[expert] Unsubscribe me
Please do not send me any more messages about [EMAIL PROTECTED] because my account [EMAIL PROTECTED] is colapsed. Thanks everyboby for your mail. b5dave escribi: As root try: # services --status-all Any Chain input will be listed. And if you see a line that says "USAGE: pmfirewall [command]" then your uninstall didn't work. If you need to manualy uninstall, you'll find it under /usr/local/pmfirewall, as well as references in your rc scripts: #grep -i -r pmfirewall /etc/rc* I use it with a ppp connection so it is started in /etc/ppp/ip-up.local. With eth0 I figure it would just be started in /etc/rc*, but I could be wrong about that. If it is indeed running, it must be misconfigured. I remember there being options for a gateway, as well a specific IP's to allow. I don't have a network, so I can't help you there.I've had great success with the program however. Good luck. Dave. On 02-Jan-2001 Tib wrote: > I stopped it, uninstalled it, and flushed all the ipchains rules. It > /should/ > be a clean setup again like I had before. But still it acts like I said > before: only icmp gets forwarded through it and data in general is > extremely > slow. > > EOL> > Tib > > > On Wed, 3 Jan 2001, Mike MacCana wrote: > >> You can stop pmfirewall when its installed by running >> >> service pmfirewall stop >> >> Which clears the rules and set them to deny. Did you read the >> documentation fully? Its a neat utility, so don't give up on it yet. >> >> If you must use ipchains directly, then... >> >> ipchains -F input >> ipchains -F output >> ipchains -F forward >> >> Wil do the trick... >> >> Mike >> >> -- >> Mike MacCana Support Consultant >> C Y B E R S O U R C E >> Level 9, 140 Queen St Melbourne 3000 >> Ph : +61 3 9642 5997 Fax: +61 3 9642 5998 >> >> On Tue, 2 Jan 2001, Tib wrote: >> >> > Ok! here's some fun that's been causing me to lose my hair in chunks >> > because >> > I've been ripping it out. I checked out PMFirewall as someone >> > mentioned, and >> > had initially set it up. Everything seemed fine. However, even though >> > I ran >> > ipchains -L and it said there were no rules in place, it seems that >> > NOTHING but >> > icmp packets are allowed through the network anymore. I've smashed my >> > head >> > against my route table and other things but I just can't figure it >> > out. Nothing >> > gets forwarded but icmp, everything else is no route to host (from >> > the machines >> > inside the network that would use the address for eth0 as a gateway), >> > furthermore, it would seem that eth0's performance has been >> > compromised as well >> > for some strange reason, data throughput of ANY kind is extremely >> > slow even >> > though pingtimes are fantastic. I uninstalled pmfirewall and backed >> > out every >> > other change I can think of, I've shut down and brought up the >> > network, >> > re-added routes the way they were before, and overall exhausted my >> > brain with >> > this problem, can someone help please??? >> > >> > EOL> >> > Tib >> > >> > >> > >> > >>
Re: [expert]Unsubscribe me please!!!
Matthew J Fletcher escribió: Hi,. I installed and configured a 2.4.0 kernel for intel 815 support but when i create a boot floppy and boot from it say it cant mount the root fs and gives a kernel panic, All this works correctly with my old 2.2.x kernel using the same process,.. Is there any way to give the kernel the root mountpoint on the lilo commandline,.. boot: linux root=/dev/hdd5 (which is correct for my system) does not seem to work. -- regards --- Matthew J Fletcher NPD Firmware --- ** Serck Controls Ltd, Rowley Drive, Coventry, CV3 4FH, UK Tel: 44 (0) 24 7630 5050 Fax: 44 (0) 24 7630 2437 Web: www.serck-controls.co.uk Admin: [EMAIL PROTECTED] ** This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the above. Any views or opinions presented are solely those of the author and do not necessarily represent those of Serck Controls Ltd. Please note that Serck Controls Ltd is able to, and reserves the right to, monitor e-mail communications passing through its network. This email has been checked for viruses. Serck Controls Ltd shall not be responsible for damage caused by any undetected virus. ** Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list. Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] UNSUBSCRIBE PLEASE
[EMAIL PROTECTED] escribió: Sadly, its beginning to appear that installing KDE2 into a box that is currently running KDE1 is entirely more trouble than its worth. I've been working on getting just this accomplished for 3 days now with No success, and am now of the strong opinion that the only correct way to get it done is to just install Mandrake 7.2 and be done with it! Till you get done screwing around satisfying the meriad of dependancy issues which come up due to the stark reality of the incompatibility of a system which has been running KDE1 you run a 50/50 risk of roaching that system by causing more library conflicts, and possibly damaging the system mucking about TRYING to install something on a system that wasn't designed for KDE2! I know...a sentance does not a paragraph make, but I had to get that off my chest. I've collected over 30 RPM's and still counting attempting to install KDE2 on my Mandrake 7.1 system. God! my head hurts from keeping all that crap that I've been doing straight in my head. And all this just get friggin Koffice installed and working. It STILL doesn't work, nor do I have any hopes that it will ever work. Of course, I have another plan that I'm considering. That is to make a fresh install of Mandrake minus KDE at all and when the sytem comes up after the install I would install KDE2 fresh from the RPM's that I've squirreled away these last 3 days. Any comments? From: Gerald Williams [EMAIL PROTECTED] Date: Sun, 29 Oct 2000 20:41:40 +0700 To: [EMAIL PROTECTED] Subject: Re: [expert] kde1-compat On Sunday 29 October 2000 05:37, you wrote: Hey, i was wondering if anyone else had a similar problem. I'm supposing the problem lies in the kde1-compat libraries in 7.2. It happens when i try to run the configure script for kdevelop1.2. It fails when it tries to compile a small kde application. A look at the config.log files gives these errors: I was having the same problems with the 7.2beta and couldn't figure out why. Is it just a bad kde1 compatibility library or what? If anyone has a fix for this I'd like to hear it. Thanks, Benjamin Ellis If you are running KDE2, you probably have the enviroment set to where qt2 and the KDE2 library files are located. I got around that problem by putting the following in a script, and making it executible. #!/bin/sh export KDEDIR=/opt/kde export QTDIR=/usr/lib/qt export PATH=$KDEDIR/bin:$PATH export LD_LIBRARY_PATH=$KDEDIR/lib:$QTDIR/lib ./configure --prefix=/opt/kde After you do the config, you can go ahead and make, make install as usual. You will also need to change the paths to suit your box. Hope it helps. Jerry -- Gerald Williams -- Words Matter! Bangkok, Thailand Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list. Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list. Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
Re: [expert] unsubscribe
On Tue Nov 14, 2000 at 10:39:44AM -0500, Matthew Micene wrote: From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, November 13, 2000 3:52 PM Subject: [Announce] MDKA-2000:014 - everybuddy update Linux-Mandrake Update Advisory Can anyone at Madrake tell me why these updates have been arriving on the expert list as forwards and NOT showing up on the security-announce list with the rest of the security updates?? Well, for one because someone is trying to unsubscribe from this mailing list and ends up forwarding them to expert. They're actually placed on the announce mailing list. The reason they are not in securty-announce is because they are not security-related packages or updates. -- [EMAIL PROTECTED], OpenPGP key available on www.keyserver.net 1024D/FE6F2AFD 88D8 0D23 8D4B 3407 5BD7 66F9 2043 D0E5 FE6F 2AFD - Danen Consulting Serviceswww.danen.net, www.freezer-burn.org - MandrakeSoft, Inc. www.linux-mandrake.com Current Linux uptime: 7 days 15 hours 47 minutes. Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
Re: [expert] unsubscribe
On Tuesday 14 November 2000 08:46, you wrote: - Original Message - From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, November 13, 2000 3:52 PM Subject: [Announce] MDKA-2000:014 - everybuddy update Linux-Mandrake Update Advisory Can anyone at Madrake tell me why these updates have been arriving on the expert list as forwards and NOT showing up on the security-announce list with the rest of the security updates?? -- Matthew Micene Systems Development Manager Express Search Inc. www.ExpressSearch.com A host is a host from coast to coast, and no one will talk to a host too close Unless the host that isn't close is busy, hung or dead Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe
- Original Message - From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, November 13, 2000 3:52 PM Subject: [Announce] MDKA-2000:014 - everybuddy update Linux-Mandrake Update Advisory Package name: everybuddy Date: November 13th, 2000 Advisory ID: MDKA-2000:014 Affected versions: 7.2 Problem Description: The version of everybuddy released with Linux-Mandrake 7.2 has problems connecting to the msn messenger service. This new version of everybuddy corrects the problem and introduces some other small bug fixes. Please verify these md5 checksums of the updates prior to upgrading to ensure the integrity of the downloaded package. You can do this by running the md5sum program on the downloaded package by using "md5sum package.rpm". Linux-Mandrake 7.2: f86cb34edcddb38c27aa9983b8bda428 7.2/RPMS/everybuddy-0.1.5-1.1mdk.i586.rpm 416e9956e0d59fc9fc66bdc439df6f2e 7.2/SRPMS/everybuddy-0.1.5-1.1mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". You can download the updates directly from one of the mirror sites listed at: http://www.linux-mandrake.com/en/ftp.php3. Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them. Please be aware that sometimes it takes the mirrors a few hours to update, so if you want an immediate upgrade, please use one of the two above-listed mirrors. You can view other update advisories for Linux-Mandrake at: http://www.linux-mandrake.com/en/security/ Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe
- Original Message - From: Kadjo N'Doua [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, November 13, 2000 12:16 PM Subject: [Announce] MandrakeSoft appoints Bastille Unix Security guru Jay Beale November 13, 2000 - MandrakeSoft appoints Bastille Unix Security guru Jay Beale Writer of several stories and an upcoming book, winner of many security awards, Jay Beale is now MandrakeSoft's new Security Group Director. Please read more about him...: http://linux-mandrake.com/en/pr-jay.php3 -- Kadjo N'Doua Web Content Editor http://www.linux-mandrake.com Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe
- Original Message - From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, November 10, 2000 3:43 PM Subject: [Announce] MDKA-2000:013 - MandrakeUpdate update Linux-Mandrake Update Advisory Package name: MandrakeUpdate Date: November 10th, 2000 Advisory ID: MDKA-2000:013 Affected versions: 6.0, 6.1, 7.0, 7.1 Problem Description: This update for MandrakeUpdate allows MandrakeUpdate to install updated RPMs using the new update revision scheme. This update is necessary for all users to be able to install future updated packages using this new scheme. Please verify these md5 checksums of the updates prior to upgrading to ensure the integrity of the downloaded package. You can do this by running the md5sum program on the downloaded package by using "md5sum package.rpm". Linux-Mandrake 6.0: 12678c1f728b69c01d72a786233040e1 6.0/RPMS/MandrakeUpdate-6.0-8mdk.i586.rpm ba5286a4b4066a11b22792767441f21f 6.0/RPMS/grpmi-0.9-8mdk.i586.rpm 1b7fe391ad9382fbb29b384b3c676a2d 6.0/SRPMS/MandrakeUpdate-6.0-8mdk.src.rpm Linux-Mandrake 6.1: b05efdfebb96ba36a6c0ce919ec3f124 6.1/RPMS/MandrakeUpdate-6.1-6mdk.i586.rpm 450ade21aa646a6b63c3e0d62c12679f 6.1/RPMS/grpmi-0.9-6mdk.i586.rpm 81b5b88bf85fdc7f6ff6334137133867 6.1/SRPMS/MandrakeUpdate-6.1-6mdk.src.rpm Linux-Mandrake 7.0: 717fd8a72edbfc01006af8eae33db468 7.0/RPMS/MandrakeUpdate-7.0-15mdk.i586.rpm a1cb8f593dc9fbb9b7266093c3071a38 7.0/RPMS/grpmi-0.9-15mdk.i586.rpm 37b9543c6d898cb91c7438b71a45d50c 7.0/SRPMS/MandrakeUpdate-7.0-15mdk.src.rpm Linux-Mandrake 7.1: 078926de31774c01b869aa3aa359c154 7.1/RPMS/MandrakeUpdate-7.1-11mdk.i586.rpm 4a90ad176ca15eea3b78af8cf6b8a1c7 7.1/RPMS/grpmi-7.1-11mdk.i586.rpm c404d12f5c9495284cd50e8e2c649d40 7.1/SRPMS/MandrakeUpdate-7.1-11mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". You can download the updates directly from one of the mirror sites listed at: http://www.linux-mandrake.com/en/ftp.php3. Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them. Please be aware that sometimes it takes the mirrors a few hours to update, so if you want an immediate upgrade, please use one of the two above-listed mirrors. You can view other update advisories for Linux-Mandrake at: http://www.linux-mandrake.com/en/security/ Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe
- Original Message - From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, November 10, 2000 3:43 PM Subject: [Announce] MDKA-2000:013 - MandrakeUpdate update Linux-Mandrake Update Advisory Package name: MandrakeUpdate Date: November 10th, 2000 Advisory ID: MDKA-2000:013 Affected versions: 6.0, 6.1, 7.0, 7.1 Problem Description: This update for MandrakeUpdate allows MandrakeUpdate to install updated RPMs using the new update revision scheme. This update is necessary for all users to be able to install future updated packages using this new scheme. Please verify these md5 checksums of the updates prior to upgrading to ensure the integrity of the downloaded package. You can do this by running the md5sum program on the downloaded package by using "md5sum package.rpm". Linux-Mandrake 6.0: 12678c1f728b69c01d72a786233040e1 6.0/RPMS/MandrakeUpdate-6.0-8mdk.i586.rpm ba5286a4b4066a11b22792767441f21f 6.0/RPMS/grpmi-0.9-8mdk.i586.rpm 1b7fe391ad9382fbb29b384b3c676a2d 6.0/SRPMS/MandrakeUpdate-6.0-8mdk.src.rpm Linux-Mandrake 6.1: b05efdfebb96ba36a6c0ce919ec3f124 6.1/RPMS/MandrakeUpdate-6.1-6mdk.i586.rpm 450ade21aa646a6b63c3e0d62c12679f 6.1/RPMS/grpmi-0.9-6mdk.i586.rpm 81b5b88bf85fdc7f6ff6334137133867 6.1/SRPMS/MandrakeUpdate-6.1-6mdk.src.rpm Linux-Mandrake 7.0: 717fd8a72edbfc01006af8eae33db468 7.0/RPMS/MandrakeUpdate-7.0-15mdk.i586.rpm a1cb8f593dc9fbb9b7266093c3071a38 7.0/RPMS/grpmi-0.9-15mdk.i586.rpm 37b9543c6d898cb91c7438b71a45d50c 7.0/SRPMS/MandrakeUpdate-7.0-15mdk.src.rpm Linux-Mandrake 7.1: 078926de31774c01b869aa3aa359c154 7.1/RPMS/MandrakeUpdate-7.1-11mdk.i586.rpm 4a90ad176ca15eea3b78af8cf6b8a1c7 7.1/RPMS/grpmi-7.1-11mdk.i586.rpm c404d12f5c9495284cd50e8e2c649d40 7.1/SRPMS/MandrakeUpdate-7.1-11mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". You can download the updates directly from one of the mirror sites listed at: http://www.linux-mandrake.com/en/ftp.php3. Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them. Please be aware that sometimes it takes the mirrors a few hours to update, so if you want an immediate upgrade, please use one of the two above-listed mirrors. You can view other update advisories for Linux-Mandrake at: http://www.linux-mandrake.com/en/security/ Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe
- Original Message - From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, November 10, 2000 3:43 PM Subject: [Announce] MDKA-2000:013 - MandrakeUpdate update Linux-Mandrake Update Advisory Package name: MandrakeUpdate Date: November 10th, 2000 Advisory ID: MDKA-2000:013 Affected versions: 6.0, 6.1, 7.0, 7.1 Problem Description: This update for MandrakeUpdate allows MandrakeUpdate to install updated RPMs using the new update revision scheme. This update is necessary for all users to be able to install future updated packages using this new scheme. Please verify these md5 checksums of the updates prior to upgrading to ensure the integrity of the downloaded package. You can do this by running the md5sum program on the downloaded package by using "md5sum package.rpm". Linux-Mandrake 6.0: 12678c1f728b69c01d72a786233040e1 6.0/RPMS/MandrakeUpdate-6.0-8mdk.i586.rpm ba5286a4b4066a11b22792767441f21f 6.0/RPMS/grpmi-0.9-8mdk.i586.rpm 1b7fe391ad9382fbb29b384b3c676a2d 6.0/SRPMS/MandrakeUpdate-6.0-8mdk.src.rpm Linux-Mandrake 6.1: b05efdfebb96ba36a6c0ce919ec3f124 6.1/RPMS/MandrakeUpdate-6.1-6mdk.i586.rpm 450ade21aa646a6b63c3e0d62c12679f 6.1/RPMS/grpmi-0.9-6mdk.i586.rpm 81b5b88bf85fdc7f6ff6334137133867 6.1/SRPMS/MandrakeUpdate-6.1-6mdk.src.rpm Linux-Mandrake 7.0: 717fd8a72edbfc01006af8eae33db468 7.0/RPMS/MandrakeUpdate-7.0-15mdk.i586.rpm a1cb8f593dc9fbb9b7266093c3071a38 7.0/RPMS/grpmi-0.9-15mdk.i586.rpm 37b9543c6d898cb91c7438b71a45d50c 7.0/SRPMS/MandrakeUpdate-7.0-15mdk.src.rpm Linux-Mandrake 7.1: 078926de31774c01b869aa3aa359c154 7.1/RPMS/MandrakeUpdate-7.1-11mdk.i586.rpm 4a90ad176ca15eea3b78af8cf6b8a1c7 7.1/RPMS/grpmi-7.1-11mdk.i586.rpm c404d12f5c9495284cd50e8e2c649d40 7.1/SRPMS/MandrakeUpdate-7.1-11mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". You can download the updates directly from one of the mirror sites listed at: http://www.linux-mandrake.com/en/ftp.php3. Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them. Please be aware that sometimes it takes the mirrors a few hours to update, so if you want an immediate upgrade, please use one of the two above-listed mirrors. You can view other update advisories for Linux-Mandrake at: http://www.linux-mandrake.com/en/security/ Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] Unsubscribe, please.
Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe
- Original Message - From: Vincent Danen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, November 02, 2000 2:52 PM Subject: [Announce] MDKA-2000:011 - XFree86 update Linux-Mandrake Update Advisory Package name: XFree86 Date: November 2nd, 2000 Advisory ID: MDKA-2000:011 Affected versions: 7.1 Problem Description: The GE Force 2 GTS and MX cards are incorrectly recognized in Linux-Mandrake 7.1. harddrake identifies the card as a GE Force 256 card. Because of this the framebuffer kernel is not installed on the system. This XFree86-server package will correct the problem and should be installed in the following manner: - Install 7.1 on your computer if you have not already done so. If you choose the recommended install method, you will have to reset the computer near the end because the X server will automatically be tested. - Restart the computer in runlevel 3 (text mode). - Uninstall the XFree86-glide-module if it is installed (it will be if you chose recommended install) by using: rpm -e XFree86-glide-module - Install the XFree86-server-4.0.1-26mdk.i586.rpm package listed below by using: rpm -Uvh XFree86-server-4.0.1-26mdk.i586.rpm - Execute /usr/sbin/XFdrake as root and select the resolution and color depth you wish to use. Do not perform a configuration test. Select whether you want to use the X server at startup or not. - Change to the /etc/X11 directory by using: cd /etc/X11 - You must redo the symbolic link for the installed X server by using: ln -sf ../../usr/X11R6/bin/XFree86 X - You may then start the X server by using: startx Please verify these md5 checksums of the updates prior to upgrading to ensure the integrity of the downloaded package. You can do this by running the md5sum program on the downloaded package by using "md5sum package.rpm". Linux-Mandrake 7.1: c4500f68ddb6543beedaadc628140410 7.1/RPMS/XFree86-server-4.0.1-26mdk.i586.rpm 2d07a2b2993b74ab6036f3acb01ba2d1 7.1/SRPMS/XFree86-4.0.1-26mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". You can download the updates directly from: ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates ftp://ftp.free.fr/pub/Distributions_Linux/Mandrake/updates Or try one of the other mirrors listed at: http://www.linux-mandrake.com/en/ftp.php3. Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them. Please be aware that sometimes it takes the mirrors a few hours to update, so if you want an immediate upgrade, please use one of the two above-listed mirrors. You can view other update advisories for Linux-Mandrake at: http://www.linux-mandrake.com/en/security/ Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
[expert] unsubscribe expert
From the Home office of Joe M. If you don't like what I have to say then you should call: 1-800-RTO-CLUE Rent to own your own clue today! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Mark Weaver Sent: Thursday, September 28, 2000 6:30 PM To: [EMAIL PROTECTED] Subject: [expert] Advice on Mobo Hi list, I'm starting the research on getting the parts together to build a new system. I want to build a dual Athlon 700 system with at least 256MB of RAM and a large SCSI drive. What I'm wondering about is what kind of mobo would be best suited for my penguin. Of course there will be no Windows in this machine. I already have on machine with Windows in it and this one isn't going to be it. Any and all suggestions will be appreciated. TIA -- Mark ** =/\= No Penguins were harmed| ICQ#27816299 ** _||_ in the making of this | ** =\/= message... | Registered Linux user #182496 Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.