similar to: C5 : Firefox 38 bug

Displaying 20 results from an estimated 1000 matches similar to: "C5 : Firefox 38 bug"

2015 Jun 14
0
C5 : Firefox 38 bug
On Sun, June 14, 2015 8:03 am, James B. Byrne wrote: > > On Sat, June 13, 2015 17:56, Valeri Galtsev wrote: > >> >> As I said about these services here (KGB, CIA, MI-6, ...) there >> is no "ex" for their agents. The only way one retired from these >> organizations is dead, feet first dead. >> > > A bit hyperbolic. One could with as much
2015 Jun 12
2
C5 : Firefox 38 bug
On Fri, June 12, 2015 3:54 pm, jd1008 wrote: > > > On 06/12/2015 02:32 PM, Valeri Galtsev wrote: >> On Fri, June 12, 2015 3:20 pm, John R Pierce wrote: >>> On 6/12/2015 1:03 PM, Valeri Galtsev wrote: >>>> But the bottom line is the same: in both cases you are executing >>>> somebody's else code on your computer. >>> >>> your
2015 Jun 12
1
C5 : Firefox 38 bug
On Fri, June 12, 2015 4:16 pm, jd1008 wrote: > > > On 06/12/2015 03:05 PM, Valeri Galtsev wrote: >> On Fri, June 12, 2015 3:54 pm, jd1008 wrote: >>> >>> On 06/12/2015 02:32 PM, Valeri Galtsev wrote: >>>> On Fri, June 12, 2015 3:20 pm, John R Pierce wrote: >>>>> On 6/12/2015 1:03 PM, Valeri Galtsev wrote: >>>>>> But the
2015 Jun 12
4
C5 : Firefox 38 bug
On Fri, June 12, 2015 3:20 pm, John R Pierce wrote: > On 6/12/2015 1:03 PM, Valeri Galtsev wrote: >> But the bottom line is the same: in both cases you are executing >> somebody's else code on your computer. > > > your computer is *ALWAYS* executing someone elses code, unless you wrote > every line of code in it, including the BIOS and the firmware of all the >
2015 Jun 13
2
C5 : Firefox 38 bug
On 06/13/2015 08:54 AM, jd1008 wrote: > > > The more you know, the less you trust :) :) > Read the article: > http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage > > Got love a page that asserts dozens of alarming things with no examples, references or links to further reading, on top of that my understanding is that the
2015 Apr 02
1
OT: Recommended anti-virus for Windows
Well them plus CIA, NSA, Barney the Dinosaur and Teletubbies. Brian Bernard On Apr 2, 2015 5:58 PM, "????????? ????????" <nevis2us at infoline.su> wrote: > One thing I forgot to mention: I also always recommend AGAINST using >> kasperski. Kasperski is KGB guy (*cough* *cough* retired. You know in that >> service retirement is only feet first dead, so you do your
2006 May 03
13
Can I recreate a Fax from a recorded file?
This is a very KGB / NSA / InterPOL / CIA type question, but if I have a recorded file (G.711, no compression) can I feed it into standard in of an application and have it recreate the fax that was send? I don't know enough about the Fax handshaking to understand this. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2015 Apr 02
5
OT: Recommended anti-virus for Windows
On Thu, April 2, 2015 4:27 pm, Valeri Galtsev wrote: > > On Thu, April 2, 2015 4:11 pm, J Martin Rushton wrote: >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> Sorry to mention the "opposition" here, but I have a family member's >> laptop to protect, and I'm not allowed to upgrade it to Linux. What's >> the current best
2017 Jun 30
4
[Fwd: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible?]
Do you know this? Dario ------- Messaggio inoltrato ------- Da: stan <stanl-fedorauser at vfemail.net> Reply-to: Community support for Fedora users <users at lists.fedoraproject.org> A: users at lists.fedoraproject.org Oggetto: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?) Is this credible? Data: Thu, 29 Jun 2017 15:51:43 -0700 Wikileaks released a document about an
2016 Oct 21
2
Was, Re: photos on iPhone 6, is google
Valeri Galtsev wrote: > > On Fri, October 21, 2016 9:18 am, Brian Mathis wrote: >> For the OP: >> Did you even try Google before asking the list? Google should always be >> your first choice. > > No, darn, no!! Not google, duckduckgo should be! Or any other web _search_ > engine... > > ;-) > There's only one trouble: google is the only search engine I
2015 Oct 28
6
Detecting empty office doc containing virus macro
We are receiving LOTS of emails that contain empty XLS or DOC documents with embedded virus macros. These are getting past SPAMASSASSIN, Clamav and Kaspersky. I'm trying to write a filter for EXIM to block these emails but I need to know a good, quick, command-line to detect an empty doc with a macro. Is there anything available that I can use?? I have managed to write a PERL script to
2015 Jun 12
0
C5 : Firefox 38 bug
On 06/12/2015 03:05 PM, Valeri Galtsev wrote: > On Fri, June 12, 2015 3:54 pm, jd1008 wrote: >> >> On 06/12/2015 02:32 PM, Valeri Galtsev wrote: >>> On Fri, June 12, 2015 3:20 pm, John R Pierce wrote: >>>> On 6/12/2015 1:03 PM, Valeri Galtsev wrote: >>>>> But the bottom line is the same: in both cases you are executing >>>>>
2007 Oct 17
9
proxy errors with apache2.2.3 + mongrels
I''ve posted this to rails-deployment as well. I have to administer a medium size rails app (1''5 million requests each day), recently I''ve switched from lighttpd + fcgi to apache + mongrel. In the following lines I am going to describe the platform: All machines are running Debian Etch, with 4 gb ram and dual core intel32 processors. Web server runs debian''s
2012 Sep 13
1
cannot write to CIFS shares on a Windows box from Centos 6
Another issue that I found was that I cannot write to CIFS shares on a Windows server with Centos 6. I can write to them from Centos 5 and older Fedora versions, but not from Centos 6. Any ideas on what needs to be changed or where I can start looking for some indication of what is wrong? Thank you, Ryan Palamara ZAIS Group, LLC 2 Bridge Avenue, Suite 322 Red Bank, New Jersey 07701 Phone: (732)
2015 Jun 13
0
C5 : Firefox 38 bug
On 6/13/2015 12:15 AM, Rob Kampen wrote: >> > Got love a page that asserts dozens of alarming things with no > examples, references or links to further reading, on top of that my > understanding is that the principals of this domain are (ex) KGB > agents. Incendiary writing designed to create fear and angst. standard operating procedures in the (in)Security business. --
2015 Jun 14
0
C5 : Firefox 38 bug
> On 6/13/2015 12:15 AM, Rob Kampen wrote: >>> >> Got love a page that asserts dozens of alarming things with no >> examples, references or links to further reading, on top of that my >> understanding is that the principals of this domain are (ex) KGB >> agents. Incendiary writing designed to create fear and angst. Notwithstanding the FSB aspect of the source:
2005 Sep 29
2
icecast with ices as source
ok, correct me where I'm wrong: - the <sources> tag defines max ices processes can feed icecast - several ices sources are sent to the same icecast process, but on different ports - the icecast process is configured with <relay> <server>127.0.0.1</server> ..... </relay> for each ices instance ? or with mount ? thanks, petre On 29 Sep 2005
2005 Apr 13
4
Icecast 2.2
Hi, My stream host upgraded me to 2.2 and since that time I am no longer listed on the Icecast directory. I use SAM3 and it is setup correctly on my end and my provider states all is set correctly there, but it still does not work. Has anyone had this problem? thanks, Greg http://progpalaceradio.com gregstaf@progpalaceradio.com
2006 Feb 05
2
Continuous Integration question (not CIA question)
On 2/5/06, Joe Van Dyk <joevandyk@gmail.com> wrote: > On 2/4/06, Jonathan Weiss <jw@innerewut.de> wrote: > > Joe Van Dyk wrote: > > > Hi, > > > > > > I''d like to set up CIA. So I added the plugin to my app, went to my > > > subversion server, added the post commit, added a build directory. > > > > > > I checked
2005 Sep 29
3
icecast with ices as source
hello I have the following problem: is it possible to have several ices "feed" mp3 files to only one icecast process ? or do I have to make pais - ices/icecast - in order to have several streams on my machine ? thanks, petre -- Petre Bandac - petre@kgb.ro