Linux-Development-Sys Digest #778, Volume #7 Sun, 16 Apr 00 18:13:17 EDT
Contents:
Re: .DLL not present in W2K, MICROSOFT GUILTY OF COVERUP! (Charlie Ebert)
kernel communicate with module (Yung-Hsiang Lu)
Re: MICROSOFT IT THRU! MICROSOFT IS THRU! (News-Only)
Re: MS caught breaking web sites (Robert Hampf)
Re: Put the lib into the libc? (was: Re: Simple but...) (Nate Eldredge)
Re: MICROSOFT IT THRU! MICROSOFT IS THRU! (abraxas)
Re: Put the lib into the libc? (was: Re: Simple but...) (Matthias Kleinmann)
PCI Modem (Albert Decker)
MPROTECT (David)
Re: URGENT: Need help with French Canadian keyboard and keymap (Chuck Mattern)
----------------------------------------------------------------------------
From: Charlie Ebert <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Crossposted-To:
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip
Subject: Re: .DLL not present in W2K, MICROSOFT GUILTY OF COVERUP!
Date: Sun, 16 Apr 2000 18:02:58 GMT
This is the Chad from a short few messages ago.
>Subject:
> Re: MICROSOFT IT THRU! MICROSOFT IS THRU!
> Date:
> Sat, 15 Apr 2000 21:57:44 GMT
> From:
> "Chad Myers" <[EMAIL PROTECTED]>
> Organization:
> Road Runner - Texas
> Newsgroups:
> comp.os.linux.development.system, comp.os.linux.advocacy,
> comp.os.ms-windows.advocacy, comp.os.ms-windows.nt.advocacy,
> comp.os.linux.networking, comp.os.linux.security,
> comp.os.ms-windows.networking.tcp-ip, alt.conspiracy.area51
> References:
> 1 , 2
>You know the funny thing about this post is that there is no back door,
>and it's been proven by several parties and reported from several reliable
>news sources. I expect you'll see a retraction by WSJ monday if it hasn't
>happened
>already.
><sigh>
>I have a feeling this is going to be one of those topics that the ignorant
>zealotous anti-MS morons (such as Charlie here) will continue to bring up over
>and over and over again, even though it's been proven false.
>Kinda like the Kerberos thing, or the _NSAKEY thing, or any number of other
>BS topics.
>Oh well..
>-Chad
Yes, Oh well Chad.
And this was before we got a chance to communicate with him.
He hasn't even heard the first arguement.
And now he writes.
Chad Myers wrote:
> "Charlie Ebert" <[EMAIL PROTECTED]> wrote in message
> news:[EMAIL PROTECTED]...
> > Since the .dll in question was not found in Windows 2000 release, then
> Microsoft
> > was
> > aware of .dll and took it out of release. Appearently Microsoft just FORGOT
> to
> > warn us and the rest of the world about their ILLEGAL BACKDOOR.
>
> Charlie, it's one thing to be an idiot, but a completely different thing to
> outright
> blatantly lie.
>
> How many times do I have to say this? THERE IS NO BACKDOOR! It's been proven and
> verified by many sources. Why can't you accept the facts?
>
> > This makes them guilty of a consipiracy against Netscape Corporation as
>
> How was it a conspiracy against netscape?
>
> [SNIP More ignorant babble and flat out lies and falsehoods]
>
> -Chad
Well Chad. As the press release indicates, Microsoft used this Illegal .DLL to
FUD over
thousands of Netscape Server sites running on Microsoft Operating Systems.
BTW, there has been NO retraction of ANY of this since your started creating these
pantloads of logic Chad.
If I were to ask 1000 NT server administrators what permissions they've set on
their NT boxes
they would tell me NONE. It's assumed by most sys administration folks that
Microsoft will
at least take the TIME to burn them a CD for a default/safe install to begin with!
As far as the password "NETSCAPEENGINEERSAREWEENIES" are concerned, I'm going
to take it that you TOTALLY DENY THIS PHRASE "NETSCAPEENGINEERSAREWEENIES"
ever appeared in any Microsoft code then! Is that correct Chad. Will you
DENY this for everybody.
Don't give me any more of your silly bullshit. Just DENY it was ever there!
Shit Chad. I've been writing WIN API since before you were probably born. 20
years experience
including mainframe time. You, your a GD systems administrator for Road Runner
Cable it looks like.
What the shit do you know about writing software?
This .DLL didn't have any function within the system what so ever. It was never
intended to be
seen by NON-MICROSOFT Eye's. This .dll had but only ONE function. IT's function
was to allow
them to disrupt service on the OS.
There will be a retro-binary examination made on all CD runs they find this .dll
on. There will be
several compiled versions back across time. A different date and time will be
noted for this .dll
across several CD's and the impact of service packs will also be accounted.
As the FUNCTION of this .dll was never clearly defined by Microsoft, it's function
is obviously secret.
All they can say is delete the .dll or as Chad has suggested, change permissions on
the thing and
turn it into another DISK WASTIN PEICE OF SHIT.... That's effectively the same as
deleting it
though, no matter how he put's it. You can effectively change the permissions on a
file so that it's
not executable or writable or readable anymore thus turning it into BAD PACK SPACE.
I can't believe this was your suggestion dumbshit. How many people do you actually
think will
take such stupid advice Chad.
Chad, why don't you just hang it up here. Your just another dumbass Microsoft
systems administrator
or worse. You don't have a clue what your talking about and your likely never
going to.
You've never written a peice of software in your life and I doubt you actually know
what the function
of a .dll is in an operating system.
Why don't we try something simple. Tell me what a .dll stands for.
Next go tell me how setting a privilage on a .dll will make it all right! Get it
you fucking idiot!
That's right, nobody can execute a .dll on their own son! It's called by a parent
program!
OH Chad, I guess your forgot that. So now you look like a double dumbass in the
respect that
your telling people to set privilages on files which only OTHER executables CAN
launch and if
another EXECUTABLE tried to launch it guess what you would have next!
It's a BIG BLUE SCREEN with lots of hexadecimal figures on it!
Now go back to your TROLL HOLE and quite putting ROAD RUNNER CABLES
commercial VENUE all over every message you send out the door!
Don't come back until you've grown some brains son!
Charlie
------------------------------
From: Yung-Hsiang Lu <[EMAIL PROTECTED]>
Subject: kernel communicate with module
Date: 16 Apr 2000 18:11:53 GMT
Hi,
What is the simplest way for kernel and module to communicate? Can I
declare a variable in kernel with EXPORT_SYMBOL so that it can be seen
by modules? Is there a better way?
Thank you.
--
Sincerely,
Yung-Hsiang Lu
[EMAIL PROTECTED]
------------------------------
From: [EMAIL PROTECTED] (News-Only)
Crossposted-To:
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip,alt.conspiracy.area51
Subject: Re: MICROSOFT IT THRU! MICROSOFT IS THRU!
Date: Sun, 16 Apr 2000 16:53:19 GMT
Reply-To: [EMAIL PROTECTED]
In article <pgkK4.94$[EMAIL PROTECTED]> [EMAIL PROTECTED]
wrote...
> THERE IS NO BACKDOOR OR SECRET PASSWORD.
If this is the case, then what exactly has Microsoft admitted to and why?
------------------------------
From: [EMAIL PROTECTED] (Robert Hampf)
Crossposted-To:
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip,alt.conspiracy.area51
Subject: Re: MS caught breaking web sites
Date: 16 Apr 2000 21:47:22 +0200
Boris <[EMAIL PROTECTED]> h�lt �essu fram:
: Can you post your BS on linux newsgroups. That's were it belongs right. Just fuck
:off NT
: newsgroups you idiot.
Why? It hasn't got anything to do with Linux.
rh
: "wisdom" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]...
: > WELL WELL WELL!
: >
: > For all of you butt-bumping suckbuddies of Mr. Bill who have
: > been assuring us that there are no network "backdoors" in
: > Windows you, along with your evil master, are fucked now.
: >
: > Microsoft just acknowledged (see attached CBS article) that they
: > installed secret code in Windows to sabotage webservers
: > by allowing "backdoor" unsecured logins for hackers. The
: > code was apparently intended to be used against Netscape
: > based on embedded comments in the file.
: >
: > Microsoft is blaming this on "rogue" programmers, whom
: > they are promising to fire.(Now tell me the one about the easter bunny)
: >
: > The timing of this admission couldn't be better... Just when Judge
: > Jackson
: > is considering whether Microsoft deserves to be broken up, it turns out
: > that
: > their market dominance was aided by deliberate sabotage...Hmmmm
: >
: > Let's all hear a rousing chorus of "Breaking up is hard to do".
: >
: >
: >
: >
: > Microsoft Acknowledges Hidden File
: > Secret Message Was Aimed At Rival
: > Manager Will Fire Those Responsible
: > No Reports Of Hackers So Far
: >
: > NEW YORK
: > (CBS) Microsoft Corp.
: > engineers
: > included a secret password in
: >
: > Internet software that could
: > be
: > used to gain illegal access
: > to
: > hundreds of thousands of Web
: > sites, The Wall Street
: > Journal
: > reported Friday.
: >
: > The rogue computer code was
: > discovered in a
: > three-year-old
: > piece of software by two security experts. Contained
: > within the code
: > is a derisive comment aimed at a Microsoft rival:
: > "Netscape
: > engineers are weenies!"
: >
: > Steve Lipner, who manages Microsoft's
: > security-response center,
: > described such a backdoor password as "absolutely
: > against our
: > policy" and a firing offense for the as-yet
: > unidentified employees.
: >
: > There have been no reports of site access through
: > the code, but the
: > affected software is believed to be used by many Web
: > sites.
: >
: > The file, called "dvwssr.dll" is installed on
: > Microsoft's Internet-server
: > software with Frontpage 98 extensions. By using the
: > so-called
: > backdoor, a hacker may be able to gain access to key
: > Web site
: > management files, which could in turn provide a road
: > map to such
: > things as customer credit card numbers, the Journal
: > reported.
: >
: > One of the security experts, Russ Cooper, says the
: > risk is bigger
: > with commercial Internet hosting providers, which
: > maintain
: > thousands of Web sites for a slew of organizations.
: >
: > It was apparently programmed by a Microsoft employee
: > when
: > Netscape and Microsoft were at war over their
: > version of an internet
: > browser, according to the Journal. Eventually
: > American Online Inc.
: > acquired Netscape.
: >
: > The Journal reported that an engineer from Netscape
: > called the
: > hidden file a "classic engineer rivalry."
: >
: > Microsoft urged customers to delete the file and
: > planned to warn
: > customers with an e-mail bulletin and an advisory
: > published on its
: > corporate Web site.
: >
: > Copyright 2000 CBS Worldwide Inc. All Rights
: > Reserved. This
: > material may not be published, broadcast, rewritten,
: > or
: > redistributed. The Associated Press contributed to
: > this report.
: >
: >
:
:
------------------------------
From: Nate Eldredge <[EMAIL PROTECTED]>
Crossposted-To:
uk.comp.os.linux,uklinux.help.newbies,comp.os.linux.development,comp.os.linux.questions,comp.os.linux.development.apps
Subject: Re: Put the lib into the libc? (was: Re: Simple but...)
Date: 16 Apr 2000 13:48:23 -0700
[EMAIL PROTECTED] (William Burrow) writes:
> On Sun, 16 Apr 2000 11:02:51 +0200,
> Matthias Kleinmann <[EMAIL PROTECTED]> wrote:
> >So it is stupid, if you have to change your libc for a small (but
> >relevant) improvement in the libm, since this means AFAIK rebooting :((
>
> I dunno, for some reason my Debian system went through a change of
> libraries (glibc2.0 -> glibc2.1) without rebooting.
No, you don't really need to, but it is safest to drop to single-user
mode (since there is usually a window where no libc exists and
starting new programs will fail).
--
Nate Eldredge
[EMAIL PROTECTED]
------------------------------
From: [EMAIL PROTECTED] (abraxas)
Crossposted-To:
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip,alt.conspiracy.area51
Subject: Re: MICROSOFT IT THRU! MICROSOFT IS THRU!
Date: 16 Apr 2000 21:14:01 GMT
In comp.os.linux.advocacy News-Only <[EMAIL PROTECTED]> wrote:
> In article <pgkK4.94$[EMAIL PROTECTED]> [EMAIL PROTECTED]
>wrote...
>> THERE IS NO BACKDOOR OR SECRET PASSWORD.
> If this is the case, then what exactly has Microsoft admitted to and why?
Chad doesnt know--chad is a liar. Chad mindlessly defends microsoft with
meaningless arguments and downright lies. Then he gets offended when (once
again) no one believes him.
Hes your average winvocate.
=====yttrx
------------------------------
From: Matthias Kleinmann <[EMAIL PROTECTED]>
Crossposted-To:
uk.comp.os.linux,uklinux.help.newbies,comp.os.linux.development,comp.os.linux.questions,comp.os.linux.development.apps
Subject: Re: Put the lib into the libc? (was: Re: Simple but...)
Date: Sun, 16 Apr 2000 23:15:09 +0200
> > >So it is stupid, if you have to change your libc for a small (but
> > >relevant) improvement in the libm, since this means AFAIK rebooting :((
> >
> > I dunno, for some reason my Debian system went through a change of
> > libraries (glibc2.0 -> glibc2.1) without rebooting.
>
> No, you don't really need to, but it is safest to drop to single-user
> mode (since there is usually a window where no libc exists and
> starting new programs will fail).
At least you have to kick all users; but the real problem are services
such as httpd or httpd. But consider the following:
You have a measurment running for serveral years and a program that
steadily writes the raw data on the disk (or buffers it to fifo for
fruther calculation). You may not stop this process and it needs the
libc (formated writung like printf()). But for a rather short time you
may stop the process that reads the file.
Ok this is special and not too realistic, but maybe a general reason for
small libs.
BTW:
Is it even possible to change a lib of a runing process via SIGSTOP and
SIGCONT ?
Bye
Matthias
------------------------------
From: Albert Decker <[EMAIL PROTECTED]>
Subject: PCI Modem
Date: Sun, 16 Apr 2000 21:28:33 GMT
Newbie here - I just installed RedHat - That took three days but
that's another story - I have a PCI modem and under windows it does
not connect to a com port but is driven by an "AOpen PCI Modem
Enumerator" . How in the heck do I access it from Linux? If I can't
then it reduces the usefulness of Linux by too much!
Thanks for any help!
------------------------------
From: David <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux.development.apps
Subject: MPROTECT
Date: Sun, 16 Apr 2000 23:54:40 +0200
I can unmap code and data pages, but if I change their access
permisions I enter into defunct state.
strace no give me information. Simply say nothing. More, mprotect
function does not appear as a system call (like wait or fork).
Any Idea?
thaks in advance,
DTM
------------------------------
Reply-To: [EMAIL PROTECTED]
From: [EMAIL PROTECTED] (Chuck Mattern)
Subject: Re: URGENT: Need help with French Canadian keyboard and keymap
Crossposted-To: comp.os.linux.setup
Date: Sun, 16 Apr 2000 21:56:26 GMT
Following up to myself here, I found that the IBM keyboard I was
supplied with is mapped differently than the one that was used to create
the cf.kmap.gz and that which is present on the Keytronics I later was
provided with. I have modified the cf.kmap.gz to suit my needs but am
puzzled about the use of the ccedilla and Ccedilla characters in Quebec
and I suppose in French in general. I see that there are both a lower
and upper case avaiable but the keyboard from IBM shows only what
appears to be the upper case and it is created by the shifted key on
which the symbol resides so adding both would involve using altgr to
create it which is not all that logical (i.e: base key is asciitilde,
shited key is ccedilla altgr would be Ccedilla). Does anyone know
both upper and lower case are required and/or commonly used. The
units I am working on will be used in retail for sales associates
entering customer data, among other things.
In article <meYI4.9047$[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (Chuck Mattern) writes:
> I'm in need of some quick assistance due to a time line imposed from
> above. I need to deploy a large number of i386 clients running Linux as
> front ends to an HP-9000 machine in Quebec. First hurdle: I don't speak
> French. I have gone through as much as I can of the Francophone HOWTO
> and it looks like I need to be loading a qc keymap instead of the
> es.kmap.gz one that I have loaded for my Spanish implementation. Problem
> is I can't locate such a keymap file on the RedHat 6.1 release I am
> working from. I have an IBM French Canadian keyboard using the QWERTY
> layout.
>
> Can anyone offer any assistance with the location of a keymap file,
> words of wisdom or any experience in this area?
>
> Thanks in advance,
> Chuck
--
=============================================================================
|Chuck Mattern | "That which does not kill us, makes us stronger."|
|[EMAIL PROTECTED] | -Friedrich Nietzsche- |
=============================================================================
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and comp.os.linux.development.system) via:
Internet: [EMAIL PROTECTED]
Linux may be obtained via one of these FTP sites:
ftp.funet.fi pub/Linux
tsx-11.mit.edu pub/linux
sunsite.unc.edu pub/Linux
End of Linux-Development-System Digest
******************************