-
```
What steps will reproduce the problem?
1. running 2 JPEG feeds simultaneously
2. Leave running 24 hours 7 days
3. motion capture logging with data management on
What is the expected output? What…
-
```
What steps will reproduce the problem?
1. running 2 JPEG feeds simultaneously
2. Leave running 24 hours 7 days
3. motion capture logging with data management on
What is the expected output? What…
-
```
What steps will reproduce the problem?
1. running 2 JPEG feeds simultaneously
2. Leave running 24 hours 7 days
3. motion capture logging with data management on
What is the expected output? What…
-
The Star OTTO Light is initially in WiFi mode AP+STA. This creates an insecure Arduino-Star-Otto-******* network that any random device can connect to. While this is useful during the initial setup (a…
-
## Code Report
Tool: `valgrind --leak-check=full --show-leak-kinds=definite ./haproxy -c -f /tmp/haproxyconfig/haproxy/cfg`
```
==22368== HEAP SUMMARY:
==22368== in use at exit: 1,851,960 …
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Version
vv1.15.7 or higher
### What happened?
In Kubernetes clusters on cloud providers (control-p…
-
```
What steps will reproduce the problem?
1. download r14756 + apply the leak patch
modified r14535_5 port files into r14756+patch here :
http://code.google.com/p/lusca-freebsd-port/downloads/list
…
-
Currently in order to retrieve a IP address you need both the username and password. With the username and password you can also change the IP address. This would be unnecessary access if you just wan…
-
@martinthomson has prepared PR #25 to add a "privacy analysis", but I think the discussion of that matter would be better done in an issue than in a PR.
-
### Steps to reproduce
1. Drag a file from my local network onto telegram desktop
### Expected behaviour
should give popup that says drop files here to send them as a document
### Actual behaviour…