Search:

Type: Posts; User: rmiller; Keyword(s):

Search: Search took 0.11 seconds.

  1. Because java, python, ruby, php, javascript, etc...

    Because java, python, ruby, php, javascript, etc never had vulnerabilities. LOL. In C security depends on code quality and not a Turing-complete machine.
  2. Nop. Read again: ...

    Nop. Read again:

    https://lists.debian.org/debian-devel/2014/11/msg00174.html
  3. 200MB? $ uname -vr 5.5 GENERIC.MP#315 $...

    200MB?



    $ uname -vr
    5.5 GENERIC.MP#315
    $ du -hs /bsd.sp ...
  4. Seems people don't understand what is this...

    Seems people don't understand what is this project about. It's a compatibility layer to adapt systemd-services calls to OpenBSD/FreeBSD daemons calls. By example, systemd-timed replacement it's a...
  5. X always ran in user space. This step involves...

    X always ran in user space. This step involves remove root rights and driver aperture.
  6. Private disclosure

    Some days ago the bugs had been privately communicate to a list of linux distributions.

    This is the timeline:

    http://seclists.org/oss-sec/2014/q2/466
  7. Replies
    37
    Views
    8,957

    Not so cool

    This is only useful if the service runs with a privileged user. A unprivileged user (nobody, http, dhcp, etc) can only access to the files that are owned by him.
  8. Yes my mistake. But it's not apache 2 either....

    Yes my mistake. But it's not apache 2 either. It's similar to original apache license, one of many that the anti-bsd troll hates.
  9. OpenSSL is BSD to...

    OpenSSL has a BSD license. LOL.
  10. OpenSSL has BSD licence. LOL.

    OpenSSL has BSD licence. LOL.
  11. LibreSSL will be portable. They need a small...

    LibreSSL will be portable. They need a small codebase in order to fix the beast, and the OpenSSL portability approach was really wrong.
Results 1 to 11 of 12