On Mon, 21 Feb 2005, Shae Tan wrote:
> Hello everybody,
> Can you help me with this (I know there are very good C programmers
here):
>
> FILE *stream;
> int inputArraySize;
> int *inputLengthArray;
> int *inputDirectionArray;
>
> stream = fopen("db.txt","rt");
>
>
On Thu, 17 Feb 2005, Henry Ortega wrote:
> Is there a way to pass the password as a parameter
> to /bin/login?
>
> Or is there any other command I can use to verify
> if a certain username/password pair is valid?
In perl:
#!/usr/bin/perl
use strict;
my $pwd = (getpwuid(getpwnam($ARGV[0])))[1];
On Thu, 13 Jan 2005, Michael Chaney wrote:
> On Thu, Jan 13, 2005 at 02:17:38PM +0800, Rowel Atienza wrote:
> > > Anyway, if you somehow want to support those cards that can receive
> > > from up to 16 cameras, I'm not sure if they would work under Linux.
I
>
On Thu, 13 Jan 2005, Gideon N. Guillen wrote:
> You mean like recording from multiple CCTV camera's? I don't think
> there are any available. But if all you need is just recording, most
> recorders, like mencoder, can record from any V4L supported devices.
> You can attach CCTV cameras to cheap T
On Sat, 8 Jan 2005, CYWare wrote:
> Has anyone used uclibc in this list to deploy statically linked Linux
> applications? I am trying to compile a gcc/distro independent binary of
> our existing products written in C++. Any feedback, add'l info on setup
> would be greatly appreciated. Thanks.
On Thu, 6 Jan 2005, Rafael 'Dido' Sevilla wrote:
> On Thu, Jan 06, 2005 at 10:30:21AM +0800, Andy Sy wrote:
> > I get an "unable to find -lX11" message from ld. I have
> > to specify /usr/X11R6/lib explicitly using -L in order
> > to get to get gcc (or ld) to find libX11.
>
> Ccc doesn't know or
> #define DRV_NAME "ub"
> #define DEVFS_NAME DRV_NAME
> #define UB_MAJOR 125/* Stolen from Experimental
> range for a week - XXX */
>
> Since /dev/uba does not even exist yet on my system,
> I had to create the device, using mknod (is there
> any other command?)
>
> cd /dev
> mknod uba b 125
On Thu, 18 Nov 2004, fooler wrote:
> i think you are confuse between hardware clock, system clock and
> uptime
>
> when your pc is turn off, your hardware clock (also known as real time
> clock, cmos clock or bios clock) is always ticking until the cmos
> battery is
> run out of power... wh
We are holding a seminar on fundamentals of embedded linux starting next
week. I guess some of you might be interested. For more info see below.
In case you can not attend, you can still view my lecture and
experiment notes by joining embedded-linux-ph:
http://groups.yahoo.com/group/embedded
On Mon, 6 Sep 2004, Vincent Gulinao wrote:
> I need to create a setup that extracts MIME contents, dump them to
> directories (classified per content-type), then pass control to
> another application.
You can use MIME::Parser of perl. Sample program below. To test:
cat | ./mailparser.pl
or yo
On Sun, 29 Aug 2004, Miguel A Paraz wrote:
> So, we can DIY our own Linux boot media - flash or hard disk. A flash
> device might have problems with their write cycle, won't it?
No. Many commercial CF and USB Flash have over 1M read/write
cycle.
> Thus they
> use their own custom file
Hi stderr,
On Fri, 25 Jun 2004, stderr wrote:
..
> > In cooperation with Advanced Research and Competency Developement
> > Institute, we are organizing a seminar on embedded linux. Quick info:
> >
> > Course Name: Fundamentals of Embedded Linux
> > Schedule: 22-24, 30-31 Ju
:PHP 17,000
Place: Lower Ground Floor of Informatics
International College Building, Indo-China Drive,
Northgate Cyberzone, Alabang, Muntinlupa City
Lecturers: Rowel Atienza and Manuel Ramos
Below is the course desciption.
For reservations
mean compiling
your .o from the source code.
rowel
Orlando Andico said:
> On Mon, 12 Jan 2004, Rowel Atienza wrote:
> ..
>> > we have .o files (source code not included) from a redhat 6.1 system
>> that we want to link to in the redhat9 current system but there are
&g
If your binary from 6.1 is still running in 9.0, it means your lib
dependency is complete or your binary is static (use ldd to verify). If
you cant compile because of the missing symbols, make sure you are using
the right header files and the right library files where your binary and
.o are linked
Pablo Manalastas said:
> I have been reading the man page of ntfsresize, and
> we are told that if we have a 40G hda1 partition
> containing ntfs that we want to shrink to 20G (so we
> can use the rest for Linux), the command to give is
>
> ntfsresize -s 20G /dev/hda1
>
> The unit G is 10^9, that i
install zlib.
Aris Santillan said:
> im on d compiling part of postfix
>
>
> make makefiles 'CCARGS=-DHAS_MYSQL -I/usr/local/mysql/include/mysql
> -DUSE_SASL_AUTH -I/usr/local/include/sasl -I/usr/local/bdb/include'
> 'AUXLIBS=-L/usr/local/mysql/lib/mysql -lmysqlclient -lz -lm
> -L/usr/local/lib/
This problem bugged me for quite some time. Some of our users are using
dtmail (Solaris CDE mua) and whenever they forward a message, the message
body disappears at the recepient. I suspected everything from mta, to
dtmail, etc. until I found that the bug comes from spamassassin. By
default, when d
Johnny Tam said:
>
> Does anyone know what this means?
>
> [**] [1:466:1] ICMP L3retriever Ping [**]
> [Classification: Attempted Information Leak] [Priority: 2]
> 07/11-11:37:36.788936 0:8:74:46:E3:9D -> 0:C0:9F:1A:56:9B type:0x800
> len:0x4A 192.168.0.XXX -> 192.168.0.YYY ICMP TTL:32 TOS:0x0 ID:2
Horatio B. Bogbindero said:
> basically, we need to hire people with Video for Linux experience to
> port an win32 application we have here. the application is pretty
> straight forward and all the logic is done. it is just a matter of
> getting the "Linux" side of the equation right.
That depends
Horatio B. Bogbindero said:
>
> actually, processing mainly but this you can always learn. of course,
> editing skills are also important.
>
May I ask what exactly is the kind video processing you are interested in?
Are you interested in coding, extraction of information or enhancement?
rowel
Bopolissimus Platypus said:
> I am, however, concerned about the fact that anyone who can fake my IP
> (e.g., if i'm not in the office or my computer is off) can get all my
> access rights on the nfs server simply by setting his IP to mine and
> setting his uid to mine).
>
If these are your only
no need for crontab. just save and run this perl script:
#!/usr/bin/perl -w
use strict;
my $host = "my_isp_host";
my $email_addy = "[EMAIL PROTECTED]";
my $ping = "/bin/ping";
my $sleep = "/bin/sleep";
my $mail = "/bin/mail";
my $echo = "/bin/echo";
while(1){
`$ping $host -c 2 -w 2`;
Your last messages say you want to program at the ip layer. In that case
all you need is to use raw sockets and fill in the ip header and data. Use
that to communicate at the ip level. You dont need to make your own
network device driver since you are going to use standard eth0 whose
driver is alre
Gerald Timothy Quimpo said:
> hi all,
>
> i'm trying to mount a remote directory over nfs. mounting takes an
> incredibly long time (minutes, maybe 3 or more, hehe, haven't
> really measured). is this a DNS issue? maybe reverse DNS?
> if it is, can i disable reverse DNS in the NFS server?
>
> th
Why not use your mta to rate limit the connection? For example in postfix
if the ip address is untrusted, spawn a slower smtpd. A way of slowing
down is by introducing time delays at every step in a typical MAIL
FROM/RCPT TO/DATA/QUIT process (or by assigning a very low task priority
number). From
Gerald Timothy Quimpo said:
>
> 1. i like terminal windows to open in the following order:
> top-left quadrant, top-right quadrant, bottom-right quadrant,
> bottom-left quadrant (i.e., clockwise).
> icewm opens them thus: top-left, bottom-right, top-right,
> bottom left.
>
Dean Michael Berris said:
> socket programming is too OS specific and too much a burden for an
> application to incorporate into it consciously.
>
How do you do your socket programming? If you program in Java, same piece
of code will run on both windows and nix. If you program in C++, use Qt
lib
Your example has passwd encrypted in DES not MD5. MD5 encypted passwd has
the form:
$1$$
where is an 8-char string and
is 22-char from [/.a-zA-Z0-9] md5 encrypted. Most
modern linux distro uses md5 for /etc/shadow. If you want, you can
automatically generate encrypted passwd for shadow file usi
Jun Tanamal said:
> I want to configure pop-before-smtp and is required to download perl
> modules from CPAN. Since using CPAN took me *forever* to fetch those
> files, I just downloaded the modules manually from their site.
> I need help in installing these modules manually. Any tips?
>
Manual in
Ronald Chan said:
> Anyone has successfully implemented migrating their /etc/passwd to LDAP?
>
> here is my slapd.conf
>
>
> include /etc/openldap/schema/nis.schema
> #include /etc/openldap/schema/misc.schema
> i#nclude /etc/openldap/schema/inetorgperson.schema
Is this rig
Rick Moen said:
> Quoting Andre M. V. ([EMAIL PROTECTED]):
>
>> Using alias/unalias is tedious since you have you have to type or run
>> a script to define it all over again if you want use your alias.
>
> True, but (for reasons cited) I'd strongly suggest that the
> most-appropriate long-term solu
Just when I am about to trash some 2000+ old emails from the two mailing
lists that accumulated since Sept 02, I decided to write a small script. I
found the ff statistics on the MUA/email client we use to compose email
for plug/ph-newbie list.
Microsoft Outlook : 20.20%
Mutt : 10.62%
Mozilla : 1
On Thu, 28 Nov 2002, the CyberLizard wrote:
> But back to Linux. Does AI have any place in an OS
> like Linux? Is it possible to integrate AI into an OS
> for critical services, possibly to model a user's
> behavior so OS services are optimized? Just curious.
>
AI is already in linux. T
On Thu, 28 Nov 2002, the CyberLizard wrote:
> > That's true misconception about ai. Every person in
> > robotics know how Rodney Brooks of MIT was able make
> > a walking insect using 8 (or 10) MC68XX
> > microcontroller in 1989. It is how good your
> > algorithm that matters.
>
> Even then, wal
On Wed, 27 Nov 2002, Brian Baquiran wrote:
> the CyberLizard wrote:
>
> > Sounds hefty to me... the AI alone I think would eat
> > up 80% of the CPU's cycles. And at the same time,
> > (human) language is very flexible-- I seriously doubt
> > an AI can be written to cope with it. (Heck, natural
On Wed, 27 Nov 2002, Federico Sevilla III wrote:
> Instead of NIS you may prefer to use LDAP-based authentication. There
> are NSS and PAM LDAP libraries/modules available that will allow you to
> store user information centrally in an LDAP server. This is more secure
> than the NIS approach, an
Comments about your setup:
1) NIS is already lightweight itself. It will matter a little if you use
LDAP.
2) I dont think your NFS is to blame. I have seen a setup worse than 40
students, using an older server and things work fine. Thoug if your NFS
support cache, it can speed up file access.
On Wed, 27 Nov 2002, eric pareja wrote:
> I have -used- said tool. It is basically a dictionary attack and more.
> There are many more "cracker" tools that legit sysadmins employ to
> keep their own systems a bit more secure, but brute force cracking
> cannot completely regurgitate good password
On Mon, 25 Nov 2002, fooler wrote:
> ok... ill give you a sample code and hoping that you will use it for good
> intentions and for educational purposes only... remember you have to be as
> root user in order raw socket to work...
>
> rawsocket.c
>
> #include
> #include
> #include
>
> int mai
On Mon, 25 Nov 2002 [EMAIL PROTECTED] wrote:
> i'm using sockets with pf_packet
> at home on ethertaps and i can
> actually write() on the socket. here in school, with
> the (next) real thing, i can't.
> i've followed packet(7) instructions on bind()-ing,
> still nothing: i get EINVAL error. i l
I am not a veteran plug member to post my opinion here but I believe Orly
has a strong point. When I joined plug and its newbie counterpart more
than a year ago I enjoy reading my emails from the lists. I can say that
most issues are intellectually challenging that make my time reading and
reply
On Wed, 13 Nov 2002, CYWare wrote:
> > everything using Java?
>
> JAVA is just too resource intensive on any platform. I'm wondering what
> kind of machine you would need if Netscape/Mozilla was written entirely in
>
In defence of Java, I made some benchmarking few months ago to
shed li
On Wed, 13 Nov 2002, CYWare wrote:
>
> Both products are GUI based which will require X-Windows. The second one
> also uses Interbase which is overkill for a POS client. We would be forced
> to upgrade a couple of hundred existing POS machines which we would rather
> NOT do.
>
> This is why I
On Tue, 12 Nov 2002, Ronald Warner wrote:
> so snort can be used as a host ids but snort can also be used as a network
> ids. right?
>
Not 100% yes. Snort operates somehow similar to tcpdump in the
promiscuous mode. If your ip layer can listen to packets destined to other
ethernet card
I have tried solving this problem long time ago. I gave up because crond
seems to have a mind of its own and not following even its own man pages.
My solution was to embed the variable in the script itself or put that
variable in a file that the script can read.
rowel
On Tue, 12 Nov 2002, Glynn
Default snort configuration is really paranoid. It makes snort logs really
noisy especially with rpc stuff (nfs is a good example). But once you tune
the rules themselves, it becomes manageable.
rowel
On Tue, 12 Nov 2002, Orlando Andico wrote:
> On Tue, 12 Nov 2002, Ronald Warner wrote:
> ..
>
This is not necessarily true. I have one setup where I have snort and
firewall (SunScreen) on the same machine. In most cases, the firewall has
blocked the packet before snort able to capture and analyze it. I think it
depends on the priority level of your firewall within the kernel itself. I
have
On Tue, 12 Nov 2002, Federico Sevilla III wrote:
> On Tue, Nov 12, 2002 at 07:21:09AM +0800, Adorable Dauz wrote:
> > I need you suggestion, I'm doing a project to our company. This is
> > about track and trace thru email reply. The client will send the email
> > with the body or subject content
On Tue, 29 Oct 2002, Rommell Barcela wrote:
> in order to retain the rights/permissions, the users must have the same
> uid in both servers.
>
uid is not actually what matters. it is the username and
groupname. *nix allows you to retain permission eventhough you have
different uid's for
Some inherent problems:
tar + scp = messy. Execute tar and scp the tarred file. In most cases,
migration doesnt happen in one shot. It takes time. Sometimes you want to
test and warm up the new server first before committing your users to this
new machine. The usual strategy is you put up both o
But GPG/SSL is not a silver bullet. Once your private key or 3rd party
certificate has been compromised and you dont know it, you already have
this false sense of security. -rowel
> On Tue, Oct 08, 2002 at 10:41:16PM -0400, Gerald Timothy Quimpo wrote:
>> no. if you want the whole path between yo
Yes. You dont need a VPN to secure logging in to your corporate email
server from outside your private network. I was in the same position a
week ago. But instead of securing my imap, I installed:
1) webmail/squirrelmail + secure login plugin.
but before secure login can work you need:
2) apach
On Fri, 4 Oct 2002, Brian Baquiran wrote:
>
> > UNIX C/C++ Programmer with thorough knowledge of:
> >
>
> > The applicant must be female, not more than 30 years old.
>
> Hey, isn't this age/sex discrimination? Shouldn't any qualified person,
> regardless of gender or age, be allowed to apply?
On Thu, 3 Oct 2002, Orlando Andico wrote:
> On Thu, 3 Oct 2002, Rowel Atienza wrote:
> ..
> > Calculate:
> > Using simple set theory: The intersection of Sets A to H would
> > be around 2% .
> > Using simple Bayesian probability theory: The confidence valu
On the lighter side ...
On Thu, 3 Oct 2002, Benj wrote:
Set A:
-UNIX C/C++ Progammer with thorough knowledge of:
*around 30% of plug members are good C/C++ programmers
Set B:
- Berkeley Sockets Interface (TCP/IP)
*around 15% of plug members knows how to do it in C/C++
Set
Another alternative to tripwire is AIDE. Tripwire is not free for
non-linux platforms as far as I know. You can track changes given in
stat(1) as well as message digest such as md5sum. I dont think you can
determine who made the changes in a group/world writable file but I
believe there must be
It's your inet2.lsgh.edu.ph connecting to a remote webserver whose
ip/hostname precedes ":www"
- rowel
On Wed, 18 Sep 2002, [K][R][Y][P][T][O][N] wrote:
> Can someone tell me what does www means at the end of every ip address?
> for example gs.gator.com.89.94.:www <-- does it mean that the s
On Fri, 6 Sep 2002, Arvin C. Burgos wrote:
> hi there:
> hope and please help me! im having an headache with the security i want
> to implement for my companies LAN users and for my Remote clients. i
> tried squid proxy but it's not working. quite simple, i only want to
> have an authentication
On Sat, 7 Sep 2002, Orlando Andico wrote:
> On Sat, 7 Sep 2002, Ian C. Sison wrote:
> ..
> > Not having done this myself, i believe pine/pico will store it in a file
> > somewhere, so
> >
> > strace 2>&1 pico myfile | grep "^open" > /tmp/strace.txt
>
> It's in $HOME/###pine###something or $HOM
On Thu, 5 Sep 2002, eric pareja wrote:
> On Wed, Sep 04, 2002 at 08:35:28PM +1000, Rowel Atienza wrote:
> > cd /etc/rc5.d/
> > ./S13portmap stop
> > ./S14nfslock stop
> > mv S13portmap _S13portmap
> > mv S14nfslock _S14nfslock
>
> shouldn'
Looks like your are running rpc/portmapper. To verify, log in to that
machine and then:
su
netstat -atuvp |grep 32774
- this will show you the daemon responsible for that open port. Most
probably it is rpc related. For RH and Mandrake at runlevel 5:
cd /etc/rc5.d/
./S13portmap stop
./S14nfslo
e:
> i removed both ~/.ssh/* on both servers and followed
> the steps below but still asking for password.
>
> ssh RH_BOX2
>
>
> --- Rowel Atienza <[EMAIL PROTECTED]> wrote:
> >
> > RH_Box1:
> >
> > ssh-keygen -t rsa
> > cd ~/.ssh
> &g
RH_Box1:
ssh-keygen -t rsa
cd ~/.ssh
cp id_rsa.pub authorized_keys
scp -r ~/.ssh RH_Box2:/home/your_username
- after the last command, two-way passwordless authentication is now
possible assuming hostkeys of RH_Box1 and RH_Box2 are in the
~/.ssh/known_hosts or the serverwide ssh_known_hosts fi
Video grabber? As in frame grabber where you can watch video from input
video signal? If that is the case, I have been using one. Highly
recommended:
FlyVideo (cheap and good quality)
Imagenation
If you dont have the choices above, make sure your video grabber uses bttv
chipset. In that case, y
To encrypt:
crypt - There is a library for both C and Perl in your linux desktop.
To decrypt ( in a sense because crypt is only one way ):
John the Ripper
rowel
On Thu, 22 Aug 2002, [K][R][Y][P][T][O][N] wrote:
>
> Good day to all!
>
> Whats the name of the tool that can encrypt passwd?
>
On Sat, 17 Aug 2002 [EMAIL PROTECTED] wrote:
> I'm currently evaluating the following options to backup some UN*X hosts
>
> 1) dump/restore over ssh
> 2) rsync over ssh
> 3) tar over ssh
>
> Have you experienced using any of these options? BTW, I plan to store the
> data to a spare 20GB HDD.
I am using a client/server software that can distribute video on a network
(100MB LAN). It's a kind of a remote survellance type (as in I can have
real-time video of my office if I am connected on the LAN). Dial-up
connection works as well but of course you should expect delay. It is a
tcp/ip-bas
On Mon, 12 Aug 2002 [EMAIL PROTECTED] wrote:
> Wow! OK. I can detect a "portmap" process with ps. I left it running
> because I read somewhere that it was needed to make rpc calls. From what
> you wrote I guess I won't really be needing those services that make rpc
> calls so I'm killing it.
>
On Mon, 12 Aug 2002 [EMAIL PROTECTED] wrote:
> On Sun, 11 Aug 2002 21:26:32 +0800
> Federico Sevilla III <[EMAIL PROTECTED]> wrote:
>
> > Perhaps a neater habit will be to run:
> >
> > # netstat -lnp
>
The problem with this option is it will try to list all listening
tcp sockets only
Some good reasons to use Sun Products:
1) You have lots of $money$ to spend.
2) You want to make your life (as sys admin) a lot easier. If you cant
solve your problem, Sun is a phone call away. That's assuming you purchase
the service contract. In addition, you have a good excuse why you arent
d
Do you have java in your machine?
If yes, you can do it in java:
//Save everything below in a file MyMail.java
import java.net.*;
import java.io.*;
public class MyMail{
public static void main(String[] args){
if(args.length!=3){
System.out.println("Usage: java MyMail sender receiver s
NIS/NIS+ are old name service techiques. Sooner or later LDAP will be the
standard. I suggest that you invest time configuring OpenLDAP instead.
There are heaps of howtos for NIS/NIS+ and OpenLDAP at www.google.com.
rowel
On Sat, 29 Jun 2002, Arnel G. Pastrana wrote:
> anybody here has idea i
On Sat, 29 Jun 2002, David B. Reyes wrote:
> What if we eventually want to migrate the gameserver
> hosted on WindowsNT to linux, we have to able to
> handle the bigger number of processes.
>
All these limits (eg max memory, max number of processes) can be
modified by ulimit. See bash m
On Thu, 30 May 2002, Jeff Gutierrez wrote:
>
> The tunnel gets established but after a few minutes, the connection will
> terminate. I looked at the sshd_config to see if there's a timeout
> value.. but no dice. Is there an timeout option for sshd_config?
>
Suggestion: Try enabling KeepAlive
On 30 May 2002, Gerald Timothy Quimpo wrote:
> i'm writing a little server that will run from xinetd.
> since xinetd servers read incoming data from stdin and
> write outgoing data to stdout, i don't see how to get
> the IP number of the remote host. one way to do that
use getpeername() and i
Andrew File System - built with security in mind but difficult to
implement.
rowel
See Real-time Active Gaze Tracking at http://fork.anu.edu.au/video
On Wed, 29 May 2002, Andre John Cruz wrote:
> hi everyone,
>
> with all the bad publicity in the web about NFS, are there any notable
> alternat
I think it is not only database that matters here. It is the clustering
technique they use. If you have a distributed array of computers and a
fast internet connection, you can build a huge database in one or two
days. The real problem is when a user types in a certain topic of
interest, how do y
Some pointers that you may consider for host-based firewall (not
necessarily using iptables):
>From your email:
1) Allow incoming ssh connections (port 22 only) from your trusted ips -
you may want to consider logging all connections to this port.
2) Allow incoming http connections (port 80 only
On Wed, 3 Apr 2002, Joseph wrote:
> How do i secure a NFS Server? Is Samber better than NFS?
>
> =) Thanks
>
How to secure NFS:
1) make sure nfs uses tcp and not udp.
2) make sure your rpc services can not be accessed outside your trusted
network (use ipchains!).
3) make sure only trusted hosts
plus you have to restart your sshd after editing your sshd_config.
>
> in your freebsd box edit /etc/ssh/sshd_config and uncomment ...
>
> # Uncomment to disable s/key passwords
> ChallengeResponseAuthentication no
>
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org
in your freebsd box edit /etc/ssh/sshd_config and uncomment ...
# Uncomment to disable s/key passwords
ChallengeResponseAuthentication no
man sshd
ChallengeResponseAuthentication
Specifies whether challenge response authentication is allowed. Currently
there is only support for skey(1)
On Mon, 25 Mar 2002, Nhadie Ramos wrote:
> hi all,
>
> anyone can help me bout LILO, i installed it in my
> MBR, but after installation this is what i encountered
>
> LI
>
> that's it, it won't boot. how can i fix it how do i
from http://www.linuxdoc.org/HOWTO/Bootdisk-HOWTO/a1483.html
LI -
--- "Jaspher L. Mariano" <[EMAIL PROTECTED]> wrote:
> Hi Guys,
>
> I need some help. Where can I find libgdbm.so.1
>
> Thanks in advance
>
gdbm - gnu database manager.
http://www.gnu.org/directory/gdbm.html
unless, gdbm means something else...
rowel
___
installing linux on 30 pcs thru nfs, ftp or http is boring. if you have a
new set of pcs, the best thing is do a remote install thru pxe. i have
tried this on windows RAS with pcs not necessarily having the same
hardware but not yet in linux. give it a try and let us know the result.
this may be
why not use libssl and libcrypto from openssl? They even have sample c
programs that you may want to hack (eg demos/ssl - minimalist secure
tcp/ip client and server). -rowel
On Wed, 13 Feb 2002, Gerald Timothy G Quimpo wrote:
> hello all,
>
> does anyone have pointers to a "secure" network lib
On Thu, 7 Feb 2002, Sherwin Daganato wrote:
> I don't know. I can't explain it.
> I just couldn't believe the way you benchmark Perl codes.
> If that's the right way then why would anyone create the
> Benchmark module (see CPAN :-).
>
My mistake. I think which one is faster is system dependen
On Thu, 7 Feb 2002, Andre John Cruz wrote:
> i know this has already been way off topic :) but exponentiation with an
> integer exponent and base 2 is easier done by having bit shifts <<
>
> -andre
>
but bit shift << consumes much less cpu cycles than
exponentiation of 2 to an int.
-
On Fri, 1 Feb 2002 [EMAIL PROTECTED] wrote:
> Rowel, thanks for the suggestion. What blocking factor would you suggest for
> a DDS-3 tape drive? (4mm DDS-125, 24GB compressed/12GB uncompressed)
>
126 (i.e. 126*512 = highest for tapes) . you have to tell
dump,gzip and dd of the blocking
a perl script may do:
#!/usr/bin/perl
$command = "ssh host_to_backup \"sh -c 'dump -0uaf - / | gzip -2 | ssh -2
-c blowfish host_where_to_put_backup dd of=/dev/nrsa0' \" > dump.log
2>&1";
system $command;
btw, would it be wise to put the blocking factor as it can make your
backup more effic
Another possibility:
A driver in kernel space not working properly. You can deduce which one by
viewing /var/log/kern.log if klogd is running.
-rowel
On Tue, 29 Jan 2002, [iso-8859-1] Dudley F. CaƱas wrote:
>
> Just want to know what are these messages! it occured to us 3 times already
> pl
sniffit ! wala nga lang gui...
-rowel
On Thu, 24 Jan 2002, Raul Ocampo wrote:
> Hello,
>
> Can anybody recommend a good packet sniffer for Linux.
> One with a GUI interface.
>
>
>
> thanks,
>
> _
> Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
> To leave:
alloca.h should be in the standard include path - /usr/include. If not, it
may be somewhere. Try "locate alloca.h". It should be there otherwise copy
from another linux box with the same kernel ( or almost the same release
). Alternatively, it may be there but your makefile did not include it in
I think you do not need to recompile your kernel (as in "make bzImage" )
if it is just a module. -rowel
On Fri, 18 Jan 2002, Ian C. Sison wrote:
>
> The driver is included in the kernel source tree. If you don't have it
> already compiled, just enable it as a module (via make menuconfig) and
In order to get .o which is the driver object/module file that you can
load using insmod or modprobe is by compiling your .c and .h files. There
must be a makefile or autoconfig script when you downloaded your driver
files.
Alternatively, as far as I know, driver module for 3c905b can be compile
Commonly used way to recover lost/erased data in linux ext2 fs is
debugfs. I am not sure if this useful in your case.
-rowel
On Thu, 17 Jan 2002, Mike Blancas wrote:
> Anyone have ideas on how to recover data on an ext2 partition when e2fsck
> can't check the drive due to bad superblock? I h
As far as I know, industrial automation companies like OMRON (or maybe Johnson
Controls, Honeywell and Yamatake also) are now offering cheap version of their
PLCs for under 10K. Target is mainly home automation. These cheap PLCs can be
programmed to control your house (like sprinkler valve) by pro
On Tue, 4 Dec 2001, plug bert wrote:
>
> When Tom(www.tomshardware.com, an AMD fanatic)
> confronted AMD about this, AMD responded that future
> mobo manufacturers will incorporate overheat
> protection features for AMD processors.
>
>
> But hey, this is just my personal experience. If u
> s
On Tue, 4 Dec 2001, Orlando Andico wrote:
ImageMagick is good but it took me *2 weeks* to finally make a an
error free compilation on our SunE450 (gr...) . For the info of
non-ImageMagick users, ImageMagick depends on several independent
libraries (eg jpeg, tiff, mpeg, etc) that you
Latency or throughput wise, it really depends on what you want to achieve. It
is a long story to argue. But IMO, if you are just running server
applications that are by nature not time critical, there is no point in
making your kernel preemptible. It will just add unnecessary complication.
But if
1 - 100 of 136 matches
Mail list logo