first_imgHarris Manchester25 Corpus Christi11 30 New6 Lincoln9 Exeter20 Christ Church5 St Hilda’s29 St Edmund Hall19 Jesus8 Balliol3 Magdalen4 Lady Margaret Hall St Hugh’s10 Keble14 Merton 1 University17 Wadham16 Worcester27 St Anne’s13 Oxford University has published the preliminary version of its annual ranking of college results in Final Honours Schools subjects in the form of the Norrington Table.The top five colleges are regulars, but elsewhere in the table a number of dramatic changes are evident in comparison with 2006/2007 rankings.Pembroke plummeted 16 places from 10 to 26 while Somerville fell from 19 to 28. Conversely, Oriel jumped from 29 to 15 and St Hugh’s rose 15 places to become 10th in the list.The list of non-PPH colleges is represented below.N.B. This table is based on results which were available by 31 July. A final version, subject to amendments, will be published in October. St Peter’s21 Brasenose22 Queen’s7 Somerville28 St John’s2 Mansfield23 Hertford18 Pembroke26 Oriel15 St Catherine’s24 Trinity12last_img read more

Read More

first_imgA drunk Letterkenny man who was out celebrating his 21st birthday called Gardai ‘piggy b******s’ after he was approached at a Donegal festival.Letterkenny Court.Barry Gildea initially gave Gardai a false name when approached at the Lennon festival in Ramelton on July 13th last. However, Gildea’s false story was soon uncovered by Gardai when his friends referred to him by his real name.Gildea, of Correnagh, Letterkenny, appeared before Letterkenny District Court yesterday charged with giving a false name and under the Public Order Act.Gardai said that when he was approached, Gildea called them a “f***** piggy b********.’The court heard Gildea has nine previous convictions – four for public order.Solicitor Kieran Dillon said his client had been to a number of hostelries while celebrating his birthday but had “let himself down” by the amount of alcohol he had consumed.“He panicked and thought he could bluff his way out of it. He was foolish and friends in company were already addressing him by his real name. He didn’t help matters by reaction,” said Mr Dillon.The court heard that Gildea went to Milford Garda station the following day to apologise.He also works voluntarily for his local football club, cutting grass and lining pitches.Judge Paul Kelly remarked that Gildea was building up a record and fined him a total of €350.MAN CALLED GARDA A ‘PIGGY B******’ WHILE CELEBRATING HIS 21st BIRTHDAY was last modified: November 25th, 2014 by StephenShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window) Tags:Barry GildeadonegalGardaiLennon FestivalRameltonlast_img read more

Read More

first_imgIt’s time to patch up glibc. The popular open-source implementation of the standard C library contains a stack-based buffer overflow related to the DNS client-side resolver. This vulnerability has been patched, but is also now publicly known, and thus developers are advised to patch as soon as possible.Despite Google’s announcement of the bug today in its security blog, there was already a bug report related to the issue submitted back in July of 2015. There was no indication that a patch was in the works, however, so Google submitted its own patch. The company has stated that Red Hat was also working on fixing this bug.(Related: x86 exploit released)The bug was discovered while a Google engineer was tracking down an issue with SSH. The vulnerability relies on oversized UDP or TCP responses larger than 2,048 bytes. Google suggested mitigating the responses coming to any machine using software such as Dnsmasq to filter out large UDP or TCP responses. According to Google, “Glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at _nss_dns_gethostbyname4_r() for hosting responses to a DNS query.“Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated.“Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow.“The vectors to trigger this buffer overflow are very common and can include ssh, sudo, and curl. We are confident that the exploitation vectors are diverse and widespread; we have not attempted to enumerate these vectors further.”last_img read more

Read More