[ this msg transmitted via ComCast's godawful WWW email tool ]
Once upon a time, ComCast invited customers to send copies of SPAM
messages (those few which managed to get past ComCast's filters)
to a particular email address, so I rigged my system to do so
because I presumed they'd use them to
Anybody have a good smelter for rent?
Return it to the vendor; let them who dealt it smelt it...
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Sorry you were all so offended. I will go back to lurking.
Awww, shucks - no need for that.
All I was griping about was that somebody along the line
decided they could improve those (most excellent!)
classic haikus by claiming that they were specifically
Japanese-edition-Windows error
along without improving upon them, much as my dog improves every
hydrant he passes...
Or worse yet, feels the need to respond to everyone with engaging
banter that refers to his dog's urination habits. Speaking of inflated
opinions of oneself...
[EMAIL PROTECTED] I'm not sure where
[EMAIL PROTECTED] I'm not sure where that came from, but please be
informed that I wasn't talking about Karl or anybody else in
the GNHLUG, just (I assume) some anonymous meddler up the line...
Then I misunderstood, Sorry Michael... Thought you were trying
to stifle him
Cool. And I
subversion isn't in the 'package list database' for apt yet.
Is, too!
libapache2-dav-svn - Apache module for Subversion - in development, alpha
libsvn0 - Subversion shared libraries - in development, alpha
libsvn0-dev - Subversion development files - in development,
I haven't put much effort into figuring out what
you're trying to do but, assuming that awstats.pl
accepts stuff via stdin, you probably want to do
something like this:
gunzip $n | /path/to/my/cgi-bin/awstats.pl -config=www.buzgate.org -update
-logfile=stdin
I've checked that do-not-call site several times today
and it's been unresponsive - I think they're swamped.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
People have also raised the concern that the system might easily
be duped into mailbombing people. Apparently, the contractor who
configured the system doesn't have any experience with this kind
of application.
I heard a rumour that the barely-competent
contractor in question got approx
Alternatively, there are tools to check for the most commonly used
root kits. You should be able to find links to some on Google.
You should be able to find links to some with ANY search engine.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
I'm pulling over the chkrootkit package. Sounds like
exactly what I'm looking for!
For reasons already mentioned by Derek and others,
the results obtained from chkrootkit are only
trustworthy in the positive case. A negative result
is inconclusive, since you're basically asking the
compromised
trustworthy in the positive case. A negative result
is inconclusive, since you're basically asking the
compromised system, Hey! Are you compromised?
Then by this logic, -anything- you do, except for pulling the drive
and mounting it in a system or booting off of a CD is suspect.
While
Forwarded from [EMAIL PROTECTED]:
On behalf of a major IT research company, I am seeking
to interview IT managers at companies using Linux on
the desktop. I would like to ask qualified respondents
questions about Linux implementations, costs, downtime,
etc. If you are interested in being
Given a normal Linux box of some recent vintage
(like, say, 2.4.18) can anybody help me get a sense
of how many UDP datagrams of some nominal size (like,
say, 1k or 4k) can be received before the kernel
(as it is entitled to do with UDP) starts dropping
them on the floor? In other words,
They are both very well done, if you don't mind learning something new.
EBRAINTOOSMALL
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
I've heard of a few places that run an MTA that allows
you to have multiple .forward files with names of the form
.forward+extra
...which will be applied when the corresponding
[EMAIL PROTECTED]
addresses are seen in your inbound messages. This rather
cool feature is definitely not
Don't look at me, I took the blue pill.
...well, then we'll all DEFINITELY be keeping our distance.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
This was cut from the email announcement.
Yes, that would be an example of one of those
lowest-common-denominator messages I referred to.
[.]
I believe from this that attbi email forwarding will not
be available if the transition wizard is not used
You are, of
FYI, machines within the attbi.com domain can connect
to the NNTP server(s) named netnews.attbi.com and you
may find some postings of interest related to this topic.
The best group is probably
attbi.ne.techtalk.general
...but there are a number of others that might
also provide info of
At some point soon I may be called upon to
know more about SNMP than how to spell it,
so I'm looking for recommendations for
the best books/docs to read to get a good
general understanding.
A while back I briefly fooled around
with the snmpd and scli packages that are
available for Debian but
Besides, most people pick lousy passphrases anyway. That's why I wrote
my own passphrase generator to spit out random gibbersish such as
(actual program output):
[EMAIL PROTECTED]:~$ pgen
8T(U[TcY
[EMAIL PROTECTED]:~$ pgen 12
mp{6$}9:_+\
[EMAIL PROTECTED]:~$ pgen 24
This got a mention on Debian Planet and seemed
related to previous discussions on this channel:
http://talk.trekweb.com/~jasonb/articles/exim_maildir_imap.shtml
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
I hope the story at this link:
http://www.theinquirer.net/?article=9799
(or my understanding of it) is off the mark.
Otherwise, the implication is that IBM is
suing for infringement of patents covering
(some aspects of) the PeeCee architecture.
Yow.
Have we seen anything about this from a *real* publication?
The Inquirer is entertainment, not journalism. Furthermore,
that story is so weak on facts it is practically non-existent.
Agreed. Unfortunately, the Inquirer's hit rate on this
sort of melodramatic junk is just high enough that
One approach might be to just have one instance of
tar (standing in the source directory) squirt all
the files over to another instance that's standing
in the destination directory, maybe like this:
cd srcDir ; tar cf - . | tar xf - -C destDir
___
I think it is quite possible that Charlie has lost his *root*
disk, or part of it, such that when the kernel tries to read the
contents of /sbin/init from the disk, it hangs.
Maybe that init=/bin/bash trick from the kernel command line...?
___
I can't do any DNS lookups for any machines in
any domain associated with AOL.
I'd join you all in the unison chanting of
good riddance! except that many of my relatives
use AOL and all 4 nameservers for cnn.com are
AOL machines. Any idea what's going on?
Never mind.
The problem persisted for 20 minutes and I was seeing it
via both my work and home connections and (naturally)
it resolved itself as soon as I posted my question...
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
Bob: Hope Rob don't say balls nasty.
Rob: -Balls- nasty!
Bob: He don't shiv.
I'll bet this is high-larious, 'cept fer I don't get it...
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Check out mii-tool - it might help.
You can use it to query the current MII settings
and to nail them where they should be if they aren't
right. Sometimes two NICs fail to properly negotiate
their optimal settings and (say) a 100Mb-FD connection
might end up running at (say) 10Mb-HD. Worth a
This matter is of interest to me for a number of reasons and
very timely; I still have a lot to learn about email setup/admin
stuff and I was just about to ditch std.com (because of their
dainbramaged anti-SPAM measures) and switch over to running my
own server on my ComCast-connected Linux box.
dogpile found a couple of mentions of (what appears
to be) the bug in question and refers you to
http://bugs.kde.org/buglist.cgi
...where the response time is, unfortunately, not great.
Do a query there for the error string you mentioned and
you'll get this petite little URL which seems to
Since it's an abuse to inflict one's non-Linux-related
views on this captive audience (gathered here because
we value this channel's blessedly high *LINUX-RELATED*
S/N ratio) and since there are eleventy-bazillion
other channels (email lists, blogs, barrooms, etc)
where war-talk *is* welcome,
The more I see of Microsoft's stuff, the
worse it smells. Is it just me?
No - as you say, it's the Microsoft stuff, too... ;-
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
How can I tell what CPU the kernel was compiled for?
I believe 'uname -m' will indicate what CPU the currently running kernel
was compiled for.
I think the uname app just invokes the uname syscall whose
contract is not necessarily to report the target build but
the current (and perhaps
It isn't often that I've needed info about the various
characteristics of power supplies, but this site is
where I'll look first the next time I do:
http://www.formfactors.org/developer/powersupply.htm
http://www.formfactors.org/formfactors/form_factors.htm
So, how 'bout them Linux - ain't they sumthin!
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Stupid [EMAIL PROTECTED]@ email...
Sorry for the noise.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Heads up -
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
I recently had to buy some CD-Rs in a hurry
and since Wal-Mart was closest that's where
I went. The best price/quality I could find
there was approx $0.35 each for 50-packs of
Maxell and Memorex - good thing I was on an
expense account!
___
I usually look in the Sunday circulars. Somebody is usually selling packs
of 100 for about $7 or $8 after rebate. They are typically either generic
CompUSA discs, or Imations. I have never had a problem with them myself.
Just FYI, quality does sometimes appear to be an
issue with some
I don't know anything about CygWin but (on an
obliquely related note) I can tell you that
changing your home directory has a few gotchas
on Linux because not every chunk of software
figures out how to find a given account's home
directory by the same method. For example,
I recently was working
Hiya, all -- I know that there are compressed filesystems (eg.
Linus' own cramfs), but I believe they're largely read-only for
embedded systems. I'm looking, for various reasons, to find a
disk-based compressed filesystem. Is anyone aware of such a beast?
Interesting - I'll be curious to
Look at The World. I don't know there costs for POPs
in NH, but they are under $10.00 and also support Unix.
http://www.theworld.com
I have been a customer of Software Tool and Die since
1991. Their domain name is std.com and world.std.com
became so much more recognizable as a reference to
[STD] have had aggressive SPAM filtering in place for years.
Years? You might be mistaken about that. At any rate,
bzs and crew have recently been angering a lot of
people because the rate of false positives has changed
dramatically for the worse while lots of genuine SPAM
still gets
I had a quick peek at the sources (apt-get source e2fslibs-dev)
for chattr/lsattr - they seem to be fairly straightforward examples
of how to use functions like fgetflags/fsetflags from that e2fslibs
library, so you might consider writing something that along those
lines if you don't concoct
So, when performing a backup of a filesystem (ext2 or ext3)
which has these attributes, it seems that none of the tools that
I have been able to identify actually backup file attributes.
As a result, if you ever set those attributes, you need to keep a
log of how so that should you ever
I'd be surprised if dd was anybody's first choice as a
backup utility, but the approach in question (copying
all bits from one device to another) does in fact
work very nicely, resulting in an EXACT copy of the
filesystem in question, unallocated blocks and all.
And there's no requirement that
The article at
http://www.theregister.co.uk/content/4/29009.html
is intriguing - does anybody here know anything
about Workspot?
If I understand their description, Workspot maintains
a complete instance of Linux for every subscriber on
their server, presenting a desktop remotely via any
WWW
First off, the government owns the airwaves, and charges high prices
to purchase rights to them. Or, if you prefer, you can have everyone
operate in an unlicensed band (like the 802.11b stuff), and deal with
the inevitable chaos that will result once serious usage picks up.
This article has
... There's no correction here ...
Then please explain to me why almost every single
DSL company has gone out of business.
This is certainly not authoritative but I've heard
that, despite the ruling that ordered the telcos to
allow their competitors (CLECs ?) access to their
COs, many DSL
If this happens much longer, I'm going to have to get out the baseball bat.
Prediction: before January 2005 somebody will lose their
life as a direct consequence of their involvement with SPAM.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
As indicated in earlier msgs, I'm fooling around with
Enet channel bonding and it's sorta working - yay.
I'm also trying to run a DHCP server on one such
machine and the dhcpd is unhappy - it complains about
multiple interfaces on the same subnet, even though
I've told dhcpd to use bond0 instead
dhcpd is unhappy - it complains about multiple interfaces on the same
subnet, even thoughI've told dhcpd to use bond0 instead of the
real interfaces eth0 and eth1, as if it's gone and ferreted out
the other interfaces and is secretly listening on them, too.
[...snip...]
Before I get too far into
I'm fed up with Flash. I resent it when somebody
hijacks my computer by executing something on it that
I can't control, and that's precisely what MacroMedia
had in mind when they made it possible for somebody
to create some irritating Flash thingy that refuses to
allow me to stop it. I finally
The newest sysadmin has an article on filtering banner ads. I wonder
if, in place of the regex they use as an example, you could use .swf?
unfortunately, the article isn't available online, but if you don't
subscribe, I could probably get you a copy of it somehow.
Yes, please - I'd like to
to create some irritating Flash thingy that refuses to
allow me to stop it. I finally removed the Flash plugin
from my machine and, so far, I don't miss it much.
A right click on the display brings up the Flash menu which allows
one to toggle the play off [stop] for a running Flash
FWIW, I agree. I haven't downloaded Mozilla 1.3a yet, since I
just upgraded to 1.2.1, but I suspect that this is something that
could be lobbied for. I'm just worried that there is a lot of
back-room financial pressure NOT to permit this kind of gratuitous
user control of one's own
Anybody here ever messed around with the Linux
network bonding stuff, particularly in conjunction
with a Cisco Catalyst switch and its EtherChannel
capabilities? I have the bonding stuff mostly
sorta kinda working but the behavior is a little
strange in that the throughput numbers exhibit
Excerpt from letter to one of their victims:
For example your site includes several selectors or tabs that
correspond to specific locations within your site documents.
These selectors seem to reside in their own frame or part
of the user interface. And, as such, the selectors are not
Is there some easy way I can tell from the
commandline whether a DHCP server is alive on
my network? Ideally it would be a very short,
low impact little probe that would maybe just do
(say) a DHCPDISCOVER and then report the results,
preferably including the time it took to do it. TIA
The short answer is: it can't be done, at least not
in any manner that won't cause projectile vomiting,
so just remember that you asked...
A hack like this might start with the understanding
that scripts are not, in themselves, executable.
What's really happening when you execute a script is
Some followup examples, with the last one showing how it can fail:
shrapnel:/tmp 165--- cat /tmp/nastyHack ; chmod a+x /tmp/nastyHack
cd $* # Stand in specified directory ($HOME if none),
echo PWD is $PWD# confirm our location,
ls -CFl /proc/$$/fd #
In-Reply-To: Your message of Wed, 08 Jan 2003 12:35:15 EST.
000801c2b73c$4e7a16a0$301216cf@winbox
References: 000801c2b73c$4e7a16a0$301216cf@winbox
I cobbled the attached script together a while back
and it may solve at least part of your problem by
allowing you to
But, thanks to everyone for the suggestions. They served as a great
jumping off point for a fairly interesting discussion. However,
I was a bit upset that no one posted a solution in assembly ;-)
OK. This doesn't really fit the bill except
as a smartass technicality, but here ya go...
One approach:
- Create a script named (say) /tmp/renameSpaces
which consists of the single command:
mv $* `echo $* | sed -e 's/ /_/g'`
- Mark that script executable:
chmod a+x /tmp/renameSpaces
- Then say
find yourMP3directory -type f -exec /tmp/renameSpaces {} \;
Gentlemen,
Many thanks for all the excellent followup -
in the immortal words of The Bard:
GNHLUG rocks!
BTW - what would Shakespeare be doing if he were alive today?
.
.
.
.
.
.
So let me get this straight: For people who don't understand Perl,
Perl is hard to understand.
Now, cut that out. Derek's point, of course, is
that some languages are (can be) gobbledegookier than
others and (for some of us, at least) Perl sure does
seem to make you have to gobble WAY more
Kenny or mod, both of whom, if they had cared to I'm
sure, could have figured either one-liner out in as
much time.
You're right, of course - I did. And I hope
nobody took any offense at my request for
explanations. FYI, when I asked for y'all to
explain your one-liners I did it (as much as
Anyone want any of the following books before I get rid of them:
XWindow System Inside and Out - Reiss Radin, McGraw Hill, 1992
MVS - Johnson, McGraw Hill, 1989
IBM Mainframes Architecture Design - Prasad, McGraw Hill, 1989
IBM System/370 Reference Summary -
The problems with using a named pipe are:
[...etc...]
Right. FYI, I'm developing some support infrastructure
that works in conjunction with certain apps that won't even
be aware that they're being helped, so it's a requirement
that existing file-access behaviors be unchanged.
Thanks
I just noticed that I was able to execute
programs in the current directory without
prefixing their names with ./ and without
having . in my $PATH. After saying WTF?
a number of times I finally figured out that
it's related to my PATH being defined with
a leading colon, sorta like this:
I wrote:
I just noticed that I was able to execute
programs in the current directory without
prefixing their names with ./ and without
having . in my $PATH. After saying WTF?
a number of times I finally figured out that
it's related to my PATH being defined with
a leading colon, sorta like this:
I think this qualifies as a reportable bug...
Not unless the documented behavior is otherwise... this behavior
is the normal, expected behavior of bourne-derivative shells.
Interesting; I can't find such behavior specified
in the man page for BASH, so I wonder where would
such documented
Until yesterday I got 5 hits when I searched for
gnhlug in the list of lists at mail-archive.com:
http://www.mail-archive.com/index.php?hunt=gnhlug
...but today I see only 3. Anybody know anything
about that? Is there a definitive GNHLUG archive?
Is it at gnhlug.org?
No, [GPG] is not flawed, either, anymore than a wrench
is flawed because it makes a lousy screwdriver.
Right. Funny - this all reminds me of the time when
my little sister and I were presented with a pair
of walkie-talkies. Our parents were initially pleased
to see how much fun we had
So some fsckwad is using my good name to send spam. Either that,
or there's a new spam going around that just says 'fuck you'.
Fascinating. Why would anybody do such a thing to you? Do you
have enemies? Where can one see an example of the forgery?
So, time to start signing with GPG so
It seems that I recall several times in the past
that I've stumbled across packages that allow you to
rig your system such that various file operations
are relayed to code in userland rather than (or in
addition to) being handled by the kernel. It seems
that I recall one that (with minimal
Does anyone know of any utilities which can dig into disk drive
performance? I'm looking to discover the disk busy time, i.e.,
what percentage of time is the disk off doing something, such that
requests to the disk are blocked.
I'm not sure I understand what you're trying to
measure, but
some lowlife wrote:
We would like to invite you to be a founding members of
the FSC either as a Consultant and/or an Agent.
FYI, this is SPAM that has been sent to LUGs worldwide.
Further, you'll find vosn.net mentioned in a number of
anti-SPAM filters. Does Gelinas still manage the GNHLUG
Just FYI, dealing with info can be made less painful
(in some circumstances) because info changes its
behavior when it detects that its output isn't a tty.
So if you don't want to mess around navigating info's
hierarchy you can just pipe it to less (or even to
a file) and then deal with it on
In this it might actually help to RTFM for
sshd - I just had a quick look and it appears
that you can mess around with the entries
in $HOME/.ssh/authorized_keys such that no
commands other than one you specify can be
executed. The conditions under which this will
work may be too restrictive for
When you were born I *did* look 23. Because I was.
Eh, then you're not old yet, but it's creepin' right up on ya... ;-)
WARNING: Dates on calendar are closer than they appear.
Very slick!! This looks like it's going to do just what we need, thanks.
bows
Not to spoil Derek's moment of
0.0.0.0 10.241.38.1 0.0.0.0 UG 40 0 0 eth1
0.0.0.0 192.168.10.10.0.0.0 UG 40 0 0 eth0
Are those multiple default routes, which would be b0rken?
___
gnhlug-discuss mailing list
Dude, you have two default gateways. This is almost always
a problem on Linux boxen, IME. Lose one of them.
This is standard when you have 2 interfaces. All my boxes are
configured similarly, but this one is the one exhibiting problems.
Hmmm. I thought the whole point of a default
I agree with JABR that this is not a good default configuration,
even if it does work now. You shouldn't have multiple default
routes unless you KNOW it will work. If the second network is a
private network that does not route to the Internet, then having
a default route that goes there
I wrote
If you have the proper symlink in /dev
you should be able to simply say
mount /dev/cdrom /cdrom
.
.
.
...but then Ken pointed out:
Nay; you've got it backwards -- it's not Linux that's throwing
you... leastwise, I don't think it is. You're inserting a stock,
I think of this question as being about the basic
behaviors of some important tools (the shell, find and
ls) that are worth understanding in their own right;
the style or scripting aspects seem secondary.
Just out of curiosity, is the only difference between using
find and ls -R (in this
While solving a related problem I ended up writing the
following little program that might be of interest to you:
#include stdio.h
#include string.h
/*
*
* Read lines from stdin, assume they're pathnames, attempt
http://www.theopenenterprise.com/story/TOE20021202S0001
.
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
tail -f yourLogFileHere
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
I wrote:
prettyMuchEverybody wrote:
tail -f logfile
Sheesh. I hereby certify us all as Linux Professionals.
Erik wrote:
Fine by me. It makes me look less stupid for not knowing. ;)
That would at least make me a Linux User, as opposed to a Linux Luser.
Since I'm not sure how you took
FYI, another way to monitor changing events
is via the watch command, though it's used
in slightly different circumstances than the
OP asked about; it's prepared to repeatedly
execute some command and keep the screen
updated with the results. Example:
watch ifconfig
...will show the
Paul's misconduct is indeed a serious matter;
his resignation is hereby accepted.
Since punishment must fit the crime, we must
devise something truly heinous; some fate so
awful that we can barely contemplate it.
Done. Paul is hereby sentenced to...
REINSTATEMENT!
BwaaAAHH!
Thanks for the clarification, as I generally invoke an editor
ad hoc for editing specific documents, and then dissolve it when
I'm done. If you (and other emacs users) fire it up as part of
your initial window invocations and leave it up during your entire
working session then, yes, I can
I have a home Enet firewalled behind a linux
box. My wife can bring her laptop home
from work and connect it to our home net and
pretty much everything just works - I serve
her an IP addr via DHCP and (except for the
Contivity VPN stuff) she's off and running.
I got the following email from her
Screen has been around forever, which accomplishes the same thing.
And, vim also supports this functionality.
Well, I guess for relatively small values of 'forever' :)
Here, just FYA, is a pretty good representation of history to help
you calculate an upper bound for possible values of
Since screen depends on pseudo-ttys it's
unlikely that it was around before they
were first implemented...
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
As I've said before, I suspect that emacs- and
perl-users are actually the higher life forms;
it's just that I don't know how to use them and so
keep falling back on vi and the other tools that I
already know...
As a general answer to pll's queries: vi can't
necessarily do all the goofy things
OTOH, the fact that vi and vim seem to treat some characters as
magical (like '#' and especially '%') really louses me up sometimes,
at which point I scramble back to emacs.
(I can't :'a,.! perl -pe 's/^/#/' in vim, for example)
Heh. All it takes is one additional backslash:
1 - 100 of 123 matches
Mail list logo