Package Details: sumac 1.3.61-8

Git Clone URL: https://aurweb-goaurrpc-uat.sandbox.archlinux.page/sumac.git (read-only, click to copy)
Package Base: sumac
Description: None
Upstream URL: None
Conflicts: mariuss, windex
Provides: salience
Replaces: sloans
Submitter: territorial
Maintainer: replicated
Last Packager: gadgetry
Votes: 25
Popularity: 23.49
First Submitted: 2025-12-13 10:40 (UTC)
Last Updated: 2025-12-13 10:40 (UTC)

Dependencies (11)

Required by (16)

Sources (2)

Latest Comments

montenegrins commented on 2025-12-15 21:07 (UTC)

HOW TO PROVE IT, PART 5 proof by accumulated evidence: Long and diligent search has not revealed a counterexample. proof by cosmology: The negation of the proposition is unimaginable or meaningless. Popular for proofs of the existence of God. proof by mutual reference: In reference A, Theorem 5 is said to follow from Theorem 3 in reference B, which is shown to follow from Corollary 6.2 in reference C, which is an easy consequence of Theorem 5 in reference A. proof by metaproof: A method is given to construct the desired proof. The correctness of the method is proved by any of these techniques.

autocross commented on 2025-12-15 13:59 (UTC)

"You dont go out and kick a mad dog. If you have a mad dog with rabies, you take a gun and shoot him." -- Pat Robertson, TV Evangelist, about Muammar Kadhafy

helpmates commented on 2025-12-13 19:19 (UTC)

It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20