similar to: Avery Wizzard using Wine and Ubuntu

Displaying 20 results from an estimated 10000 matches similar to: "Avery Wizzard using Wine and Ubuntu"

2009 Mar 17
1
Avery DesignPro 5.4 Crashing
I'm trying to run Avery DesignPro 5.4 with Wine 1.1.17 under Ubuntu 8.10. Most of the time, if I try to save a design, or change a font, it crashes completely. Anyone have any idea what might cause this? Any suggestions on diagnostics or logs?
2005 Dec 15
5
Avery Lables, PDF::Writer or LaTex?
In a new app we are developing, we need to be able to dynamically create a PDF and send it to the browser (inline with send_data). I have been tinkering with PDF::Writer and love the simplicity and native ruby-ness of it all. However, one of the main uses for this functionality is to output a PDF of addresses to be printed on Avery 5161 labels. LaTex seems to be suited well for this, but it
2018 Jun 29
2
is "map untrusted to domain" possible?
hi: at RHEL 7.4 we had used "map untrusted to domain = yes". so users can login with "username" instead of "sam-dom\username". after upgrade to RHEL 7.5, samba version upgrade from 4.6 to 4.7. now "map untrusted to domain = yes" or "map untrusted to domain = auto" are not working. can we still let user to use "usename" instead
2011 Nov 05
2
winbind map untrusted domain problem
Hi I have a question/problem about winbind and the "map untrusted to domain" (=yes) parameter. I use samba 3.6.0 on FreeBSD 8.2 with the following configuration: [global] encrypt passwords = yes map untrusted to domain = yes allow trusted domains = yes client ntlmv2 auth = yes client use spnego = yes client lanman auth = yes client plaintext auth = no winbind enum
2018 Apr 27
4
[PATCH] allow indefinite ForwardX11Timeout by setting it to 0
This change allows use of untrusted X11 forwarding (which is more secure) without requiring users to choose a finite timeout after which to refuse new connections. This matches the semantics of the X11 security extension itself, which also treat a validity timeout of 0 on an authentication cookie as indefinite. Signed-off-by: Trixie Able <table at inventati.org> --- clientloop.c | 12
2020 Apr 24
3
[PATCH] Allow RDTSC and RDTSCP from userspace
On 4/24/20 2:27 PM, Tom Lendacky wrote: > On 4/24/20 4:24 PM, Dave Hansen wrote: >> On 4/24/20 2:03 PM, Mike Stunes wrote: >>> I needed to allow RDTSC(P) from userspace and in early boot in order to >>> get userspace started properly. Patch below. >>> >>> --- >>> SEV-ES guests will need to execute rdtsc and rdtscp from userspace and
2020 Apr 24
3
[PATCH] Allow RDTSC and RDTSCP from userspace
On 4/24/20 2:27 PM, Tom Lendacky wrote: > On 4/24/20 4:24 PM, Dave Hansen wrote: >> On 4/24/20 2:03 PM, Mike Stunes wrote: >>> I needed to allow RDTSC(P) from userspace and in early boot in order to >>> get userspace started properly. Patch below. >>> >>> --- >>> SEV-ES guests will need to execute rdtsc and rdtscp from userspace and
2020 Apr 29
3
[PATCH 5/5] virtio: Add bounce DMA ops
On Wed, Apr 29, 2020 at 03:39:53PM +0530, Srivatsa Vaddagiri wrote: > That would still not work I think where swiotlb is used for pass-thr devices > (when private memory is fine) as well as virtio devices (when shared memory is > required). So that is a separate question. When there are multiple untrusted devices, at the moment it looks like a single bounce buffer is used. Which to me
2020 Apr 29
3
[PATCH 5/5] virtio: Add bounce DMA ops
On Wed, Apr 29, 2020 at 03:39:53PM +0530, Srivatsa Vaddagiri wrote: > That would still not work I think where swiotlb is used for pass-thr devices > (when private memory is fine) as well as virtio devices (when shared memory is > required). So that is a separate question. When there are multiple untrusted devices, at the moment it looks like a single bounce buffer is used. Which to me
2019 Jun 04
2
ADS security mode - authenticating non-domain Linux users
Hi All, We've been beating our heads against a problem here with a new Samba server that we're trying to bring into production, and I'm hoping that the members of this list can provide some insight. Our server is on a Linux CentOS 7.6, Samba version 4.8.3 installed from distribution packages. Our clients are a mixture of Windows, Mac, and Linux systems. Most of these clients are
2004 Feb 28
4
[Bug 803] Security Bug: X11 Forwarding is more powerful than it needs to be.
http://bugzilla.mindrot.org/show_bug.cgi?id=803 Summary: Security Bug: X11 Forwarding is more powerful than it needs to be. Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: major Priority: P2 Component: ssh AssignedTo: openssh-bugs
2018 Jun 01
0
Regroup and create new dataframe
Responses should be copied to r-help using ReplyAll. You are still sending html formatted emails. If you are using Microsoft Outlook, click the Format Text tab and select ?Aa Plain Text?. No one has asked you to reveal the data set, only to create one with a similar structure. Is the data I sent reasonably close? What should it look like after it is transformed? David C From: nguy2952
2018 Jun 29
3
is "map untrusted to domain" possible?
2018-06-29 15:12 GMT+08:00 Rowland Penny via samba <samba at lists.samba.org>: > On Fri, 29 Jun 2018 12:56:33 +0800 > d tbsky via samba <samba at lists.samba.org> wrote: > >> hi: >> >> at RHEL 7.4 we had used "map untrusted to domain = yes". so users >> can login with "username" instead of "sam-dom\username". >>
2019 Nov 25
3
[RFC] LLVM Security Group and Process
On Tue, Nov 19, 2019 at 10:46 AM JF Bastien <jfbastien at apple.com> wrote: > And I do agree that if someone were to come in and put in the significant > amounts of work to make LLVM directly usable in security-sensitive places, > then we could support that. But none of that should have anything to do > with the security group or its membership. All of that work and discussion,
2018 Jun 01
0
Regroup and create new dataframe
No html!, Copy the list using Reply-All. The data frame group_PrivateLabel does not contain variables called Product_Name or Region. David C From: nguy2952 University of Minnesota <nguy2952 at umn.edu> Sent: Friday, June 1, 2018 2:13 PM To: David L Carlson <dcarlson at tamu.edu> Subject: Re: [R] Regroup and create new dataframe Hi David, your example is perfect! I am still
2008 Jan 15
4
popen woes
From: "Michael S. Fischer" <michael at dynamine.net> > > I wanted my worker program (which uses EM) to pass the user''s password > to the Expect script via standard input in order to avoid some > security hazards associated with alternatives such as storing it in a > file or in the environment, either of which may be observed by others > logged into the
2019 Jun 05
3
ADS security mode - authenticating non-domain Linux users
Hi Rowland, Thanks very much for the reply and confirming what I suspected. One quick questions in-line, if I may: On 6/4/19 4:00 PM, Rowland penny via samba wrote: > 'map untrusted to domain' made 'UNKNOWNDOMAIN\fred' become > 'LOCALDOMAIN\fred' and if 'fred' is a member of 'LOCALDOMAIN' and has > the correct password, then access will be
2009 Apr 30
1
[Announce] Samba 3.4.0pre1 Available for Download
Release Announcements ===================== This is the first preview release of Samba 3.4. This is *not* intended for production environments and is designed for testing purposes only. Please report any defects via the Samba bug reporting system at https://bugzilla.samba.org/. Major enhancements in Samba 3.4.0 include: ------------------------------------------ General changes: o Samba4 and
2009 Apr 30
1
[Announce] Samba 3.4.0pre1 Available for Download
Release Announcements ===================== This is the first preview release of Samba 3.4. This is *not* intended for production environments and is designed for testing purposes only. Please report any defects via the Samba bug reporting system at https://bugzilla.samba.org/. Major enhancements in Samba 3.4.0 include: ------------------------------------------ General changes: o Samba4 and
2007 Apr 05
1
signing certs
I noticed a behaviour which is kind of confusing. I have the puppetmasterd running. Now I want a new client to connect. I edit the site.pp and add the client. When the client is started I can see it with puppetca --list. So I sign the client. When it next tries to connect it shows: notice: Allowing ::ffff:192.168.x.y(::ffff:192.168.x.y) untrusted access to CA methods notice: Host