quier implementar este servidor y utilizar un solo ip para varia paginas
Alberto Torres Paredes:
Ingenieria de Sistemas :
Universidad
Hola,
Soy nuevo en Linux y llevo various días intentando abrir el puerto 1500 para
comunicar con una aplicación. Por defecto la polítca es ACCEPT
En la Iptable añadi manualmente la siguiente entrada:
-A RH-Firewall -1-INPUT -p tcp -m tcp --dport 1500 -j ACCEPT
Pero al revisar con nmap, no me
On 06/30/2010 09:11 AM, Jose Alberto Torres Paredes wrote:
quier implementar este servidor y utilizar un solo ip para varia paginas
activa NameBasedHosting en tu apache y configúralo de acuerdo a lo requerido
___
CentOS-es mailing list
Precisamente, nmap no escanea puertos abiertos sino más bien puertos
publicados por alguna aplicación, por ejemplo si tienes un servidor de
correos veras abierto el puerto 25 y 110, si tienes una aplicacion web
seguro veras el 80, etc...
lo que quieres hacer es monitorear la conexion, puede
Cambia el INPUT por FORWARD y mira si es TCP, necesitas. Establecer una sesión
remota a algún server o host o es comunicación UDP?? Revisa eso
Mensaje enviado desde mi terminal BlackBerry® de Porta
-Original Message-
From: Damaso Payares lordel...@gmail.com
Sender:
On Wed, Jun 30, 2010 at 11:59 AM, Christopher Chan
christopher.c...@bradbury.edu.hk wrote:
Sounds exactly like the mentality in Hong Kong too. I mean, even the
bigger companies with Asian managers have a similar mentality. The IT
department is always the under-budgeted, under-manned and public
On Wednesday 30 June 2010, Spiro Harvey wrote:
Aleksey Tsalolikhin atsaloli.t...@gmail.com wrote:
(a) account for the difference in the binaries, and
(b) see if something else is different that I can make the same to get
the mkfs.ext3 time down to 15 sec on both systems.
Solving (a)
Jacob Bresciani wrote:
R605 is a power edge server model I think.The Perc6/i is a Dell rebranded
raid controller, it's actually an LSI in disguise. Try downloading the
Megaraid utilities from LSI and using them to see the status of the card.
Hmmm, I think I see the Linux/CentOS megaraid load
Les Mikesell wrote on Tue, 29 Jun 2010 17:52:37 -0500:
Apache Server 2.x Prior To 2.2.14 Multiple Vulnerabilities Apache
\'mod_proxy_ftp\' Wildcard Characters Cross-Site Scripting.
Remove that module from httpd.conf and try again. If it still gives that
warning you've proven the tool is
Emmanuel Noobadmin wrote:
On Wed, Jun 30, 2010 at 11:59 AM, Christopher Chan
christopher.c...@bradbury.edu.hk wrote:
Sounds exactly like the mentality in Hong Kong too. I mean, even the
bigger companies with Asian managers have a similar mentality. The IT
department is always the
Drew wrote:
You must be spoiled by always using GUI tools that present a pick list - no
one
would ever type all that crap every time they want to access a file. And,
you
could just as well use underscores instead of spaces and get the same visual
effect AND still permit natural 'break on
Kai Schaetzl wrote:
Les Mikesell wrote on Tue, 29 Jun 2010 17:52:37 -0500:
Apache Server 2.x Prior To 2.2.14 Multiple Vulnerabilities Apache
\'mod_proxy_ftp\' Wildcard Characters Cross-Site Scripting.
Remove that module from httpd.conf and try again. If it still gives that
warning
On Jun 30, 2010, at 8:47 AM, Les Mikesell lesmikes...@gmail.com wrote:
Drew wrote:
You must be spoiled by always using GUI tools that present a pick list - no
one
would ever type all that crap every time they want to access a file. And,
you
could just as well use underscores instead of
Ross Walker wrote:
On Jun 30, 2010, at 8:47 AM, Les Mikesell lesmikes...@gmail.com wrote:
Drew wrote:
You must be spoiled by always using GUI tools that present a pick list -
no one
would ever type all that crap every time they want to access a file. And,
you
could just as well use
On Tue, 2010-06-29 at 17:36 -0400, m.r...@5-cent.us wrote:
Clues for the poor? I want to put the system on the SATA drive, leaving
the raid for data.
mark
---
See the drive in the raid configurator? ^C-M
Configure the 750G drive as a Raid 0? Init the Scrubing?
The controler
On Wed, Jun 30, 2010 at 08:47:17AM -0500, Les Mikesell wrote:
Ross Walker wrote:
In my world I have two parts of the file system, one containing OS and
apps that runs short-name standard and the other where the user data
files are contained that uses long names and sometimes unicode names,
Les Mikesell wrote:
Kai Schaetzl wrote:
Les Mikesell wrote on Tue, 29 Jun 2010 17:52:37 -0500:
Apache Server 2.x Prior To 2.2.14 Multiple Vulnerabilities Apache
\'mod_proxy_ftp\' Wildcard Characters Cross-Site Scripting.
Remove that module from httpd.conf and try again. If it still gives
2010/6/30 mark m.r...@5-cent.us:
Jacob Bresciani wrote:
R605 is a power edge server model I think.The Perc6/i is a Dell rebranded
raid controller, it's actually an LSI in disguise. Try downloading the
Megaraid utilities from LSI and using them to see the status of the card.
Hmmm, I think I
For those who might be interested, RHEL 6b2 has just been announced.
http://www.redhat.com/rhel/beta
Cheers,
B.J.
CentOS 5.5, Linux 2.6.18-194.3.1.el5 x86_64 10:47:08 up 8 days, 14:45, 1
user, load average: 0.56, 0.55, 0.49
___
CentOS mailing list
-Original Message-
From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On
Behalf Of b.j. mcclure
Sent: Wednesday, June 30, 2010 4:49 PM
To: centos@centos.org
Subject: [CentOS] RHEL 6b2 Release
For those who might be interested, RHEL 6b2 has just been announced.
2010/6/30 Morten P.D. Stevens mstev...@imt-systems.com:
-Original Message-
From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On
Behalf Of b.j. mcclure
Sent: Wednesday, June 30, 2010 4:49 PM
To: centos@centos.org
Subject: [CentOS] RHEL 6b2 Release
For those who
this sounds like the right solution, you can do this either form the firmware
or the megaraid command line tool MegaCli64 (MegaCli for non-64 bit systems)
On 2010-06-30, at 7:18 AM, Eero Volotinen wrote:
2010/6/30 mark m.r...@5-cent.us:
Jacob Bresciani wrote:
R605 is a power edge server
On 30/06/10 16:25, Eero Volotinen wrote:
is there package list with version numbers available?
Not that I've seen, but you could just browse the source dir:
ftp://ftp.redhat.com/pub/redhat/rhel/beta/6Server-beta2/source/SRPMS/
___
CentOS mailing
After reading:
*[1] http://forums.fedoraforum.org/showthread.php?t=141178
*[2]
https://www.centos.org/modules/newbb/viewtopic.php?viewmode=flattopic_id=22187;
forum=39
*[3]
http://wirelessness.wordpress.com/2007/02/07/installing-fedora-linux-on-a-dell-o
ptiplex-320/
*[4]
On 6/30/10, Les Mikesell lesmikes...@gmail.com wrote:
One thing you can do on the cheap is set up nightly backups with backuppc.
It
can run on a machine that does something else in the daytime if necessary
and
its pooling and compression scheme will store about 10x the history you
would
Thanks, everyone. Making the single drive a RAID-0 was the answer. From
the boot, it was ctrl-R, and then follow what y'all were saying. As soon
as I did that, and had the controller software make it bootable, when I
got out and went into the CenOS install, everything was wonderful - I even
saw
On 6/30/2010 11:02 AM, Emmanuel Noobadmin wrote:
On 6/30/10, Les Mikeselllesmikes...@gmail.com wrote:
One thing you can do on the cheap is set up nightly backups with backuppc.
It
can run on a machine that does something else in the daytime if necessary
and
its pooling and compression
when i opened Devhelp,there was a segment err even i had reinstall it.
How can i fix it?
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
What's the deal with all of the new dependencies for xulrunner-devel in
the last update? I'm updating my servers and the update for
xulrunner-devel is forcing me to install 43 new packages! Is this a
packaging problem, or are all of those packages really needed?
For the moment, I've been
I get an email from security, I see the article on slashdot, and other
places, that Adobe's issued an update to acroread... but yum update
AdobeReader_enu is still telling me there's no update. Has anyone seen it
yet, in the repositories?
mark
On 30/06/2010 17:47, cjzjm100 wrote:
when i opened Devhelp,there was a segment err even i had reinstall it.
How can i fix it?
I've just pushed an update to the centos mirrors for devhelp that should
fix this issue for you. Give it a few hours to be seen publicly. If your
problem persists
On Wed, Jun 30, 2010 at 12:52 PM, m.r...@5-cent.us wrote:
I get an email from security, I see the article on slashdot, and other
places, that Adobe's issued an update to acroread... but yum update
AdobeReader_enu is still telling me there's no update. Has anyone seen it
yet, in the
The above discussion of prelink gave me pause for thought...
I have a suite of programs that I install in their own directory,
along with their datafiles, under /opt.
Would it be a good idea to add that directory to /etc/prelink.conf?
What could go wrong?
--
MELVILLE THEATRE ~ Melville Sask ~
On Wed, 2010-06-30 at 10:10 -0400, m.r...@5-cent.us wrote:
I understand that. We had a scan a few months ago (and theyre about to
do
it again), and to satisfy it, I had to turn off the h/d/ramdisks in
our
laser printers
What is the point of doing a security scan under conditions that
Frank Cox wrote:
On Wed, 2010-06-30 at 10:10 -0400, m.r...@5-cent.us wrote:
I understand that. We had a scan a few months ago (and they're about to
do it again), and to satisfy it, I had to turn off the h/d/ramdisks in
our laser printers
What is the point of doing a security scan under
-Original Message-
From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On
Behalf Of Morten P.D. Stevens
Sent: Wednesday, June 30, 2010 5:13 PM
To: CentOS mailing list
Subject: Re: [CentOS] RHEL 6b2 Release
Hi,
And here are the Release Notes for RHEL 6 Beta 2:
Anyone know of a repository with uuid_fixer? Now that I've rebuilt this
thing, I need to recover the LVM that the raid comprises
mark
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
For most (large) organizations, security scans have NOTHING to do with
increasing security, and everything with being able to answer Yes
to a question like Do you regularly scan for known defects?,
probably for a VISA type compliance check.
If you don't already know, you really don't want to know
-Original Message-
From: centos-boun...@centos.org
[mailto:centos-boun...@centos.org] On Behalf Of Jason Pyeron
Sent: Wednesday, June 30, 2010 11:54
To: 'CentOS mailing list'
Subject: [CentOS] Grub fails on dell optiplex 320
After reading:
*[1]
Jim Wildman wrote:
On Wed, 30 Jun 2010, Frank Cox wrote:
snip
What is the point of doing a security scan under conditions that are not
actually live?
It sounds like moving the flammable materials out before a fire
inspection, then moving them right back in when the inspector leaves.
What
On Wed, 2010-06-30 at 15:14 -0400, m.r...@5-cent.us wrote:
Sorry, you lost me here. I turned off all access to the h/d/ramdisk on
the
printers, and left it off. This, of course, slows things down a lot,
but
it's Secure.
The point is that the security scan is supposed to be verifying that
On Wed, Jun 30, 2010, Frank Cox wrote:
On Wed, 2010-06-30 at 15:14 -0400, m.r...@5-cent.us wrote:
Sorry, you lost me here. I turned off all access to the h/d/ramdisk on
the
printers, and left it off. This, of course, slows things down a lot,
but
it's Secure.
The point is that the security
Frank Cox wrote:
On Wed, 2010-06-30 at 15:14 -0400, m.r...@5-cent.us wrote:
Sorry, you lost me here. I turned off all access to the h/d/ramdisk on
the
printers, and left it off. This, of course, slows things down a lot,
but
it's Secure.
The point is that the security scan is supposed to
m.r...@5-cent.us wrote:
Frank Cox wrote:
On Wed, 2010-06-30 at 15:14 -0400, m.r...@5-cent.us wrote:
Sorry, you lost me here. I turned off all access to the h/d/ramdisk on
the
printers, and left it off. This, of course, slows things down a lot,
but
it's Secure.
The point is that the
John Jasen wrote:
m.r...@5-cent.us wrote:
Frank Cox wrote:
On Wed, 2010-06-30 at 15:14 -0400, m.r...@5-cent.us wrote:
Sorry, you lost me here. I turned off all access to the h/d/ramdisk on
the printers, and left it off. This, of course, slows things down a lot,
but it's Secure.
snip
Forgive
On 6/30/2010 4:02 PM, m.r...@5-cent.us wrote:
Frank, I'm not sure of the object of your part of the conversation, me, or
the security team that I have to deal with. I'm also feeling as though
we're talking past each other. They ran the scan. My manager handed the
response handling of it to
Les Mikesell wrote:
On 6/30/2010 4:02 PM, m.r...@5-cent.us wrote:
Frank, I'm not sure of the object of your part of the conversation, me,
or the security team that I have to deal with. I'm also feeling as though
we're talking past each other. They ran the scan. My manager handed the
response
But the point is that the original poster is NOT the one running the
scan. And the results of the scan (complaining about
vulnerabilities based on version numbers) indicates that it is not a
true 'security' scan anyway. For (almost) every CVE issued, there
is a way to mitigate the risk that does
On 6/30/2010 4:39 PM, m.r...@5-cent.us wrote:
companies/business units/administrators police themselves so you need
metrics for someone else to test with. And even internally you need to
document why the failure of any standard check should be overlooked.
No, the security people should have
On Wed, Jun 30, 2010 at 1:48 AM, Peter Kjellstrom c...@nsc.liu.se wrote:
On Wednesday 30 June 2010, Spiro Harvey wrote:
Aleksey Tsalolikhin atsaloli.t...@gmail.com wrote:
(a) account for the difference in the binaries, and
(b) see if something else is different that I can make the same to
On Jun 30, 2010, at 6:03 PM, Les Mikesell lesmikes...@gmail.com wrote:
On 6/30/2010 4:39 PM, m.r...@5-cent.us wrote:
companies/business units/administrators police themselves so you need
metrics for someone else to test with. And even internally you need to
document why the failure of any
On Wed, Jun 30, 2010 at 5:02 PM, m.r...@5-cent.us wrote:
Frank, I'm not sure of the object of your part of the conversation, me, or
the security team that I have to deal with. I'm also feeling as though
we're talking past each other. They ran the scan. My manager handed the
response handling
Hi list,
I'm running 2.6.18-164-15.1 xen kernel.
Any way to get firewire to work on it?
I've read plenty about needing the centosplus kernel but is that really
necessary?
- aurf
___
CentOS mailing list
CentOS@centos.org
Hi,
I'm trying to repair a remote system using the Live CD.
I have VPN access to the subnet where it lives.
An onsite person is booting from cd, and running a small script I
provided to tweak the default firewall rule set to allow incoming ssh,
and set a password for the centos user and start
A bit more info about my system;
I edited /etc/modprobe.d/blacklist-firewire and commented out the
blacklist like so it looks like so;
#blacklist firewire-ohci
Running lspci returns;
10:0b.0 Firewire (IEEE 1394): Texas Instruments TSB82AA2 IEEE-1394b Link
Layer Controller (rev 02)
lsmod |
Instead of unmounting the partition try using 'mount -o rw,remount ', I
dont use the live CD much, but unless you screwup the rw, remount, or the path
to the mounted partition it should either remount the partition properly or
error that you didnt point to the correct path. I have rarely
m.r...@5-cent.us wrote:
John Jasen wrote:
m.r...@5-cent.us wrote:
Frank Cox wrote:
On Wed, 2010-06-30 at 15:14 -0400, m.r...@5-cent.us wrote:
Sorry, you lost me here. I turned off all access to the h/d/ramdisk on
the printers, and left it off. This, of course, slows things down a lot,
but
I read up on prelink as suggested; and used ldd /sbin/mkfs.ext3 to
see what the dependencies (libraries) are.
There are 13 dependencies; file size is the same between servers but
md5sum's are different!
Most of these libraries have other libraries they call; I finally drilled down
to ld-2.5.so
i think you'll need to re-read the man pages on prelink. specifically, the
-y or --md5 or --sha options. that is essentially what rpm -V does, it does
an undo of the prelink to verify the original binary file's hash; which
will be the same for the same version of software from the same package.
59 matches
Mail list logo