of doing this: class
2012 Sep 12
1
[LLVMdev] [Patch] Metadata nodes and C API
Hi Anthony, You need to send patches to the llvm-commits mailing list to get them reviewed and committed. -Dave -- Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation > -----Original Message----- > From: llvmdev-bounces at cs.uiuc.edu [mailto:llvmdev-bounces at cs.uiuc.edu] > On Behalf Of Anthony Bryant > Sent: Wednesday, September
2015 Jul 03
6
boot... round 2
Hi, poma wrote: > - "unsigned char c;" does not solve the problem > > - "c >= 0 && c <= ' '" solves the problem for the current git What the ... ?!? My proposal of "(c >= 0 ... )" was only made to avoid the need for a type change of variable "c". Both proposals should be equivalent ... on the first morning glimpse they
2003 May 28
2
SSH1 security with Kerb5
Hi, I am trying to decide if it is worth the time to test the Kerberos support in a port I am working on of Openssh 3.5p1. Does using Kerb5 with SSH1 solve the security problems inherent in protocol 1 and bring it up to par with the security level of SSH2 or are there other issues that Kerb5 authentication won't help for SSH1? Thanks, Greg Lambert --------------------------------- Do
2003 Jun 27
3
Kerberos Support in OpenSSH
Dear Sir and Madam: I'm writing to you on behalf of the MIT Kerberos team and several other parties interested in the availability of Kerberos authentication for the SSH protocol. We recently noticed that the OpenSSH developers had added support for the kerberos-2 at ssh.com user authentication mechanism. We are delighted but we believe additional steps are necessary, as explained
2003 Sep 16
5
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory. This document can be found at: http://www.openssh.com/txt/buffer.adv 1. Versions affected: All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively. 2. Solution: Upgrade to OpenSSH
2018 May 20
0
You say #nothing... I say "Hello. Hello! Hello?" Moving forward with this will stop this violence, it will also stop murder, and then death. (... in that order)
...? <http://isiti.gq/lists/lt.php?id=YUgBAAFQGAFSXB1QWlQKVF0F> Simmons, Wilder and Roddenberry ? and with those names the key ?s' of the Simulator, Wild Thing's singing Heart is the Earth with the ?how? the end and the beginning are symbolically Saturnalian. Wilder connects to Willy Wonka (which ties to the Promised Land of flowing chocolate milk and honies <http://isiti.gq/lists/lt.php?id=YUgMAANVGAFSXB1QWlQKVF0F> ? remember there is NO ZY <http://isiti.gq/lists/lt.php?id=YUgCBwZXGAFSXB1QWlQKVF0F> ) and another religious reference encoded in names, the Ka? the body of C...
2018 Jul 18
0
ET Y M OSO C A TOAY. Moscow. Hypo-X-Us .... TO DAY ... & AND Y Msg o' Pi ... "e, Ya!" ... at the crossroads of Secord, Oli North and ... Ved
...y and child and parent that unite a great many words for places and names important to religion and the story under the auspieces of the concepts of Ka and Ba that connect Egyptian mythological concepts of body and spirit to modern places like the Bahamas and stories of the Promised Land like Willy Wonka and maybe even names like Picard and Riker and Kirk and Uhura. The "a" was originally "alive" as in Johnny 5 and "in the /progenitor/ Universe" in reality. Rather than Ho and Ha; of which I really see almost no difference in preference of connotation and significantly...
2011 Feb 24
0
Bug#599520: (no subject)
+1
2006 Nov 13
2
Traffic monitor per IP
Hi, I´ve been using iptraf for real time traffic monitoring and it works fine. But I would like to know if anyone knows other package to monitor traffic per IP in real time, without requiring each IP''s MAC address as I have some terminals behind a router that hides their MAC. Cacti/MRTG works like this but not in real time. Thanks for your ideas. Regards, Edo
2005 Jul 02
0
Question regarding iptables marks for HTB
Hi, Currently I´m using the following iptables rule to mark packets in order to shape traffic: iptables -A PREROUTING -i eth2 -t mangle -p tcp -s 192.168.1.50/32 -j MARK --set-mark 50 So my question is, is there a limit in the numbers that can be used as marks? And also, can only numbers be used as marks? How about: iptables -A PREROUTING -i eth2 -t mangle -p tcp -s 192.168.1.50/32 -j MARK
2005 Jul 06
1
Mark all traffic except browsing
Hi, I´d like to create two classes for HTB, one of them to limit traffic for everything except browsing and the other to limit traffic only for browsing. How can I mark all traffic except the one related to browsing with iptables? Currently I mark all traffic related to one IP with: iptables -A PREROUTING -i eth2 -t mangle -p tcp -s $IP_ADDRESS -j MARK --set-mark 10 Should I use three rules
2005 Aug 05
0
Real time traffic monitor like iptraf
Hi, Just wondering, how you guys monitor traffic per ip to test if the traffic shaping is working? iptraf works great but no new version is available, and most ip accounting projects (MRTG & Friends) update its graphics on a per minute process. So I´d like to know which project you use to monitor bandwidth use in real time. Regards, Edo
2003 Mar 12
3
Warnings with and without r2q
Hi everyone, My HTB script is showing me those "r2q change" warnings. I read that I should test with r2q values to gain accuracy and stop the warnings but I made some tests with r2q and with burst and I still get the warnings. Any ideas on this issue will be very helpful. The script seems to be working as the bandwidth for the IPs is being shaped. The NIC works at 100mbit and the