> On Mar 1, 2017, at 23:34 , William Hermans <yyrk...@gmail.com> wrote: > > Back on topic. > > I wonder if it wouldn't be simpler, and easier for everyone if someone where > to just write / create a setup script for both options. It's been a while, so > I do not recall the finer details with each process. But I can say while I do > not know everything, I'm also not a novice Linux user by far. And I was never > able to get remoteproc setup correctly and working. Also, having > documentation of the finer details for remoteproc is a must. Things like what > is a *.hex file, and which options are required, or optional. In addition to > what all these options mean. e.g. definitions are required.
+1 > > Setting up uio_pruss was also no cake walk, But in the end I was able to get > two of the examples working. > > I still think that remoteproc in concept a pretty cool feature.I'd like to > see a lot of people using it, and showing off really cool examples of it's > usage. Despite me thinking that remoteproc is better suited for systems with > multi core application processors. e.g. running Linux on one core, and having > the other cores running bare metal. Or some mixture in between that. But in > all honestly, when was the last time you saw something really cool done with > the PRU's ? ~2013, using uio_pruss, to create an all software( in PRU ) VGA > adapter ? That's the last really cool project I remember achieved through the > PRU's anyway . . . > > On Wed, Mar 1, 2017 at 11:52 PM, William Hermans <yyrk...@gmail.com> wrote: > > > On Wed, Mar 1, 2017 at 10:19 PM, Robert Nelson > <robertcnel...@beagleboard.org> wrote: > The above is disabled by default as of 2-3 weeks ago.. > > I'm still kind of on the fence. I can completely understand wanting to just > type ssh root@beaglebone and *bam* be right where I need to be to start > working on a problem. I get it. But at the same time, I sit behind 3 layers > of routers between any local system, and the internet. I also understand the > implications of having root wide open to the world. Free to anyone with a > port scanner to exploit. Assuming I had a hole punched in our routers for > outside access. Still,it's not impossible for someone to "hack" in to our > network, but it would not be very easier either. > > For those who still may not understand. Allowing root access to port 22( ssh > ) with no password is akin to allowing remote assistance access into a > Windows system with no admin password. Which just so happens to be a big > "player" in the reason why Windows is often seen as the most insecure > operating system in the wild. Because by default, and from the factory. > Windows does not setup an admin password, and default to allowing remote > access to anyone with the username, and password. IF the username is known > "admin" and no password . . . At this point, the operating systems software > architecture is irreverent, and is begging any, or all script kiddie with a > port scanner to take over your system. > > > -- > For more options, visit http://beagleboard.org/discuss > --- > You received this message because you are subscribed to the Google Groups > "BeagleBoard" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to beagleboard+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/beagleboard/CALHSORowq3jt9Sn3Odp_gZFfhxqW4pCEn5P%3Du%2BEbUXi-csr-Jw%40mail.gmail.com. > For more options, visit https://groups.google.com/d/optout. -- Rick Mann rm...@latencyzero.com -- For more options, visit http://beagleboard.org/discuss --- You received this message because you are subscribed to the Google Groups "BeagleBoard" group. To unsubscribe from this group and stop receiving emails from it, send an email to beagleboard+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/beagleboard/EB7E6C05-C756-4B7B-8B16-5C69983C9EED%40latencyzero.com. For more options, visit https://groups.google.com/d/optout.