Linux-Misc Digest #580, Volume #19               Tue, 23 Mar 99 19:13:09 EST

Contents:
  choosing attorneys [Re: Public license question] (Richard E. Hawkins Esq.)
  Re: IE5 under Linux (Hans Wolters)
  Re: SuSE6 & Kernel 2.2.3 ([EMAIL PROTECTED])
  Re: Pentium III Boycott and survey info ([EMAIL PROTECTED])
  Re: What is the best Linux to install? (jik-)
  Mac/Cdrom (Mestivier Denis)
  Re: Is there a good graphical web page editor for Linux? (Matthias Benkmann)
  Re: Is there a reference for Bash shell scripts on the web? (Oracle startup script) 
(Matthias Benkmann)
  Re: csh scripts won't run (M. Buchenrieder)
  Re: Auto login ? (Juergen Heinzl)
  Email-only terminal accounts (Eric Rossing)
  Re: No-Win Modem Situation ("David Stockbridge")
  Q:How to get /sbin,/usr/sbin back into $PATH... (Wes Yates)
  fortran 90 (Uwe Brauer)
  Hard drive space? (Paul Richards)
  Re: Which program to use scsi-tape drive? (Andi Vontobel)
  Re: Creative Labs Awe32 ([EMAIL PROTECTED])
  Re: what "rc" scripts exist for linux? (Alexander Viro)
  Re: Looking for a webcam for linux (Alan)
  Re: What is the best Linux to install? (Jon-o Addleman)
  Re: chown: bug or feature (Steve Peltz)
  Re: SuSE6 & Kernel 2.2.3 (Crew)
  Re: Fetchmail posts two copies of each mail... ? ("Joseph K. Vossen")
  Thanks to Julius, Thomas and Paul ([EMAIL PROTECTED])
  Re: Linux Safeguards for the Consumer? (Michael Talbot-Wilson)
  Re: DHCP and name resolving ("Ron")
  Re: Public license question (Stephan Schulz)

----------------------------------------------------------------------------

From: [EMAIL PROTECTED] (Richard E. Hawkins Esq.)
Crossposted-To: comp.os.linux,gnu.misc.discuss
Subject: choosing attorneys [Re: Public license question]
Date: 23 Mar 1999 11:44:43 -0600

In article <[EMAIL PROTECTED]>,
Michael Powe  <[EMAIL PROTECTED]> wrote:

>Indeed, how do you?  The few times I've used attorneys, I've
>researched their backgrounds through a local service and then talked
>to several on the phone before going in for a consultation with one.

This can be a mixed bag, and actually backfire.  While the yellow pages
are the second-worst way to find an attorney (the worst being television
ads), expecting to talk to one on the phone can screen in the wrong 
direction.  There are serious liability issues to anything vaguely 
resembling advice from a phone conversation, and it's viturally
impossible to prove that a conversation didn't happen, or that the
claimed "advice" wasn't given.  The only prudent practice is to
have a general rule not to speak with unknown people on the phone,
save in certain well-delineated cases.  Never on domestic matters :)

The best way to find an attorney is by word of mouth, from someone who 
has already hired or otherwise worked with that attorney.  Failing that
many bar associations (usually at the county level) run referral 
services.  Some services (the preferable kind) require a certain amount
of experience in the area, while others don't.



>Maybe, if you have a realistic chance of doing so.  After one term of
>C++ at the local college, am I qualified to pass judgement on how the
>linux kernel is coded?  I don't think so.  Just so, if I had serious
>concerns about how an attorney was handling my case, I'd get advice
>from another attorney.

This can be tricky, too.  Giving adice to someone on a matter in 
which he is already represented can create liability problems
(interference with contract), unless permission is gained from the
first attorney.  Then again, refusing to give such permission should
raise questions in itself (but you can't tell this to someone who
is looking for a second opinion).

rick

-- 
These opinions will not be those of ISU until it pays my retainer.

------------------------------

From: [EMAIL PROTECTED] (Hans Wolters)
Crossposted-To: comp.os.linux.setup,comp.os.linux.x
Subject: Re: IE5 under Linux
Date: 23 Mar 1999 22:04:12 GMT
Reply-To: [EMAIL PROTECTED]

On Tue, 23 Mar 1999 10:22:43 -0600, John Thompson <[EMAIL PROTECTED]>
 found a keyboard and composed the following intresting message:

[snap]

>I tried Opera a while back.  It was OK, but nothing
>special.  IIRC, it didn't support Java or plugins (maybe
>that's changed now) and I decided if/when I want pretty
>pictures and all the other bells and whistles I'll use
>Netscape and for quick-n-dirty text access I'll use lynx. 
>Opera just seemed superfluous.

If you don't mind a java browser you should take a look at icebrowser
(todays or yesterdays link at freshmeat). It can handle applet's, frames,
etc.. but it doesn't use any cache. You are also not able to bookmark. 

It's the first java browser that is very quick (P120 + 48 MB ram). I also
tried modzilla but that's even worse then NS.

Regards, Hans

-- 
        Java Search Engine Front End
    http://home.gelrevision.nl/~h.wolter/
     Linux Links/CMI8330 Soundpro HOWTO
http://home.gelrevision.nl/~h.wolter/linux.htm

------------------------------

From: [EMAIL PROTECTED]
Subject: Re: SuSE6 & Kernel 2.2.3
Date: Tue, 23 Mar 1999 18:08:59 GMT
Reply-To: [EMAIL PROTECTED]

On Mon, 22 Mar 1999 07:46:11 GMT, [EMAIL PROTECTED] (Crew) wrote:

>Can anyone help with the following errors I get when running bzImage
>to compile the kernel.
>
>gzipped file expanded from /usr/src into /usr/src/linux per readme
>(where linux is shown as linux->linux-2.0.36.SuSE Folder (Link)
>
Your fault was to expand your 2.2.3 sources into the linux subdirectory, which
is a link to the SuSE sources. It happened to me too. Do the following:

make a backup copy of /boot/vmlinuz, call it vmlinuz-2.0.36

cd /usr/src
rm linux

assuming you have the archive linux-2.2.3-tar.gz in this directory, unpack it
again:

gzip -cd linux-2.2.3.tar.gz | tar xfv -

this will create a new linux directory. Rename it:

mv linux linux-2.2.3

and recreate the link:

ln -s linux-2.2.3 linux

now you need to create a new configuration. copy the .config file from the SuSE
sources to linux. 

cd linux

now call

make oldconfig

this tries to get the old configuration. But be careful and check it again by

make menuconfig

to see all is as you want. After that, proceed with

make dep clean
make bzImage
make modules modules_install

copy the bzImage to /boot/vmlinuz-2.2.3

and adjust LILO or your boot manager to load this image. Be careful not to
delete the /boot/vmlinuz-2.0.36 ! until you are safe with 2.2.3

Hope this helps ! It worked for me.

=====================================================
Answers please in this newsgroup!
[EMAIL PROTECTED]

=====================================================

------------------------------

From: [EMAIL PROTECTED]
Crossposted-To: comp.os.linux.advocacy
Subject: Re: Pentium III Boycott and survey info
Date: 23 Mar 1999 18:13:29 GMT


>
>I have some questions about the timing of the boycott.
>
>Here's the facts as I understand them.  If in error, please let me know.
>Many months ago, Intel announces the PIII ID feature.
>Then after many months pass, Intel announces it is ready to ship.
>Then the boycott is announced.
>
>
>Why is this reasonable?  Why wasn't the boycott announced when Intel
>made the original announcement?
>
>The US law is based on English Common Law.  As I understand ECL, people
>have a *responsibility* to mitigate damages.  By not notifying Intel
>right away, the people who object to the PIII ID feature failed to
>mitigate Intel's damages.  Could someone please explain justify the
>boycott in light of failure to mitigate damages?
>
>These questions only apply to citizens of countries that are based on
>ECL or have laws that require mitigation of damages.
>
>(I'm not saying you are wrong; I'm asking for an explaination.)
>
>-- 
>Hugh McCurdy


I don't know much about this but i'm going to assume that a boycott
wasn't started immediatly after intel's announcement because it wasn't
widely known about.  Mabye. 

------------------------------

Date: Tue, 23 Mar 1999 10:59:17 -0800
From: jik- <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux,comp.os.linux.setup,comp.os.linux.networking
Subject: Re: What is the best Linux to install?

calc best

------------------------------

From: Mestivier Denis <[EMAIL PROTECTED]>
Subject: Mac/Cdrom
Date: Tue, 23 Mar 1999 19:25:34 +0100
Reply-To: [EMAIL PROTECTED]

Is it possible to read a (only) Macintosh CDROM
on a PC/Linux Box ?

Thank's for your responses

Mestivier Denis


------------------------------

From: [EMAIL PROTECTED] (Matthias Benkmann)
Subject: Re: Is there a good graphical web page editor for Linux?
Date: Tue, 23 Mar 1999 19:47:46 GMT

>There's no such thing as a WYSIWIG web page/HTML editor, but if you're
>looking for a visual HTML editor, there's Amaya (which can also be used as
>a Web browser if you're very, very patient) which can provide you with
>several simultaneous views of your document, including a graphically
>rendered view, a text-based rendering, a table of contents and a structural
>outline.  Unfortunately, the last version I tried was very slow and more
>than a little prone to dying.  

I downloaded the binary for Amaya a week ago and tried it. I was very
impressed. It's really nice to use, very fast (on my K6/300) and
didn't crash on my machine. I can only recommend it to everybody. MSB


------------------------------

From: [EMAIL PROTECTED] (Matthias Benkmann)
Crossposted-To: comp.databases.oracle.misc,comp.os.linux.questions
Subject: Re: Is there a reference for Bash shell scripts on the web? (Oracle startup 
script)
Date: Tue, 23 Mar 1999 19:48:07 GMT

>I'm looking for a reference for Bash shell scripts on the web.  
There is a bash-doc-2.03.tar.gz on the same ftp servers that carry the
bash sources bash-2.03.tar.gz. MSB

------------------------------

From: [EMAIL PROTECTED] (M. Buchenrieder)
Subject: Re: csh scripts won't run
Date: Tue, 23 Mar 1999 13:44:57 GMT

Rey Rios <[EMAIL PROTECTED]> writes:

>I just installed Caldera 1.3 and I have not been able to run a csh script. 
>The script runs fine on SunOS.  

[...]

Did you check the permissions of that file after you transferred
it onto the Linux box ? Do you have a /bin/csh ?

Michael
-- 
Michael Buchenrieder * [EMAIL PROTECTED] * http://www.muc.de/~mibu
          Lumber Cartel Unit #456 (TINLC) & Official Netscum
    Note: If you want me to send you email, don't munge your address.

------------------------------

From: [EMAIL PROTECTED] (Juergen Heinzl)
Crossposted-To: alt.os.linux,comp.os.linux.help
Subject: Re: Auto login ?
Date: Tue, 23 Mar 1999 20:23:49 GMT

In article <[EMAIL PROTECTED]>, Jose M. Urena wrote:
>I am not an expert, but security is there because of the millions upon
>millions of people for more than 20 years before you  who honestly found
>out that it was an important way to prevent you and your machine from
>being compromised

If it is my home machine with no services up an running a password is
not going to help if someone breaks the lock of the door and carries
the whole damn thing away ...
[...]
>> If you're the only one who use your computer, then what's the use of
>> login-security?
... then it does not make sense and autologin is possible, or just use
an empty password if that is not a keystroke too much.

It still cannot hurt to have one for root, simply to avoid (after one of
those late night sessions) to log in as root by accident and swiftly
doing a rm -rf.

Minor note, at work no-one ever made it into one of my machine who was
not allowed too, but there it is a different story.

Cheers,
Juergen

-- 
\ Real name     : J�rgen Heinzl                 \       no flames      /
 \ EMail Private : [EMAIL PROTECTED] \ send money instead /
  \ Phone Private : +44 181-332 0750              \                  /

------------------------------

From: [EMAIL PROTECTED] (Eric Rossing)
Subject: Email-only terminal accounts
Reply-To: [EMAIL PROTECTED]
Date: Tue, 23 Mar 1999 20:23:55 GMT

What is the best way to set up a user so he is automatically put into a
mailreader (eg. elm) when he logs in, and is automatically logged off when
he exits that program?

Thanks!

Eric Rossing
[EMAIL PROTECTED]

------------------------------

From: "David Stockbridge" <[EMAIL PROTECTED]>
Crossposted-To: alt.os.linux,comp.os.linux.setup
Subject: Re: No-Win Modem Situation
Date: Tue, 9 Mar 1999 19:39:53 -0500

>Wrong! There are many ISA winmodems.

I stand corrected. My internal ISA modem isn't a winmodem, but others may
be.




------------------------------

From: [EMAIL PROTECTED] (Wes Yates)
Subject: Q:How to get /sbin,/usr/sbin back into $PATH...
Date: 23 Mar 1999 20:25:54 GMT

I don't know what I did or how I did it, but when I echo $PATH I get no 
/sbin or /usr/sbin. I haven't changed /etc/profile or I don't think I 
changed ~/.bash_profile, but something is wrong. Right now I have:

/usr/local/qt/bin::/bin::/usr/bin:/usr/X11R6/bin:/root/bin

and I need:

/usr/local/qt/bin:/sbin:/bin:/usr/sbin:/usr/bin ...

How do I get this back to normal????

What could I have done?!?

Thanks a lot guys!

-Wes Yates

------------------------------

From: Uwe Brauer <[EMAIL PROTECTED]>
Subject: fortran 90
Date: 23 Mar 1999 21:19:17 +0000

Hi 

Since a short while I am using the free Fortran 90 compiler VAST/f90
from www.psrv.com, actually this is not a 'real' compiler but more a 
f90-to-g77  translator, which in principle is a to C translator,
anyhow.
Does anybody know about a different compiler for Linux?
Thanks

Uwe Brauer

------------------------------

From: Paul Richards <[EMAIL PROTECTED]>
Subject: Hard drive space?
Date: Tue, 23 Mar 1999 18:40:01 +0000
Reply-To: Paul Richards <[EMAIL PROTECTED]>

How do I see how much space there is on a HD or partition?
-- 
Paul Richards (aka. Pauldoo)
EMAIL   [EMAIL PROTECTED]
HTTP    www.dunvegan1.demon.co.uk/paul/
ICQ#    14106503

------------------------------

From: Andi Vontobel <"andi.vontobel(RxExMxOxVxE)"@gmx.net>
Crossposted-To: comp.os.linux.help,comp.os.linux.networking
Subject: Re: Which program to use scsi-tape drive?
Date: Wed, 10 Mar 1999 15:10:15 +0100

Ralf Lange wrote:
> 
> tar,dump,restore,dd
mt

-- 
  -------------------------:WARNING:----------------------------
By sending me unsolicited commercial/political/religious/MailPush
E-mail message/s (known also as "spam"), you irrevocably agree to
pay me $500.-(plus any legal expenses incurred by my trying to
collect the amount due) per unsolicited commercial/political/
religious/MailPush E-mail message - for the service of receiving it.

------------------------------

From: [EMAIL PROTECTED]
Crossposted-To: comp.os.linux.hardware,comp.os.linux.setup,comp.os.linux.questions
Subject: Re: Creative Labs Awe32
Date: Wed, 10 Mar 1999 14:26:12 GMT

On Tue, 09 Mar 1999 18:02:55 GMT, egray7 <[EMAIL PROTECTED]>
wrote:

>dooogh! wrote:
>
>> Have you tried sndconfig?
>
>Can't, don't have any such program.    But I have managed to figure out
>how to get  some things working properly through an older message I
>found that said to put some "insmod" stuff in the
>rc.d file.    That worked.    Except for using the AWE32's midi
>system.   For that, I need the AWE utils at
>http://bahamut.mm.t.u-tokyo.ac.jp/~iwai/awedrv/ but unfortunately, I
>can't figure out how to
>install it....there are binaries there, but while the awesfx one seems
>to work, the drvmidi doesn't.   Think it is set for some other version
>of Linux or something.   Can anyone help with doing that?
>

First you must have a properly edited isapnp.conf
file to get the awe32 initialized. There are many 
copies floating around to show you what to do,
I can send you a copy if you don't have one.

Second you need to apply the patch to a clean kernel source code.
Do a "make mrproper" in your kernel source directory.
Then unpack the awe patch you got from the above url.
Then run the install script that comes with the patch.
It will find your kernel source code, and patch the sound 
files. If it dosn't make sure you have a symbolic link @linux
pointing to your kernel source in /usr/src.
Next you need to recompile your kernel, with sound as 
module, and enable low-level drivers for the awe.

You just do the standard kernel compilation.
make dep  make  clean  make zImage  make modules  make modules_install
Don't forget to run lilo again to install your new kernel .

Then reboot.

To turn sound on "insmod sound"
To turn sound off "rmmod sound"
To check sound  " cat /dev/sndstat"

If you want to use fancy soundfont banks, copy
the sfxload utility to somewhere in your path, like /usr/bin.
Then type "sfxload synthgm.sfx" ; which will load the
soundfont bank synthgm.sfx.
You can put this command in your boot.local file to
automatically turn sound on at boot time.

For example, in boot.local put:
insmod sound
sfxload synthgm.sfx











------------------------------

From: [EMAIL PROTECTED] (Alexander Viro)
Crossposted-To: comp.os.linux.development.apps,comp.os.linux.development.system
Subject: Re: what "rc" scripts exist for linux?
Date: 23 Mar 1999 18:03:24 -0500

In article <7d8jfp$[EMAIL PROTECTED]>,
david parsons <o r c @ p e l l . p o r t l a n d . o r . u s> wrote:
>     Okay, here's where we diverge.
>
>     My rc system doesn't assume that network will be starting;  if a
>     script needs to have the network running, it makes the appropriate
>     call -- if the network is already running, nothing happens, but if
>     not it's started and registered.  And since the rc system is handling

        man touch
        man rm
Sorry, couldn't resist ;-)

[snip]

>>Moreover, you can say
>>MODLIST += nfs
>>network_DEP += nfs
>>in nfs.mk and in the end of the main makefile play with subst and foreach
>>if you really are into macdinking and want everything happen automagically.
>
>     The complexity in each makefile begins to get somewhat daunting, I'm
>     afraid.

Umm, no. All complexity goes into the standard black magic at the end of
*main* makefile. Other just declare their existance and dependencies (see
above) and give all specific actions. Stuff in the end of the main makefile
goes through the combined lists and adds all dependencies between the goals.
In the example above you'ld get
network_stop: nfs_stop
nfs_start: network_start
added automagically. Additional dependencies can go at any point of makefile -
they are accumulated. Implicit rules are also very convenient thing. Look
at the Dancing Makefiles (sorry, I don't have an URL at hands - either ask
MEC or look through l-k archives).

-- 
"You're one of those condescending Unix computer users!"
"Here's a nickel, kid.  Get yourself a better computer" - Dilbert.

------------------------------

From: Alan <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux.hardware,comp.os.linux.networking
Subject: Re: Looking for a webcam for linux
Date: Tue, 23 Mar 1999 17:51:19 -0500

AMJ wrote:
> 
> Hi there!
> 
> I'm looking for good webcam server-software
> and hardware for Linux (SuSE 5.*/6.*).
> 
> keywords:
> - stable software
> - serverpush/clientpull/streaming/stills
>   (and upload of pictures through ftp to provider)
> - availability (hard & software)
> - parallel interface
> - free (GNU,almost free) software
> - cheap but good color camera
> - compatability browsers & platforms (clients)
> - easy to use/install
> 
> I want to use it for dialup connections, Intranet
> and for livecontent on webpages.
> 
> Any suggestions?
> 
> Thx
> 
> Marius Kluin

Try www.wincam.com 

They focus on Windoze but also support UNIX/LINUX & O/S2. Go to their
support page and you will find an email link.

-- 
<Alan Mc - a LINUX Newbie - Red Hat 5.2 & KDE 1.1>
[EMAIL PROTECTED] - Remove the NWO. from addr.

------------------------------

From: [EMAIL PROTECTED] (Jon-o Addleman)
Crossposted-To: comp.os.linux,comp.os.linux.setup,comp.os.linux.networking
Subject: Re: What is the best Linux to install?
Date: Tue, 23 Mar 1999 21:12:24 GMT

Once upon a  23 Mar 1999 10:53:46 GMT, [EMAIL PROTECTED] (urgrue) wrote:
>Which Linux distro suits a certain user is not only a matter of taste. If the 
>poster describes himself as a home pc user, used to win98, with little to no 
>linux experience who just want to get the thing running, he is NOT going 
>to enjoy slackware. I'd recommend red hat or suse. If he's a coder who wants 
>to start coding on the linux platform then i'd recommend he keep away from the 
>likes of RPM and YaST. Which linux you choose has a lot more to do with your 
>needs, experience, and how much time you are willing to invest than just 
>taste. so i see nothing wrong with a newbie describing his needs and asking 
>experienced users for advice. And I wish people who did (find something wrong 
>with it) would just skip that message and not turn the thread into an 
>argument.

Just out of curiosity, why aren't RPM an YaST good for coders? I don't
think I've heard that said before...
-- 

Jon-o Addleman

------------------------------

From: [EMAIL PROTECTED] (Steve Peltz)
Crossposted-To: alt.os.linux,linux.dev.newbie
Subject: Re: chown: bug or feature
Date: 23 Mar 1999 23:43:54 GMT

In article <7c8u6e$44f$[EMAIL PROTECTED]>,
Chris Hardin  <[EMAIL PROTECTED]> wrote:
>program, turning on the SUID bit (with "chmod +s"), then changing
>ownership of that program to root.  If you have too much time on your

Linux turns off the SUID (and SGID) bits if you change the owner (or
group); it also turns them off if the file is modified by anything other
than the owner (or root).

------------------------------

From: [EMAIL PROTECTED] (Crew)
Subject: Re: SuSE6 & Kernel 2.2.3
Date: Tue, 23 Mar 1999 19:52:25 GMT
Reply-To: [EMAIL PROTECTED]

gus <[EMAIL PROTECTED]> wrote:

>Crew, it seems you have a bit of a situation ...
>etc,,,,,

Gus, 

You was right there, I had screwed up both the old and new file
systems. Thanks for your help in pointing this out. I should have
spotted the sym link to the earlier file set.

Now all ok. 

Thanks.

Jeff


------------------------------

From: "Joseph K. Vossen" <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux,comp.mail.sendmail,comp.os.linux.networking
Subject: Re: Fetchmail posts two copies of each mail... ?
Date: Tue, 23 Mar 1999 14:46:56 -0500
Reply-To: [EMAIL PROTECTED]

Matthew wrote:
> 
> Hello,
> 
> I am using fetchmail to retrieve mail from an ISP to a mail gateway
> machine running RedHat Linux 5.1 and sendmail 8.8.7 (sendmail.cf 8.8.4). I
> don't think that sendmail is the problem though...
> 
> The mail is posted into a multidrop box at the isp (any mail that goes to
> mydomain.co.uk). My machine is locally called gateway.mydomain.co.uk (and
> other machines on the network are called a.mydomain.co.uk, b.mydom..., c.
> etc.)
> 
> I have to use POP3 to retrieve the mail, but with fetchmail it gets the
> mail from the ISP, and then depending on how I change the .fetchmailrc
> file either sends it all to [EMAIL PROTECTED], or to, say,
> [EMAIL PROTECTED] *and* [EMAIL PROTECTED] Sendmail then
> reports a problem because the MX dns entry points gateway.mydomain.co.uk
> to mydomain.co.uk and reports a DNS loop, bouncing one of the two e-mails
> back to the sender.
> 
> I could use the first method of all e-mail going to root, and then use
> procmail to separate e-mail out to each user (which seems to allow more
> dynamic configuration), but then the users cannot use "Reply" to reply
> e-mail back to the sender, as the sender of the mail is now "root".
> 

I use fetchmail to pull my email from my isp and then feed that to
procmail for delivery to my users.  Yes, the sender is now root, but the
reply-to header is not changed so when the user uses reply, it just
works.

I would double-check your procmail configuration to ensure that the
reply-to field is left intact.

> Please help! I don't really mind which method I use to retrieve the mail,
> but it really needs to put the e-mails into local (mail gateway) mailboxes
> unaltered from downloading from the ISP.

------------------------------

From: [EMAIL PROTECTED]
Subject: Thanks to Julius, Thomas and Paul
Date: Tue, 23 Mar 1999 21:01:58 GMT

It might be kind of cool to have Linus come and recompile my kernel for me! 
I'm not sure what happened, but I redid everything, and it came out fine. 
hmm....If I didn't know better, I'd say it was a bit of windowitis.  Reminds
me of the haiku: Yesterday it worked Today it is not working Windows is like
that

Well, I guess I can't blame my mistakes on the OS anymore! =)

thanks again for your help.

============= Posted via Deja News, The Discussion Network ============
http://www.dejanews.com/       Search, Read, Discuss, or Start Your Own    

------------------------------

Date: Wed, 24 Mar 1999 08:02:31 +1030
From: Michael Talbot-Wilson <[EMAIL PROTECTED]>
Subject: Re: Linux Safeguards for the Consumer?

On 21 Mar 1999, David E. Fox wrote:

> In article <01be6960$be9ba1c0$8a97d6d1@sher07>, Benjamin Sher wrote:
> 
> >Specs: NEC Pentium 166, MMX, 64 meg Ram. Win95 + Linux (hopefully) using
> >LILO.
> 
> Such a machine should run Linux fine.
> 
> 
> >Are there any safeguards (either command-line or by way of the GUI) against
> >accidentally hitting the wrong key combination while in "root" mode? Does
> 
> The 'ctrl-alt-del' combination? Well, properly configured systems (and

You don't mention the 'cd /; rm -rf x *' combination.  The most
important thing to convey is the "minimum privilege" doctrine.
Exactly because Linux is powerful you should be root for only a
brief time, and during that time be attentive and conscious of your
power.

Really critical files you can protect with chattr so that even root
can't delete them, but if you take that too far it becomes highly
inconvenient.

Apart from those two (getting quickly out of root, and chattr) THERE
ARE NO SAFEGUARDS, and that should be made very plain.

'ctrl-alt-del', unless there is serious misconfiguration, does an
orderly shutdown.



------------------------------

From: "Ron" <[EMAIL PROTECTED]>
Subject: Re: DHCP and name resolving
Date: Tue, 23 Mar 1999 22:14:24 +0100
Reply-To: "Ron" <[EMAIL PROTECTED]>

As far as I know it doesn't...
I'm currently looking at some scripts somebody mailed me.

Basically, what it does is, pulling the ip-numbers and hostnames form
dhcpd.leases and making them available for DNS.

If you're interessted i could mail the scripts;-)

Another thingy is DyDNS, found it through:
http://www.win.net/~utumno/features/dyndns.html

Good Luck

>How does my nameserver know which IP-address (assigned through DHCP)
belongs
>to which computer. How does DHCP and DNS work together.



------------------------------

From: [EMAIL PROTECTED] (Stephan Schulz)
Crossposted-To: comp.os.linux,gnu.misc.discuss
Subject: Re: Public license question
Date: 10 Mar 1999 16:54:35 GMT

In article <[EMAIL PROTECTED]>, John Hasler  <[EMAIL PROTECTED]> wrote:
>Stephan writes:
>> I am in effect distributing "Snow Crash", and am thus in violation of
>> copyright, even though it is perfectly legal to distibute each individual
>> component, and even though the user has to perform a non-trivial
>> operation ("linking") of the two parts to actually get the novel.
>
>I think that a court would say the encrypted novel contains the novel and
>is therefor a derivative.  One of the arguments that the plaintiff would
>make is that someone might invent a way to crack the encryption.  Another
>is that as long as a method of decryption exists distributing the encrypted
>novel is distributing the novel, even though the recipients can't read it
>without your help.  What if you distributed copies of the novel printed
>with a disappearing ink which only you knew how to make visible?  The court
>would consider that and your encryption scheme equivalent.

Sorry, perhaps I should have been technically more specific.

If you have a perfect source of white noise (say a decaying
radioactive element and a Geiger counter), you can use this to create
a perfectly random binary string (a "key"). If you biwise XOR this
string to any other piece of data (of the same lenght, the "original
message"), you get a third bitstring (the "encrypted message") that is
just as random as your original key.  Thus you now have two bit
strings that are, by themselves, pure white noise. You cannot get the
original from either of the two bit strings. This is the principle of
one-time-pad encryption. It is not breakable, because, from an
information theoretical point of view, neither of the two strings
contains any information about the original (short of the lenght, but
then you can always pad the original with 0 bits). If this sounds
unconvincing to you, either think about it for a while or read up on
it on any modern book on cryptography.

However, both bit strings can be combined to yield the original work.
Thus, the information is hidden neither in the key nor in the
encrypted message, but in the relationship between the two (and the
encryption is actually symmetric, i.e. there is no conceptual
difference between key and encrypted message).

Now tell me why I am not allowed to distribute a totally random string
of bits just because someone has another string of bits that will
transform my string into a copyrighted work? Also keep in mind that
for either of the two bit strings I can produce third bit string that
combines with wither of the two original ones to give me a copy of the
American declaration of indepencence (to name a public domain
document).

[Other valid arguments/examples deleted - I do not exactly know where
 fair use ends for literary texts - there seems to be a pretty large
 grey zone]

Stephan

========================== It can be done! =================================
   Please email me as [EMAIL PROTECTED] (Stephan Schulz)
============================================================================

------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and comp.os.linux.misc) via:

    Internet: [EMAIL PROTECTED]

Linux may be obtained via one of these FTP sites:
    ftp.funet.fi                                pub/Linux
    tsx-11.mit.edu                              pub/linux
    sunsite.unc.edu                             pub/Linux

End of Linux-Misc Digest
******************************

Reply via email to