archive-org.com » ORG » R » REDBARN.ORG

Total: 169

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • spammer northbridge.com | Red Barn
    and regardless of your immediate capital needs it d be great to arrange an introductory conversation Please let me know if there is a good time for us to connect in the upcoming weeks to introduce you to North Bridge and see if we can be helpful as you continue building your business Thank you in advance for your time and I look forward to being in touch Best Steve

    Original URL path: http://www.redbarn.org/node/22?destination=node%2F22 (2016-04-24)
    Open archived version from archive


  • northbridge.com | Red Barn
    modules taxonomy taxonomy pages inc on line 33 spammer northbridge com today i received spam from a private equity firm details below for the search engines From Steve Isom mailto smi northbridge com Sent Thursday July 17 2014 5 40

    Original URL path: http://www.redbarn.org/taxonomy/term/45?destination=taxonomy%2Fterm%2F45 (2016-04-24)
    Open archived version from archive

  • spammer | Red Barn
    taxonomy taxonomy pages inc on line 33 spammer northbridge com today i received spam from a private equity firm details below for the search engines From Steve Isom mailto smi northbridge com Sent Thursday July 17 2014 5 40 AM

    Original URL path: http://www.redbarn.org/taxonomy/term/44?destination=taxonomy%2Fterm%2F44 (2016-04-24)
    Open archived version from archive

  • Paul Vixie's Testimony before Subcommittee on Crime and Terrorism, "Taking Down Botnets", 2014-07-15 | Red Barn
    s blog Paul Vixie s Testimony before Subcommittee on Crime and Terrorism Taking Down Botnets 2014 07 15 Testimony of Paul Vixie Chairman CEO Farsight Security Inc before the Subcommittee on Crime and Terrorism United States Senate Committee on the Judiciary Hearing on Taking Down Botnets Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks July 15 2014 Attachment Size 2014 07 15 botnets pdf 40 93 KB By

    Original URL path: http://www.redbarn.org/node/21?destination=node%2F21 (2016-04-24)
    Open archived version from archive

  • botnets | Red Barn
    empty value in usr local www drupal6 modules taxonomy taxonomy pages inc on line 33 Paul Vixie s Testimony before Subcommittee on Crime and Terrorism Taking Down Botnets 2014 07 15 Testimony of Paul Vixie Chairman CEO Farsight Security Inc before the Subcommittee on Crime and Terrorism United States Senate Committee on the Judiciary Hearing on Taking Down Botnets Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks July

    Original URL path: http://www.redbarn.org/taxonomy/term/41?destination=taxonomy%2Fterm%2F41 (2016-04-24)
    Open archived version from archive

  • e-crime | Red Barn
    empty value in usr local www drupal6 modules taxonomy taxonomy pages inc on line 33 Paul Vixie s Testimony before Subcommittee on Crime and Terrorism Taking Down Botnets 2014 07 15 Testimony of Paul Vixie Chairman CEO Farsight Security Inc before the Subcommittee on Crime and Terrorism United States Senate Committee on the Judiciary Hearing on Taking Down Botnets Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks July

    Original URL path: http://www.redbarn.org/taxonomy/term/43?destination=taxonomy%2Fterm%2F43 (2016-04-24)
    Open archived version from archive

  • malware | Red Barn
    empty value in usr local www drupal6 modules taxonomy taxonomy pages inc on line 33 Paul Vixie s Testimony before Subcommittee on Crime and Terrorism Taking Down Botnets 2014 07 15 Testimony of Paul Vixie Chairman CEO Farsight Security Inc before the Subcommittee on Crime and Terrorism United States Senate Committee on the Judiciary Hearing on Taking Down Botnets Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks July

    Original URL path: http://www.redbarn.org/taxonomy/term/42?destination=taxonomy%2Fterm%2F42 (2016-04-24)
    Open archived version from archive

  • Modula-3 (article reprinted from USENIX ;login: November/December 1992) | Red Barn
    it or more often in the code we ve seen casts it to void Modula 3 has as part of every procedure declaration a list of conditions which that procedure is capable of raising Code which calls that procedure has the option of wrapping the call in a TRY EXCEPT END statement if it wants to have a chance to handle certain exceptions in the absence of any caller who cares the program exits with an error This leaves the return value available for a full range of useful things none of which are reserved as magic cookies It also avoids most occasions where an error encoding must be mapped from 1 was an error to but NULL is my return error code A Larger Example So why would you care about Modula 3 given that the world seems to be switching to C and Objective C or pouring megaspecmarks into Common Lisp Simply put it ain t over til the fat lady sings C is an endlessly flexible language much worse so than C measured by the ability to write code which other programmers cannot understand or to write code which even the author cannot understand or to write code which does not do what it looks like it should be doing C is the first language to eclipse C Sorry Larry C beat Perl by a couple of years One could and has argued that C s design not only permits bad code it encourages it Common Lisp on the other hand is a beautiful elegant language which will someday join ADA in the museum of beached whales Of the languages whose definitions are in the public domain and for which there are freely available portable implementations available for most of the popular POSIX like platforms Modula 3 is the one in which it is hardest to write code which does not do what it looks like it should be doing or which even the author cannot understand or which other programmers cannot understand You may not see this from the examples shown so far but consider the program in Figure 2 which sends an IP UDP datagram think packet requesting the network time from all inetd 8 s on the local subnet collects the replies and prints the average or network time UNSAFE MODULE Main IMPORT Datagram Netdb Net MyTime local hacks IMPORT Stdio Wr Fmt Thread Time Text standard IMPORT Word Ctypes nonportable TYPE T Ctypes long 64 bit machines will in be trouble here VAR Done FALSE Rcvd 0 Waits 0 NetTime T CONST TimeDifferential 2085978496 inetd 8 s offset PROCEDURE ProtocolF self Thread Closure REFANY RAISES VAR port Datagram NewClient NIL mayBroadcast TRUE server Netdb NewRemotePort 255 255 255 255 time udp timeval NEW REF T BEGIN port send NIL 0 server 0 length datagram is a request LOOP EVAL port recv timeval BYTESIZE timeval server timeval Word Minus Net ntohl timeval TimeDifferential IF Rcvd 0 THEN NetTime timeval ELSE NetTime Word Divide Word Plus NetTime timeval 2 END INC Rcvd Done FALSE END END ProtocolF BEGIN EVAL Thread Fork NEW Thread Closure apply ProtocolF REPEAT Done TRUE Time LongPause 1 INC Waits UNTIL Done IF Rcvd 0 THEN Wr PutText Stdio stdout No Replies n ELSE NetTime Word Minus NetTime Waits Wr PutText Stdio stdout Network time MyTime TimeToText NetTime Fmt Int Rcvd replies n END END Main One important note about this code the Datagram module is a quick and dirty hack that we cobbled together to test some assumptions about IP UDP performance the actual IP UDP interface supported in Modula 3 is likely to be quite different Likewise the Netdb Net and MyTime modules are all local hacks that you don t have and wouldn t want anyway As is true of any language which is less than a decade old Modula 3 s standard libraries are still evolving The program makes slightly contrived use of the Thread interface the goal is to keep collecting responses until none appear for one second A C programmer would use alarm 2 or select 2 with a timeout This program starts a thread which blocks in port recv which given the presence of the Thread interface was designed without any explicit timeouts of its own whenever a datagram comes in this thread receives it and computes it into the running average The main thread loops waiting one second and then exiting the loop only when no datagrams have been received by the other thread during the last second The code is sloppy in that it should protect its thread shared variables with mutexes but as a demonstration it is already as complicated as would be useful The program is also of the ugly and nonportable variety a more robust implementation would hide all of the details of the Word unsigned arithmetic in other modules so that this module could do its job as straighforwardly as possible We chose this example because it shows Modula 3 code trying to deal with the UNIX system call interface This in other words is as ugly as system dependent Modula 3 source ever has to get You might wonder why we NEW the timeval variable and dereference it every where rather than creating a normal variable and passing it by ADR in the one place we actually need its address This has to do with the declaration of the Datagram object s recv method which due to dampness behind its authors ears was rather more selective than it could have been To get an idea of what is really possible given threads and garbage collection consider an IP DNS name server which needs to concurrently process multiple incoming and outgoing zone transfers over IP TCP all the while receiving forwarding and generating DNS requests and replies over IP UDP The popular BIND name server forks a subprocess for each zone transfer a major performance penalty if you don t have a copy on write fork and your

    Original URL path: http://www.redbarn.org/node/20?destination=node%2F20 (2016-04-24)
    Open archived version from archive



  •