-
Hi there, thanks for Graphia, it's fantastic.
I'm curious if I've missed a way to see bidirectional edges:
This is a graph of this text file:
```
a b
b a
b c
a c
```
The multi-ele…
-
https://youtu.be/eUnzO_Ususw?t=705
- https://x64dbg.com
- Don't work for wow. As soon as attach wow close.
-
I am trying to use the python bindings to style text. To do that, I define a TextSymbolizer and I try to set its `name` property. However, when I do this, I get this expection:
```
Traceback (most re…
-
```
BALLYHOO
BARKOV
ACE OF SPADES
LAST WORD
DEAD MAN'S TALE
DEAD MESSENGER
LORENTZ DRIVER
Parasite
Whisper of the Worm
Eye of Sol
Fugue-55
Gallu RR3
Thorn
Sunshot
Red Death
Buzzard
Du…
-
It looks like your still using v3 protocol that has known vulnerabilities and is subject to be using in DDos attacks. Version 4 has been around since 2010 and earlier. Is this on your radar and if s…
-
Sometimes, after unpredictable amount of time working in monitor mode, something fails and monitoring mode is not working anymore (no packets captured, etc...)
Symptoms:
- nexutil calls takes much m…
-
When Digital Forensics Framework (`dff`) is executed on the command line, it **executes with the following error**:
```
android@tamer ~/Desktop> dff
loading modules in /usr/lib/python2.7/dist-package…
-
In [MinSec for SaaS/PaaS](https://uit.stanford.edu/guide/securitystandards/saas_paas), the _Logging and Auditing_ item has the following:
`1. Enable any available application logging that would ass…
-
Currently when joystick gremlin hides/unhides a device the user has to manually unplug and replug in the usb cable. I present to you a fix to automate this!!
Basically all we have to do is disable…
-
- [x] incorporated reviewer's 606A feedback
1. p. 7: Does Defn 3.3 cover only syntax or also perfect completeness and soundness?
2. Sec 3.3: Motivation/intuition for the formalization of the prope…