We have been helping thousands of men with male enhancement
http://qudk.roukvs92oj9hda9.carucatedlf.info
Everybody winds up kissing the wrong person good night.
Practice, the master of all things.
University politics are vicious precisely because the stakes are so small.
--
To
On Mon, Jul 04, 2005 at 03:07:23AM +0200, Matthias Klose wrote:
> Junichi Uekawa writes:
> > Hi,
> >
> > > This week, we will change the GCC default versions from 3.3 to 4.0
> >
> > Would it break kernel 2.4 builds somehow ?
>
> No, you can still build using gcc-3.3.
I have added this as a buil
[Martijn van Oosterhout]
> To be honest, I think it would be far more useful to timestamp each
> entry so you can simply expire old ones.
Last access time, it'd have to be, not create time. Meaning, every
time ssh runs, it rewrites .ssh_known_hosts (and not just appends to
it). Which implies lo
On Thursday 09 June 2005 08:17 pm, Kenneth Stailey wrote:
> --- Anonymous <[EMAIL PROTECTED]> wrote:
>
> > >> Can't the remainder of the third DVD be filled up
with multimedia
> > >> propoganda files or other fluff?
>
> > > Or 3vil planz for world domination?
>
> > If all elve fails fill it up
Good day sir,
This just in - 2005 Digital Filters have just been released
with the latest Pass-Through technology video bypass chip.
At this time, it's the only digital filter on the market
today that you can get with the new lockup buster technology!
Now you can get Sports, HBO, Cinemax, Starz
Thiemo Seufer <[EMAIL PROTECTED]> writes:
> Junichi Uekawa wrote:
>> Hi,
>>
>> > This week, we will change the GCC default versions from 3.3 to 4.0
>>
>> Would it break kernel 2.4 builds somehow ?
>> I've not been quite following; but the thread almost a month ago
>> seems to indicate thus:
>> h
Package: wnpp
Severity: wishlist
* Package name: hiptex
Version : 0.7.0
Upstream Author : Alexander V. Voinov
* URL or Web page : http://str12.sobor.org/hip/
* License : LaTeX Project Public License
Description : LaTeX package for writing Church Slavonic texts in HIP
Junichi Uekawa writes:
> Hi,
>
> > This week, we will change the GCC default versions from 3.3 to 4.0
>
> Would it break kernel 2.4 builds somehow ?
No, you can still build using gcc-3.3.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PR
Junichi Uekawa wrote:
> Hi,
>
> > This week, we will change the GCC default versions from 3.3 to 4.0
>
> Would it break kernel 2.4 builds somehow ?
> I've not been quite following; but the thread almost a month ago
> seems to indicate thus:
> http://www.kerneltraffic.org/kernel-traffic/kt20050701
Hi,
> This week, we will change the GCC default versions from 3.3 to 4.0
Would it break kernel 2.4 builds somehow ?
I've not been quite following; but the thread almost a month ago
seems to indicate thus:
http://www.kerneltraffic.org/kernel-traffic/kt20050701_316.html#7
regards,
junichi
On Jul 2, 2005, at 19:40, Olaf van der Spek wrote:
On 7/2/05, Marco d'Itri <[EMAIL PROTECTED]> wrote:
What is the rationale for changing the default setting?
I find it very annoying, and from a brief discussion on #debian-
devel I
see that I'm not alone.
What causes this annoyance?
It
On Sun, 2005-07-03 at 18:36 +0200, Martijn van Oosterhout wrote:
> One case I can think of is where you regularly ssh into a machine with
> a dynamic IP address. Maybe with or without a dyndns name. Depending
> on the size of the ISP and how often the address changes the
> known_hosts files could
Package: wnpp
Severity: wishlist
Owner: Dave Mauroni <[EMAIL PROTECTED]>
* Package name: clamtk
Version : 2.02
Upstream Author : Dave Mauroni <[EMAIL PROTECTED]>
* URL : http://clamtk.sourceforge.net
* License : Artistic
Description : A GUI frontend for C
* Colin Watson:
> That's true. You can add them by hand without hashing the host name (and
> use 'ssh-keygen -H' afterwards if you like); known_hosts may contain a
> mix of hashed and unhashed host names.
>
> Is this a feature you would use often?
It might be practical for those of us who copy SS
On Sun, Jul 03, 2005 at 08:25:51PM +0100, Jochen Voss wrote:
> On Sun, Jul 03, 2005 at 12:20:47AM +0100, Colin Watson wrote:
> > On Sat, Jul 02, 2005 at 11:42:40PM +0200, Marco d'Itri wrote:
> > > There is also the quite important point that even the most stupid of the
> > > attackers could just lo
Hello,
On Sun, Jul 03, 2005 at 12:20:47AM +0100, Colin Watson wrote:
> On Sat, Jul 02, 2005 at 11:42:40PM +0200, Marco d'Itri wrote:
> > There is also the quite important point that even the most stupid of the
> > attackers could just look at ~/.bash_profile instead and get all or most
> > of the
I've recently put a number of my packages up for adoption, mostly
because I no longer use them. They are all in good shape, and haven't
been much trouble. Here's the list:
gnomad2 - Manage a Creative Labs Nomad Jukebox
gnusim8085 - Graphical Intel 8085 simulator
neutrino - GNOME shell for managing
No pills, no pumps - Its the Patch
http://www.siratu.com/ss/
Talk of nothing but business, and dispatch that business quickly.
A desk is a dangerous place from which to watch the world.
Toughness doesn't have to come in a pinstriped suit.
It is a profitable thing, if one is wise, to s
Martijn van Oosterhout wrote:
> One case I can think of is where you regularly ssh into a machine with
> a dynamic IP address. Maybe with or without a dyndns name. Depending
> on the size of the ISP and how often the address changes the
> known_hosts files could increase without bound.
I don't bel
Hello
On Sat, Jun 04, 2005 at 05:17:18PM -0500, Adam Heath wrote:
> On Sat, 4 Jun 2005, Josselin Mouette wrote:
>
> > Le vendredi 03 juin 2005 à 18:41 -0500, Adam Heath a écrit :
> > > > I agree. A java policy should talk about how java packages should
> > > > interact
> > > > once installed.
2005/7/3, Colin Watson <[EMAIL PROTECTED]>:
> On Sun, Jul 03, 2005 at 03:28:15PM +0200, Bernd Eckenfels wrote:
> > In article <[EMAIL PROTECTED]> you wrote:
> > > That's true, and unavoidable in this scheme; but the use case (beyond
> > > fastidiousness) for this is not clear to me.
> >
> > Well, h
On Sun, Jul 03, 2005 at 11:08:38AM +0200, Florian Weimer wrote:
> * Colin Watson:
> > On Sat, Jul 02, 2005 at 09:04:18PM +0200, Florian Weimer wrote:
> >> There should be tools supporting this, I agree.
> >
> > There is such a tool, which I mentioned in the changelog:
> >
> > - ssh and ssh-keys
This week, we will change the GCC default versions from 3.3 to 4.0
(for g77 and gpc to 3.4, these are not supported in 4.0) on all
architectures. The GCC-4.0 version used is taken from the GCC 4.0
branch (something that will likely become the 4.0.1 release candidate
3). The switch to 4.0 (instead t
On Sun, Jul 03, 2005 at 05:16:08PM +0200, Kurt Roeckx wrote:
> On Sun, Jul 03, 2005 at 03:52:07PM +0100, Colin Watson wrote:
> > The only time I've ever removed entries from
> > known_hosts is when I know that a specific host's key has changed, and
> > 'ssh-keygen -R' deals with that just fine.
>
On Sun, Jul 03, 2005 at 04:57:58PM +0200, Ola Lundqvist wrote:
> On Fri, Jun 24, 2005 at 05:21:51PM +0200, Bill Allombert wrote:
> > `Depends'
> > This declares an absolute dependency. A package will not be
> > configured unless all of the packages listed in its `Depends'
> > fi
On Sun, Jul 03, 2005 at 03:52:07PM +0100, Colin Watson wrote:
> The only time I've ever removed entries from
> known_hosts is when I know that a specific host's key has changed, and
> 'ssh-keygen -R' deals with that just fine.
That options seems to be undocumented. It's not in the man page
or the
Hello
On Fri, Jun 24, 2005 at 05:21:51PM +0200, Bill Allombert wrote:
> Dear Debian developers,
>
> Following a post to Debian-Devel-Announce, I would like to
> discuss getting rid of circular dependencies.
>
> Why ?
> -
> 1) The semantic of Depends specified by Debian policy 7.2. does not a
On Sun, Jul 03, 2005 at 03:28:15PM +0200, Bernd Eckenfels wrote:
> In article <[EMAIL PROTECTED]> you wrote:
> > That's true, and unavoidable in this scheme; but the use case (beyond
> > fastidiousness) for this is not clear to me.
>
> Well, how do you audit the files and purge stale entries.
Tha
In article <[EMAIL PROTECTED]> you wrote:
> That's true, and unavoidable in this scheme; but the use case (beyond
> fastidiousness) for this is not clear to me.
Well, how do you audit the files and purge stale entries.
Gruss
Bernd
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
On Sun, Jul 03, 2005 at 12:17:13AM +0100, Colin Watson wrote:
> On Sat, Jul 02, 2005 at 11:19:26AM +0200, Marco d'Itri wrote:
> > (BTW, would you mind fixing #284874? It's six months old and should be
> > trivial...)
>
> Sorry I haven't got round to this yet. The reason I haven't done it is
> that
On Sun, Jul 03, 2005 at 02:16:08AM +0200, Marco d'Itri wrote:
> On Jul 03, Colin Watson <[EMAIL PROTECTED]> wrote:
> > Then I'm afraid you simply haven't read the documentation ...
>
> I did. But I cannot remove entries if I do not know the hostname.
That's true, and unavoidable in this scheme; b
* Colin Watson:
> On Sat, Jul 02, 2005 at 09:04:18PM +0200, Florian Weimer wrote:
>> * Wouter Verhelst:
>> > Some of us actually do care what is listed in that file, and edit it
>> > from time to time. Hashing those names makes that much harder
>>
>> There should be tools supporting this, I agree
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi!
For a few weeks there are discrepancies between some "Packages" files
and the files in the ./pool/ directory. Unfortunately the debian-mirrors
list is dead since the end of 2003. Therefore I try to ask this list, if
you know anything about this discrepancy, if you can point me where I
should a
On 7/3/05, Wouter Verhelst <[EMAIL PROTECTED]> wrote:
> On Sat, Jul 02, 2005 at 05:35:09PM -0700, Michael K. Edwards wrote:
> > On 7/2/05, Andrew Suffield <[EMAIL PROTECTED]> wrote:
> > > On Thu, Jun 30, 2005 at 09:43:04PM +0100, Gervase Markham wrote:
> > > > These are two very different cases, th
On Sat, Jul 02, 2005 at 05:35:09PM -0700, Michael K. Edwards wrote:
> On 7/2/05, Andrew Suffield <[EMAIL PROTECTED]> wrote:
> > On Thu, Jun 30, 2005 at 09:43:04PM +0100, Gervase Markham wrote:
> > > These are two very different cases, though. If a local admin installs a
> > > new root cert, that's
36 matches
Mail list logo