Am 21.08.2015 um 23:46 schrieb Andrew Neuschwander
:
> On 08/21/2015 02:04 PM, Leon Fauster wrote:
>> Am 21.08.2015 um 21:08 schrieb Александр Кириллов :
>>>
>>> Try to change %_tmppath in /usr/lib/rpm/macros or build in mock and place
>>> the whole chroot on a larger drive (/etc/mock/site-defau
Am 22.08.2015 um 00:18 schrieb Ned Slider :
>
> On 21/08/15 22:46, Andrew Neuschwander wrote:
>> On 08/21/2015 02:04 PM, Leon Fauster wrote:
>>> Am 21.08.2015 um 21:08 schrieb Александр Кириллов :
>>
>> I set %_tmppath (in ~/.rpmmacros) and $TMPPATH (xz called by
>> find-debuginfo.sh uses it) and
Thunderbird has a MITM vulnerability with its otherwise rather groovy
auto-configuration feature.
The problem is that it makes requests via HTTP to retrieve the auto
configuration information.
This allows a black hat (e.g. the NSA) to modify the results sent to the
client, and the client has
Had seen various folks ask about how to do this (I did mine long ago and
far away to make my Windows machine dual-bootable to Win or CentOS) and
while looking for some HD repair diagnostics, ran across this and
thought it may be useful to some folks.
http://rufus.akeo.ie/
I've not yet used it, bu
4 matches
Mail list logo