--- Steve Watt [EMAIL PROTECTED] wrote:
In
[EMAIL PROTECTED],
N)?
Problem? Scheduler activations may be used to
build M:N
systems, but that is not a requirement -- you can
easily
build a 1:1 (all threads are system contention
scope) system
with activations.
But the POSIX std allows
On Thu, Mar 03, 2005, Perry E. Metzger wrote:
No, I am not. PHK invented new cryptographic modes for his work. The
fact that he does not understand this is part of the problem.
Hi Perry,
You've brought up this claim at several points in this thread.
Would you be willing to be more specific? I
David Schultz [EMAIL PROTECTED] writes:
On Thu, Mar 03, 2005, Perry E. Metzger wrote:
No, I am not. PHK invented new cryptographic modes for his work. The
fact that he does not understand this is part of the problem.
Hi Perry,
You've brought up this claim at several points in this thread.
David Schultz wrote:
As a
rather extreme example, suppose that it was discovered that on
random input, an MD5 output only has 70 bits of entropy. Then
it might be relatively easy for an adversary to recover sector
keys without knowing the master key. (Granted, this would
I also believe that it would be beneficial to implement regular rewriting
of randomly picked lock sector(s) at random times during a user specified
interval (up to x rewrites within n seconds) in order to further obscure
the write pattern and provide additional protection for lock sectors.
In message [EMAIL PROTECTED], [EMAIL PROTECTED] writes:
I also believe that it would be beneficial to implement regular rewriting
of randomly picked lock sector(s) at random times during a user specified
interval (up to x rewrites within n seconds) in order to further obscure
the write
I agree. I would also add random reads (or specially designed, combined
random reads and writes) to make traffic analysis and differential attacks
a real PITA for the hacker (although this idea may not be very effective
against a highly motivated and determined attacker, such as some
In message [EMAIL PROTECTED], [EMAIL PROTECTED] writes:
If you want to do something like this, you want to do sectorrenaming
and journaling since that means you can only see that something
was written but not what it was that was written.
So you think that just adding specially crafted,
[EMAIL PROTECTED] wrote:
I agree. I would also add random reads (or specially designed, combined
random reads and writes) to make traffic analysis and differential attacks
a real PITA for the hacker (although this idea may not be very effective
against a highly motivated and determined
If you want to do something like this, you want to do sectorrenaming
and journaling since that means you can only see that something
was written but not what it was that was written.
So you think that just adding specially crafted, random reads/writes
will have no significant positive
Hi Scott,
I am encountering these errors wiht FreeBSD 5.3-REL-p5
Any ideas what is going on.
ahd0: Adaptec AIC7902 Ultra320 SCSI adapter port
0x4000-0x40ff,0x4400-0x44ff mem 0xfc30-0xfc301fff irq 28
at device 2.0 on pci3
ahd0: [GIANT-LOCKED]
aic7902: Ultra320 Wide Channel A, SCSI Id=7, PCI-X
[EMAIL PROTECTED] wrote:
On Mon, Mar 07, 2005 at 09:43:13AM -0700, [EMAIL PROTECTED] wrote:
I also believe that it would be beneficial to implement regular rewriting
of randomly picked lock sector(s) at random times during a user specified
interval (up to x rewrites within n seconds)
well, i guess all is ok, since im not getting much feedback :-)
anyways, this is my new problem:
o- the target accepts the login, but does not supply a valid device, usually
because some admin. problem. I would like to be able to report the problem
to the initiator and I need some clues. The
13 matches
Mail list logo