similar to: [OFF-TOPIC] Reminder to tighten ALL types of security

Displaying 20 results from an estimated 1100 matches similar to: "[OFF-TOPIC] Reminder to tighten ALL types of security"

2015 Apr 02
1
OT: Recommended anti-virus for Windows
Well them plus CIA, NSA, Barney the Dinosaur and Teletubbies. Brian Bernard On Apr 2, 2015 5:58 PM, "????????? ????????" <nevis2us at infoline.su> wrote: > One thing I forgot to mention: I also always recommend AGAINST using >> kasperski. Kasperski is KGB guy (*cough* *cough* retired. You know in that >> service retirement is only feet first dead, so you do your
2006 Jul 03
2
[Bug 1205] scp back-slash escaping of spaces ignored after username@hostname: tag
http://bugzilla.mindrot.org/show_bug.cgi?id=1205 Summary: scp back-slash escaping of spaces ignored after username at hostname: tag Product: Portable OpenSSH Version: 4.3p2 Platform: ix86 OS/Version: Linux Status: NEW Keywords: low-hanging-fruit Severity: normal Priority: P3
2002 Jun 29
2
TO SYMMETRY AND ASYMMETRY-----NOW ADD SUPERSYMMETRY
Open Letter to Developers, Is there any way you can cut through the mob scene at Homeland Defense with a powerful new encryption/decryption formula? The government cryptography bunch are stuck in symmetry and asymmetry and are deaf/dumb/blind to supersymmetry. When it's so easy to line up a supersymmetrical hypercube fractal-to-fractal, pair-to-pair, quantum-to-quantum and slice through
2013 Dec 11
1
A Question about Management/Control Protocol Licensing
I see the following paragraph in the Asterisk trunk LICENSE file: "In addition, Asterisk implements two management/control protocols: the Asterisk Manager Interface (AMI) and the Asterisk Gateway Interface (AGI). It is our belief that applications using these protocols to manage or control an Asterisk instance do not have to be licensed under the GPL or a compatible license, as we believe
2007 May 06
1
simple table ordering question
Hi all, I'm sure this is simple but I don't get it. I have a table mytable<-c(rep("Disagree",37),rep("Agree",64)) table(mytable) this gives me Agree Disagree 64 37 but I didn't ask for it to be in alphabetic order. How can I get it in original order? Disagree Agree 37 64 Thanks, Jeff Jeffrey. M. Miller, PhD
2005 Oct 16
0
Climb Aboard the Small Cap Gravy Train
Newsletter - October Issue, 2005 In October's issue we are going to profile a company involved in the Red Hot homeland security sector, also recently entering the Oil/Energy Industry! This company's st0ck is very much undervalued considering the potential of the industry and the position of the company. (The perfect time to get in) This small treasure is: VNBL (Vinoble, Inc.)
2016 Mar 10
0
[OT] security bug with firefox and add-on
> Date: Wednesday, March 09, 2016 17:30:57 -0600 > From: g <geleem at bellsouth.net> > > On 03/09/16 14:28, Ned Slider wrote: >> On 09/03/16 19:11, g wrote: > <<<>>> > >> Does it affect the latest version of Firefox just released: >> >> firefox-38.7.0-1.el6_7 >> >> Is the bug in Firefox or the add-on. >>
2023 Nov 24
0
Dear friends from the United States
I hope this message finds you well and thriving in your endeavors. As a fellow Vietnamese student currently pursuing education in the United States, I can't help but feel a sense of pride and excitement about the prospect of inviting you to experience the beauty and charm of my homeland, Vietnam. Vietnam is a land of captivating landscapes, rich history, and warm hospitality. From the
2016 Jul 27
0
NT4-Style Auth & Roaming Profiles Only?
On Tue, 26 Jul 2016 13:40:59 -0500 Dale Schroeder <dale at BriannasSaladDressing.com> wrote: [snip] > > Sorry Rowland, but the break happened before the badlock patches when > Debian jumped from 4.1.x to 4.3.x, skipping 4.2.x altogether. [snip] > > Jim, currently at Debian 4.4.5. If you search this list, you will > find others who have had the same thing happen. To my
2017 May 31
3
CentOS 6.9, shredding a RAID
John R Pierce wrote: > On 5/31/2017 10:13 AM, m.roth at 5-cent.us wrote: >> If I had realized it would run this long, I would have used DBAN.... For >> single drives, I do, and choose DoD 5220.22-M (seven passes), which is >> *way* overkill these days... but I sign my name to a certificate that >> gets stuck on the outside of the server, meaning I, personally, am
2016 Jul 27
1
NT4-Style Auth & Roaming Profiles Only?
On 7/27/2016 12:18 PM, Jim Seymour wrote: > On Tue, 26 Jul 2016 13:40:59 -0500 > Dale Schroeder <dale at BriannasSaladDressing.com> wrote: > > [snip] >> Sorry Rowland, but the break happened before the badlock patches when >> Debian jumped from 4.1.x to 4.3.x, skipping 4.2.x altogether. > [snip] >> Jim, currently at Debian 4.4.5. If you search this list, you
2016 May 06
2
Resuming the discussion of establishing an LLVM code of conduct
On 6 May 2016 at 23:31, Tanya Lattner <tanyalattner at llvm.org> wrote: > I am not going to argue with you anymore. I hope this isn't how we'll deal with CoC violations. > Please stop twisting my words. I'm certainly not twisting your words. I'm sorry you feel that way. I explicitly said I was confused, and I asked questions to understand what the point was. This
2019 Jun 26
0
Re: [libnbd PATCH 0/2] Tighten URI parser
On Tue, Jun 25, 2019 at 09:09:58PM -0500, Eric Blake wrote: >I'm not sure whether we want to go with just the first patch (reject >nbd:unix:/path but still accept nbd:/path), or squash the two in order >to go with the second (reject both abbreviated forms, and require >scheme://...). Either way, though, nbdkit -U - --run '$nbd' will now >error out rather than
2018 Sep 08
1
Re: [PATCH nbdkit v2 2/6] main: Tighten up characters permitted in config keys.
On 09/08/2018 03:15 AM, Richard W.M. Jones wrote: > Previously key=value on the command line allowed the key to be pretty > much anything that didn't contain an '=' character. Even empty > strings were permitted. > > This tightens up the permitted keys so they must contain only ASCII > alphanumeric, period, underscore or dash characters, and must not be > an
2023 Jul 17
1
[libnbd PATCH 1/2] api: Tighten rules on completion.callback
On Sun, Jul 16, 2023 at 04:39:18PM +0000, Tage Johansson wrote: > > @@ -194,7 +198,10 @@ calls. The cookie is unique (per libnbd handle) and E<ge> 1. > > > > You may register a function which is called when the command > > completes, see L</Completion callbacks> below. In this case we have > > -specified a null completion callback. > >
2007 Feb 11
2
tighten up class?
The following works fine but is there some way to make it more succinct? Thanks, Kent class obsd_etc_static { file { "/etc/mygate": owner => root, group => wheel, mode => 644, backup => main, source => "puppet://example.com/obsd_static/mygate" } file { "/etc/rc.conf": owner => root, group => wheel,
2007 Jul 27
2
Patch to tighten down the permissions and ownership in configuration.rb
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Attached is a patch which attempts to enforce ''proper'' permissions of all files controlled directly by the puppet processes. All owners and groups are explicitly set as are all permissions. The idea is that the Puppet process configuration files should be relatively tamper resistant and at least throw a warning that the
2018 Sep 08
0
[PATCH nbdkit v2 2/6] main: Tighten up characters permitted in config keys.
Previously key=value on the command line allowed the key to be pretty much anything that didn't contain an '=' character. Even empty strings were permitted. This tightens up the permitted keys so they must contain only ASCII alphanumeric, period, underscore or dash characters, and must not be an empty string. --- docs/nbdkit-plugin.pod | 18 ++++++++++-------- src/main.c
2018 Sep 10
0
[PATCH nbdkit v3 2/6] main: Tighten up characters permitted in config keys.
Previously key=value on the command line allowed the key to be pretty much anything that didn't contain an '=' character. Even empty strings were permitted. This tightens up the permitted keys so they must contain only ASCII alphanumeric, period, underscore or dash characters; must not be an empty string; and must start with an ASCII alphabetic character. --- docs/nbdkit-plugin.pod
2006 Feb 11
1
Bug#352337: please tighten permissions on /etc/logcheck
Package: logcheck Severity: wishlist I see no reason why /etc/logcheck should have any more permissions than 0750. Please consider removing access rights from 'other'. -- System Information: Debian Release: testing/unstable APT prefers stable APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 'experimental') Architecture: i386 (i686)