I am writing script, that would ssh to switch and dump configuration in file.
1) Since it is switch, i have no way to make use of public key
authentication, because I have no way to store pubkey on switch.
2) Since I'm using dedicated box for backups, I don't need to hide
password from ps.
What
On 11/12/07, Steven Mestdagh <[EMAIL PROTECTED]> wrote:
> Richard Storm [2007-11-11, 00:03:37]:
> > Hello!
> > I have macbook:
> > hw.model=Intel(R) Core(TM)2 CPU T7400 @ 2.16GHz
> > hw.vendor=Apple Inc.
> > hw.product=MacBook2,1
> > hw.version=1.0
&g
Hello!
I have macbook:
hw.model=Intel(R) Core(TM)2 CPU T7400 @ 2.16GHz
hw.vendor=Apple Inc.
hw.product=MacBook2,1
hw.version=1.0
On http://wiki.freebsd.org/AppleMacbook "IR receiver" section there is
tool available at http://fnop.net/~rpaulo/priv/freebsd/aird.tgz.
Here is patch that makes it comp
# sysctl -a | grep hw
hw.machine=amd64
hw.model=Intel(R) Core(TM)2 CPU T7400 @ 2.16GHz
hw.ncpu=2
hw.byteorder=1234
hw.physmem=2114535424
hw.usermem=2114523136
hw.pagesize=4096
hw.disknames=cd0,wd0,vnd0
hw.diskcount=3
hw.sensors.cpu0.temp0=54.00 degC
hw.sensors.cpu1.temp0=54.00 degC
hw.sensors.acpia
On 10/22/07, Ted Unangst <[EMAIL PROTECTED]> wrote:
> On 10/22/07, Richard Storm <[EMAIL PROTECTED]> wrote:
> > Is there possible workarounds for my program to allocate more memory than
> 1GB?
>
> you can mmap a large file with PROT_SHARED. this doesn't count
On 10/22/07, Ted Unangst <[EMAIL PROTECTED]> wrote:
> On 10/21/07, Richard Storm <[EMAIL PROTECTED]> wrote:
> > Is it possible to bypass this limit somehow?
>
> depends, but if it's easy to bypass a limit, it's not much of a limit.
Is there possible workar
Is it possible to bypass this limit somehow?
Do you plan to increase this limit?
As I understand, macbooks doesn't have TPM, macbooks PRO has.
Thanks to deanna (yeah!) sound works in 4.2, and I read cvs that newer
-current has feature when plugging headphones in event gets noticed
and built in speakers gets vol down... nice, havent tried jet.
However, sound recording doesn't w
In the First USENIX Workshop on Offensive Technologies (WOOT07)
there was presentation
by Robert N. M. Watson:
"Exploiting Concurrency Vulnerabilities in System Call Wrappers"
with exploit code included how to bypass restrictions:
http://www.watson.org/~robert/2007woot/2007usenixwoot-exploit
Quick question.
Is openbsd bind vulnerable to attacks on binds PRNG described here:
http://www.securiteam.com/securitynews/5VP0L0UM0A.html
???
ROTECTED]> wrote:
On 7/15/07, Richard Storm <[EMAIL PROTECTED]> wrote:
> The final:
>
> MacBook 13" Core2Duo
>
> * OpenBSD 4.1-release partly works.
> * Integrated 82945GM works fine with the 1280x800 wide screen,
> after enabling the resolution using the x11/915
on unencrypted bootable medium like CD,usb, hdd...
Thats how I understand it
On 7/16/07, Adriaan <[EMAIL PROTECTED]> wrote:
On 7/15/07, Richard Storm <[EMAIL PROTECTED]> wrote:
> I am very interested in full disk encryption too.
> I guess it comes slowly, since there now
The final:
MacBook 13" Core2Duo
* OpenBSD 4.1-release partly works.
* Integrated 82945GM works fine with the 1280x800 wide screen,
after enabling the resolution using the x11/915resolution package by
invoking it in /etc/securelevel like:
/usr/local/sbin/915resolution 4d 1280 800 >/dev/null
* So
I am very interested in full disk encryption too.
I guess it comes slowly, since there now is mount_vnd in -current,
maybe could make use of it.
If you find out something, give me know :)
14 matches
Mail list logo