Linux-Announce Digest #511, Volume #3 Fri, 11 Jun 99 19:13:22 EDT
Contents:
PostgreSQL Version 6.4.2-6 RPMs are now available (Al Dev)
Direct Save protocol -- Saving via Drag-And-Drop (John Lindal)
COMMERCIAL: Linux Workshops ("ITTE")
jed B0.99-6 released with menu support (John E. Davis)
TkDVI 0.1, a TeX DVI previewer based on Tcl/Tk (Anselm Lingnau)
SECURITY: afio: security hole in 'afio -P pgp' encrypted archives (Koen Holtman)
----------------------------------------------------------------------------
From: Al Dev <[EMAIL PROTECTED]>
Subject: PostgreSQL Version 6.4.2-6 RPMs are now available
Date: Thu, 10 Jun 1999 21:50:37 GMT
=====BEGIN PGP SIGNED MESSAGE=====
New changes in postgresql-6.4.2-6*.rpm :
- ----------------------------------------
The following new items are added:
1. Added perl module files.
Note: Interfaces like Python, Perl, "C", "C++", Tcl/Tk,
ecpg (Embedded C-SQL), Java JDBC and ODBC are already included.
Commercial technical support is now available from
http://www.pgsql.com
PostgreSQL Version 6.4.2-6 RPMs are now available
- ----------------------------------------------------------
PostgreSQL is a very advanced "Open Source Code" SQL server. It is
"tremendously sophisticated" and is a very powerful SQL server. It
is the default SQL server for most of the Linux distributions -
Redhat, Debian, Suse, Slackware, etc... It's "status rank" is same
as what Apache, gcc, Linux is to Webserver, compiler, OS. It is
very fast becoming the "STANDARD SQL SERVER" engine for this world.
PostgreSQL runs on most flavors of unix - Linux, Solaris, HPUX, AIX,
BSD, SCO etc. and Microsoft Windows NT/95.
For Windows95/NT port see -
http://www.askesis.nl/AskesisPostgresIndex.html
RPMS source and binaries of PostgreSQL Version 6.4.2-6 is at:
http://aldev.8m.com
http://aldev.webjump.com
http://www3.bcity.com/aldev/
http://members.spree.com/technology/aldev/
Files are postgresql-6.4.2-6*.rpm
and will be soon available at official redhat site ftp://ftp.redhat.com
More details about PostgreSQL is at http://www.postgresql.org
Quick Steps to Install, Test, Verify and Run PostgreSQL
-------------------------------------------------------
Download the 'Maximum RPM' textbook from http://www.RPM.org the
filename
is maximum-rpm.ps.gz
And read it on linux using gv command -
# gv maximum-rpm.ps.gz
Login as root.
# rpm -qpl postgre*.rpm (to see list of files. For docs 'man rpm')
# rpm -qpi postgre*.rpm (to see info of package)
# cat /etc/passwd | grep postgres
Note: If you see a 'postgres' user, you may need to backup and clean
up the home directory ~postgres and delete the unix user 'postgres'
or rename the unix user 'postgres' to something like 'postgres2'.
Install must be "clean slate"
# rpm -i postgre*.rpm (Must install all packages clients, devel, data
and main for pgaccess to work )
# chkconfig --add postgresql (to start pg during booting, see 'man
chkconfig')
# cp /usr/lib/pgsql/python/_pg.so /usr/lib/python1.5/lib-dynload (for
python)
# /etc/rc.d/init.d/postgresql start (to start up postgres)
# su - postgres
bash$ createdb mydatabase (this will create a database by name
'mydatabase')
(for doc 'man createdb')
bash$ psql mydatabase (for doc 'man psql')
...... in psql press up/down arrow keys for history line editing or \s
bash$ export DISPLAY=<hostname>:0.0; pgaccess mydatabase; (see 'man
pgaccess')
Now you can start banging away at SQL commands at pgaccess or psql !!
bash$ cd /usr/doc/postgresql*
Here read all the FAQs, User, Programmer, Admin guides and tutorials.
More details about PostgreSQL is at http://www.postgresql.org
**************************************************
Testing PyGreSQL - Python interface
===================================
bash$ cd /usr/lib/pgsql/python
bash$ createdb thilo
bash$ psql thilo
thilo=> create table test (aa char(30), bb char(30) );
bash$ /usr/bin/python
>>> import _pg
>>> db = _pg.connect('thilo', 'localhost')
>>> db.query("INSERT INTO test VALUES ('ping', 'pong')")
>>> db.query("SELECT * FROM test")
eins|zwei
- ----+----
ping|pong
(1 row)
>>>CTRL+D
bash$
...... Yow! Seems to work - now install it properly
bash$ su - root
# cp /usr/lib/pgsql/python/_pg.so /usr/lib/python1.5/lib-dynload
**************************************************
Testing Perl - Perl interface
=============================
bash$ cd /usr/doc/postgresql-6.4.2/examples/perl5
Note: Gloabl var @INC should include the Pg.pm module in
directory site_perl hence use -I option below
bash$ perl -I/usr/lib/perl5/site_perl/5.004/i386-linux-thread
../example.newstyle
..... Wow! You ran the perl which is accessing PostgreSQL database!!
Read the example files for using perl interface
**************************************************
Testing libpq, libpq++ interfaces
=================================
bash$ cd /usr/doc/postgresql-6.4.2/examples/libpq++
bash$ su root --> to change ownership of examples
# chown -R postgres /usr/doc/postgresql-6.4.2/examples
# exit
bash$ g++ testlibpq0.cc -I/usr/include/pgsql
- -I/usr/include/pgsql/libpq++ -lpq++ -lpq -lcrypt
bash$ ./a.out (Note: Ignore Error messages if you get any - as below)
> create table foo (aa int, bb char(4));
No tuples returned...
status = 1
Error returned: fe_setauthsvc: invalid name: , ignoring...
> insert into foo values ('4535', 'vasu');
No tuples returned...
status = 1
Error returned: fe_setauthsvc: invalid name: , ignoring...
> select * from foo;
aa |bb |
- -----|-----|
4535 |vasu |
Query returned 1 row.
>
>
>CTRL+D
bash$
..... Hurray!! You ran direct C/C++ interfaces to PostgreSQL database!!
**************************************************
Testing Java interfaces
=======================
For this you MUST install the jdk-*glibc*.rpm package (Java RPM
packages)
bash$ cd /usr/doc/postgresql-6.4.2/examples/jdbc
bash$ echo $CLASSPATH
--> Should show CLASSPATH=/usr/lib/jdk-1.1.6/lib/classes.zip
bash$ export CLASSPATH=$CLASSPATH:.:/usr/lib/pgsql/postgresql.jar
Edit all psql.java file and comment out the 'package' line.
bash$ javac psql.java
bash$ java psql jdbc:postgresql:template1 postgres <password>
[1] select * from pg_tables;
tablename tableowner hasindexes hasrules
pg_type postgres true false false
pg_attribute postgres true false false
[2]
CTRL+C
bash$
..... Hurray!! You ran direct Java interfaces to PostgreSQL database!!
**************************************************
Testing ecpg interfaces
=======================
bash$ cd /usr/doc/postgresql-6.4.2/examples/ecpg
bash$ ecpg test1.pgc -I/usr/include/pgsql
bash$ cc test1.c -I/usr/include/pgsql -lecpg -lpq -lcrypt
bash$ createdb mm
bash$ ./a.out
..... Wow!! You ran Embedded "C"-SQL to PostgreSQL database!!
**************************************************
Testing Tcl/Tk interfaces
==========================
Example of Tcl/Tk interfaces is pgaccess program.
Read the file /usr/bin/pgaccess using a editor -
bash$ view /usr/bin/pgaccess
bash$ export DISPLAY=<hostname of your machine>:0.0
bash$ createdb mydb
bash$ pgaccess mydb
**************************************************
Testing ODBC interfaces
==========================
1. Get the win32 pgsql odbc driver from
http://www.insightdist.com/psqlodbc/
2. See also /usr/lib/libpsqlodbc.a
**************************************************
Testing MPSQL Motif-worksheet interfaces
========================================
Get the RPMs from http://www.mutinybaysoftware.com
**************************************************
To verify the top quality of PostgreSQL, run the Regression test
package :-
Login as root -
# rpm -i postgresql*.src.rpm
# cd /usr/src/redhat/SPECS
# more postgresql*.spec (to see what system RPM packages you need to
install)
# rpm -bp postgresql*.spec (.. this will prep the package)
Regression test needs the Makefiles and some header files like *fmgr*.h
which can be built by -
# rpm --short-circuit -bc postgresql*.spec ( .. use short circuit to
bypass!)
Abort the build by CTRL+C, when you see 'make -C common SUBSYS.o'
By this time configure is successful and all makefiles and headers
are created. You do not need to proceed any further
# cd /usr/src/redhat/BUILD
# chown -R postgres postgresql*
# su - postgres
bash$ cd /usr/src/redhat/BUILD/postgresql-6.4.2/src/test/regress
bash$ more README
bash$ make clean; make all runtest
bash$ more regress.out
**************************************************
Email: [EMAIL PROTECTED]
_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com
- --
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED]
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3ia
Charset: latin1
iQCVAgUBN2AzLlrUI/eHXJZ5AQG16QQAlren40Y7jfnxwU3YeoVJka/znDQukU0U
Iw+8fye5fenK2UMTum6dHv4pB86nFK1LPgczbUXR4oep8MP4lcKXyOCiT4hw/+Wc
ohJyjeMGiktzxJ5VEqCdXO+iRnqsWZdx0uMS0AIin3HLfIo1nrhH5k72WLkp0qJz
yHrw+2RsuZg=
=Kkfb
=====END PGP SIGNATURE=====
------------------------------
From: [EMAIL PROTECTED] (John Lindal)
Subject: Direct Save protocol -- Saving via Drag-And-Drop
Date: Thu, 10 Jun 1999 21:43:26 GMT
=====BEGIN PGP SIGNED MESSAGE=====
Thomas Leonard has developed a protocol on top of XDND that allows the user
to save a file by dragging it to a file manager window. The protocol is
described at
http://www.its.caltech.edu/~jafl/xds/
The latest version of XDND is described at
http://www.its.caltech.edu/~jafl/xdnd/
John Lindal
- --
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED]
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3ia
Charset: latin1
iQCVAgUBN2AxflrUI/eHXJZ5AQGx8QP9FLWcuNyqGOZp4FaV6Zo1JKaDti9xUq4h
GIhtf66bEIdSjJ2XcC/a8s1MxJjddyYFBx55h415xa+Zr1kMGoFoy7YwcBdDGZ/u
wLelMPpArDc92SCpZ1XyjZup5jARcsNKgkFzH+VyhJjqEDzYmxFfOBvCudr+6RqF
4lmufKPnB1M=
=kLLD
=====END PGP SIGNATURE=====
------------------------------
From: "ITTE" <[EMAIL PROTECTED]>
Subject: COMMERCIAL: Linux Workshops
Date: Thu, 10 Jun 1999 21:51:36 GMT
=====BEGIN PGP SIGNED MESSAGE=====
Learn Linux in Two Days
July 22-23, 1999 * San Jose, CA
July 29-30, 1999 * New York City, NY
September 30-October 1 * Austin, TX
Tuition: $795.
Register 30 days in advance, receive a $75 discount.
Special Group Rates are available.
About this Workshop
Attendees will learn to install, administer, integrate, and secure Linux
(Red Hat, Caldera, Slackware, Debian, and Suse distributions). This
intensive hands-on
workshop is designed to provide a comprehensive understanding and the "how
to" knowledge required to run Linux.
Space is limited.
Visit: http://www.itte.org/INFO/ptrain.html for the complete course
overview.
To register or for more information e-mail: [EMAIL PROTECTED]
- --
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED]
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3ia
Charset: latin1
iQCVAgUBN2AzaVrUI/eHXJZ5AQFoRwP+J1/3nPw4ZWXjNFl14WwtR0FPLA/M9WGk
/XmOoDLg1qRKpH1DSvKB6/qVLzwipnq9T+C6MVhbX6G8IoENj/YXSyd7sY7x1FEU
vVc2tyjjZDbCaNrmbDFlfaY3bA/6nTjvrs0Q7sQva040koVoOeaPDZKXQMTdR3h2
M21aeBLVXmU=
=MN5x
=====END PGP SIGNATURE=====
------------------------------
From: [EMAIL PROTECTED] (John E. Davis)
Subject: jed B0.99-6 released with menu support
Date: Thu, 10 Jun 1999 21:31:25 GMT
Reply-To: [EMAIL PROTECTED]
=====BEGIN PGP SIGNED MESSAGE=====
Version B0.99-6 of the jed programmer's editor is now available from
ftp://space.mit.edu/pub/davis/jed/v0.99
ftp://ftp.uni-stuttgart.de:/pub/unix/misc/slang
ftp://ftp.prz.tu-berlin.de/pub/unix/editors/jed
ftp://ftp.ntua.gr/pub/lang/slang/
The major new feature in this release is the support for drop-down
menus. These menus work even when using jed via a remote terminal
making the editor easier to use than ever. See
http://space.mit.edu/%7Edavis/images/jed-0.99-6.gif for an image of
jed with the new menus.
Although version B0.99 is considered to be a beta version, it appears
to be very stable with no significant problems reported in the B0.99
series.
***You will need slang 1.3.7 to compile this version. 1.3.7 is
backward compatible with other 1.x releases.
Changes since B0.99-5: (The complete list of changes is available
from the ftp site in changes.txt.)
0. New drop down menu system added. These menus work in all
versions of jed and may be activated via the F10 key or via the
mouse. For use in an xterm, load mousex.sl. See doc/menus.txt
for more information.
1. site.sl:mode_hook modified so that ~ gets removed from the
extension.
2. src/Makefile.in was not installing the color definition files.
3. VMS patches from Jouk Jansen <[EMAIL PROTECTED]>:
Jed_Doc_Files was not getting set. Typo in vms.c corrected.
4. Gpm mouse patch from George Young <[EMAIL PROTECTED]>
to fix the ``sticky mouse'' problem.
5. Updated pymode.sl to v1.2.
6. f90.sl patch from Jouk Jansen: Include `<' and `>' as binary
operators.
7. Work around for a glibc or linux 2.2 kernel bug that gets triggered
when reading 0 bytes from a pipe.
8. win32 patches from John Skilleter
<[EMAIL PROTECTED]>. These allow jed to be
compiled with Borland 5.
9. Reworked the init_slang hook to allow multiple hooks.
10. lib/os.sl:set_selective_display moved to lib/seldisp.sl. In
addition, the function was modified so that the current column
is used to set the display column.
11. lib/emacs.sl: goto_line_cmd bound to ESC-g (Ang Chin Han
<[EMAIL PROTECTED]>).
12. New color schemes: default1.sl, blue1.sl
13. Updated .sl files from Guido Gonzato <[EMAIL PROTECTED]>:
ide.hlp, ide.sl, matlab.sl, rcs.sl, sgml.sl.
14. 1+1 is now highlighted correctly.
15. unset_buffer_hook intrinsic added.
- --
John E. Davis Center for Space Research/AXAF Science Center
617-258-8119 One Hampshire St., Building NE80-6019
http://space.mit.edu/~davis Cambridge, MA 02139-4307
- --
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED]
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3ia
Charset: latin1
iQCVAgUBN2AurVrUI/eHXJZ5AQGt3wP/eybawMgNtCjp6bAl4EvHD8yclFSBQo4z
BqvqQ10UOkPLK7Wpt13MxpHReHaas+O+l9sONnEWRfe5Ek+dxI9poObZuqbVV+Kf
LtGWy8lU1jj//I/epWbjtQ1WUJQcVTcZo0EAP/hU07sOJkZMHfq8sL3agLpm21sS
oHKYukPwJ7M=
=NuFl
=====END PGP SIGNATURE=====
------------------------------
From: Anselm Lingnau <[EMAIL PROTECTED]>
Subject: TkDVI 0.1, a TeX DVI previewer based on Tcl/Tk
Date: Thu, 10 Jun 1999 21:53:41 GMT
=====BEGIN PGP SIGNED MESSAGE=====
TKDVI 0.1
=========
An alpha release of TkDVI, a TeX DVI previewer based on Tcl/Tk, is now
available at
ftp://www.tm.informatik.uni-frankfurt.de/pub/dist/tkdvi/
The program works reasonably well (I like to think) but is not (yet) a
full-blown substitute for xdvi. However, it does offer a few unusual
features, it may be interesting to some of you, and I want to show it
around a bit for feedback.
TkDVI is licensed under the same license as Tcl/Tk.
Visit the TkDVI home page on the World-Wide Web at
http://www.tm.informatik.uni-frankfurt.de/~lingnau/tkdvi/
Have fun, and let me know how you like TkDVI!
Anselm
<[EMAIL PROTECTED]>
- From the README:
Features
- --------
Here are the basic features of the `dvi' Tk extension:
* Implements re-usable Tk `image type'. DVI material can occur
wherever Tk allows images, e.g., on a canvas (which is the most
sensible place), but also in labels, buttons etc.
* Supports multiple windows displaying multiple pages from multiple
DVI files simultaneously.
* All DVI files share the same fonts (if resolution etc. allows).
* Supports fonts in PK format. (Virtual font support is forthcoming;
in the meantime dvicopy can be used to de-reference virtual fonts
in DVI files.) The standard Kpathsea library is used to locate
(and make) fonts.
* Supports arbitrary (integer-factor) image shrinking as in xdvi.
* Supports anti-aliasing as in xdvi.
* Comes with an (incomplete) self-test suite.
Here are the basic features of the TkDVI previewer:
* Multiple DVI files.
* Multiple DVI file windows.
* Each DVI file window supports three display modes:
- `Single Page' as in xdvi
- `Two-page spread': Two facing pages, like a book.
- `16-page overview': Sixteen reduced pages at the same time, great
for looking at page breaks and floats.
* `Magnification glass' as in xdvi.
* `gv'-style page selector.
* Automatic reload of changed DVI files on Expose events as in xdvi.
This updates all windows that the DVI file is displayed in
(regardless of whether they are currently being exposed or not).
* Can be easily adapted, reconfigured or extended in Tcl.
The most notable omissions to date are:
* No support for virtual fonts. This can be somewhat clumsily worked
around using Peter Breitenlohner's dvicopy program (which is a
standard part of teTeX) to `flatten' DVI files before TkDVI gets to
work on them. If you use only CM or EC fonts, this is not a problem
for you, but to use PostScript fonts you need virtual font support.
* No support for graphics inclusions and similar stuff. I'm planning
to look at the `Img' Tk extension by Jan Nijtmans, which would mean
that besides Encapsulated PostScript we get to include all kinds of
other graphics formats, which would be nice.
- --
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED]
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3ia
Charset: latin1
iQCVAgUBN2Az5VrUI/eHXJZ5AQEhFAP+L3pc2wAS60jozWubA51dBDdSZ2oXIMUn
ErXVfzEfG4j2fEWme0YGZvuJ6qJEr2Bth4TDWIoyRcEu2asqebViXxdn2AlniYHE
xU2LfQr6omNN5jZx5b52fN1GmmC/l9cvcAlnfJHTbVAs7Q+3mqH14IMGtdDWrCNn
L4wwbrynSlc=
=+UKl
=====END PGP SIGNATURE=====
------------------------------
From: Koen Holtman <[EMAIL PROTECTED]>
Subject: SECURITY: afio: security hole in 'afio -P pgp' encrypted archives
Date: Thu, 10 Jun 1999 21:58:00 GMT
=====BEGIN PGP SIGNED MESSAGE=====
I believe that there are very few people who use afio's -P option for
encrypting afio archive contents with pgp. If you do not use afio,
pgp, or the 'afio -P pgp' option, it is safe to skip this message.
I. Description
Since version 2.4.2, the afio archiver has had an interface, the '-P
pgp' command line option, which can be used to pgp-encrypt the file
data written to an afio archive. Following up on some bug reports, I
have recently discovered a security problem with this afio-pgp
interface: pgp encryption is not always applied in the right way.
This makes it possible to crack the encryption on the file data in an
'encrypted' archive produced using afio with the '-P pgp' option.
The security of files which were already encrypted _before_ being
written to the archive is not affected. The security hole is not in
pgp itself, but in the interaction between afio and pgp. Other
programs which interact with pgp to encrypt things are very unlikely
to have a similar security hole.
II. Impact
It is possible to crack the encryption of at least some of
the file data in the 'encrypted' archives produced using 'afio -P
pgp'. This includes archives produced using the pgp_write example
script included in the afio distribution.
The attack against the broken archive encryption is obscure, but not
impossible to find. The next version of afio (due out in 1-n
months) will fix the security bug. By reverse-engineering the bug
fix, it will be easier to find the attack. So the release of the
next afio version will make already-existing 'afio -P pgp' archives
more vulnerable.
III. Solution
_Existing archives_ produced with 'afio -P pgp' should really be
treated with the same care (against theft etc.) as unencrypted
archives. If such existing archives cannot be deleted or safely
locked away, then encrypting the _entire_ existing archive file with
pgp will protect it. Such completely encrypted archives will _not_ be
fault-tolerant against storage media errors, like normal afio
archives are.
_New archives_ which really need to be protected with encryption can
be made by having afio output the archive to stdout and piping this
output through pgp: 'find [options] | afio -o [options] - | pgp
[options] >device_or_file'. Such encrypted archives will _not_ be
fault-tolerant against storage media errors, like normal afio
archives are.
The next version of afio (due out in 1-n months) will fix this
security hole by which 'afio -P pgp' creates unsafe archives.
On a personal note: I don't use PGP myself, and am not an expert in
dealing with security bugs. Obviously, reporting the existence of the
bug makes existing archives more vulnerable. Before I get flamed for
handling this in entirely the wrong way: yes, I did ask some experts
first, and this procedure is what came out.
Koen. (current afio maintainer)
- --
This article has been digitally signed by the moderator, using PGP.
http://www.iki.fi/mjr/cola-public-key.asc has PGP key for validating signature.
Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED]
PLEASE remember a short description of the software and the LOCATION.
This group is archived at http://www.iki.fi/mjr/linux/cola.html
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3ia
Charset: latin1
iQCVAgUBN2A06FrUI/eHXJZ5AQFliAQAiY+ViFPj6ADX323dVh2P/H1BBD7lBs/8
pR+JYYNReWqmr75Nvx33KtxGjlZmr/DG5cLp6Wb91RD4Xj2qZQkpoEUq5BjjkGFh
6kUKBD49Z6G3XDEzlGUH1UBchvnB8zBTTHMG4T1KzL0xkXBDIn1GjrLNZSOiMyAs
g1koMsqZANk=
=yXea
=====END PGP SIGNATURE=====
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can submit announcements to be moderated via:
Internet: [EMAIL PROTECTED]
Linux may be obtained via one of these FTP sites:
ftp.funet.fi pub/Linux
tsx-11.mit.edu pub/linux
sunsite.unc.edu pub/Linux
End of Linux-Announce Digest
******************************