Hi Konrad,
I've being trying to work out how the Family.l application hooks
together its database and gui objects together and simply haiing no
luck.
as far as I unsetad the current Person object is being stored in the
global variable *ID by the (default *ID (val *DB)) call.
*ID is used
On Wed, Feb 15, 2012 at 09:44:01PM +0100, Alexander Burger wrote:
Meanwhile, I'm wondering whether the observed problems might have
anything to do with the fact that PicoLisp (and httpGate) run in IPv6
hybrid mapped addresses mode. Perhaps some browsers suddenly can't cope
with that? Just an
Thorsten quintf...@googlemail.com writes:
Alexander Burger a...@software-lab.de writes:
On Wed, Feb 15, 2012 at 09:44:01PM +0100, Alexander Burger wrote:
One more try.
from:
http://code.google.com/p/chromium/issues/detail?id=98101#c31
Comment 8 by a...@chromium.org, Oct 12, 2011
Hi Thorsten,
(from http://www.gossamer-threads.com/lists/nsp/foundry/33310)
Yes, it looks indeed suspiciously similar.
Unfortunately, I still don't know how to fix it ;-)
Cheers,
- Alex
--
UNSUBSCRIBE: mailto:picolisp@software-lab.de?subject=Unsubscribe
Hi Thorsten,
http://code.google.com/p/chromium/issues/detail?id=98101#c31
Comment 8 by a...@chromium.org, Oct 12, 2011
,
|Yes, requests will be in multiple records from now on. See
I have no idea what multiple
More info on BEAST and a recent Microsoft security update that was pushed
out for it:
http://technet.microsoft.com/en-us/security/bulletin/ms12-006
http://www.securitynewsdaily.com/1077-beast-hack.html
My bet is that the update is what caused it to break.
On Thu, Feb 16, 2012 at 9:01 AM, Joe
You can see some interesting analysis on the certificate here:
https://www.ssllabs.com/ssldb/analyze.html?d=https://app.7fach.de
It mentions being vulnerable to BEAST and offers this link
https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-beast-attack-on-tls
Hi Joe,
My bet is that the update is what caused it to break.
Looks so ineed!
The link from your previous mail is interesting:
https://www.ssllabs.com/ssldb/analyze.html?d=https://app.7fach.de
If I understand the diagnosis right
Protocols
TLS 1.2 No
On Thu, Feb 16, 2012 at 09:01:53AM -0500, Joe Bogner wrote:
It mentions being vulnerable to BEAST and offers this link
https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-beast-attack-on-tls
This says:
In terms of mitigation, I expect this problem will be largely
Alexander Burger a...@software-lab.de writes:
I don't know if this helps, though (as I can't reproduce the problem).
The ssllabs.com analyzer still complains, though.
I tried the 7fach and the wiki urls again you gave me (FF10), and
unfortunately see the same errorpage as before.
Cheers,
-
10 matches
Mail list logo