You managed to build Sage on OpenBSD? Got some directions on how you did it?
On Sat, Sep 4, 2010 at 8:55 AM, Matthew Emmett wrote:
> Hi,
>
> Another option is Python with the NumPy, SciPy, and Matplotlib
> packages (all of these are in ports).
>
> For some symbolic computations, you might try Sy
Hello all,
I have several new Dell R610's each with four Broadcom BCM5709's that
are not being configured in 4.5-release with the bge driver. I checked
the errata for 4.5 release, but didn't notice any patches that seemed
to address this.
Suggestions or advice appreciated. Dmesg follows:
OpenBSD
Hello all,
For recovery purposes, I'm interested in logging when certain MAC
addresses send traffic to our firewall. Understanding that MAC address
filtering is the province of brconfig plus tagging, I've setup the
following:
External interface: em0
Internal interface: em1
I setup the bridge usi
On 10/25/07, Theo de Raadt <[EMAIL PROTECTED]> wrote:
> You're also a sysadm who refuses to read a paper written by a google
> researcher, who's team found massive bugs in every VM.
That's not quite correct. Restating (yet) again:
1. Ormandy [1] states that Xen's design is congruent with good se
On 10/25/07, Jason Dixon <[EMAIL PROTECTED]> wrote:
> On Thu, Oct 25, 2007 at 01:45:23PM -0500, L. V. Lammert wrote:
> > At 02:28 PM 10/25/2007 -0400, Jason Dixon wrote:
> > >Sure you do. You claim that the following statement is wrong, but you
> > >don't offer any explanation. That's crap.
> > >
On 10/24/07, Damien Miller <[EMAIL PROTECTED]> wrote:
> You obviously didn't read Tavis' virtualisation security paper. VM escape
> vulnerabilites are not theoretical. Tavis found vulnerabilities in every
> VM he tested using only a couple of fuzzers.
Restating my earlier post again, in regards t
On 10/24/07, Paul de Weerd <[EMAIL PROTECTED]> wrote:
> This is the theory. In theory, there's no bugs in OpenBSD. In
> practice, many of the commits to the tree are not new features/drivers
> but actual bugfixes. Read the paper by Tavis Ormandy, referenced by
> Theo. There is a real problem with
On 10/23/07, Theo de Raadt <[EMAIL PROTECTED]> wrote:
> > Virtualization seems to have a lot of security benefits.
>
> You've been smoking something really mind altering, and I think you
> should share it.
Sure! Here's some research one of my colleagues (with whom I've
discussed this a lot) did on
Virtualization seems to have a lot of security benefits. Rootkits can lie to
DomU but not Dom0, and of course snapshotting, migration etc is *really* nice.
Dom0 in OpenBSD in a current Xen implementation (with HVM) would be a dream.
I'd switch wholesale, and buy a CD for every server (as I do
Bill Anderson got this to work, and I've subsequently been able to
upgrade a website running Zope/Plone on OpenBSD 4.0.
In a nutshell:
Ensure that the following packages are installed:
python-2.4.3p0
py-xml-0.7.1p0
py-Imaging-1.1.5p0
py-ElementTree-1.2.6p0
python-expat-2.4.3p0
python-tkinter-2.
On 12/25/06, Merp.com Volunteer <[EMAIL PROTECTED]> wrote:
We were seeing an unusually large number of complaints when doing search
results related to getting Zope/plone/python working on OpenBSD.
Is there a known caveat about using zope/plone/python-latest on openbsd 4.0
that we should be warne
Hello all,
We are using VLAN-tagging to aggregate multiple subnets onto our firewall.
We don't trust all of the networks that we're filtering, so we want to
explicitly forbid traffic from VLAN1 to VLAN0 unless there's a rule
that allows it.
Normally, we put our block in/out rules on the externa
12 matches
Mail list logo