FOR IMMEDIATE RELEASE
April 8, 2014
Read it online: http://bit.ly/1hUQw2G
Fedora 4 Call to Action–Test Your Favorite Feature!
Winchester, MA A Fedora 4.0 beta will be released in time for Open
Repositories 2014. The full list of features to be included in the 4.0 beta and
the release is
On Apr 7, 2014, at 11:25 PM, Richard Wallis richard.wal...@dataliberate.com
wrote:
You are correct that in the xmlns namespace definitions in the xml
http://viaf.org/viaf/231063554/rdf.xml references a namespace that is no
longer used in the output. There is a single commented out reference
These are exactly the same issues we are experiencing.
We had some support from individuals at Atlas Systems, and no specific
recommendations.
One library found a solution on their own; I don't have all the details.
It involved installing stunnel (https://www.stunnel.org/index.html) as an
Hi,
I have VIAF loaded in my triplestore and did these queries for you:
1) select distinct ?s where {[] a ?Concept}
http://xmlns.com/foaf/0.1/Organization
http://xmlns.com/foaf/0.1/Person
http://dbpedia.org/ontology/Place
http://xmlns.com/foaf/0.1/Document
Sorry, Eric!
We've known about this problem for a couple of weeks now and had the fix in
place, but touching a production system requires motivation. I'll push to get
the fix installed this week.
In the meantime, here's a pointer to the file you're supposed to get when you
ask for
Please read this page and its supporting documents about the Heartbleed Bug.
http://heartbleed.com/
If you use OpenSSL, and most service providers do, you should patch your
servers ASAP. OpenSSL versions 1.0.1 through 1.0.1f (inclusive) are
vulnerable. Only version 1.0.1g or newer should be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 4/8/2014 10:06 AM, Cary Gordon wrote:
Please read this page and its supporting documents about the
Heartbleed Bug.
http://heartbleed.com/
If you use OpenSSL, and most service providers do, you should patch
your servers ASAP. OpenSSL
Thanks for forwarding this along, Cary. I've been patching this morning,
and am now in the process of determine needs for new certs. (sigh...)
If you need some guidance in patching your server, here are a couple of
links to start y'all out:
Ubuntu-related patch info -
Francis,
Are you asking us to register our servers into a great big list of
vulnerable machines?
Chad
On Tue, Apr 8, 2014 at 10:11 AM, Francis Kayiwa fkay...@colgate.edu wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 4/8/2014 10:06 AM, Cary Gordon wrote:
Please read this page
The ontology document shouldn't 404s, but either way I'm pretty sure that all
the vocabulary terms defined there are obsolete (e.g.
viaf:NameAuthorityCluster). The diagram referenced in the 2011-04 Outgoing blog
post is still current:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 4/8/2014 10:27 AM, Chad Nelson wrote:
Francis,
Are you asking us to register our servers into a great big list of
vulnerable machines?
Assumption here was.
Machine == vulnerable
Patch on confirmation but your point is well received.
./fxk
There’s a nice “fork me on github” banner on the test site, so someone
motivated could at least check the (purported) code and set up their
own checker. So at least they have an implicit “you don’t need to trust
us” sign.
-Tod
On Apr 8, 2014, at 10:00 AM, Francis Kayiwa fkay...@colgate.edu
There are other options for testing you can run locally, e.g.
http://pastebin.com/WmxzjkXJ
I'm pretty sure it doesn't send anything it finds anywhere else, but more
folks on this list (a) understand python to verify that for themselves and
(b) can run it right now than with Go =)
AC
On Tue,
We are pleased to announce that 20 rooms have been secured
at an overflow hotel for this years NASIG conference. The
hotel is:
The Courtyard Fort Worth Downtown/Blackstone Hotel
601 Main Street
Fort Worth Texas, 76102-5407
Website:
There is this one for CentOS 6
http://people.centos.org/z00dax/disable_heartbeat/x86_64/Packages/
They are disabled_heartbeat versions, download your version and use
rpm -ivh --force your_version_here
to overwrite your current openssl executable.
The following were sent out from our campus
Thanks for this, wouldn't have known otherwise, but there goes my Wednesday!
Riley Childs
Student
Asst. Head of IT Services
Charlotte United Christian Academy
(704) 497-2086
RileyChilds.net
Sent from my Windows Phone, please excuse mistakes
From: Thomas
16 matches
Mail list logo