Displaying 16 results from an estimated 16 matches similar to: "SYSKEY2. Request For Comments"
2000 Feb 17
0
Using rpcclient or samedit to randomise trust account passwords
when an nt 4.0 workstation or backup domain controller is joined to a
domain, the trust account password is set to a well-known initial value.
if you are concerned about internal network security, this is not really
an acceptable risk: any captured network traffic can be decoded simply
from knowing the name of the workstation, which is contained in the
network traffic itself. the initial value
2016 Dec 26
6
[Bug 99202] New: system freeze - fifo: SCHED_ERROR 0a [CTXSW_TIMEOUT] - MULTIPLE_WARP_ERRORS - DATA_ERROR 00000004 [INVALID_VALUE] - ILLEGAL_CLASS ch 11 - RT_STORAGE_TYPE_MISMATCH - CLASS_SUBCH_MISMATCH
https://bugs.freedesktop.org/show_bug.cgi?id=99202
Bug ID: 99202
Summary: system freeze - fifo: SCHED_ERROR 0a [CTXSW_TIMEOUT] -
MULTIPLE_WARP_ERRORS - DATA_ERROR 00000004
[INVALID_VALUE] - ILLEGAL_CLASS ch 11 -
RT_STORAGE_TYPE_MISMATCH - CLASS_SUBCH_MISMATCH
Product: xorg
Version: unspecified
2011 Feb 18
1
[PATCH] core: Honor DISPLAY text background color when in VGA mode
When in VGA graphics mode, BIOS int 10h ah=09h doesn't seem to
treat high-order attribute bits as a background color; instead,
it apparently always uses black. This means that a background
color requested via <SI> in a DISPLAY file is not honored in
VGA mode.
However, the BIOS supports an "XOR" mode, in which the pixels
to be written are XORed with pixels already on the
2007 Sep 18
0
Re: LARTC Digest, Vol 31, Issue 25
>
> Message: 6 Date: Tue, 18 Sep 2007 10:44:42 +0200 From: Michal Soltys
> <nozo@ziu.info> Subject: Re: [LARTC] I''m having an issue with u32
> masking To: lartc@mailman.ds9a.nl Message-ID:
> <46EF8FFA.6070707@ziu.info> Content-Type: text/plain;
> charset=ISO-8859-1; format=flowed Vadtec wrote:
>> > Is this how tc is supposed to work? Does it only
2015 Dec 28
1
[PATCH 2] more changes in bitmath.h
1) FLAC supports only MSVS 2005 and newer, so (_MSC_VER >= 1400)
is always true and can be removed.
2) The argument for FLAC__clz_uint32() is of FLAC__uint32 type, so
FLAC__clz_soft_uint32() should have the same argument type.
3) The patch removes unnecessary parentheses around 'word' variable.
4) It also replaces "sizeof(FLAC__uint32) * CHAR_BIT - 1 -
2011 Apr 11
0
[LLVMdev] TTA-Based Co-design Environment (TCE) v1.4 released
TTA-Based Co-design Environment (TCE) is a toolset for designing
application-specific processors (ASP) based on the Transport Triggered
Architecture (TTA). The toolset provides a complete retargetable co-design
flow from C programs down to synthesizable VHDL and parallel program
binaries. Processor customization points include the register files,
function units, supported operations, and the
2012 Jun 15
0
[LLVMdev] Windows development and "virus" in LLVM test suite
Sounds like a great idea. On Windows there are so many types of antivirus
solutions, that it is impossible to provide a detailed description of how
to add an ignored folder for all of them.
-- A Windows user only for the games.
2012/6/15 Hal Finkel <hfinkel at anl.gov>
>
>
> ----- Original Message -----
> > From: "Chandler Carruth" <chandlerc at google.com>
2008 Mar 18
0
AST-2008-005: HTTP Manager ID is predictable
Asterisk Project Security Advisory - AST-2008-005
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | HTTP Manager ID is predictable |
2008 Mar 18
0
AST-2008-005: HTTP Manager ID is predictable
Asterisk Project Security Advisory - AST-2008-005
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | HTTP Manager ID is predictable |
2012 Jun 15
2
[LLVMdev] Windows development and "virus" in LLVM test suite
----- Original Message -----
> From: "Chandler Carruth" <chandlerc at google.com>
> To: "Mikael Lyngvig" <mikael at lyngvig.org>
> Cc: "LLVMdev Mailing List" <llvmdev at cs.uiuc.edu>
> Sent: Friday, June 15, 2012 5:00:03 PM
> Subject: Re: [LLVMdev] Windows development and "virus" in LLVM test suite
> On Fri, Jun 15, 2012
2000 Feb 24
1
Making password driven SSH 'immune' to MTM attacks.
[I know this is the 'port' list, but I can't find a better place to post
this, and with the garbage going on @slashdot I figured I'd get this out.
This belongs on sci.crypt or a general OpenSSH mailing list]
First, a quick rehash of stuff everyone here already knows,
OpenSSH can use two major forms of authentication:
1. Password
2. RSA keys
The RSA method is good because it
2014 Aug 07
2
[LLVMdev] Signed NaNs in APFloat arithmetic
Ok. That you for clarifying the point for me. I was primed for a
regression because this behavior changed over llvm versions and was
causing my tests to fail ;). I'm now doing bitcasting to int, xoring
with the signbit and bitcasting back.
On Thu, Aug 7, 2014 at 2:59 AM, Owen Anderson <resistor at mac.com> wrote:
> Subtraction is also not a correct implementation of negation, for
2005 May 25
0
[PATCH] Fix fuction prototypes/definitions with void argument
Hi,
the patch below fixes function prototypes/defintions with void
argument to shut up the heartful warnings by recent gcc :)
It doesn't cover all places, e.g. test directories.
The patch is to 1.1.2.
Takashi
--- src/metaflac/operations.c-dist 2005-05-25 16:20:02.000000000 +0200
+++ src/metaflac/operations.c 2005-05-25 16:20:09.000000000 +0200
@@ -26,7 +26,7 @@
#include <stdlib.h>
2010 Jun 17
4
[PATCH] Improve support for exporting btrfs subvolumes.
If you export two subvolumes of a btrfs filesystem, they will both be
given the same uuid so lookups will be confused.
blkid cannot differentiate the two, so we must use the fsid from
statfs64 to identify the filesystem.
We cannot tell if blkid or statfs is best without knowing internal
details of the filesystem in question, so we need to encode specific
knowledge of btrfs in mountd. This is
2012 Jan 15
22
Does raidzN actually protect against bitrot? If yes - how?
"Does raidzN actually protect against bitrot?"
That''s a kind of radical, possibly offensive, question formula
that I have lately.
Reading up on theory of RAID5, I grasped the idea of the write
hole (where one of the sectors of the stripe, such as the parity
data, doesn''t get written - leading to invalid data upon read).
In general, I think the same applies to bitrot of
2009 Jul 23
1
[PATCH server] changes required for fedora rawhide inclusion.
Signed-off-by: Scott Seago <sseago at redhat.com>
---
AUTHORS | 17 ++++++
README | 10 +++
conf/ovirt-agent | 12 ++++
conf/ovirt-db-omatic | 12 ++++
conf/ovirt-host-browser | 12 ++++