Hi, all. I know there are a few people on the list who have set up
mythtv before, and so I'm hoping some of them would be able to help me
out. I am currently having a couple of problems with my new mythtv
setup, and any direction or information would be appreciated.
Problem 1: Sound:
I can't
On Tue, Feb 15, 2005 at 10:05:17PM -0700, Stuart Jansen wrote:
On Tue, 2005-02-15 at 22:26 -0600, Michael Halcrow wrote:
As a precaution, I will not be signing any future messages until
an updated spec for PGP is released and GnuPG integrates it. At
this point, all digital signatures
Crap. I signed my last message. :-) The process of
set-sign-bit-type-password-hit-send is programed into my spinal cord.
Mike
BYU Unix Users Group
http://uug.byu.edu/
The opinions expressed in this message are the responsibility of their
author. They are not endorsed
I am currently having a couple of problems with my new mythtv
setup, and any direction or information would be appreciated.
useless reply
can't help ya, but um, you could just buy a tivo. :-/
reminds me of this funny onion article:
http://pepper.idge.net/slashdot/realtimetv.html
/useless
It is looking like all PGP digital signatures are now subject to forgery.
i'm no crypto-genius or anything, but my understanding is that this SHA-1
crack is similar to the MD5 crack that the same team wrote about a few
months back.
IIRC, it was just some alarmist BS, and they actually did
On Wed, 2005-02-16 at 08:36 -0700, Josh Coates wrote:
useless reply
can't help ya, but um, you could just buy a tivo. :-/
reminds me of this funny onion article:
http://pepper.idge.net/slashdot/realtimetv.html
I'm going to borrow your tags...
I thought this was real until I read the
My brother's company has a job opening:
Entry level software tester. Basic Linux and MySQL skill preferred
but would be willing to train the right person. Full time position
with lots of potential growth. Visit www.qcomm.com for more
information and send resumes to [EMAIL PROTECTED]
On Wed, Feb 16, 2005 at 08:29:24AM -0800, Bryan Murdock wrote:
Not that I really care that much, but um, if a signed messages has
some remote possibility of being forged by the NSA or someone else
with a super crypto computer, what's the sense in not signing it at
all and really increasing the
On Wed, Feb 16, 2005 at 08:28:52AM -0700, Lloyd Brown wrote:
I suppose that, if it came to it, I could take a patch cord from the
tuner's external audio port (which works), and plug it into the sound
card's line-in, but that just seems messy, especially since the
line-in is located at the
The Utah Valley Linux Users Group (UVLUG) is pleased to announce that we
will be hosting a presentation on using Samba.
WHAT:
We will be discussing interoperability between Windows and Linux using
Samba. While much can be accomplished by bringing Samba into your
Windows networks, we will be
On Wed, 16 Feb 2005, Josh Coates wrote:
IIRC, it was just some alarmist BS, and they actually did nothing new. they
just used there zillion dollar mini-supercomputer to find M and M' that had
the same hash. given a chunk of data, they weren't able to 'reverse' the
hash, or fake out a hash.
A couple of weeks ago, I sent out a mailing list submission detailing
my Nvidia woes. I though you'd like to know how I solved the problem.
1. Replaced the standard yum.conf file with a modified version found
on fedorafaq.org
2. installed new kernel through yum (default kernel wasn't working)
Yes, it is a big deal, and it's most certainly new, same as we explained
last time
well, to be honest, i didn't buy last times explanation. their paper was
just a warmed over Dobbertin, 1996. ;-)
But the attacks are not wildly practical, and in most cases exposure
remains thankfully limited,
On Wed, 16 Feb 2005, Josh Coates wrote:
like i said, with their md5 stunt (and probably sha-1, but i guess no one
knows yet), they scratched the crypto-armor with their zillion dollar
supercompuer, showing us it's just made of metal and not made of some magic
invincible element. but, we
snip
As a precaution, I will not be signing any future messages until an
updated spec for PGP is released and GnuPG integrates it. At this
point, all digital signatures should be considered broken until more
details come to light.
/snip
snip
um, that's pretty much what i meant by not a very
Michael Moore wrote:
Isn't it all about probability anyways? Even before this was broken, a
GPG signed file/email was no guarantee that it was from who it said it
was. Someone could have dug through trash, social engenieered, or
hacked into whoever's computer and gotten enough information to
On Wed, 16 Feb 2005, Michael Moore wrote:
Isn't it all about probability anyways? Even before this was broken, a
GPG signed file/email was no guarantee that it was from who it said it
was. Someone could have dug through trash, social engenieered, or
hacked into whoever's computer and gotten
Anyone want a G-Mail account? I can currently invite fifty people.
You can't complain when you have 1 gig of storage.
Yes, i use gmail, and i think its the best thing since squirrel mail,
but i'm tired of everyone offering invites, looks like i have a new
spam filter to create. I think that
On Wed, Feb 16, 2005 at 01:46:13PM -0700, Mark Gardner wrote:
Anyone want a G-Mail account? I can currently invite fifty people.
You can't complain when you have 1 gig of storage.
Yes, i use gmail, and i think its the best thing since squirrel mail,
but i'm tired of everyone offering
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jason Holt wrote:
| It's all about risk, yes, and you're wise to consider those factors when
| deciding what to do.
At least they haven't cracked memfrob[1] yet, so I'm still secure!
[1] man memfrob
Frank
- --
Frank Sorenson - KD7TZK
Systems Manager,
NUPM (Northern Utah Perl Mongers) has a mail list online now. Subscribe at:
http://nupm.org/cgi-bin/mailman/listinfo/nupm
--
James Lance
pgpqmJXCP7HbZ.pgp
Description: PGP signature
BYU Unix Users Group
http://uug.byu.edu/
The opinions expressed in this message are the
If you can't believe Schneier, Kaminsky and Rescorla, then there's not much
else I can do for you.
first off, i'm just like most engineers - we dont just blindly give
credibility to quoted experts - we examine things ourselves, and right
now, there is nothing to examine except a bunch of blogs.
On Wed, 16 Feb 2005, Josh Coates wrote:
first off, i'm just like most engineers - we dont just blindly give
credibility to quoted experts - we examine things ourselves, and right
now, there is nothing to examine except a bunch of blogs.
I'm not much of one for appeal to authority, so I'm
On Wed, 16 Feb 2005 16:07:10 -0700, Josh Coates [EMAIL PROTECTED] wrote:
If you can't believe Schneier, Kaminsky and Rescorla, then there's not much
else I can do for you.
first off, i'm just like most engineers - we dont just blindly give
credibility to quoted experts - we examine things
Now this is high tech crypto:
http://news.com.com/Photos+RSA+gadgets%2C+gizmos+and+geeks/2009-1009_3-5579622.html?tag=st.num
Bryan shouldbeworkingdangit Murdock
BYU Unix Users Group
http://uug.byu.edu/
The opinions expressed in this message are the responsibility of
On Tue, Feb 15, 2005 at 10:18:43PM -0700, Phillip Hellewell wrote:
tinfoil hat
H, come to think of it, how can we trust this so called e-mail and
so called break of SHA-1. I mean, hey, they didn't even really prove it
yet, so how do we know it's not just some huge conspiracy; hey, maybe
On Wed, Feb 16, 2005 at 08:20:20PM -0600, Michael Halcrow wrote:
On Tue, Feb 15, 2005 at 10:18:43PM -0700, Phillip Hellewell wrote:
tinfoil hat
H, come to think of it, how can we trust this so called e-mail and
so called break of SHA-1. I mean, hey, they didn't even really prove it
Actually, RIPEMD was broken along with md5:
http://eprint.iacr.org/2004/199
RIPEMD-160 may be better than vanilla RIPEMD, but I'd still be very
suspicious.
-J
BYU Unix Users Group
http://uug.byu.edu/
The opinions expressed in
Anyone who receives a digital signature based on an MD-5 or SHA-1 hash
should be suspicious.
aw, c'mon mike - you don't *really* mean that, do you?
i mean, really - should we be suspicious, just in case they someone has been
running SHA1-Crack-2005 for the last 3 days on their 200,000,000 cpu
On Wed, 2005-02-16 at 09:31 -0600, Michael Halcrow wrote:
On Tue, Feb 15, 2005 at 10:05:17PM -0700, Stuartyin Jansen wrote:
I'm curious what the motivation for that decision is.
Right. That's why I am not signing any messages until the situation
gets ironed out. It is looking like all PGP
Peter McClanahan wrote:
Does anyone know a good music composition program for Linux?
Have you looked into Rosegarden?
http://www.rosegardenmusic.com/
Jordy
BYU Unix Users Group
http://uug.byu.edu/
The opinions expressed in this message are the responsibility of their
Does anyone know a good music composition program for Linux? I'm
looking for something similar to noteworthy or finale. It doesn't
have to have the drag/drop feature, but if one exists, I'd like it to
be able to read in midi files (and place the notes on the staves).
Saving files as midi would
I've noticed that web pages load significantly slower in Firefox under
Ubuntu Linux than Windows or other Linux distributions I have used.
Any ideas why this might be? Perhaps network settings or browser
settings that I am unaware of?
Thanks
--
Drew A. Withers
Webmaster, Department of Chemical
On Wed, Feb 16, 2005 at 08:04:28PM -0700, Stuart Jansen wrote:
On Wed, 2005-02-16 at 09:31 -0600, Michael Halcrow wrote:
On Tue, Feb 15, 2005 at 10:05:17PM -0700, Stuartyin Jansen wrote:
I'm curious what the motivation for that decision is.
Right. That's why I am not signing any
On Thu, Feb 17, 2005 at 02:33:44AM +, Jason Holt wrote:
Actually, RIPEMD was broken along with md5:
http://eprint.iacr.org/2004/199
RIPEMD-160 may be better than vanilla RIPEMD, but I'd still be very
suspicious.
Yes, SHA-256, RIPEMD-160, and the sort may very well be subject to
some
By very definition collisions will occur in any digest algorithm. The only way
to have no collisions would be to have a hash as long as the data, then have
the algorithm perfectly distribute the hashes. So collisions are extremely
common (in a statistical sense). The real notion behind a
On Thu, 17 Feb 2005, Jason Holt wrote:
Unfortunately, neither of these gives as much protection as we'd hope.
Recent research suggests that collisions on the concatenation of hashes are
much easier to find than naive brute force would suggest, and the Kaminsky
paper shows that you actually
37 matches
Mail list logo