done.
== PORT ... done.== RETR SUSE-10.0-EvalDVD-i386-GM.iso ... done.
[ = ] -673,009,664 113,23K/s
Assertion failed: bytes = 0, file retr.c, line 292
This application has requested the Runtime to terminate it in an unusual
way.
Please contact the
Tobias Koeck wrote:
done.
== PORT ... done.== RETR SUSE-10.0-EvalDVD-i386-GM.iso ... done.
[ = ] -673,009,664 113,23K/s
Assertion failed: bytes = 0, file retr.c, line 292
This application has requested the Runtime to terminate it in an unusual
way.
i am not going to publish a complete security advisory on this topic,
but i think wget users deserve a little bit more information about the
security vulnerability that was fixed yesterday, october 13th 2005.
yesterday i was notified by iDEFENSE of a remotely exploitable buffer
overflow in
On Fri, 14 Oct 2005, Noèl Köthe wrote:
The last paragraph says something like: Notable is the fast time of
reaction of the Open Source developer: two days ago the problem was
reported, yesterday corrected packages were produced and details of the
vulnerability were published.
Just want to
I saw that the option "-k, --convert-links" make the links on the root directory, not at the directory you down the pages. For example: if I download a page that the url is www.pageexample.com, the pages I download goes into there. But if i use that option, in the pages the links will link to the