--- Malcolm Ferguson <[EMAIL PROTECTED]> wrote:
>John DOE wrote:
>>
>> Have to code the application in C ( I would prefer visual basic since it is
>> sometimes hard to tell a professor that this code does it in C especially if
>> you are in Turkey ) or C++
--- Wade Richards <[EMAIL PROTECTED]> wrote:
>Hello Mr. Bacteria/John Doe:
>
>Translation: Homework is hard, and plagiarism is so much easier.
>Can someone please do my homework for me?
Wrong translation. First of all I did not ask anybody to do my work for me I
just asked
--- Malcolm Ferguson <[EMAIL PROTECTED]> wrote:
>John DOE wrote:
>>
>> Have to code the application in C ( I would prefer visual basic since it is
>sometimes hard to tell a professor that this code does it in C especially if you are
>in Turkey ) or C++ and of
--- Wade Richards <[EMAIL PROTECTED]> wrote:
>Hello Mr. Bacteria/John Doe:
>
>Translation: Homework is hard, and plagiarism is so much easier.
>Can someone please do my homework for me?
Wrong translation. First of all I did not ask anybody to do my work for me I just
asked
I have to find a library that will make me able to use public-key and
symmetric-key crypto functions like RSA or ElGamal algorithm and IDEA or AES (
formerly known as Rijndael ). And also I have to have a MAC function like SHA
but prefer any collision resistant keyed hash function if it is easil
I have to find a library that will make me able to use public-key and symmetric-key
crypto functions like RSA or ElGamal algorithm and IDEA or AES ( formerly known as
Rijndael ). And also I have to have a MAC function like SHA but prefer any collision
resistant keyed hash function if it is easi
Hello everybody,
I want to have some information about what kind of cryptological benefits does
my linux server offer to me . I searched linuxdoc.org but could not find a howo
about linux cryptology. Could you please guide me to a web site or to a
documentation site where I can start from the no
Hello everybody,
I want to have some information about what kind of cryptological benefits does my
linux server offer to me . I searched linuxdoc.org but could not find a howo about
linux cryptology. Could you please guide me to a web site or to a documentation site
where I can start from the n
Have a look at RFC 1034-RFC 1035 that gives more information about dns servers
and dns logic. Btw this is a security list, if you have serious questions about
bind or any other dns d's you should use another mailing list instead of that
one, if you have security problems about bind we will be gr
Have a look at RFC 1034-RFC 1035 that gives more information about dns servers and dns
logic. Btw this is a security list, if you have serious questions about bind or any
other dns d's you should use another mailing list instead of that one, if you have
security problems about bind we will be g
too many dots too many numbers and confusion ;) you are rigth :).
--- kath <[EMAIL PROTECTED]>
> wrote:
>I think you mean 2.4.2 not 2.2.4 =)
>
>- k
>
>On Wednesday 25 July 2001 07:59 am, John DOE wrote:
>> hi, I got a similar problem on a machine running IPCHAINS.
hi, I got a similar problem on a machine running IPCHAINS. after an
upredictable time period the machine suddenly forgets the ethernet card and
results 100% packet loss even ifconfig shows the interface is there and then
crashes. I can see the card starts blinking and packets are coming but ther
too many dots too many numbers and confusion ;) you are rigth :).
--- kath <[EMAIL PROTECTED]>
> wrote:
>I think you mean 2.4.2 not 2.2.4 =)
>
>- k
>
>On Wednesday 25 July 2001 07:59 am, John DOE wrote:
>> hi, I got a similar problem on a mach
hi, I got a similar problem on a machine running IPCHAINS. after an upredictable time
period the machine suddenly forgets the ethernet card and results 100% packet loss
even ifconfig shows the interface is there and then crashes. I can see the card starts
blinking and packets are coming but the
Well I am not a guru on this subject and did not want to put my nose into that
( well this is my MsD project at the moment ) but as far as I know
impersonation is not the only thing we try to achieve when we are using such
things. We also use one way hash functions to get a value out of our mes
Well I am not a guru on this subject and did not want to put my nose into that ( well
this is my MsD project at the moment ) but as far as I know impersonation is not the
only thing we try to achieve when we are using such things. We also use one way hash
functions to get a value out of our m
Hello, I am a new debian user and someone still learning linux. I have a
small problem. In my company ( which is a microsoft developer ) I insisted on
using a firewall created with Ipchains of 3
zones ( dmz - local - internet ) on a Intel Pentium Pro processor machine
running Debian 2.2r3 on i
Hello, I am a new debian user and someone still learning linux. I have a
small problem. In my company ( which is a microsoft developer ) I insisted on using a
firewall created with Ipchains of 3
zones ( dmz - local - internet ) on a Intel Pentium Pro processor machine
running Debian 2.2r3
18 matches
Mail list logo