You should check that your hard drive isn't failing before reinstalling
everything. That sounds like a symptom of a bad disk if multiple files are
empty that shouldn't be.
On Sat, Jul 22, 2023, 9:41 AM Silvio Siefke wrote:
>
>
> Am 22.07.23 um 15:23 schrieb Martin Rys:
> > What's the output of
try bsdiff maybe? https://www.daemonology.net/bsdiff/
it will probably be very slow if you're not going through the filesystem
cache
On Fri, Apr 14, 2023, 4:59 PM Ralf Mardorf wrote:
> Hi,
>
> my google search was "does linux diff compare data using a cache".
>
> I'm trying to figure out
I've been having the same issue for months with Firefox, using XMonad. I
doubt this is a DE-caused issue. Possibly something to do with X. Might be
worth testing it under Wayland.
On Tue, Jan 17, 2023, 9:33 AM NicoHood wrote:
> Hey guys,
> I dont know where to report this, as it could be
Has anyone considered http://shriram.github.io/p4p/ as an alternative?
The idea in a nutshell is to get rid of the implicit `(begin ...)` that
many of the forms have, and use that to reduce the number of required
parentheses for parsing, and add in some extra syntactic sugar in the form
of `:`
Has anyone considered http://shriram.github.io/p4p/ as an alternative?
The idea in a nutshell is to get rid of the implicit `(begin ...)` that
many of the forms have, and use that to reduce the number of required
parentheses for parsing, and add in some extra syntactic sugar in the form
of `:`
Wesley Kerfoot added the comment:
Description:
python 2.7.8 fails with a 'stack smashing detected' error and aborts when
trying to access a C union using ctypes/libffi
Steps to reproduce: see the attached shell script which reproduces the issue on
Ubuntu 13.10 and Arch Linux
Also fails
New submission from Wesley Kerfoot:
Description:
python 2.7.8 fails with a 'stack smashing detected' error and aborts when
trying to access a C union using ctypes/libffi
Steps to reproduce:
See the contents of test.c and test.py in the attached file
gcc -c -fpic -Wall -Wextra -pedantic
http://convergence.io
On 22 February 2012 19:12, Jeffrey Walton noloa...@gmail.com wrote:
It appears to be official.
Trustwave issued MitM certificates, which is deceptive, unethical, and
contrary to its agreement for inclusion.
Mozilla just rewarded their violations of trust by continuing
It turns out that it was a problem with firefox. However, I do not believe
I had any malicious addons or extensions for a few reasons. 1) I only had 4
extensions, adblock plus, pentadactyl, firebug, and noscript.
2) they were all vetted (presumably) by mozilla.
I believe, and this is simply
So there I was, innocently posting anti-SOPA links on my wall. I close my
facebook tab temporarily, open a new one a few minutes later, and I’m
logged out of my account.
“Well that’s odd” I think. So I log back in.
“Your computer has malware!” Facebook says to me. They tell me that my
computer
Sorry! We can't display this content while you're viewing Facebook over a
secure connection (https).
To use this app, you'll need to switch to a regular connection (http).
On Tue, Mar 1, 2011 at 8:56 PM, Andrew Farmer andf...@gmail.com wrote:
On 2011-02-28, at 09:42, Nathan Power wrote:
3.
I think the fact that they have that info in their systems is pretty awful.
I wouldn't trust them with my personal information. How do you know some
disgruntled employee won't take it all and sell it? Or that their database
servers are insecure? BB have shown that they have incompetent employees
where is the password for the archive?
On Wed, Feb 2, 2011 at 1:19 PM, gregorydev...@aim.com wrote:
Do not meddle in the affairs of hackers, for they are subtle and quick
to anger
When one thinks of frauds in the infosec community, most people are
quick to point to Gregory D Evans of LIGATT
Paypal is affected by an XSS vulnerability where it fails to validate
input for the following url:
https://www.paypal.com/xclick/business=
One can add arbitrary javascript with no need for any filter evasion.
https://www.paypal.com/xclick/business=script alert(xss); /script
As far as I
14 matches
Mail list logo