The Gentoo Linux packaging of Tomcat does a nice job of laying out
separate CATALINA_HOME and one or more CATALINA_BASE trees, if you'd
like something to study.
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan S
t.
You may wish to have a look at https://stackoverflow.com/a/12160863/2916377
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu
signature.asc
Description: PGP signature
uot;5"
> logAbandoned="true"
> username="shoc"
> password="password"
> />
>
>
> className="org.apache.catalina.valves.AccessLogValve"
> prefix="s
simple and straightforward.
>
> Would it make sense to create a solution with less caveats and up to date
> security requirements?
If the OP's cyber security group insists, then maybe they would care
to give him their requirements and suggestions for setting up IPSEC.
--
Mark H.
well but I
very much prefer the way mod_proxy_ajp integrates with the proxy
configuration in HTTPD.
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu
signature.asc
Description: PGP signature
different means.
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu
signature.asc
Description: PGP signature
ing it, there may not
*be* a way to specify "no encryption" of the PKCS12 structure itself,
only ways to express a zero-length password.
Of course I pay strict attention to file and directory permissions.
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana Universit
e clever uses
they hadn't thought of. One result is a rather Wild West approach to
using directory services for authentication. (I see this also in
services dedicated to authentication: seemingly no two organizations
use CAS in the same way.)
--
Mark H. Wood
Lead Technology Analyst
Unive
s proxied through Apache HTTPD
via AJP.)
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu
signature.asc
Description: PGP signature
wrong place to clean it
up anyway.
Sorry for the noise.
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu
signature.asc
Description: PGP signature
rtified public key was signed by hashing it with SHA1 and
then encrypting the hash with the CA's RSA private key.
I just remembered that your browser probably has a way to display
details of a certificate, too.
BTW that certificate above was issued in 1999, when SHA1 was
considered sufficient.
I've appreciated this discussion. It's caused me to think a bit more
about my use of this pattern.
[regarding tests for null references]
This has got me wondering why there is no operator for such an
irritatingly common need:
if (my_reference isNull) { ... }
--
Mark H. Wood
Lead
I decided that just lengthening timeouts was a losing strategy,
because these particular reports can be requested over any portion of
a record set that steadily grows in size, and can thus take longer to
generate every month. Your situation may be different.
--
Mark H. Wood
Lead Technolog
going on!?
I suppose there's nothing useful in the logs? Can anyone suggest
adjustments that might log relevant observations?
--
Mark H. Wood
Lead Technology Analyst
University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu
signature.asc
Description: PGP signature
.
https://tomcat.apache.org/tomcat-7.0-doc/config/valve.html#Remote_CIDR_Valve
I got so tired of those eye-watering IP address REs that I wrote my
own CIDR-based Valve some years ago, but I'm happy to discover that I
can now throw it away and use one that ships with Tomcat.
--
Mark H. Wood
Lead
ase knows which distant hosts should be
reachable via each local address. 'connect' should use this to pick
an address that can reach the distant host, assign an unallocated
port, and send SYN to request a connection.
So the answer to your question is "it depends on the service
;s a shame that the package is in such a poor state,
because it has a number of clever and useful features which are rarely
mentioned.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp1UL7EgEQWH.pgp
Description: PGP signature
ies whose names are specified by the logger.
The only distro-specific thing in any of this is the particular paths
assigned to these properties, and determining those values is the
responsibility of the asker because, as you say, you cannot know them
in advance. But an answer expressed in ter
scovered long ago on my Linux Debian Etch system, but could not
> figure out how Tomcat found it or used it.
Tomcat doesn't find or use it. The logging package does that.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpInunMsNEg7.pgp
Description: PGP signature
fic is
routed properly.
I can't say anything about sharing a single copy of a webapp on three
vhosts, because although two of our three vhosts are running the same
webapp, each has a separate on-disk copy. We need to keep them that
way, since the services are updated on unrelated schedules.
--
M
n mind that there should still be a local "log of last
resort" to note the evidence when network logging fails.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp
n lexical order.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpwKSCP0nZKD.pgp
Description: PGP signature
alf, it Just Works.
Currently on Tomcat 6.0.16, but I've had this frustration with 6.0,
5.5, and I believe 5.0.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpQTeCbpaS7X.pgp
Description: PGP signature
, as we update a developing app. a mere
dozen times. I am ever so happy to have not just separate production
and development containers, but separate hosts, to contain the
problems of unfinished software until they can be fixed.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typi
nice clean site that Just Works.
So when selecting technology, do consider the balance between
providing useful functionality to the users and just bothering them.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive&quo
opinions don't carry as much weight as others (having your
> opinion carry more weight is one of the perks of moving up the ladder
> after all).
Yes, borrow as many brains as you can, and give everyone a chance to
contribute. THEN make the decision, and be clear that what is decided
is
gt; Is there any MIBS that I can use?
>
> In short, you can't. Tomcat does not provide SNMP, even with the Admin app.
Hep probably means something like this:
http://java.sun.com/j2se/1.5.0/docs/guide/management/SNMP.html
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
t; /myserver/manager/logs
Because it is waiting for YOU to write it?
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpiNkIPIPa0f.pgp
Description: PGP signature
it's appropriate to point
out that much more subtle arrangements are available, and when you
want more, come back, here are pointers to all the hairy details.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive&
changed) so I can't just pile them into
'server.xml' even if that weren't bad form.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpcce84PISkL.pgp
Description: PGP signature
x27;host' element's 'deployOnStartup' attribute looks
like it would do this, if set to 'false'.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpHVHN2a8u4Q.pgp
Description: PGP signature
mebody to watch screens and check things periodically.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpxkmTChiio2.pgp
Description: PGP signature
of what went
wrong each time might be useful. As you spot patterns, you may be
able to develop antibugging techniques and tools to better avoid the
common problems.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp6j3MqFMdLN.pgp
Description: PGP signature
s deployXML='false'.
Otherwise the webapp itself will supply a Context.
Tomcat will generate a Context on its own in some circumstances which
I've not yet completely worked out from the documentation. How did
you disable this?
--
Mark H. Wood, Lead System Programmer [EM
red on insertion. Hashing data is like hashing meat and
potatoes: the result is expected to be finely divided and well mixed.
---
* You could sort its content into some other data structure, but apparently
that's not done here.
--
Mark H. Wood, Lead System Programmer [EM
code a 'path' attribute in the Context element.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp4YDWzpIkwI.pgp
Description: PGP signature
iation of a folder with
an address and providing a button for "send to this folder's
associated address".
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpcSwaAsBimg.pgp
Description: PGP signature
nstead of scripting it from your webapp.
>
> Or in this case scp (or rcp, or sftp, or ftp) ?
Definitely. While you're at it, just pipe the backup stream through
instead of collecting a huge file on host A and then moving it to host
B. I have some DBMS backups that run that way.
--
y until the job
is done. I still use it to throw huge files across WAN paths, even
dialup links.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
"Don't throw the past away. / You might need it some rainy day."
pgpjPpH7E7dZP.pgp
Description: PGP signature
host/host-manager.xml
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpOxPa7PBlzd.pgp
Description: PGP signature
s of procps v2.
At one point I had one Tomcat running on Red Hat Linux and another
on Gentoo Linux, and one showed a huge number of Tomcat "processes"
while the other showed only one. Switching attention between the two
was, uh, interesting.
--
Mark H. Wood, Lead System Programmer [EM
27;ll take Gentoo any
day, but I'm a very hands-on, tweak-the-last-cycle-out,
do-it-with-a-text-editor-or-don't-do-it sort of sysadmin. There are
good reasons to choose any of those, or others, and you have to decide
which reasons are yours.
--
Mark H. Wood, Lead System Programmer [EM
I wonder if the OP means the shutdown password? That's in server.xml,
and the only consequence of changing it that I know of is that your
shutdown script needs to be kept in sync. with this or it won't work.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when
of returning
port-not-reachable
* many many well-tested specialty modules for Apache HTTPD should you
need to do something out of the ordinary
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
me
That probably depends on which FIPS you mean. There are at least 201
different U.S. Federal Information Processing Standards.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exac
Well, I probably wouldn't put that directory anywhere near
$TOMCAT_HOME; I'd want it somewhere on /var with other volatile and
temporary stuff.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive"
27;t say anything about Tomcat owning these files
and being allowed to create and destroy them at will.
The documentation apparently doesn't reflect the behavior of the
code. Let me say that I find the documented behavior much more useful
than what we actually get.
--
Mark H. Wood, Lead Syst
Okay, I'll ask: why?
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpeFZrT5TC4a.pgp
Description: PGP signature
uage="java" contentType="text/html; charset=US-ASCII"
pageEncoding="US-ASCII"%>
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
http://www.w3.org/1999/xhtml";>
Dummy Web Application
This is a test.
Java Runtime Environment versi
/manager/serverinfo
OK - Server info
Tomcat Version: Apache Tomcat/5.5
OS Name: Linux
OS Version: 2.6.18-gentoo-r6
OS Architecture: i386
JVM Version: 1.5.0_11-b03
JVM Vendor: Sun Microsystems Inc.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a
host B has
different NIC(s).
Having to re-register a product for reasons unrelated to the product
is a negative Customer Experience, and the marketplace will punish
such designs.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is
n you want it.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpyToR6JHnz1.pgp
Description: PGP signature
If you *do* get it working with TLS, I'd appreciate hearing how.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpvqA6KJOlKV.pgp
Description: PGP signature
o, and didn't
cause any trouble. That is so rare that they will think of you first
the next time they need software.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpCWYrsu9OB6.pgp
Description: PGP signature
e, etc. Then there were a number of designs built around the
Zilog Z80, by Radio Shack, Sinclair, and others. Intel's line never
caught on beyond the industrial and hobbyist markets until the 8086,
but there were plenty of others. CP/M's market was 8-bit machines.
--
Mark H. Wood, Lead S
uot;64-bit machines are faster/slower" really
don't say much outside the context of a specific application.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp7
Would you (or anyone) care to provide a link to where I can learn more
about swatch? Everything I've turned up so far points to a wanna-be
replacement for UTC called "internet time" promoted by a watchmaker.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically
f
Tomcat source on my desk right now, and a pile of somebody else's
servlet code as well.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpu9wPj3oawH.pgp
Description: PGP signature
st/myapp.xml will be deleted by the server
> automatically.
>
> So I have to provide the file again, and to restart the server ;(
>
> In 5.0.30 it works so cool...
If you get an answer off-list, please share. 5.5 has the same problem.
--
Mark H. Wood, Lead System Programmer
g a source kit that you intend to
blindly install. I doubt this would sway many sysadmin.s.
As another Gentoo fan, I'd certainly get source and tweak the living
daylights out of the build configuration and compiler switches of any
non-Java app. I wanted. But I probably wouldn't do the sam
security depends on the
trustworthiness of that human.
The choice is made based on whether you think you are likely to lose
more by someone breaking into the machine's privileged accounts, or by
ignoring customers until a human notices the request for secrets.
--
Mark H. Wood, Lead System Progr
I take it that you found http://tomcat.apache.org ? In what way does
it not answer your question?
Your question is rather vague -- the answer depends on what you
consider to be a "feature". What do you expect to find?
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typi
to have done a thorough job. But I wouldn't be surprised to find that
there are applications which will need some fixing for v6.
Have a look at this for starters:
http://java.sun.com/javase/6/docs/technotes/guides/net/ipv6_guide/index.html
--
Mark H. Wood, Lead System Programmer [EMAIL
ple of Least Surprise. Programs should not muck with their own
configurations on their own initiative. Sysadmin.s expect the
settings they make to stay set. If they need to override default
values within a .war, their changes shouldn't be blown away with every
redeployment.
--
Mark H. Wo
Gentoo Linux comes with its own startup script for Tomcat (using, I
believe, tools from Debian) that fits into the Gentoo startup
structure, so one doesn't need jsvc there. I suppose that many other
distro.s do likewise, although some may use jsvc "under the covers".
--
Mar
pplication design, bigger/faster
hardware, network optimization, whatever).
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpDnJKNkbGhr.pgp
Description: PGP signature
larly. Again, you either know all about your system and can
calculate this already, or you pick any non-ridiculous number and
measure/adjust until you are satisfied.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive
phons off for that worker. (The URL/worker mapping is
done with jkMount directives in the main config.)
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpgPnqFeVfpe.pgp
D
make arbitrary changes
anywhere on your server.
If I ever have time to do something about that, I'll be sure to submit
a patch.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
he last time I looked at jsvc,
or the documentation has improved quite a bit. I've tried it before
and it wouldn't do what I wanted. Time to try again. Thanks.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "
/Catalina/$HOST/$CONTEXTNAME.xml on the user's
behalf.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpvEJOFTk10Q.pgp
Description: PGP signature
Well, IF you are sure you want to use Apache HTTPD to frontend Tomcat,
there's no reason for Tomcat to run an HTTP connector at all. Just
use the AJP connector, and only allow it to listen to your frontend
service(s), or firewall it away from the Big Bad Internet. (Or both.)
--
Mark H.
A hollow voice whispers, "IPSec".
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpXHb0gRtjuo.pgp
Description: PGP signature
On Tue, Mar 11, 2008 at 06:37:03PM +, Mark Thomas wrote:
> Tomcat re-writes the file. Any comments are lost. Real users, groups etc
> will be kept.
Since the question came up, would someone please tell me *why* Tomcat
does such a strange thing?
--
Mark H. Wood, Lead System Prog
y* or it will croak" then your
developers are insufficiently trained. Code so haywired that it
depends on the quirks of a single version of anything in its
environment is too fragile for production use.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a softwar
your app.s. In that case you
may want to see if giving some of it back to the OS (see caching
above) would give better overall performance.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means
configuring it. Properly setting up an MUA, *any* MUA, is not simple.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpNOiorupUkj.pgp
Description: PGP signature
ngle executable. Anyway,
recent Tomcat exposes the necessary methods to be run by jsvc.
I don't use jsvc yet, but I want to experiment a bit and eventually
submit patches to Gentoo to replace the current complicated rigmarole
in their Tomcat startup script with something simpler built aro
e context
file.
But I haven't seen it happen recently. I may have been keeping the
affected '.war's in the appbase directory, and then moved them out.
The fundamental rule seems to be: don't keep any part of your app. in
Tomcat's own directories, except a context specif
"iSeriesNavigator" sounds like some application that came with your
IBM i-Series hardware.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp61d45t1yD0.pgp
Description: PGP signature
I wonder if the real question here is not more like: what advantage
does one gain in using RPC rather than some other method? I must
admit that I sometimes ask myself that question. I must also admit
that this whole thread is too general to be topical on the Tomcat list.
--
Mark H. Wood, Lead
Do you *really* want that file to be world-writable? Why not 644?
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgp8EEJOzvw1S.pgp
Description: PGP signature
need access to remote resources. On older
versions you'd need to create or select a domain account, grant it
sufficient rights and privileges on the host, and use that account to
run your service.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor
empted, it wouldn't appear
to be a problem with the database user.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpotqU5kaI4g.pgp
Description: PGP signature
are signs of severe memory pressure. You could also
investigate by experiment: try to provide a lot more swap space and
see if the problem is alleviated.
If this is it, the real cure is more memory.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor s
y using OpenSSL
facilities plus its own "mixer", and I don't know what your JRE uses.
If your processor provides a source of randomness that you trust, be
sure it's being used, since a number of sources (keyboard and mouse
event timing, for example) are of little use on a s
his drove me crazy for a while. Eventually I
began keeping the .war files *out* of /webapps and I haven't seen this
problem for a while. You'll need to add the docBase attribute to the
Context to point to such an "external" webapp.
--
Mark H. Wood, Lead System Programmer [EM
want to do that.
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
pgpL6aT0Blf51.pgp
Description: PGP signature
If there's a better place to ask, please direct me.
I'm tracking down a problem with third-party code which looks more and
more like double URI-decoding. But I can't find anywhere in the
servlet documentation where it says whether getParameter returns
decoded or encoded data.
nner in working with servlet code myself
I want to be very sure there is not a good reason for these calls. I
think now I'm sure enough to take them out. Thanks!
--
Mark H. Wood, Lead System Programmer [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitiv
d find that the logs have eaten
up all the available space. If /var/log fills up, we lose a few data
that have a 1:1 chance of being interesting; if /var fills up, we
lose customers because nothing works for them.
So, that's why some people insist on separating files that have
different li
Oh, come on, guys.
The log4j package includes the log viewers "chainsaw" and "lf5".
There are probably others, but these are the only ones I can recall
quickly. (And I'm not at all experienced with either one yet, sorry.)
--
Mark H. Wood, Lead System Programmer mw..
t of time. So overcommitting a VMware host might be a
reasonable short-term approach while one is budgeting, pushing papers,
and waiting for one's purchase to arrive.
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Friends don't let friends publish revisable-form documents.
pgp5KVksBmkqe.pgp
Description: PGP signature
Reverse engineering is not a technical problem; it is a legal
problem. You need a lawyer, not a program.
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Friends don't let friends publish revisable-form documents.
pgpRmc02QIJYG.pgp
Description: PGP signature
On Thu, Jan 21, 2010 at 03:02:41PM +, Peter Crowther wrote:
> 2010/1/21 Mark H. Wood
>
> > Reverse engineering is not a technical problem; it is a legal
> > problem. You need a lawyer, not a program.
> >
> > Mmm, yes and no. Burglary is also a legal problem, b
all that memory back and continue as if nothing had happend.
Maybe you've found a way to do something similar with Tomcat, but it
takes 16 minutes to cycle.
Just waiting until you think it's been long enough is not a very
strong test. What's it doing while you wait? is a question
classes were in session the EMI was picked
up by my keyboard.
(Written from one of my xterms.)
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Friends don't let friends publish revisable-form documents.
pgpu1LttJE0ti.pgp
Description: PGP signature
An alternative approach: you could pump the messages through a
mailing-list digest builder. You may get 100 messages in five
minutes, but you only get interrupted once.
Sorry, I've never run a digested list so I don't have a name handy.
--
Mark H. Wood, Lead System Progr
Consider something like:
$ openssl rand -base64 32
DJaLgg+fcT8ygQVCd1uKcpLAuxGPmEWhv7j+aorobVs=
if you want help coming up with reasonably hard-to-guess secrets.
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Asking whether markets are efficient is like asking whether people are
styles out of my head.
Again, I should try writing a DNS-style globber. It might be fun.
(But don't hold your breath waiting for it.)
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Asking whether markets are efficient is like asking whether people are smart.
pgpBlPBdN6hmN.pgp
Descri
1 - 100 of 178 matches
Mail list logo