Also
1)once init process is created, every other call to init only writes
named pipe
2) In case you have appropriate patches, the process ID's would be
randomly generated and hence init might not be 1 process at all
regards
Supreet
Sandip Bhattacharya wrote:
On Thu, 2005-03-31 at 23:24
Fri 1-Apr-2005
ILUG-D activity in last 7 days:
=
New/recent events: 0 Total events:41
=
New Discussion forum postings: 16 Total postings: 543
Hi! all
Yahoo! has launched a search engine for searching
contetn under creative commons licence. More at
http://news.com.com/2100-1038_3-5633649.html
Search engine (still in beta) can be reached at
http://search.yahoo.com/cc
See above links to find out how this search engine is
different
Sorry guyz forgot to put [OT] tag in earlier mail.
--- vivek khurana [EMAIL PROTECTED] wrote:
Hi! all
Yahoo! has launched a search engine for searching
contetn under creative commons licence. More at
http://news.com.com/2100-1038_3-5633649.html
Search engine (still in beta) can be
[Please upgrade ImageMagick (again!) on all distributions -- Raju]
This is an RFC 1153 digest.
(1 message)
--
Message-Id: [EMAIL PROTECTED]
From: [EMAIL PROTECTED] (Martin Schulze)
Sender: [EMAIL PROTECTED]
To:
(1) /etc/init.d is linked to /etc/rc.d/init.d and
(2) /etc/rc5.d is linked to /etc/rc.d/rc5.d
(1) contains all the startup scripts whereas (2) has all the S* and K*
scripts which are actually linked to the respective scripts in (1)
so the use of (1) is to keep scripts at one place and a link to
Is there any open source tool available which is equivalent of:
http://www.opsware.com/software/server.htm.
Currently I am looking for a tool with at least the Linux provisioning
capabilities on multiple machines from a single console.
Any pointers will be much appreciated.
Thanks,
Ajay
[Please upgrade kernel on all distributions. Expect new vendor kernel
packages soon -- Raju]
This is an RFC 1153 digest.
(1 message)
--
Message-ID: [EMAIL PROTECTED]
From: Arkoon Security Team [EMAIL PROTECTED]
To:
On Sat, 2005-04-02 at 10:13 +0530, Raj Mathur wrote:
Leaked kernel memory can be found in ext2 filesystems; either on
hard drives, removable media (USB thumb drives, flash cards),
initrd images, UML filesystem images, etc...
A quick scan reveals that most ext2 images