Google News, notícias Google a respeito de sistemas BSD e Código Aberto em geral.
Estas pesquisas são as mesmas que você pode fazer em http://news.google.com e http://news.google.com.br , com algumas palavras chaves relevantes ao interesse do visitante do Web Site da FUG-BRR.
No editor de textos vi(1), para remover os ^M de arquivos MS-DOS (Windows), use:
:g/^V^M/s//
You Receive this email because you are subscribed to BGPmon.net.For more details about these updates please visit:http://bgpmon.net/showupdates.php====================Possible Prefix Hijack (Code: 11)1 number of peer(s) detected this updates for your prefix 3.0.0.0/8:Update details: 2008-11-11 01:55 (UTC)3.0.0.0/8Announced by: AS16735 (Companhia de Telecomunicacoes do Brasil Central)Transit AS: 27664 (CTBC Multimdia)ASpath: 27664 16735
If the probability of a request failing during the n th 5-minute interval is p(n), and the number of requests issued during the n th interval is determined solely by p(n), the expected value of the Monthly Uptime Percentage is 100% minus the average value of p(n) over all the intervals; put another way, you can't cheat by waiting for a high p(n) and then quickly running up the failure count by issuing lots and lots of requests. However, this uncheatability applies only if the number of requests issued is independent of the success or failure of individual requests; if we can see whether one request succeeded before issuing the next one, we can cheat the SLA -- quite extravagently, in fact.
Amazon SimpleDB measures the machine utilization of each request and charges based on the amount of machine capacity used to complete the particular request [...]
OpenSSH Security Advisory: cbc.adv Regarding the "Plaintext Recovery Attack Against SSH" reported as CPNI-957037: The OpenSSH team has been made aware of an attack against the SSH protocol version 2 by researchers at the University of London. Unfortunately, due to the report lacking any detailed technical description of the attack and CPNI's unwillingness to share necessary information, we are unable to properly assess its impact.
OpenSSH Security Advisory: cbc.adv
Regarding the "Plaintext Recovery Attack Against SSH" reported as CPNI-957037:
The OpenSSH team has been made aware of an attack against the SSH protocol version 2 by researchers at the University of London. Unfortunately, due to the report lacking any detailed technical description of the attack and CPNI's unwillingness to share necessary information, we are unable to properly assess its impact.
The following diff is the next step of some further cleaning of the Ethernet ioctl handling code in the Ethernet drivers. This takes advantage of the addition of MTU and multicast handling to ether_ioctl() so some some duplicate code can be removed from the individual drivers and simplifies things a bit. This needs testing with pretty much every NIC supported. Please send me a dmesg with whatever you are able to test. This mainly affects multicast handling which is used by things such as IPv6, CARP and OSPF.
The following diff is the next step of some further cleaning of the Ethernet ioctl handling code in the Ethernet drivers. This takes advantage of the addition of MTU and multicast handling to ether_ioctl() so some some duplicate code can be removed from the individual drivers and simplifies things a bit.
This needs testing with pretty much every NIC supported. Please send me a dmesg with whatever you are able to test.
This mainly affects multicast handling which is used by things such as IPv6, CARP and OSPF.
From: Jacob Meuser Date: Sun, Nov 16, 2008 at 6:17 PM Subject: Re: CVS: cvs.openbsd.org: src To: source-changes@ On Sun, Nov 16, 2008 at 01:44:03PM -0700, Alexandre Ratchov wrote: > CVSROOT: /cvs > Module name: src > Changes by: ratchov@ 2008/11/16 13:44:03 > > Modified files: > usr.bin/aucat : aucat.1 aucat.c listen.c sock.c > > Log message: > allow aucat to listen on multiple sockets. Each socket carries its > channel and volume settings allowing multiple configuration to > coexist. Mostly useful for envy(4)-like devices, but can be used > to force different apps to use different settings. OMG! that's the coolest thing ever! thank you thank you thank you