On Sunday, January 28, 2018 11:35:33 AM CET Dan Johansson wrote:
> On 28.01.2018 00:13, Corbin Bird wrote:
>
> Thanks for your feedback.
>
> > .
> > Thank you for that info.
> > .
> > What kind of integrated VGA?
> > ( example Intel i915, i965, etc. )
>
> According to the MB docu is it a
On Wednesday, 31 January 2018 11:30:13 GMT Martin Vaeth wrote:
> Nikos Chantziaras wrote:
> > Yeah, that's the kind of software that benefits from the Spectre
> > mitigation patches. Like browsers, virtualization or emulation software,
> > the kernel, etc.
>
> No. It's software
Installing gentoo as guest into vbox vm on solaris-11 (openindiana)
HOST
gentoo-17
VBox 5.2.6
Kernel 4.15.0
My first boot resulted in resulted in a kernel panic... not able to
mount root.
I checked my /etc/fstab trying to make sure I didn't make a stupid
mistake there... it appear to be sound.
On Wed, Jan 31, 2018 at 7:07 AM, Nikos Chantziaras wrote:
>
> I was under the impression that it's the function that performs the call
> that needs protection. The called function doesn't need protection, because
> if it ends up being actually called, then it's too late already.
On 31/01/18 13:17, Martin Vaeth wrote:
Nikos Chantziaras wrote:
Well, if you're running a local process that is trying to attack you,
you've been compromised already, imo.
By your definition, you are compromised if you surf to the
wrong webpage with enabled javascript.
Setup:
Installing gentoo-17 as guest in Vbox vm on solaris-11 HOST
(openindiana (powered by Illumos))
VBox 5.6.2
Kernel-4.15.0
grub2
I'm a litte confused about how to enable a high res framebuffer
console.
At gentoo pages:
On 31/01/18 14:04, Mick wrote:
Just to dilute my confusion on what I should do to keep desktops safe(r),
would someone please clarify:
Is it necessary to keyword gcc 7.3 + kernel 4.15 and emerge kernel 4.15 with
gcc 7.3, or wait until these versions have been stabilised in the tree?
What gcc
Nikos Chantziaras wrote:
>
> For example, if you don't trust Firefox, don't install Firefox. But you
> *do* trust Firefox. What you don't trust is the JS code Firefox is
> executing.
That's an artificial distinction, because it is actually firefox
which is executing the code
On Wednesday, 31 January 2018 12:20:51 GMT Nikos Chantziaras wrote:
> On 31/01/18 14:04, Mick wrote:
> > Just to dilute my confusion on what I should do to keep desktops safe(r),
> > would someone please clarify:
> >
> > Is it necessary to keyword gcc 7.3 + kernel 4.15 and emerge kernel 4.15
> >
On Wed, Jan 31, 2018 at 4:16 AM, Nikos Chantziaras wrote:
> On 30/01/18 23:43, Rich Freeman wrote:
>>
>> If you had some program that listened on a socket and accepted a
>> length and a string and then did a bounds check using the length, it
>> might be exploitable if a local
Hello again,
I feel really stupid.
So I had set imap_user/pass, but not smtp_url so I was receiving emails
fine, but then instead of sending them, it was just encrypting them and
saving them via `set record = "+[Gmail]/Sent Mail"`.
** face palm **
Thanks for your help!
On 01/31/2018 07:38 AM, Harry Putnam wrote:
> Setup:
> Installing gentoo-17 as guest in Vbox vm on solaris-11 HOST
>(openindiana (powered by Illumos))
>
> VBox 5.6.2
> Kernel-4.15.0
> grub2
>
> I'm a litte confused about how to enable a high res framebuffer
> console.
On Wed, Jan 24 2018, Canek Peláez Valdés wrote:
> On Wed, Jan 24, 2018 at 10:11 PM, allan gottlieb wrote:
>>
>> I ran the build failed twice, each time with MAKEOPTS="--jobs=1" and the
>> build logs are essentially identical. After about 12 hours compiling and
>> 36MB of
Hello.
I've got a fresh Gentoo installation that does not boot. I just end up in
the Grub2 shell.
However when there if I do 'set root=(md/0)' and 'configfile
/grub/grub.cfg' I do get to the Grub2 menu where Gentoo boots just fine.
/boot and / are both on mdadm devices.
I've tried re-running
On Wed, Jan 31 2018, Canek Peláez Valdés wrote:
> On Wed, Jan 31, 2018 at 1:29 PM, allan gottlieb wrote:
> [snip]
>> I have two questions, one trivial, one hopefully easy.
>>
>> 1. (trivial) In your recipe did you mean "rsync", not "sync"?
>
> I sync ("emerge --sync") only one
On Wed, 31 Jan 2018 12:18:08 -0500
Lucas Ramage wrote:
Hello again,
I feel really stupid.
So I had set imap_user/pass, but not smtp_url so I was receiving emails
fine, but then instead of sending them, it was just encrypting them and
saving them via `set record =
On Wed, Jan 31, 2018 at 1:29 PM, allan gottlieb wrote:
[snip]
> I have two questions, one trivial, one hopefully easy.
>
> 1. (trivial) In your recipe did you mean "rsync", not "sync"?
I sync ("emerge --sync") only one machine, and then I rsync from there to
my other computers.
Alan McKinnon writes:
> On 07/01/2018 17:45, Melleus wrote:
>> Melleus writes:
>>
>>> Neil Bothwick writes:
>>>
On Sat, 06 Jan 2018 18:46:25 +0200, Melleus wrote:
>> What do the logs say?
> That's all I
On Wed, 31 Jan 2018 15:38:27 -0600, Canek Peláez Valdés wrote:
> I sync ("emerge --sync") only one machine, and then I rsync from there
> to my other computers. After the rsync is done, you need to do "emerge
> --metadata" in the recipient machine (--sync does that for you
> automatically).
If
Oh excellent! I will drop those in my dotfiles.
I am going to try and write some of this down in the Gentoo Wiki since
there isn't really that much on the existing page.
https://wiki.gentoo.org/wiki/Mutt
There isn't even a page for NeoMutt.
On 30/01/18 23:43, Rich Freeman wrote:
If you had some program that listened on a socket and accepted a
length and a string and then did a bounds check using the length, it
might be exploitable if a local process could feed it data. Even if
the process only listened for outside connections it
On Wed, 31 Jan 2018 20:50:13 +1300
"Roger J. H. Welsh" wrote:
On Wed, Jan 31, 2018 at 05:17:45AM +0100 , Floyd Anderson wrote:
> On my neomutt, when I press "v" to view attachments, all I can
> see is text/plain. I think my neomutt does something automatic to
> decrypt
Nikos Chantziaras wrote:
>
> Well, if you're running a local process that is trying to attack you,
> you've been compromised already, imo.
By your definition, you are compromised if you surf to the
wrong webpage with enabled javascript.
While this is arguably true, I would
Nikos Chantziaras wrote:
> Yeah, that's the kind of software that benefits from the Spectre
> mitigation patches. Like browsers, virtualization or emulation software,
> the kernel, etc.
No. It's software like gnupg, encfs, openssl and all the library they
use (glibc, glib, X
On 01/31/2018 04:16 AM, Nikos Chantziaras wrote:
On 30/01/18 23:43, Rich Freeman wrote:
If you had some program that listened on a socket and accepted a
length and a string and then did a bounds check using the length, it
might be exploitable if a local process could feed it data. Even if
the
On 31/01/18 11:48, taii...@gmx.com wrote:
On 01/31/2018 04:16 AM, Nikos Chantziaras wrote:
On 30/01/18 23:43, Rich Freeman wrote:
If you had some program that listened on a socket and accepted a
length and a string and then did a bounds check using the length, it
might be exploitable if a
26 matches
Mail list logo