On Tue, Jun 26, 2001 at 08:59:45AM -0700, BigNews wrote:
> English:
>
> http://www.faluninfo.net/
>
> Chinese:
>
> http://www.minghui.ca/mh/articles/2001/6/14/12083.html
Sorry, gnucash folks. I was trying to do something else at the same
time as moderating the non-member posts and I let this
FYI.
--linas
- Forwarded message from Paul Fenwick <[EMAIL PROTECTED]> -
From: Paul Fenwick <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-PGP-Fingerprint: BD81 4071 CB8C A0A3 79A9 0319 C793 7A8F B147 9E55
Resent-To: [EMAIL PROTECTED]
Subject: [Finance-quote-devel] Finance::Quote v1.06 ava
On Mon, Jun 25, 2001 at 11:18:48PM -0700, Dave Peticolas was heard to remark:
> On 26 Jun 2001 00:56:51 -0500, Linas Vepstas wrote:
> > What's the right way to initialize the list of iso currencies?
> > When I just call gnc_book_load() from a stand-alone C program,
> > it gets a parse error, becau
On Mon, Jun 25, 2001 at 09:40:07PM -0400, Mattias Hembruch was heard to remark:
> Linas Vepstas wrote:
> >
> > On Mon, Jun 25, 2001 at 08:53:57PM -0400, Mattias Hembruch was heard to remark:
> > >
> > > Thanks. I was going to try that anyway as soon as I get another machine up
> > > and running..
ccing the mailing list ...
On Mon, Jun 25, 2001 at 06:54:11PM -0500, [EMAIL PROTECTED] was heard to remark:
>
> One thought would be to try to build an alternative to QIF/OFX/IFF,
> and _DO IT RIGHT_.
Easier said than done.
(actually, IIF doesn't look that bad; just underdocumented).
> Note t
Does postgres' internal network functionality include network-level
encryption?
-derek
[EMAIL PROTECTED] (Linas Vepstas) writes:
> It should ... but that depends very much how you set up hba.conf
> If you marke a certain host (such as yourself) trusted, then clearly
> it won't behave the same w
On Tue, Jun 26, 2001 at 01:26:06PM -0400, Derek Atkins was heard to remark:
> Does postgres' internal network functionality include network-level
> encryption?
The postgres documentation recommends setting up ssh to port-forward
the postgres port. And if you already know ssh, this seems to
be
[EMAIL PROTECTED] (Linas Vepstas) writes:
> On Tue, Jun 26, 2001 at 01:26:06PM -0400, Derek Atkins was heard to remark:
> > Does postgres' internal network functionality include network-level
> > encryption?
>
> The postgres documentation recommends setting up ssh to port-forward=20
> the postgr
[EMAIL PROTECTED] (Linas Vepstas) writes:
> One posibility is OTP -- open trading protocol. This was issued
> by a small company some 3 years back. Don't know if its dead or allive.
> It seemed to be designed specifically for communicating the transfer of
> 'stuff' from one vendor to another,
I was sitting here, thinking, 'you know what gnucash really needs?
post-it notes!' It would be pretty cool to stick one onto
some transaction; every time you opened the register, there it would
be, a big fat post-it stuck to the transaction, scrolling with it.
It screams out 'hey you need to
On Tue, Jun 26, 2001 at 02:00:14PM -0400, Derek Atkins was heard to remark:
> [EMAIL PROTECTED] (Linas Vepstas) writes:
>
> > On Tue, Jun 26, 2001 at 01:26:06PM -0400, Derek Atkins was heard to remark:
> > > Does postgres' internal network functionality include network-level
> > > encryption?
> >
True, I agree with you that key management is hard. However, SSH
is not the answer. Think about what it means to require SSH with
port forwarding:
a) you cannot easily have multiple connections going at once
(because you cannot have multiple port-forwarders on the
On Tue, Jun 26, 2001 at 02:12:21PM -0400, Derek Atkins was heard to remark:
> [EMAIL PROTECTED] (Linas Vepstas) writes:
>
> > One posibility is OTP -- open trading protocol. This was issued
> > by a small company some 3 years back. Don't know if its dead or allive.
> > It seemed to be designed
On Tue, Jun 26, 2001 at 05:56:34PM -0400, Derek Atkins was heard to remark:
> True, I agree with you that key management is hard. However, SSH
> is not the answer.
OK, yep.
> I still maintain that a self-contained end-to-end encryption is the
> way to go. We can use an RPC (be is SOAP/CORBA/
> Thus I claim that the 'right' implementation would be a kernel module
> (so that its not breakable even if the root shell has been compromised,
> which is something lomac protects against). The kernel module would
> work with some appropriate set of authentication mechanisms to
> verify the trus
15 matches
Mail list logo