Re: automated installation

2002-07-24 Thread Bob Bell

On Wed, Jul 24, 2002 at 11:19:13AM -0400, Kenneth E. Lussier <[EMAIL PROTECTED]> 
wrote:
> On Wed, 2002-07-24 at 11:06, Michael O'Donnell wrote:
> > You're such losers - anybody can see that the
> > vi-versus-emacs flamewar is by FAR superior to
> > the Linux-distro one...
> 
> I'm not a big fan of the 5 editor. And eMacs, well, isn't that Apple's
> version of a networked toilet-seat looking laptop?? ;-)

Actually, "vi" would be 6 (so says me, Robert John Bell IV).  Now
"vim", OTOH, well, I'm not sure that's legitimate Roman numerals, but if
I had to treat it as such, I suppose I'd call it 994 (that's 0x3E2,
01742, or 100010 for those of you who have been behind a keyboard
too long).

And yes, there really was no point to this email...

-- 
Bob BellHewlett-Packard Company
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Missing pictures on web site

2002-07-16 Thread Bob Bell

On Tue, Jul 16, 2002 at 05:44:52PM -0400, John Abreau <[EMAIL PROTECTED]> wrote:
> You might try to find them in Google's cache. I seem to recall a story 
> a while back about a web archive project; offhand I don't remember its
> name or url, but perhaps it spidered your site in the past and cached 
> your missing photos. 

That would be the "Way Back Machine":
http://web.archive.org/collections/web.html

-- 
Bob BellHewlett-Packard Company
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Abusing CC:

2002-07-11 Thread Bob Bell

On Thu, Jul 11, 2002 at 04:54:27PM -0400, Jerry Feldman <[EMAIL PROTECTED]> wrote:
> I use exmh at home, and I have set up templates for the lists I use.
> Thus when replying to a listserv, the template preserves the Subject
> but not the addresses so I get a nice clean header. 

Which, incidently, removes the In-Reply-To and References headers, which
hinder threading of messages.

(Also, your email lines don't wrap, but that's a separate issue)

-- 
Bob BellHewlett-Packard Company
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Abusing CC:

2002-07-11 Thread Bob Bell

On Thu, Jul 11, 2002 at 12:40:17AM -0400, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>   Any message sent to the list address is not a private reply.
> 
>   I suspect you really mean that people who blindly hit "Reply" will send to
> the wrong address.  You're right, they will.  But that's not the fault of
> the mail headers, it's pilot error.  I've said this before and I'll say it
> again: Check your headers before sending, or you will do the Wrong Thing
> sooner or later.

Not only that, but many mailer's automatically accept the "Reply-To"
address.  Even if the responder is being diligent about checking mail
headers, he'll have to open the original message and copy-and-paste your
personal email address if he *doesn't* want to reply to the list.
A major annoyance, and one that could lead to extra list traffic, which
I don't like.

IMHO, "Mail-Followup-To" is a cleaner solution.  Additionally, it
eliminates the "Please Cc me with responses because I am not subscribed
to this list" type messages, as that information is provided in the mail
headers.

>   1. Very few MUAs currently implement Mail-Followup-To, which makes it
>  an ineffective solution in real life.

Very true, though hopefully this will change, as I like the
solution.  It does seem to be more effective in more "tech"-oriented
groups.

>   2. As noted above, the problem is really with people who blindly invoke
>  the same function in their mailer for all kinds of replies, regardless 
>  of what they really want to do.  So, people who blindly hit "Reply All"
>  will still do so, and people who get into the habit of blindly hitting
>  "Group Reply" will end up sending private replies to a group.

I find that most people have adjusted to the difference between
"reply" and "Group Reply"/"Reply All" (I might not have been able to say
the same thing, say, 5 years ago).  However, mailing lists throw
a monkey wrench in the works.  I believe that the proper (and yes,
complete) use of "Mail-Followup-To" keeps the semantics of "[Individual]
Reply" and "Group Reply" the same when mailing lists are used, including
whether or not the individuals are subscribed to the list.

I like *my* solution, and I plan to stick to it. :-)

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Parentheses in Perl are like shoes in the Caribbean."
   -- Larry Wall, creator of the Perl programming language

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Abusing CC:

2002-07-10 Thread Bob Bell

On Wed, Jul 10, 2002 at 02:49:27PM -0400, mike ledoux <[EMAIL PROTECTED]> 
wrote:
> The way your headers are coming through now, a well-behaved mail client
> will suggest replying directly to you.  If you prefer to not get any
> 'private' replies, you could always set your reply-to to the list
> address...

The problem here is that attempts at private replies will grab the
list address [0].  The "proper" solution, IMHO, is to set the
Mail-Followup-To header [1].  mutt does this properly when you establish the
list with the "subscribe" command [2].  For instance, for this email
I simply hit "group reply", and since Mike Ledoux's mailer set
Mail-Followup-To, my reply is going *only* to [EMAIL PROTECTED]  Since
I have told mutt I am subscribed to gnhlug, it will add
a Mail-Followup-To header.

[0] http://www.unicom.com/pw/reply-to-harmful.html (though the points
here are less significant, since setting Reply-To in this context is
being proposed on a per-user basis)
[1] http://cr.yp.to/proto/replyto.html
http://www.mutt.org/doc/manual/manual-4.html#using_lists
[2] http://www.mutt.org/doc/manual/manual-3.html#ss3.9

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Shipping software is an unnatural act"
   -- David Stafford

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: procmail -> Maidir format -> courier-imapd

2002-06-29 Thread Bob Bell

On Fri, Jun 28, 2002 at 04:36:18PM -0400, Kevin D. Clark <[EMAIL PROTECTED]> 
wrote:
> # I don't even know if this next line is necessary -- YMMV
> MAILDIR=$HOME/Maildir

> # IT IS CRITICAL THAT THIS IS THE LAST RULE
> :0
> $HOME/Maildir/

For what it's worth, I set:
MAILDIR=${HOME}/Maildir
DEFAULT=${MAILDIR}/

Setting DEFAULT I think should eliminate the need for the last rule,
although upon checking I do have it as well.  I believe the advantage to
setting MAILDIR is that you can then use relative paths. For instance,
I specify a folder as ".Bob/", rather than "$HOME/Maildir/.Bob/".

-- 
Bob BellHewlett-Packard Company
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Completely OT

2002-06-05 Thread Bob Bell

On Tue, Jun 04, 2002 at 06:40:59PM -0400, Bob Kenney <[EMAIL PROTECTED]> wrote:
>   Anybody who is/was planning on buying a new digital camera
> or camcorder should wait a little while before buying one, otherwise
> you'll be kicking yourself.  New imaging technology on the horizon,
> folks.

Except that's *always* going to be the case.  Meanwhile, your kids
continue to grow up, you take your vacation in the mountains, etc.

>   Check out www.foveon.com.  New revolutionary imaging chip that
> pretty much obsoletes current CCD and CMOS technology.  The first
> company licensed to use the chip is Sigma(yuck).  I'd rather wait
> for Nikon or Canon to jump into the arena.
> 
>   If you buy digital now, it'll be ultra-obsolescent before you
> even crack open the shipping box.

Oh?  You actually expect the technology to be productized and priced
comparably that quickly?  I don't.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Computers are like air conditioners -- they stop working properly
  if you open WINDOWS."
   -- Humorix (http://i-want-a-website.com/about-linux/)

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Partition Image

2002-05-02 Thread Bob Bell

On Thu, May 02, 2002 at 11:03:26AM -0400, Ben Boulanger <[EMAIL PROTECTED]> wrote:
> On Thu, 2 May 2002, Michael O'Donnell wrote:
> > Hmmm, is the IP addr in question one of yours? 
> > 
> >  Address: 64.254.172.117 Name: anbst01.noc.speedtrak.net
> 
> Yep, that's the box I'm trying to make the image of.

Can you verify that something is (was) listening on port 35665?
netstat might help you determine this.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Another (simpler) bash scripting question...

2002-04-24 Thread Bob Bell

On Wed, Apr 24, 2002 at 11:47:28AM -0400, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> If so, why would you use an array for this sort of thing.  Way back 
> in time when I was taking Intro to Programming, they taught us to use 
> linked lists for this type of scenario where you didn't know up front 
> how many items you'd need to store.
> 
> I know there's usually a huge disconnect between "How things are taught"
> and "How things are".  Is this the situation here?  Why?  What are 
> the pros/cons of using arrays vs. linked lists in this type of 
> scenario?
> 
> Please help me be less ignorant :)

Well, I have no idea what's going on in this specific case, but
a fuller study of algorithms may cover "Dynamic Tables" (I don't recall
hearing about them before grad school).  Dynamic Tables are like arrays,
which grow to twice the current size when they fill up, and contract
when they are only 1/4 full.  Those ratios are very important (i.e., you
can't contract when only 3/4 full) to achieve O(n) (I believe)
operation.

A quick Google search turned up 
http://www.google.com/search?q=cache:www.idt.mdh.se/kurser/cd5370/01/amortized.pdf


-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Another (simpler) bash scripting question...

2002-04-22 Thread Bob Bell

On Mon, Apr 22, 2002 at 05:15:00PM -0400, Mansur, Warren <[EMAIL PROTECTED]> 
wrote:
> > No?  Then how about this?
> > 
> >result=badness# init with failure default
> >spewSomeKindOfOutput | while read input
> >do
> >result=goodness
> >done
> >echo $result
> > 
> > What is the output?
> 
> badness

Hrm "badness" in bash, pdksh, and Tru64's "SVR4" /bin/sh.
"goodness" in Tru64's "POSIX.2/XCU5.0" /bin/posix/sh, Tru64's ksh, and
zsh.

...that can't be good...

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Another (simpler) bash scripting question...

2002-04-22 Thread Bob Bell

On Mon, Apr 22, 2002 at 02:15:14PM -0400, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> In a message dated: Mon, 22 Apr 2002 14:03:32 EDT
> Bob Bell said:
> 
> >Look at the bash man page for '#', '##', '%', and '%%'.
> 
> Are these "built-ins" also available in the real Bourne Shell, and/or ksh?
> Or are they strictly a "bash" thing?[1]
> 
> If they only exist within bash, then I wouldn't advocate their use if 
> you're goal is portable shell code.

Well, of course it depends on your goal.  Limiting yourself to
Bourne shell is at times necessary, but makes many things much more
difficult.

For what it's worth, what I mentioned is also available in ksh
(which is where I actually learned it), but not in "original" Bourne
shell.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Another (simpler) bash scripting question...

2002-04-22 Thread Bob Bell

On Mon, Apr 22, 2002 at 12:16:15PM -0400, Brian Chabot <[EMAIL PROTECTED]> wrote:
> On Mon, 22 Apr 2002 [EMAIL PROTECTED] wrote:
> 
> > I said:
> >
> > > in other words, given: "1234M /home/USER" I want "USER" so as to then turn
> > > around and email that user. (I already have
> > > way of removing non-user directories in /home).
> 
> Woo hoo!
> 
> Thanks for all the lightning fast help.
> 
> I already had most of the script written, but now I think I'll go back
> and re-write much of it thanks to all your input!

Yuck, yuck, yuck!  It looks like everyone was pointing out ways to
use sed to accomplish this.  Now, sed may give you extra power, but when
writing shell scripts, I prefer to avoid using external commands where
possible.  To that extent, consider:

$ foo="1234M /home/USER"
$ echo ${foo##*/}
USER
$

Look at the bash man page for '#', '##', '%', and '%%'.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: RAID Problems

2002-03-28 Thread Bob Bell

On Wed, Mar 27, 2002 at 11:26:06PM -0500, Rich Cloutier <[EMAIL PROTECTED]> wrote:
> *sigh* I fear that this is "vaccuum tube" mentality. Unless an
> electronic device has electro-mechanical parts that wear out, or has
> been stressed beyond its specifications (unlikely in the average
> computer chassis) it either works or it doesn't. In fact, there is
> actually some added value in a piece of silicon that has been run for a
> while, since most integrated circuits die after being run for a short
> period of time. In fact, this is WHY manufacturers burn in their
> products. So in a sense, EVERY electronic product you buy is used.

You would think so, wouldn't you?  However, one of my Netgear
FA310TX's that I've been using for about 2 years suddenly stopped
working a few weeks ago.  It wouldn't work in Win98, Linux, or in
another machine (running a fresh install of Win98).  Win98 saw it and
simply said that it wasn't working properly; Linux actually spit out
some error messages.  The link LED on my switch never went on.

    Netgear just replaced it under there lifetime warranty.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "I am ready to meet my maker. Whether or not my maker is prepared for
  the great ordeal of meeting me is another matter."
   -- Winston Churchill

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: PostgreSQL Vs. MySQL

2002-02-18 Thread Bob Bell

I've been looking into this recently, as I really wanted transaction
support for my database.  However, given my web hosting situation, it's
much easier to run MySQL.  What follows it what I've researched, but
haven't actually implemented yet.

On Sun, Feb 17, 2002 at 09:39:31PM -0500, Rich Payne <[EMAIL PROTECTED]> wrote:
> Correct, if memory serves me when MySQL does a write it does a whole table 
> lock (or was that a whole DB lock, can't remember). Anyway, it's very 
> quick at reads, at the expense of writes. There are other limitations of 
> MySQL, for instance no sub-select (select * from table where field in 
> (select * from)). To get round this you can sometimes use a join, at 
> other times it requires a temporary table. It also doesn't support 
> commit/rollback - basically if one part of this update fails, roll back 
> any other changes to the previous state. Note that these limitations are 
> being addressed and 4.xx (in alpha ?) supports sub-selects and there is 
> transaction support as well. However the mysql shipped with any distro 
> probably won't have that.

MySQL supports additional table types in version 3.23, which is
a stable release.  These table types have run through a lot of testing,
but I believe the table support is not yet at 1.0.  The new tables are
InnoDB (http://www.innodb.com/, http://www.mysql.com/doc/I/n/InnoDB.html)
and Berkeley DB (aka BDB) (http://www.sleepycat.com/,
http://www.mysql.com/doc/B/D/BDB.html).  These tables are included in the
MySQL-Max distribution, or you can ./configure to your pleasure if you are
building from source.  There's also the Gemini table from NuSphere
(http://www.nusphere.com/products/mysqladv.htm) that has been the cause of
a big debate over software licenses, trademarks, and domain names
(http://slashdot.org/article.pl?sid=01/07/12/1453210), which may or may
not have been resolved (I saw a note at unixreview.com that said that the
debate had been resolved and software released under the GPL, but that the
web sites didn't reflect this yet).

AFAIK, all these tables support transactions and row-level locking
(though I'm not sure about BDB's locking).

> If you're doing any serious sort of web application my suggestion would 
> be to make it as DB neutral as possible. It makes it a little more painful 
> at first as you can't necessarily make use of feature X of database Y but 
> later on this usually pays off. However as usual YMMV.

A note on switching databases: the ease at which you can do so may
depend on your programming interface.  For instance, I'm using PHP, which
unfortunately means that I have separate mysql_*() and pg_*() functions.
I'm doing my best to hide this behind another layer of abstraction.  Other
interfaces like Perl's DBI and Java's JDBC may provide an easier way to
move from one database to another.

On Mon, Feb 18, 2002 at 09:40:46AM -0500, Cole Tuininga <[EMAIL PROTECTED]> wrote:
> On Sun, 2002-02-17 at 12:58, [EMAIL PROTECTED] wrote:
> > I don't believe that MySQL has support for record locking (I may be 
> > wrong) 
> 
> This is correct.

See above.  This is dependent on the table type, I believe.

On Mon, Feb 18, 2002 at 11:37:51AM -0500, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> Got a lot of messages ahead of me and someone may have already
> posted this.  See the analysis done by Tim "GeoCrawler" Perdue:
> 
> http://www.phpbuilder.com/columns/tim2705.php3?page=1

This column is almost 2 years old, and is now rather out-of-date with
respect to the current state of these projects.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Sorta OT, but I'm stuck...

2002-02-15 Thread Bob Bell

On Fri, Feb 15, 2002 at 12:42:03PM -0500, Mark Komarinski <[EMAIL PROTECTED]> 
wrote:
> On Fri, Feb 15, 2002 at 12:28:23PM -0500, Jack Hodgson wrote:
> > Hmmm. Last night I became suspicious that this might be a permissions 
> > problem. I confess that permissions is an aspect of linux/unix that 
> > I've always been a little fuzzy on, so I spent last night trying to 
> > learn more on that. But I'm not there yet.
> >
> You do need to have +x on all directories leading up to the directory
> that Apache wants access to.  You don't need +r on /home/foo, for example, but
> you do need +x.  And make sure you have +rx on /home/foo/www or
> /home/foo/public_html or whatever.

Don't "chmod +rx" your www or public_html unless you're sure that's
what you want.  Depending on your Apache configuration, that may allow
a web browser or another user on the same system to get a listing of all
files in your directory.  If you don't want to allow that "+x" should
suffice.

That said, be sure that your scripts are "a+rx".  Scripts are not
executable in themselves; they need to be read by the Perl interpreter.
Thus, scripts must be both readable and executable, while compiled
programs can be simply executable.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Knuth, was Python follow-up...

2002-01-09 Thread Bob Bell

On Wed, Jan 09, 2002 at 10:36:01AM -0500, Kurth Bemis <[EMAIL PROTECTED]> wrote:
> HUH?

Sorry, brain fart... :-P  A downside of mutt allow you to read
multiple mail folders at once I suppose -- they all blended together and
that was the result.  I *do* own TAoCP and have twiddled with (La)TeX,
but now that my head's on straight, I guess that wasn't really the
point...

(Incidently I did find a course at my alma mater that touches on
Knuth's writings, though not heavily:
http://www.css.tayloru.edu/~sbrandle/310/)

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "World domination, of course. And scantily clad females. Who cares
  if it's twenty below?"
   -- Linus Torvalds, creator of the Linux operating system

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Knuth, was Python follow-up...

2002-01-09 Thread Bob Bell

On Tue, Jan 08, 2002 at 02:19:09PM -0500, Ray Cote <[EMAIL PROTECTED]> 
wrote:
> Yup. Amazing isn't it. I've not met a CS grad in the last 5 years who 
> read any of Knuth's work in school. Some ran across him in extended 
> reading, but nothing in the formal schooling. Sad to lose history 
> this quickly.

Well, you'll be happy to know that all 6 or so of my fellow Taylor
University graduates here at Compaq (all graduating within in the last
4 years) have all read Brooks' _The_Mythical_Man-Month_ as part of
a software engineering course, at a minimum. :-)

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Microsoft has never been an innovator - it's a fast follower.  And
  when you're as big and dominant as Microsoft, and growing at 30 or 40
  percent a year, it gets harder and harder to find people to be fast
  followers of."
   -- Paul Saffo, Institute for the Future

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: RPM question

2001-12-28 Thread Bob Bell

On Fri, Dec 28, 2001 at 02:34:52PM -0500, Rich C <[EMAIL PROTECTED]> wrote:
> As long as you manage your libraries, tools, and all lower level utilities,
> daemons, and programs with RPM too. For example, what if you try to install
> a new slick version of some Window manager that requires XFree86 Version
> 4.x, but you built XFree v4 from source?

I would guess that you either build from a source RPM (optionally
dropping in an updated copy of the source itself), or you edit
/etc/rpmrc with a "provides:" line.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "So far we've managed to avoid turning Perl into APL.  :-)"
   -- Larry Wall, creator of the Perl programming language

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: rfc2505

2001-12-27 Thread Bob Bell

On Mon, Dec 24, 2001 at 07:45:22PM -0500, Paul Iadonisi <[EMAIL PROTECTED]> wrote:
>   As Paul L. mentions in a later message, there's no problem with this
> as a corporate policy.  There are many arguments for sealed servers, but
> I believe that it's beyond the scope of the points I'ld to make.  (I'm
> happy to discuss it, but I just think it's a different, though related,
> discussion.)
>   I'm not really 'blaming' procmail, anyhow.  It does what it does well.
> Problem is, that it's not designed for filtering using only IMAP.  I
> personally cringe at alternating my access of an INBOX between IMAP and
> procmail or any other non-IMAP access.  Leaving Cyrus out the picture for
> the moment, let's take a look at UW-IMAP.  Upon accessing a folder, it puts
> a dummy message in the front of the file with some folder information.  It
> looks pretty innocuous and I doubt it would ever be a problem deleting it
> and letting UW-IMAP recreate it, but I just don't trust letting non-techie
> users do stuff to IMAP folders unless it's through IMAP only.  It's
> comparable (though not as bad as) to modifying an rcs file by hand.

What is your objection to an alternative interface to the procmail
rules?  Here at work we have a web-based interface to edit procmail
rules.  I can't find a URL for that interface, but I found a similar
project at http://www.uvm.edu/opensource/?Page=procbuilder.html.  This
should allow you to edit your procmail rules without having shell access
to the server.


Additionally, I have to question how effective your method of
filtering would really be.  Initially, it sounded great, but then I had
the consider the likelihood that it would actually deny spam.  I don't
know how many messages that I've received actually use the same return
address, but I would hazard a guess that very few do.  Without some sort
of pattern to the return address (or "MAIL FROM:"), I would think that
my inbox would simply be cluttered with messages from the mail server
about rejecting/accepting a message/sender instead of the actual spam,
which would like actually consume *more* of my time to process.

> If an employee really want to reject all mail from the CEO, he can do
> that himself, later.

Hmm, which makes me wonder about "I never got that email" excuses in
such a setup...

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "We have to make a management decision."
   -- Jerry Mason, Morton Thiokol Inc., before launching the "Challenger"

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: [MAILER-DAEMON@unknown.domain: Delayed Mail (still being retried)]

2001-12-10 Thread Bob Bell

On Mon, Dec 10, 2001 at 04:46:36PM -0500, Paul Lussier <[EMAIL PROTECTED]> wrote:
> In a message dated: Mon, 10 Dec 2001 16:43:25 EST
> Bob Bell said:
> >This guy is unable to receive his email.  Get him off the list! :-)
> 
> Might want to forward this to owner-gnhlug instead :)

I could have, but I thought the message itself was funny due to the
email address referenced.  Given that I've already receive a couple such
emails, I suppose it wasn't that obvious, or wasn't that funny.  (In
fact, it is kind of sad, given recent events)

Cross-reference my randomly-chosen-but-just-so-happened-to-be-
somewhat-appropriate sig to see whose email bounced.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "If Gates is going back into programming and design, this is the
  best thing that ever happened to Linux."
   -- Jon "maddog" Hall, Linux evangelist

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



[MAILER-DAEMON@unknown.domain: Delayed Mail (still being retried)]

2001-12-10 Thread Bob Bell

This guy is unable to receive his email.  Get him off the list! :-)

- Forwarded message from Mail Delivery System <[EMAIL PROTECTED]> -

From: [EMAIL PROTECTED] (Mail Delivery System)
Date: Mon, 10 Dec 2001 15:40:22 -0600 (CST)
To: [EMAIL PROTECTED]
Subject: Delayed Mail (still being retried)

Content-Description: Notification
This is an automated reply from the system ztxmail03.ztx.compaq.com.


# THIS IS A WARNING ONLY.  YOU DO NOT NEED TO RESEND YOUR MESSAGE. #


Your message could not be delivered for 6.0 hours.
It will be retried until it is 3.0 days old.

For further assistance, please send mail to <[EMAIL PROTECTED]>

Here's a diagnostic clue:


<[EMAIL PROTECTED]>: host mail1.valinux.com[198.186.202.175] said:
451-Envelope sender verification failed 451 rejected: temporarily unable to
verify envelope sender address (try again later) <[EMAIL PROTECTED]>

Content-Description: Delivery error report
Reporting-MTA: dns; ztxmail03.ztx.compaq.com
Arrival-Date: Mon, 10 Dec 2001 08:49:31 -0600 (CST)

Final-Recipient: rfc822; [EMAIL PROTECTED]
Action: delayed
Status: 4.0.0
Diagnostic-Code: X-Postfix; host mail1.valinux.com[198.186.202.175] said:
451-Envelope sender verification failed 451 rejected: temporarily unable to
verify envelope sender address (try again later) <[EMAIL PROTECTED]>
Will-Retry-Until: Thu, 13 Dec 2001 08:49:31 -0600 (CST)

Content-Description: Undelivered Message Headers
Received: by ztxmail03.ztx.compaq.com (Postfix, from userid 12345)
id B70FF1475; Mon, 10 Dec 2001 08:49:31 -0600 (CST)
Received: from mailrelay01.cce.cpqcorp.net (mailrelay01.cce.cpqcorp.net [16.47.68.171])
by ztxmail03.ztx.compaq.com (Postfix) with ESMTP
id 7F37133EE; Mon, 10 Dec 2001 08:49:31 -0600 (CST)
Received: by mailrelay01.cce.cpqcorp.net (Postfix, from userid 12345)
id 3338B1D96; Mon, 10 Dec 2001 08:49:31 -0600 (CST)
Received: from anw.zk3.dec.com (alpha.zk3.dec.com [16.140.128.4])
by mailrelay01.cce.cpqcorp.net (Postfix) with ESMTP
id 1CD671F66; Mon, 10 Dec 2001 08:49:29 -0600 (CST)
Received: by anw.zk3.dec.com (8.9.3/1.1.22.2/08Sep98-0251PM)
id JAA0001360784; Mon, 10 Dec 2001 09:49:22 -0500 (EST)
Date: Mon, 10 Dec 2001 09:49:19 -0500
From: Bob Bell <[EMAIL PROTECTED]>
To: Paul Lussier <[EMAIL PROTECTED]>
Cc: John Abreau <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: Re: Creating a TOC when burning audio CDs?
Message-ID: <[EMAIL PROTECTED]>
Mail-Followup-To: Paul Lussier <[EMAIL PROTECTED]>,
John Abreau <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
[EMAIL PROTECTED]
References: <[EMAIL PROTECTED]> 
<[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.3.22.1i
X-Editor: Vim http://www.vim.org/
X-URL: http://www.css.tayloru.edu/~bbell/
Sender: [EMAIL PROTECTED]
Precedence: bulk
X-List-Info: [EMAIL PROTECTED]; Majordomo 1.92
X-Sender: Bob Bell <[EMAIL PROTECTED]>


- End forwarded message -

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "It's easy to solve the halting problem with a shotgun.   :-)"
   -- Larry Wall, creator of the Perl programming language

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Creating a TOC when burning audio CDs?

2001-12-10 Thread Bob Bell

On Sun, Dec 09, 2001 at 12:19:55PM -0500, Paul Lussier <[EMAIL PROTECTED]> wrote:
> In a message dated: Sun, 09 Dec 2001 02:18:42 EST
> John Abreau said:
> >The CD audio format doesn't support any meta-information; it's just a big
> >spiral track of audio data. The applications you're referring to tie into
> >a volunteer-generated database of track information out on the 'Net;
> >essentially they compute a hash of the audio data, then use that as a key
> >in a database lookup. The track info is sent in from many users around the
> >'Net, and has been building up for years.
> 
> I could've sworn there was a cd player which was able to do this that 
> I used to use way back when... But now that you mention it, I guess 
> you're right.  I must have had to edit those track lists manually.

It may be that HDCD's include some data on the disc.  I put my
wife's Dixie Chicks "Fly" CD in our Toshiba SD-2700 CD/DVD player, and
the flourescent readout had the name of the CD.  HDCD is supposedly
a backwards-compatible minor CD enhancement.  It increases the quality
from 16-bit to 24-bit.  I'm assuming that some other enhancement must
included the CD title.  It seems that HDCD is now a Microsoft
technology.

http://www.hdcd.com/about/index.html

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Faces database disccussion [ was Summary: Karl Runge's SSH/VPN talk ]

2001-12-03 Thread Bob Bell

On Mon, Dec 03, 2001 at 11:17:34AM -0500, mike ledoux <[EMAIL PROTECTED]> 
wrote:
> On Mon, Dec 03, 2001 at 11:06:24AM -0500, Paul Lussier wrote:
> 
> > Someone has privately e-mailed and raised the privacy issue.  While I 
> > think this "faces" database would be useful, I am a little concerned 
> > about search engines indexing our images (anyone seend 
> > images.google.com?)
> 
> > Could this be prevented by adding password access to the images page?
> > Or, should we https it as well?
> 
> First, I'd like to emphasize that any such database would, by nature,
> be strictly optional.  Anyone that doesn't want to be in it won't be.
> As for restricted access, I had taken it as a given that any such database
> wouldn't be publicly accessable (I certainly don't want my ugly mug
> on google!).  A password protected webpage seems like a good idea, but who
> do you allow in?  You'd want to allow everyone who has a photo posted,
> obviously, but what about 'GNHLUG members' that don't post a photo?
> Given our open membership, does it make sense to treat 'GNHLUG members'
> any differently from the general public?

I seems to me that a standard robots.txt file would prevent at least
the common search engines from indexing the pages.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "We have to make a management decision."
   -- Jerry Mason, Morton Thiokol Inc., before launching the "Challenger"

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: more ls command

2001-11-15 Thread Bob Bell

On Thu, Nov 15, 2001 at 03:52:15PM -0500, Michael Bovee <[EMAIL PROTECTED]> wrote:
> Hi folks,
> On a related note, sort of, I discovered that under SuSE 7.1 for PPC, 
> that if I type ll  
> the output looks the same as if I had typed ls -l, but there is no 
> man page for 'el el'?
> Is this common for different groups to add their own shorthands, and 
> then not include them in the manpages?

Not knowing SuSE, by guess would be that you probably had an alias
in your default profile for ll.  This would not be the subject of a man
page.

To replicate this behavior, add:
alias ll='ls -l'
    to your ~/.profile or ~/.bash_profile

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Suppose I want to take over the world. Simplicity says I should
  just take over the world by myself."
   -- Larry Wall, creator of the Perl programming language

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: MS Product Activation [OFF-TOPIC] (was: SWANH Conference 2001 )

2001-11-06 Thread Bob Bell

On Mon, Nov 05, 2001 at 07:48:48PM -0500, Benjamin Scott <[EMAIL PROTECTED]> wrote:
>   I have also heard it said that the EULA for the latest release of MS
> FrontPage forbids you from using FP to create or publish a web page
> criticizing Microsoft or its products.  I have not substantiated that rumor
> at this time, so consider it suspect -- but it would fit with the trend
> we've been seeing from Redmond as of late.

I believe the qualification was that you couldn't use Microsoft
logos on such a site.  However, if that was really the intent, the
wording of the EULA leaves much to be desired.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "If Gates is going back into programming and design, this is the
  best thing that ever happened to Linux."
   -- Jon "maddog" Hall, Linux evangelist

*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*



Re: Impatient with cable

2001-10-17 Thread Bob Bell

On Wed, Oct 17, 2001 at 04:18:59PM -0400, Mansur, Warren <[EMAIL PROTECTED]> 
wrote:
> If you wanna be even more clever, scan the network for all open IPs on
> your subnet and use one:
> 
> % su
> Password: xx
> % nmap -sP yy.yy.yy.*
> 
> where yy.yy.yy is the first three entries of the IP address.
> 
> Can't say whether or not AT&T will get upset about such a scan, but
> doing it once shouldn't be such a problem.

Maybe less likely to draw attention would be a single broadcast ping:
$ ping -b -i 10 -w 9 24.49.157.255 | sed -n 's/^.*bytes from \(.*\): icmp.*/\1/p' | 
sort -u

Where 24.49.157.255 is the broadcast address on the nic.  Then use
an address in the subnet that doesn't respond.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "To understand recursion one must first understand recursion."
   -- Anonymous

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Linux on Dell Inspiron 8100

2001-10-17 Thread Bob Bell

On Wed, Oct 17, 2001 at 08:48:08AM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> > for ($x = 0; $i <= 5000; $x++) {}
> 
>   A good compiler will optimize that right out of existence.  :-)

Yep, but I suppose that's not going to be the case with perl.
A much better construct is to use sleep() or usleep() to actually wait
for a processor and compiler independent amount of time.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "The obvious mathematical breakthrough [to break modern encryption]
  would be development of an easy way to factor large prime numbers."
   -- Bill Gates from "The Road Ahead," p. 265.

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: File uploads with HTTP, default filter

2001-10-01 Thread Bob Bell

On Mon, Oct 01, 2001 at 05:06:37PM -0400, Bob Bell <[EMAIL PROTECTED]> wrote:
> To my knowledge, you can't specify this in a cross-platform way.
> Note that Mozilla (and I think IE) come up with a default filter of "*"
> ("*.*" for IE).  I'm not sure if you can customize on the client.
> 
> http://www.w3.org/TR/html401/interact/forms.html#file-select
> http://www.w3.org/TR/html401/interact/forms.html#input-control-types
> 
> This documents states that "User agents may use the value of the
> value attribute as the initial file name", but Netscape doesn't appear
> to treat a value of "*.jpg" as a wildcard.

Well, I have to take some of that back.  Apparently you can specify
and "accept" field that lists MIME types that the server will be able to
handle.

http://www.w3.org/TR/html401/interact/forms.html#adef-accept

That said, while it would make sense to do so, neither Netscape
Navigator nor Mozilla appear to use this list to adjust the filter of
the file select control.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Microsoft has never been an innovator - it's a fast follower.  And
  when you're as big and dominant as Microsoft, and growing at 30 or 40
  percent a year, it gets harder and harder to find people to be fast
  followers of."
   -- Paul Saffo, Institute for the Future

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: File uploads with HTTP, default filter

2001-10-01 Thread Bob Bell

On Mon, Oct 01, 2001 at 04:46:58PM -0400, Cole Tuininga <[EMAIL PROTECTED]> wrote:
> Quasi on topic question for you folks.
> 
> I'm working on a site that will require file uploads.
> 
> I create the input tag with no problem, and the widget shows up on the
> page with the 'Browse' button.  When you click on it, the little file
> browser comes up.  Here's where my question comes in.

This widget is what the W3C refers to as the "file select control".

> At least on my system, the file browser comes up with a default filter
> of *.html.  Is this something to do with the client (netscape) setup?
> Can I change what this pops up as by adding/changing something in the
> input tag?  Thanks in advance.

To my knowledge, you can't specify this in a cross-platform way.
Note that Mozilla (and I think IE) come up with a default filter of "*"
("*.*" for IE).  I'm not sure if you can customize on the client.

http://www.w3.org/TR/html401/interact/forms.html#file-select
http://www.w3.org/TR/html401/interact/forms.html#input-control-types

This documents states that "User agents may use the value of the
value attribute as the initial file name", but Netscape doesn't appear
to treat a value of "*.jpg" as a wildcard.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "During my service in the United States Congress, I took the
  initiative in creating the Internet."
   -- An apparently confused Vice President Al Gore

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Woman's Lawsuit Targets Technology

2001-09-25 Thread Bob Bell

On Tue, Sep 25, 2001 at 01:43:09PM -0400, Rich Payne <[EMAIL PROTECTED]> 
wrote:
> Of course they can never really stop you from encoding the dataafter
> all I can connect my CD player's audio out to the line in on the
> soundcard, record on the PC in standard PCM format then encode it into
> MP3s. Now I know it's not 'digital quality', but any home user could do
> this, and FWIW most newer sound cards have a digial in, so if you're CD
> player has a digital out.

I'm curious whether this would work.  The article mentions that CDs
protected with their technology are not designed to work in DVD players.
I wonder what that's referring to...

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "There are two major products to have come out of Berkeley:
  LSD and UNIX"
   -- Author Unknown

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Linux article in Nashua Telegraph

2001-08-28 Thread Bob Bell

For those who missed it, there was a Linux article in the Nashua
Telegraph this past Sunday (two days ago).  The front page to the
business section had a half-page graphic of Tux at his birthday party
:-)  The article references GNHLUG and few of our members.

The two parts of the article can be found online at:
http://www.nashuatelegraph.com/main.asp?ArticleID=39023&SectionID=27
http://www.nashuatelegraph.com/main.asp?ArticleID=39022&SectionID=27

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "We didn't go to the altar, never swore allegiance or anything like
  that."
   -- Andrew Grove, Intel chairman, regarding the "Wintel duopoly"

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: General Question

2001-08-28 Thread Bob Bell

On Tue, Aug 28, 2001 at 11:40:48AM -0400, a.w.gaunt <[EMAIL PROTECTED]> wrote:
> 
> I would like to learn more about 'ganging' multiple NICs
> on a network to act as "one" for the sake of performance.
> I know this is being done somewhere, somehow. Does anyone
> on this list know of a good reference I can read on the Web?

I don't have a reference for you, but this is normally referred to
as "link aggregation".

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "In general, if you think something isn't in Perl, try it out,
  because it usually is.  :-)"
   -- Larry Wall, creator of the Perl programming language

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Dual-Athlon?

2001-07-27 Thread Bob Bell

On Fri, Jul 27, 2001 at 09:20:51AM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> On Thu, 26 Jul 2001, James R. Van Zandt wrote:
> > AnandTech also reviewed the Tyan board.  The things I found discouraging
> > about their report were that it's large ...
> > ... and requires a nonstandard power supply.
> > Might their 760MPX board have a better chance of fitting in a regular
> > chassis?
> 
>   Define "regular".  The Tyan Thunder should fit in any full-sized ATX case.
> The power supply thing is basically inherent, but maybe by the time the
> 760MPX is out, the industry will have settled on a standard on how to supply
> the additional juice.

Actually, Tyan's web site describes the form factor of the Thunder
K7 (S2462) as "Extended ATX", 13" x 12".  Fortunately, Tyan has an
upcoming board, the Tiger MP (S2460), seen at x-bit labs
(http://www.xbitlabs.com/news/story.html?id=996098640).  This site
(apparently just quoting Tyan information) says that the board with have
a regular ATX form factor, 12" x 10.3", and will use a standard ATX
power supply, albeit at least a 300W one ("20-pin power supply connector
(300+W, +5V = 30A+)").

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Linux, WinNT, MS-DOS - also known as the Good, the Bad and the Ugly."
   -- Anonymous

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Security Quick Reference

2001-07-11 Thread Bob Bell

On Sun, Jul 08, 2001 at 04:02:58PM -0400, Ed Robitaille <[EMAIL PROTECTED]> 
wrote:
> I pulled the  attached from LinuxSecurity.com. Just a little
> info for any of us newbies lurking. 

Not viewable (or won't run?) for me.  Do you have another format?
Anyone else having difficulties.


Error: /undefined in ~~
Operand stack:
   --nostringval--   --nostringval--   ADO_mxRot
Execution stack:
   %interp_exit   .runexec2   --nostringval--   --nostringval--   --nostringval--   2  
 %stopped_push   --nostringval--   --nostringval--   --nostringval--   false   1   
%stopped_push   2   3   %oparray_pop   .runexec2   --nostringval--   --nostringval--   
--nostringval--   2   %stopped_push   --nostringval--   --nostringval--   
--nostringval--   --nostringval--
Dictionary stack:
   --dict:984/1476(ro)(G)--   --dict:0/20(G)--   --dict:76/200(L)--   
--dict:397/454(L)--   --dict:4/4(L)--   --dict:76/200(L)--   --dict:183/300(L)--
Current allocation mode is local
Last OS error: 2
Current file position is 74068
Aladdin Ghostscript 6.01: Unrecoverable error, exit code 1


-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "If somebody took a gun and pointed at me and said write proprietary
  software or I'll shoot, I think under those circumstances, I'd be
  justified in writing some proprietary software, although I think that
  it would be very buggy and would never get to work reliably."
   -- Richard M. Stallman, Founder, Free Software Foundation

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: sound cards

2001-06-27 Thread Bob Bell

On Wed, Jun 27, 2001 at 11:22:58AM -0400, Derek D. Martin <[EMAIL PROTECTED]> wrote:
> Anyone know of a decent PCI sound card which all its features
> (i.e. on-board MIDI sequencer, off-board MIDI, etc.) work properly
> under Linux?

You might want to consider products based on the Trident 4DWave
chip.  Trident has historically been very good about giving out
information on their chip, including (I believe) writing a basic open
source driver themselves.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "There are two major products to have come out of Berkeley:
  LSD and UNIX"
   -- Author Unknown

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Open Formats (was ZD on Linux)

2001-06-19 Thread Bob Bell

On Tue, Jun 19, 2001 at 02:05:28PM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
>   The whole "all the world runs Microsoft Office" perception is a problem, but
> that is a different sort of problem.  There already are open format
> alternatives; it is just getting people to use them is hard.

I had read (source unknown, but I think it was a ZD pub) that the
next (?) version of MS Windows will move heavily to XML.  It is my
recollection that the Windows registry and MS Office file formats will
move to XML.  I wonder what this will do for interoperability?

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "One reason that few people are aware there are programs running the
  internet is that they never crash in any significant way: the free
  software underlying the internet is reliable to the point of
  invisibility. "
   -- Glyn Moody at http://www.guardianunlimited.co.uk/

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Mail and Linux redux

2001-05-31 Thread Bob Bell

On Thu, May 31, 2001 at 09:25:32AM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> On Wed, 30 May 2001, Bob Bell wrote:
> > No, you cannot.  Mutt does not speak SMTP.  The idea is that that's what
> > the MTA is for.  Mutt adhere's strongly to the "do one thing and do it
> > well" philosophy.
> > 
> > This is an oft-debated and very hot topic, and not one that we need to
> > discuss here.  There was a lot of discussion no more than 2 weeks ago on
> > the mutt-dev list.  If you are interested, check there first.
> 
>   Easy, killer.  :-) 

Sorry if I came off that way.  That wasn't my intent (though I can
see how my email could be read that way).

>   As far as the mutt-dev mailing list goes, this isn't the mutt-dev mailing
> list, and (no offense) just because you were involved in a long debate over
> something there doesn't mean the topic is now forbidden here.  :-)

No, but if the topic were to be discussed, I would hope that people
would be willing to go over the already-presented material from the
mutt-dev mailing archives.  Saves everybody a lot of time rehashing old
arguments.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Computers may be stupid, but they're always obedient.
  Well, almost always."
   -- Larry Wall, creator of the Perl programming language

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Mail and Linux redux

2001-05-30 Thread Bob Bell

On Sun, May 27, 2001 at 07:39:40PM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> On 27 May 2001, Ed Robitaille wrote:
> > Mutt, once you have it tuned is really a great program. It does use POP to
> > pull in mail and it looks like it has hooks that will allow me to possibly
> > weed-out incoming mail. I'll soon know.
> 
>   See if it has a feature to send mail directly to another SMTP server.  If
> so, you can avoid a lot of hassle by simply sending all mail out through your
> ISP.

No, you cannot.  Mutt does not speak SMTP.  The idea is that that's
what the MTA is for.  Mutt adhere's strongly to the "do one thing and do
it well" philosophy.

This is an oft-debated and very hot topic, and not one that we need
to discuss here.  There was a lot of discussion no more than 2 weeks ago
on the mutt-dev list.  If you are interested, check there first.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Mail and Linux redux

2001-05-30 Thread Bob Bell

On Sun, May 27, 2001 at 05:06:34PM -0400, Ed Robitaille <[EMAIL PROTECTED]> 
wrote:
> Mutt, once you have it tuned is really a great program. It does use POP
> to pull in mail and it looks like it has hooks that will allow me
> to possibly weed-out incoming mail. I'll soon know. 

You might want to consider a different configuration: use fetchmail
to download your mail to a local mail spool, and then run mutt to read
mail from the local spool.  This is the preferable way to handle POP
mail.  POP support in mutt has been much maligned...

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "The obvious mathematical breakthrough [to break modern encryption]
  would be development of an easy way to factor large prime numbers."
   -- Bill Gates from "The Road Ahead," p. 265.

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Mail client for both Linux and W32

2001-05-28 Thread Bob Bell

mutt will also run in Windows, using CygWin.  To pull mail from the
server, however, you'd have to use fetchmail.  I'm not sure if that runs
in CygWin.
http://unixmail-w32.sourceforge.net/

On Mon, May 28, 2001 at 10:24:53AM -0400, Kenneth E. Lussier <[EMAIL PROTECTED]> 
wrote:
> The only one's that I can think of are Netscape, Mozilla, and Pine. 
> 
> C-Ya,
> Kenny
> 
> Randy Edwards wrote:
> > 
> >Can someone suggest a mail client which runs under both Linux and Win32
> > and which uses the same file format directory structure in each?
> > 
> >This is for a laptop with a WinModem where one must dial out in Windows
> > to the ISP and send/receive mail.  However, the desire is to actually
> > read/reply to mail under Linux storing the files on a VFAT partition.
> > Anyone know of a mail client that will meet such criteria?  TIA.
> 
> **
> To unsubscribe from this list, send mail to
> [EMAIL PROTECTED] with the following text in the
> *body* (*not* the subject line) of the letter:
> unsubscribe gnhlug
> **
> 

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Netscape Question.

2001-05-10 Thread Bob Bell

On Thu, May 10, 2001 at 12:58:18PM -0700, Ken Ambrose <[EMAIL PROTECTED]> wrote:
> On Thu, 10 May 2001, Bob Bell wrote:
> > Did you blow away (or rename) ~/nsmail as well?
> 
> Note: may I heartily recommend that you *NOT* "blow away" ~/nsmail?  This
> would, after all, _DELETE_ all e-mail currently in any of your local
> mailboxes, including your Inbox...

Hence "(or rename)".  You can "blow it away" if you make a copy of
it first...  Sorry if I assumed that people would know that nsmail
contains Netscape mail.  The key here is removing a corrupted mail
file, or the like.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: Netscape Question.

2001-05-10 Thread Bob Bell

On Wed, May 09, 2001 at 05:52:14PM -0400, Wayne <[EMAIL PROTECTED]> wrote:
> I'm having a problem with Netscape,s messenger.
> After selecting the icon to get my mail, the dialog
> window appears and start to pull my mail down.,
> but it only get one message and then hangs. In
> desparation I deleted everything that was
> in directory .netscape . Then I sign on again
> to let netscape recreate the netscape tree.
> I'm still havingthe same problem. Can anyone
> help here.

Did you blow away (or rename) ~/nsmail as well?

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Windows XP is stable! ...

2001-04-24 Thread Bob Bell

http://www.zdnet.com/anchordesk/stories/story/0,10738,2710551,00.html

The No. 1 complaint I hear from people using Windows 95, 98, and Me is
that these operating systems crash too often--and they're right. My home
system crashes, and I suspect yours does, too, particularly if you set
it to suspend during inactivity and then hope it resumes on cue. 

WINDOWS 2000 DOES a much better job than previous versions in the
stability department. I can run my notebook for two to three weeks
between reboots, even when suspending and resuming a dozen times a day.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Testing shows the presence, not the absence, of bugs."
   -- Edsger W. Dijkstra, University of Texas

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: OpenSSH, Secure CRT and Public Key authentication

2001-03-30 Thread Bob Bell

On Thu, Mar 29, 2001 at 08:21:24PM -0500, James R. Van Zandt <[EMAIL PROTECTED]> 
wrote:
> ping uses gethostbyname successfully:
> 
> However, ssh is using getaddrinfo instead, and failing:
>   getservbyname("ssh", "tcp")   = 0x4020bc1c
>   snprintf("22", 32, "%d", 22)  = 2
>   getaddrinfo("vanzandt.mv.com", "22", 0xb2bc, 0xbfffee94) = -2
>   gai_strerror(-2)  = "Name or service not known"

I'm not sure what this means for fixing the problem, but getaddrinfo is a
new call that supports both IPv6 and IPv4 addresses.  It's possible that you're
having problems trying to resolve the hostname into an IPv6 address.  It's had
to tell without knowing the contents of the last 2 parameters to getaddrinfo.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Where a calculator on the ENIAC is equipped with 18,000 vacuum
  tubes and weighs 30 tons, computers in the future may have only
  1,000 vacuum tubes and weigh only 1.5 tons. "
   -- Popular Mechanics, March 1949

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: An issue and a question.

2001-03-29 Thread Bob Bell

On Wed, Mar 28, 2001 at 02:36:50PM -0500, Greg Kettmann <[EMAIL PROTECTED]> wrote:
> The other issue is technical.  For those that didn't know, MediaOne /
> AT+T Broadband stinks.  Actually, and to be honest, it's a love hate
> relationship.  The fact is their infrastructure is very weak.  In
> particular their DNS server seems to be down or incredibly slow as often
> as not.  My Linux Firewall is running DNS Caching but that's not always
> a big enough help.  Any suggestions on how I can circumvent this
> problem?  I'm a Network Architect not a System Administrator so keep
> your answers conceptual and I'll dig up the details.

I used AT&T for my cable modem service in Nashua, and I run my own
DNS server on my Linux multi-purpose (including firewall).  I just set
it up as a real DNS server, I have never had any problems.  In fact, I'm
very happy with my cable modem service, perhaps just because I wound up
working around the one issue you've found.

I think that I learned how to setup up BIND from a HOW-TO available
at www.linuxdoc.org.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: csh read file question

2001-03-28 Thread Bob Bell

On Wed, Mar 28, 2001 at 08:40:21AM -0500, Jeffry Smith 
<[EMAIL PROTECTED]> wrote:
> > Maybe.  Some U*ixes don't let you change your own shell.  You may need
> > to get the system administrator to change it for you.
> 
> or just have a "sh" command run on start-up.

Indeed, this is what I do here at work.  Some of our machines have
bash installed, but Tru64 won't let you change your shell to something
not in the /etc/shells file.  Since bash isn't on all machines, I
wouldn't want to set it as my shell, as that would mean that I couldn't
log onto some machines.

Instead, I have ksh (a decent shell for programming, but bash
interacts more nicely) as by default shell.  When I log in, my .profile
checks a file to see if this host is in the list of hosts that can run
bash (because it's NFS automounted, it's available on some machines on
which it won't execute).  If the current host can run bash, I then find
where it is installed.  If that succeeds, I then run bash with
'--login'.

I used to 'exec' bash, but occassionally ran into problem where if
bash failed to start properly, I wouldn't be able to log in at all.
Instead, I run bash from my login shell (ksh).  I have a one line
.bash_logout file which reads 'exit 0'.  My login shell (ksh) checks the
return from bash.  As long as it is 0, it knows bash was able to run
successfully, and exits the login shell when bash exits.

This has worked like a charm so far...

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: Fwd: ALERT - A DANGEROUS NEW WORM IS SPREADING ON THE INTERNET

2001-03-23 Thread Bob Bell

On Fri, Mar 23, 2001 at 08:31:49PM -0500, Derek D. Martin <[EMAIL PROTECTED]> wrote:
> There are lots of reasons for people to not have these things fixed.
> The largest one is ignorance.  You can't fix something you don't even
> know is broken.

Minor nit pick, but in some cases you can.  I happened to wind up
with an updated BIND simply by running Red Hat's up2date.  I paid
attention, since I knew about the BIND vulnerability, but had I known
nothing, I still would have worked around the problem.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "So right now the only vendor that does such a stupid thing is
  Microsoft."
   -- Linus Torvalds on bad file system interface design

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: CERT Advisory CA-2001-04 (another reason to look towards Linux)

2001-03-23 Thread Bob Bell

On Fri, Mar 23, 2001 at 08:26:38AM -0500, Taylor, Chris <[EMAIL PROTECTED]> wrote:
> Just for those of you who have not seen the bulletin, there is yet another
> reason to look towards Linux.

My understanding is that this has nothing to do with Microsoft
Windows.  This will likely only affect you if you go to a website, and
your web browser ask you if you want to accept a certificate.  Since it
says "signed by Microsoft Corporation", you might be more inclined to
say "yes".  However, here the certificate actually belongs to a
third-party, and could conceivably be signing malicious code.

This is not related to MS Windows.  The error here was made by
VeriSign, not Microsoft, who was tricked into believing that the
individual who registered the certificate was an authorized Microsoft
employees.  The only thing that one could possibly blame Microsoft for
is that Internet Explorer doesn't automatically check to see if a
certificate has been revoked by VeriSign.  However, I'm not sure if any
other browsers do, either.  It may also be true that these certificates
are limited to ActiveX controls, but they just as well could have been
issued for other purposes.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Parentheses in Perl are like shoes in the Caribbean."
   -- Larry Wall, creator of the Perl programming language

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: NICs

2001-03-19 Thread Bob Bell

On Sun, Mar 18, 2001 at 06:57:55PM -0500, Kenneth E. Lussier <[EMAIL PROTECTED]> 
wrote:
> I like the NetGear, personally. LinkSys is pretty good, as well (uses
> the NE2000 driver). And, I can say that I haven't had any trouble with
> Intel EEPro's.

I also have had good luck with Netgear FA310TX's, in both Windows and
Linux.  I believe the Linksys cards mentioned elsewhere are closely
related.  Both are very inexpensive: $15-20.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Computers are like air conditioners -- they stop working properly
  if you open WINDOWS."
   -- Humorix (http://i-want-a-website.com/about-linux/)

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: Netscape Mail NT -> Linux migration question

2001-03-02 Thread Bob Bell

On Fri, Mar 02, 2001 at 04:03:47PM -0500, Dave Cherkus <[EMAIL PROTECTED]> 
wrote:
> I've looked at the mail with pine, mutt and netscape from all three
> platforms (well, there's no mutt for win32).

A number have had successful compiling mutt with CygWin.  For
example, look here: http://unixmail-w32.sourceforge.net/

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "If Gates is going back into programming and design, this is the
  best thing that ever happened to Linux."
   -- Jon "maddog" Hall, Linux evangelist

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: djbdns

2001-02-26 Thread Bob Bell

On Sat, Feb 24, 2001 at 05:05:19PM -0500, Tony Lambiris <[EMAIL PROTECTED]> 
wrote:
> Derek Martin wrote:
> 
> > As far as the message showing up, it was simply yet another ^X vs. ^C
> > error (in pine)... Time to start using mutt full-time.  
> 
> apl@orion:~/pine4.33/pine$ grep -r strcat * | wc -l
>  72
> apl@orion:~/pine4.33/pine$ grep -r strcpy * | wc -l
> 474
> 
> -
> 
> apl@orion:~/mutt-1.2.5$ grep -r strcpy * | wc -l
>  36
> apl@orion:~/mutt-1.2.5$ grep -r strcat * | wc -l
>  27
> 
> :)

I'm not sure whether the point here is that mutt's numbers are fewer
than pine, or that both are non-zero.  If the latter, consider the
following results from mutt-1.3.15.

$ grep strcpy * */* | wc -l
18
$ grep strcpy * */* | grep -v mutt_substrcpy | wc -l
15
$ grep strcpy * */* | grep -v mutt_substrcpy | grep -v \
  __STRCPY_CHECKED__ | wc -l
0
$ grep strcat * */* | wc -l
23
$ grep strcat * */* | grep -v __STRCAT_CHECKED__ | wc -l
        0

I'd put a lot more faith in that than I would Netscape 4.76.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Good judgement comes from experience, and experience comes
  from bad judgement."
   -- Frederick Brooks

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**




Re: time

2001-02-14 Thread Bob Bell

On Wed, Feb 14, 2001 at 08:50:31AM -0500, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> > 1) make a user for Gnome and a user for KDE
> 
>   Separate users is not a good idea.  You want one account for yourself;
> otherwise, you won't be able to access your own files.

You might be able to make two users with different home directories,
but with the same user id.  On my systems I use an account called
'rootbob' which is the root user, but with my customizations.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: VIRUS ALERT!

2001-02-12 Thread Bob Bell

On Mon, Feb 12, 2001 at 12:12:27PM -0800, Karl J. Runge <[EMAIL PROTECTED]> wrote:
> Does anyone know if microsoft.com provides a free version of "OutLook"
> with VB-scripting that runs on Win95?

Outlook Express comes with Internet Explorer...

> A month or two back I hacked up a script to run vmware on attachments
> in a `sandbox' environment. I'd love to add "LookOut / VBscript" to my
> sandbox to run these things! (But I tell ya, I was mighty damn
> disappointed with that "Snowhite + 7 dwarfs" thingie... And I likely will
> be with AnnaKournikova.jpg.vbs as well! ;-)

You'll still wind up sending emails out to everyone in your address
book, unless you've dummied up your network config somehow.  Of course,
your address book will likely be empty...

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Microsoft is not the answer.
  Microsoft is the question.
  Linux is the answer."
   -- Humorix (http://i-want-a-website.com/about-linux/)

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Warning Banner?

2001-02-12 Thread Bob Bell

On Mon, Feb 12, 2001 at 03:11:04PM -0500, Rodent of Unusual Size <[EMAIL PROTECTED]> 
wrote:
> Peter Cavender wrote:
> > 
> > Hack the source for login.  Not too hard.  I've customized mingetty
> > and login on RedHat.  I can help if you need. What distro you running?
> 
> Eeuw.  Unfortunately, since /bin/login is one of the main
> cracker target files, this will always cause my security
> checks to show a false positive because it will not match
> the RPM checksums.
> 
> Sounds like an opportunity for a configuration option in a
> future release of login..
> 
> RH 6.2.

How about editing the source from a source RPM?  After rebuilding
the source RPM, you've got both a patch to submit to the maintainer, and
a working version that should match your (new) RPM checksum checks.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Think of me as CVS with brains."
   -- Linus Torvalds, creator and maintainer of the Linux operating system

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: sig in pine

2000-12-14 Thread Bob Bell

On Thu, Dec 14, 2000 at 12:49:01PM -0500, Kurth Bemis <[EMAIL PROTECTED]> wrote:
> i remember a while ago that there was a hack or a script to make pine grab
> a fortune and stick it in your sig every time that pine called your .sig
> file.  So that each time you sent a mail a diff fortune was in it.
> 
> does anyone know how to do this?

You can use a named pipe, so that when pine thinks it is reading a
file, it is really reading the output of a program.  However, I think
pine has built-in support for signature-generating programs now.  Mull
over your option at freshmeat.

However, you should be using mutt anyway... :-)

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: (Off-topic Humor) GNUs also build houses!

2000-12-08 Thread Bob Bell

On Fri, Dec 08, 2000 at 01:27:21PM -0500, Paul Lussier <[EMAIL PROTECTED]> wrote:
> So, the question I have is:
> 
>   Is the author of this page aware that gnus really do exist? :)

If he wasn't before, he is now -- I already sent him an email about
it :-)  I can only guess that he had only seen GNU in the context of the
FSF and assume that the drawing was an imaginary creature?

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "The box said "Requires Windows 95 or better."  I can't understand
  why it won't work on my Linux computer."
   -- Humorix (http://i-want-a-website.com/about-linux/)

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Managing services on two NICs

2000-12-04 Thread Bob Bell

I've got an appointment to get cable modem Internet access installed
Tuesday (woohoo!).  After they hook me up on my Windows box, I'll be
looking to resetup service on my dedicated Linux box with two NICs.  One
will speak to the cable modem and rest of the world, and the other will
speak to my local network (only 1 other system currently) and provide IP
masquerading.

I haven't found any good information yet on how I can set up
services on those two network cards (with different addresses)
differently.  For instance, I may want to run DNS locally but not
externally, or I may want to have FTP or Apache configured differently
depending on the network.  Does anyone have any good information on
this, or pointers to some?

Thanks for your help.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Windows 98: n. minor bug-fix/patch release of 32-bit extensions
  and a graphical shell for a 16-bit patch to an 8-bit operating
  system originally coded for a 4-bit microprocessor, written by a
  2-bit company that can't stand 1 bit of competition."
   -- Author unknown

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Cable modems

2000-11-28 Thread Bob Bell

Now that AT&T is added broadband Internet access in Nashua via
cable "modems", I need to figure out whether I should buy a cable modem
or rent one from AT&T for $10/month.  I'd thought I'd ask this group for
its advice.

First, does anyone have an opinion or renting the cable modem or
buying one in general?  Pros, cons, and recommendations?

Secondly, I'm really interested in the specific cable modem.  I went
to Circuit City (where AT&T says to get the modem from), and they are
selling the Toshiba PCX1100 for $200, and there's also a $50 rebate.
The price doesn't sound so bad.  I remember hearing some things on the
list about the Toshibas, though.  Circuit City wouldn't say what modems
AT&T would be leasing out, except to claim that they all have the same
performance.  Recommendations and advice are appreciated.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "If Gates is going back into programming and design, this is the
  best thing that ever happened to Linux."
   -- Jon "maddog" Hall, Linux evangelist

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: ignoring "blinking" dialtone

2000-11-15 Thread Bob Bell

On Wed, Nov 15, 2000 at 03:59:57PM -0800, Ken Ambrose <[EMAIL PROTECTED]> wrote:
> Time to use AT command set stuff: ATX4 and higher (eg. ATX7) pay attention
> to dialtone -- ATX3 and lower don't.  To make your modem really dumb, but
> very compatible, go with ATX1 -- you'll have to plug it in to your modem
> initialization string, or else you can bring up minicom and do something
> like this:
> 
> atx1
> OK

I think this will ignore the busy signal as well, which may be
undesirable.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "We didn't go to the altar, never swore allegiance or anything like
  that."
   -- Andrew Grove, Intel chairman, regarding the "Wintel duopoly"

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: ignoring "blinking" dialtone

2000-11-15 Thread Bob Bell

On Wed, Nov 15, 2000 at 06:13:13PM -0500, Mjo <[EMAIL PROTECTED]> wrote:
> Anyway, now that my parents need to be on the net through my machine, they need
> to be able to dial it when I'm not here.  So I'd like the dialer to ignore the
> blinking dialtone when I have messages.  I want them to be able to have access,
> but don't want them checking my phone messages all the time.  My isp dumps me
> too often to rely on just dialing up before I leave.
> 
> Anyone know how to get the dialer to do this?  I know it's possible.

Your modem is the one refusing to dial, returning "NO DIALTONE".
Try dialing with "ATX3DT5551212" instead of "ATDT5551212" and see what
happens.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Professionals built the Titanic, amateurs built the Ark."
   -- Author unknown

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: DNS Woes

2000-11-09 Thread Bob Bell

On Thu, Nov 09, 2000 at 02:30:02PM -0500, Derek Martin <[EMAIL PROTECTED]> wrote:
> Nonsense.  If you have your own DNS server, it can do Internet queries
> when your link comes up.  If the link goes down, you still need it to do
> local queries (the scenario here is most likely the DNS server is running
> on the machine that brings up the link).  There SHOULD be a way to prevent
> the overwrite.

This is the situation I have at home.  I have my dedicated Linux box
serve DNS.  When I connect over ppp, it could be to at least two
different networks, with different DNS servers.  I modified the ip-up
scripts in /etc/ppp to update named.conf to put the DNS servers in the
forwarders section on named.conf and restart named.

Attached is the ip-up.local file I am using.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Felten, who examined the secret "source code" for Windows 98 under
  a court order, said he had found 3,000 bugs marked by Microsoft
  programmers in the portion of Windows 98 he had examined -- and he
  had looked at only one-seventh of it."
   -- http://www.zdnet.com/zdnn/stories/news/0,4586,2273581,00.html


#!/bin/sh
if [ "$PEERDNS" != no -a -n "$DNS1" ] &&
   tr=`mktemp /tmp/named.XX` ; then
current_replacement="$DNS1"
next_replacement="$DNS2"
forward_next="no"
(cat /etc/named.conf ; echo EOF ; echo EOF) | while read answer ; do
case "$answer" in
*"}"*)
forward_next=no
;;
esac
if [ "$forward_next" = yes ] && [ -n "$current_replacement" ] ; then
echo "$current_replacement" >> $tr
if [ -n "$next_replacement" ] ; then
current_replacement="$next_replacement"
next_replacement=
else
current_replacement=
fi
elif [ "$answer" != EOF ] ; then
echo "$answer" >> $tr
fi
case "$answer" in
*"forwarders {"*)
forward_next=yes
;;
esac
done
cat $tr > /etc/named.conf
rm -f $tr
/etc/rc.d/init.d/named restart
fi
exit 0



Re: What to do with a DS10 Alpha

2000-10-20 Thread Bob Bell

On Fri, Oct 20, 2000 at 10:08:23AM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> Some one recently asked me to provide a list of things one could do with a 
> DS10.  I came up with a bunch of the usual things like a rackful of them to 
> create a beowulf, etc. but I'm wondering what other *really cool* things a 
> DS10 could be used for that would justify it's purpose over that of a 
> similarly configured Intel box.

A rack of DS10Ls is even better for clustering -- all the fun of a
DS10 in a super slim package.  I just visited our website and saw that
we have a buy 10, get 2 free deal!  I don't think I've ever personally
seen that kind of marketing approach in the server market.  You'd think
they were candy bars or something!

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Preach the Gospel at all times. If necessary, use words."
   -- St. Francis of Assisi

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



X Computing for RH7 CDs?

2000-10-16 Thread Bob Bell

I'm looking to finally get my hands on Red Hat Linux 7.0 Intel CDs
so I can update my systems at home.  Unfortunately, downloading 2 CDs
over a 33.6 modem is not really an option.  I've looked around, and X
Computing (http://www.xcomputing.com/) appears to be the cheapest place
to get pressed RH7 CDs.  I was wondering if any one had experience with
them before I place an order.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "The box said "Requires Windows 95 or better."  I can't understand
  why it won't work on my Linux computer."
   -- Humorix (http://i-want-a-website.com/about-linux/)

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: ZDNet story link on the Q

2000-10-12 Thread Bob Bell

On Thu, Oct 12, 2000 at 08:44:17AM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> Hmm, rebranding, didn't DEC do this by going from blue text on white to 
> white text on red?  I wonder if that means the "red Q" will be a white Q on 
> red? :)

Actually, some of the new ads I've seen include (in part) white text
(whole sentences, though) on a red background :-)

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "I definitely think that open-source is a revolution and not hype...
  It's little known, but the schematics of the Apple I were actually
  handed out at the Homebrew Computer Club before we started Apple."
   -- Steve "Woz" Wozniak, inventor of the Apple Computer

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: ZDNet story link on the Q

2000-10-11 Thread Bob Bell

On Wed, Oct 11, 2000 at 09:04:54PM -0400, Derek Martin <[EMAIL PROTECTED]> wrote:
> On Wed, 11 Oct 2000, Bayard Coolidge USG ZKO3-3/S20 wrote:
> > The origin of the name 'Compaq' was that their first product was
> > "compact" (and it was the first relatively compact PC) and the
> > Q stands for Quality, which is what they pride themselves on.
> 
> Thanks for that little bit of trivia Bayard... I didn't know that!
> 
> But I still think it's a bit odd...

Well, when I was at employee orientation in Stow, Mass. about a year
ago, they really seems to push the red "Q" as our identifying logo.  Of
course, now we just started the process of "rebranding" ourselves.  I
think we're emphasizing that our technology is an enabler for people, or
something.  Whatever...

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Windows is popular enough that if they declare a standard they will
  need to do the work to support it on Windows without our being
  involved.  We do _not_ want to ship the 'standard' with Windows
  because we want to make the native APIs more attractive."
   -- Bill Gates, Microsoft CEO, regarding Microsoft's take on Java

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



MaxiCode

2000-10-10 Thread Bob Bell

[ Regarding UPS-style "bar" codes ]

Wow, these guys seem very committed to open standards.  Very refreshing.
>From the FAQ:

Q. Is a license required to use MaxiCode?
A. No. MaxiCode is a public domain symbology and no license is required
in order to use it.

Q. Who should I contact in order to obtain a license to use MaxiCode?
A. No one. Hang up the phone. MaxiCode is a public domain symbology and
no license is required in order to use it.

:-) And best yet, further down...

Q. What's the cost to obtain a license to use MaxiCode?
A. Come closer. (closer.) MaxiCode is a public domain symbology!!! This means
no license is required to use it. You don't have to ask permission. You don't
have to pay anybody. Just use it, and be comfortable in the knowledge that
indeed some of the best things in life ARE free!

All seems very refreshing.  It looks like it might be a little difficult
to get your hands on the actually standard without paying money, though.
Hopefully, that's not the case.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Linux represents a best-of-breed Unix, that is trusted in mission
  critical applications, and -- due to it's open source code -- has
  a long term credibility which exceeds many other competitive OS's."
   -- Microsoft "Halloween" Document

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Looking for a good system case

2000-10-03 Thread Bob Bell

On Tue, Oct 03, 2000 at 02:25:17PM -0400, Michael O'Donnell <[EMAIL PROTECTED]> wrote:
> I'm in the market for new Linux box
> (I've pretty much decided it'll be based
> on an AsusA7V+850MhzTbird+256Mb - drool!)
> I'd really like a good enclosure with lots
> of room, providing excellent access to all
> components, optimal airflow, intelligent
> drive-bay placement, not too ugly and oh,
> yeah - reasonably priced.  Suggestions?

I recommend you check out the reviews at Ars Technica
(http://www.arstechnica.com/) and then balance you need for features
with your budget.  I found Ars to be a good source for info on quality
cases.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "World domination, of course. And scantily clad females. Who cares
  if it's twenty below?"
   -- Linus Torvalds, creator of the Linux operating system

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: What would this do to our LUGS and the Open Source Community?

2000-09-15 Thread Bob Bell

On Fri, Sep 15, 2000 at 11:06:06AM -0400, Lori Hitchcock 
<[EMAIL PROTECTED]> wrote:
> WRITE YOUR REPRESENTATIVES
> 
> 
> VOTE NO ON Bill 602P
> I guess the warnings were true. Federal Bill 602P 5-cents per E-mail
> It figures! No more free E-mail! We knew this was coming!

Whenever you see somthing like this, check it out at a few "Urban Legends"
sites (http://directory.google.com/Top/Society/Urban_Legends/).  Today I found
"The Urban Legend Combat Kit", which appears to have some good replies for
those who refuse to believe that critically important story they posted was a
hoax (http://urbanlegends.about.com/ is pretty good, too).  For this one, it
says:


Thank you for forwarding me the "postage surcharge" story.  
Fortunately, the story you sent me is a well-known urban legend.  I 
have attached an excerpt from an article on this urban legend I 
recently read on the Internet TOURBUS.  

By the way, if you do not yet subscribe to TOURBUS, I strongly 
recommend that you do.  TOURBUS is a free, semi-weekly Internet 
newsletter that tells you about the latest Internet sites and helps 
you debunk the latest Internet urban legends.  I have included 
TOURBUS subscription information at the bottom of this message.

---
Urban Legend Update: Postage Surcharge Story -- 1 June 1999
---

About a month ago, a story circulated around the Net warning Canadians 
that

... Bill 602P will permit the Federal Govt to charge a 5 cent 
surcharge on every email delivered, by billing Internet Service 
Providers at source. The consumer would then be billed in turn by 
the ISP.  Toronto lawyer Richard Stepp QC is working to prevent 
this legislation from becoming law. 

The Canada Post Corporation is claiming that lost revenue due to 
the proliferation of email is costing nearly $23,000,000 in 
revenue per year ...

The letter goes on to warn that

... One back-bencher, Liberal Tony Schnell (NB) has even 
suggested a "twenty to forty dollar per month surcharge on all 
Internet service" above and beyond the government's proposed 
email charges ...

Fortunately, the letter is yet another Internet hoax.  According to 
a recent column in the Toronto Sun,

Don't rush to the keyboards and phones.  The lawyer does not 
exist.  The law firm whose name appears on the alert does not 
exist.  There is no MP named Schnell.  Forget Bill 602P; that's 
not even the way bills are numbered.

[quote shamelessly stolen from David Emery's "Email Tax for 
Canada" column, which we will talk about in a moment ... maybe.]

Proving the old saying "everything old is new again," here is a recent 
story that has been floating around the Net.  See if you notice any 
similarities.  The story says that

Bill 602P will permit the [US] Federal Govt to charge a 5 cent 
surcharge on every email delivered, by billing Internet Service 
Providers at source.  The consumer would then be billed in turn 
by the ISP.  Washington D.C. lawyer Richard Stepp is working 
without pay to prevent this legislation from becoming law. 

The U.S. Postal Service is claiming that lost revenue due to the 
proliferation of email is costing nearly $230,000,000 in revenue 
per year.

The letter goes on to warn that

One congressman, Tony Schnell (r) has even suggested a "twenty to 
forty dollar per month surcharge on all Internet service" above 
and beyond the government's proposed email charges

Deja vu?  Yep.  The message floating around the Net right now is 
almost word for word the same message that floated around Canada in 
May.  [I particularly enjoyed the fact that Mr. Schnell was able to 
switch from being a Canadian Liberal to being an American Republican 
in less than a month -- ain't technology wonderful?!]

For the record, both stories are hoaxes.  Neither Canada nor the US is 
considering an email surcharge.  Neither Canada nor the US has a 
lawmaker named "Tony Schnell" [that's what happens when you jump 
parties!].  Neither Canada nor the US has a bill 602P (in Canada, 
bills from the Senate begin with the letter S and bills from the 
Commons begin with the letter C; in the US, bills from the Senate 
begin with the letter S and bills from the House begin with the letter 
H).  Finally, neither Toronto nor Washington has a lawyer named 
Richard Stepp.

... and, no, Australia isn't considering an email surcharge either. :P

For more information about this story, visit David Emery's new site at

http://urbanlegends.about.com/


-- 
Bob Bell <[EMAIL PROTECTED]>

Re: Linux Engineer Position

2000-09-14 Thread Bob Bell

On Thu, Sep 14, 2000 at 06:57:13PM -0400, Derek Martin 
<[EMAIL PROTECTED]> wrote:
> These apps sound interesting... I'll have to check them out.  Though mutt
> is out for me; all my mail is on IMAP servers. :(

Umm, so's mine.  I'm responding to this mail from an IMAP server.
While some people like to use fetchmail, mutt 1.2 and 1.3 (development
branch) have good IMAP support.  I run mutt from CVS, and would actually
recommend it, or the latest development version.  It's quite stable and
has a number of IMAP performance enhancements.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "During my service in the United States Congress, I took the
  initiative in creating the Internet."
   -- An apparently confused Vice President Al Gore

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Linux Engineer Position

2000-09-14 Thread Bob Bell

On Wed, Sep 13, 2000 at 07:23:52PM -0400, Derek Martin 
<[EMAIL PROTECTED]> wrote:
> text?  Why should I, the recipient, be forced to launch some lame, bloated
> application (microsoft or otherwise) just to read a five-line e-mail?
> 
> In practice, the answer is, I don't.  The e-mail goes unread.  As did this
> one.

While I agree in principle, in this case you don't have to launch a
lame, bloated application.  Use OSS!  In my case, mutt reads the email,
invokes wvHtml on the attachment, w3m dumps the resulting HTML file to
text, and mutt appends that to the message, which is then pageable as a
whole within mutt.  So it looks just like a text attachment.  I almost
didn't even noticed it was a Word attachment.

P.S.  If you're wondering, I've been contributing a little to mutt,
hence my enthusiasm and advocacy. :-)

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Microsoft has never been an innovator - it's a fast follower.  And
  when you're as big and dominant as Microsoft, and growing at 30 or 40
  percent a year, it gets harder and harder to find people to be fast
  followers of."
   -- Paul Saffo, Institute for the Future

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Reading word documents (was Re: Linux Engineer Position)

2000-09-13 Thread Bob Bell

On Wed, Sep 13, 2000 at 03:13:47PM -0400, Rich Payne <[EMAIL PROTECTED]> 
wrote:
> OK, I usually don't complain about these thingbut sending a 30K MSWord
> attachment to a Linux list for a Linux job just isn't groovy in my book. I
> know I wouldn't want to work for you

Agreed, but on a related note, I must say that my combination of
mutt, wvHtml, and w3m handled that *very* nicely.  Much nicer than
MS Outlook, I'd wager.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "It's only a movie. People should get a life."
   -- George Lucas, Star Wars creator, regarding The Phantom Menace

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Dynamic DNS (was Re: Two Questions (NT Server) and (Linux Numbers)).

2000-09-07 Thread Bob Bell

On Thu, Sep 07, 2000 at 11:54:38AM -0400, Rich Payne <[EMAIL PROTECTED]> 
wrote:
> http://www.dyndns.com
> http://www.ods.org/
> 
> 
> I'm sure there's more.

From my bookmarks (I believe these are all free):
http://www.myip.org/
http://soa.granitecanyon.com/
http://www.easydns.com/ (with paid domain registration)

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "If Linux is going to succeed, its needs to be not only
  open-source, but open-minded."
   -- Ransom Love, Caldera Systems CEO

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Netscape removing file extensions

2000-08-24 Thread Bob Bell

Okay, actually I'm seeing this on my Tru64 workstation, but if you
can bear with me, I think it's similar enough to Netscape on Linux.
Basically, at some undetermined point, Netscape decided that it would
start dropping the .gz extension from the .tar.gz files I download.  It
is *real* annoying.  Note that it doesn't gunzip the file (nor would I
want it to), though I think it does sometimes decide to gunzip files
with a simple .gz extension.

If anyone could help restore the default behaviour (just download it
as is!), I'd appreciate it.  Thanks.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "In general, if you think something isn't in Perl, try it out,
  because it usually is.  :-)"
   -- Larry Wall, creator of the Perl programming language

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Linux 2.4 32bit UID.

2000-08-23 Thread Bob Bell

On Wed, Aug 23, 2000 at 04:28:57PM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> On Tue, 22 Aug 2000, Greg Kettmann wrote:
> > One area which I've heard is that the UID will be increased from 16 bits
> > to 32.  Is this correct ...
> 
>   Yes.
> 
> > ... and where is that documented?
> 
>   The source code.  ;-)

And a good way to get around is with LXR.  You can check on uid_t in
2.4 at http://lxr.linux.no/ident?v=2.4.0-test6;i=uid_t .  Looking
briefly, it appears to be 16-bit for non-kernel code, and 32-bit in the
kernel.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "MSN [the Microsoft Network] has a guy whose full time job is
  walking around rebooting NT Servers as they crash."
   -- Alex St. John, former Microsoft employee

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: GNHLUG mailing list

2000-08-23 Thread Bob Bell

On Wed, Aug 23, 2000 at 12:10:15PM -0400, Derek Martin <[EMAIL PROTECTED]> wrote:
>   Messages sent to the GNHLUG list don't appear to be making it to the
> list, and I'm getting a bunch of bounces from list posts concerning
> connection time-outs sending mail.  Are you guys having mail server
> trouble over there?

It seems to work fine for me.  Of course, I'm here in ZK3, but Adam
Wendt <[EMAIL PROTECTED]> also reported things working.  Perhaps
it's sporadic?

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: This is amusing...

2000-08-17 Thread Bob Bell

On Thu, Aug 17, 2000 at 10:38:31AM -0500, Tony Lambiris <[EMAIL PROTECTED]> wrote:
> Yeah, I remember seeing this posted on Slashdot. Im not sure how I feel 
> about this. On one hand, if they ported Office to Linux, it would 
> probably convert _alot_ more people to Linux. Ive read countless people 
> post that their works would run all linux, but theres no office suite 
> that can handle what they do with MS Office. On the other hand, why 
> can't they just leave us alone, and take the evident failure of Win* 
> with their chins up?=D

I don't believe the positions pointed out are for porting anything
to Linux.  Rather, they are for keeping on top of what's going on in the
Linux arena and helping to analyze what Microsoft needs to do to be
competitive.  Gives credence to the idea that Microsoft views Linux as a
competitor.

-- 
Bob Bell <[EMAIL PROTECTED]>
-
 "Computers are like air conditioners -- they stop working properly
  if you open WINDOWS."
   -- Humorix (http://i-want-a-website.com/about-linux/)

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: dec chipsets

2000-07-27 Thread Bob Bell

On Thu, Jul 27, 2000 at 09:13:45AM -0400, dsbelile <[EMAIL PROTECTED]> wrote:
> does anyone know a list of cards with dec chipsets on them? or direct me
> to a 10/100 pci nic that is dec based.

Are you looking for NICs with Tulip chipsets?  I use the Netgear
310 TX, and have been happy with it.  The Linux Tulip driver home page
is http://www.scyld.com/network/tulip.html and will give you a whole
list of cards.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



ddate

2000-07-18 Thread Bob Bell

This could be what you're looking for
http://jubal.westnet.com/hyperdiscordia/ddate.html
Just for fun, check out http://www.ddate.com/  :-)

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Paranoia (was: CPU comparisons)

2000-07-17 Thread Bob Bell

On Mon, Jul 17, 2000 at 01:44:39PM -0400, Derek Martin <[EMAIL PROTECTED]> wrote:
> On Mon, 17 Jul 2000, mike ledoux wrote:
> > You're worried about privacy and security, yet you would run a Java
> > applet from an untrusted source?
> 
> No silly!  I wouldn't, but that's not the point.

Although you could argue that with a proper Java implementation
(i.e., well-defined sandboxing) you should be able to...

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Host IDs (was: PIII CPU id)

2000-07-17 Thread Bob Bell

On Sun, Jul 16, 2000 at 01:31:49PM -0400, James R. Van Zandt <[EMAIL PROTECTED]> 
wrote:
> 
> Benjamin Scott <[EMAIL PROTECTED]> writes:
> >On Fri, 14 Jul 2000, Karl J. Runge wrote:
> >> Maybe it is all faked on Intel, but on other arches (e.g sparc, alpha)
> >> perhaps it is something on the board... Anyone know?
> >
> >  Such "high-end" or "professional" architectures traditionally have
> >a unique ID embedded in the CPU or motherboard.  For specifics, you'd
> >have to consult someone familiar with the particular hardware you're
> >dealing with.  OEM websites are often good for this.
> 
> On a Silicon Graphics box, I believe gethostid() just returns the IP
> address.

Tru64's DESCRIPTION:
  The hostid command displays the 32-bit identifier of the host as a
hexadecimal number in host standard byte order. The identifier must be
unique across all hosts and is commonly set to the Internet address of the
specified host.  The superuser can set the host ID by specifying a
hostname, internet_address, or hexadecimal_number argument.  The identifier
is stored in network standard byte order.

It appears it is basically the IP address by default, unless the
sysadmin decides to change it.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Why Linux?

2000-07-12 Thread Bob Bell

On Thu, Jul 06, 2000 at 05:23:39PM -0400, Jonathan Eunice <[EMAIL PROTECTED]> 
wrote:
> Btw, in discussing scalability, you might want to keep in mind that 
> the world's fastest TPC-C benchmark (that is, DBMS and OLTP 
> performance) is a Windows 2000 cluster.  At just over 440K tpmC, it 
> beats the fastest Unix competitor (at ~136K tpmC, the IBM S80, a 24x 
> box) by over 3:1.  If you forego absolute performance in favor of 
> price/performance, all ten of the top ten resuls run Windows.  Linux 
> has never run this race. 

I checked it out, and you're right, of course.  IBM has the
highest mark running DB2 on a Netfinity 8500R c/s, which is a Windows
2000 cluster with 128 Xeon 700's.  That's some hefty horsepower.
Note that there were 32 nodes, though, so each node only had 4
processors.  128 processors is the most of result on the chart, but a
number of the others achieved the same result with fewer processors,
and more in the same box.  A cluster of *those* systems would surely
best the result of the W2K cluster.  The most processors used in a
single W2K system appears to be 8.  With a score of 56388.5 tpmC, it
puts it basically 9th for single systems (I'm excluding cluster and
virtually identical submissions from IBM and Bull).

Where can I pick up the W2K cluster?  I can't.  The system
availability is listed as December 7th, 2000.  I can't say I blame
them for advertising way early, though.

OTOH, IBM also has the next item.  It's a non-clustered machine
running IBM AIX on 24 450 MHz RS64-III CPUs and Oracle 8i.  This
machine has been available since March according to the submitted
results.

Also, don't forget the TPC-H benchmark.  From the results, it
appears results have been exclusively W2K for 100 GB databases, and
exclusively Un*x for 300 and 1000 GB databases.

I'm not presenting an argument per se, just trying to make things
clear.  I encourage those interested to research TPC-C more at
http://www.tpc.org/New_Result/tpcc_all.html

Personally, I'm hoping Compaq can submit good results from a
cluster of GS320's (currently listed #2 for single systems).

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Email on Linux

2000-07-12 Thread Bob Bell

On Wed, Jul 12, 2000 at 11:27:52AM -0400, Derek Martin <[EMAIL PROTECTED]> wrote:
> On Wed, 12 Jul 2000, Bob Bell wrote:
> > If you like configuribility (?), I recommend mutt.  Aron Griffis
> > introduced me to it, and with the 1.2 series I've been converted to
> > the point where I'm on the developer's list submitting patches.
> > *Highly* recommended.
> 
> I've been meaning to look into mutt, and I have 2 questions:
> 
> 1) Does it support IMAP?

Yes.  In fact, I use mutt with an IMAP server.  However, it
doesn't keep a local list of messages, so I has to retrieve the
message headers whenever you change folders.  For that reason, some
people use fetchmail instead, as it's a lot quicker.  However, I use
IMAP directly, and it works well for me.

> 2) Does it support encrypted sessions (SSL, SSH, whatever)?

I know that you can use IMAP with SSL in mutt, though I haven't
done so, so I don't know the details.  I did a search for ssh in the
manual and came up with the following setting:

imap_preconnect

Type: string
Default: "" 

If set, a shell command to be executed if mutt fails to establish a
connection to the server. This is useful for setting up secure
connections,
e.g. with ssh(1). If the command returns a nonzero status, mutt gives
up opening the server. Example: 

imap_preconnect="ssh -f -q -L 1234:mailhost.net:143 mailhost.net sleep
20 < /dev/null > /dev/null" 

Mailbox 'foo' on mailhost.net can now be reached as
'{localhost:1234}foo'. 

NOTE: For this example to work, you must be able to log in to the
remote machine without having to enter a password. 



Some info on SSL from the manual:

If Mutt was compiled with SSL support (by running the configure script
with the --enable-ssl flag), connections to IMAP servers can be
encrypted. This naturally requires that the server supports SSL
encrypted connections. To access a folder with IMAP/SSL, you should
use
{[username@]imapserver[:port]/ssl}path/to/folder as your folder path. 



There are several ssl-related variables that can be set.

If you are going to use mutt, plan to allocate some time.  It's one of
those things that's very configurable and powerful, but you've got to
learn about it first.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Email on Linux

2000-07-12 Thread Bob Bell

On Tue, Jul 11, 2000 at 11:00:40PM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> On Tue, 11 Jul 2000, Derek Martin wrote:
> >> I don't want to go back to the Pine/Elm/Emacs days since I've become
> >> spoiled with spell check, easy attachments etc
> > 
> > AFAIK, you can use spell checking with Pine (via the alternate editor
> > command) ...
> 
>   Better yet, newer versions of Pine [1] support a "spell checker" command
> which you can define in setup.  I set my to "ispell".  Thus, [CTRL]+[T] checks
> my messages interactively.

If you like configuribility (?), I recommend mutt.  Aron Griffis
introduced me to it, and with the 1.2 series I've been converted to
the point where I'm on the developer's list submitting patches.
*Highly* recommended.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Help! how do you you undelete??

2000-06-28 Thread Bob Bell

On Wed, Jun 28, 2000 at 10:54:41AM -0400, Suzanne Hillman <[EMAIL PROTECTED]> 
wrote:
> On Wed, 28 Jun 2000, Bob Bell wrote:
> > FWIW, I only commented because I just noticed last week that AdvFS
> > (on Tru64 Unix) let you do 'mktrashcan' to save deleted files,
> > although I don't think it's normally used.
> 
> I recently ran into a version of RedHat (I think it was 6.2, but I *know*
> the vendor who sent the equipment changed things) which had the rm command
> replaced with a command that saved things to a trashcan instead of
> deleting them.
> 
> I think I proceeded to alias the rm command to their command (destroy, I
> think) which actually acted like rm is supposed to.

Having a trashcan at the file system level is much different that
even MS Windows' Recycle Bin (don't know about the Mac).  In Win9x,
if you delete a file in certain ways it won't move to the recycle bin.
With your mentioned rm command, if a program uses unlink() to delete a
file, it will be gone for good.

However, AdvFS trash can works at the fs level, so that all files
deleted with the unlink system call will be put into the trashcan.
This should catch most, if not all, files.  File of the same name will
overwrite each other, though.  You restore a file by mv'ing it out.

I don't use it, but it sounded interesting to hear about a
trashcan on a UNIX file system.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: maddog speaks

2000-06-28 Thread Bob Bell

On Tue, Jun 27, 2000 at 11:07:07PM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
>   Before Office, it was Word Perfect and Lotus 1-2-3.  Remember those?  
> Everybody thought everybody would be using them until time ended (at 3:14:07
> AM on Fri, Jan 19th, 2038).  Now they are practically non-existent.

Jan 19th, 2038 is a *Tuesday*. :-)

$ cal 1 2038
   January 2038   
Sun Mon Tue Wed Thu Fri Sat  
 1*  2
 3   4   5   6   7   8   9
10  11  12  13  14  15* 16
17  18  19  20  21  22  23
24  25  26  27  28  29* 30
31


-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Help! how do you you undelete??

2000-06-28 Thread Bob Bell

On Wed, Jun 28, 2000 at 07:19:11AM -0400, Benjamin Scott <[EMAIL PROTECTED]> wrote:
> On Tue, 27 Jun 2000, Brice Gibson wrote:
> > some files got deleted, can I undelete them ... ?
> 
>   No.

Assuming use of the ext2 file system, of course.  The answer is
really based on the file system, though based on the question, I'd
have to assume Brice probably is running e2fs.  Of course, you still
might be able to recover some of the data, but that's involved, and
definitely not the same as undeleting them.

FWIW, I only commented because I just noticed last week that AdvFS
(on Tru64 Unix) let you do 'mktrashcan' to save deleted files,
although I don't think it's normally used.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: UNIX versus Linux

2000-06-26 Thread Bob Bell

On Fri, Jun 23, 2000 at 08:32:26PM -0400, Jerry Feldman <[EMAIL PROTECTED]> wrote:
> I have not installed it in a while, but they 
> used to ship quite a bit of GNU software with the unsupported CD. Some 
> things such as FLEX and AWK are shipped with the base system. I also seem 
> to remember that they needed gcc for some od the test suites.

I personally prefer to download the sources myself, but there is a
bunch of software on an "OSIS" CD (Open Source Internet Solutions, I
believe).  It has tested open source software on it that should work
on Tru64.  A few of us penguins here try to use a lot of OSS.  A lot of
it works as shipped.  When it doesn't, we normally wind up creating a
patch to get it to work on Tru64, and then spend an eternity trying to
get some maintainers to accept our patches (ORBit anyone?).

Yes, things like awk come shipped, but I believe a lot of
utilities like awk are in-house versions, though I do have a man page
for gawk (looks like I didn't install it, though).  As far as gcc
goes, I had it compiled once, but when I upgraded my system and tried
again, it refused to compile.  Most things compile with the DEC C
compiler, which produces *much* better executables anyways.  Compiling
with DEC C also serves to point out all the "additional features"
(read: non-standard extensions) gcc supports.

    Yes, we are running Gnome on Tru64 :-)

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access (aka power consumption)

2000-06-26 Thread Bob Bell

On Sat, Jun 24, 2000 at 01:24:34PM -0400, Derek Martin <[EMAIL PROTECTED]> wrote:
> On Fri, 23 Jun 2000, Karl J. Runge wrote:
> 300W seems to make more sense.  But even then,  you're still talking about
> roughly 250,000 KWH per month, just to power the workstations.  Doesn't
> include things like lights, monitors, coffee makers... etc.
> 
> Imagine paying that bill?  I'll pass...  :)

"They" often post the energy bill here at Compaq (in a lobby, so
I assume I can share) in an attempt to get us to use energy wisely.
Usually it's over $300,000/month, or (I'd estimated) about $4 million
a year!

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-23 Thread Bob Bell

On Fri, Jun 23, 2000 at 12:14:29AM -0400, Derek Martin 
<[EMAIL PROTECTED]> wrote:
> Yesterday, Jerry Feldman gleaned this insight:
> > Or you have some corporate directive come down saying that ALL 
> > workstations must be physically turned off every night. If I could draw, I'd 
> > draw you the bucket :-)
> 
> Well, I'd just assume leave them on too, but you have to admit leaving
> 1000 computers on 24x7 does consume a lot of power.  This argument makes
> no sense from a security perspective, but certainly from a cost savings
> one.

I think modern computers handle this much better.  Monitors switch
to standby, hard drives spin down, even CPUs can go into a low power 
mode.  With newer equipment, I think it is much more reasonable to
leave the computer running - as long as you aren't running Windows, of
course, in which case you probably want to reboot every once in a
while anyway. :-)  And, of course, locking the screen is terribly
important if you're going to leave your machine on.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 04:10:20PM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> Bob Bell said:
> >> Does it ask you for the old NIS passwd if you:
> >
> >Yes, in fact it still does.
> 
> Well that's good to know.  At least someone does it right :)  Though, does
> running passwd as root also ask for the user's old passwd?  Neither Solaris 
> nor Linux do this, and if the root passwd compromised is also managed via NIS, 
> then someone just got root access to the NIS server.  I think you can see 
> where this would lead :)

Each machine has its own root password (AFAIK, they are at least
local, not NIS-mapped).

> Well, I'd be curious to know if the data were at least encrypted, or if it 
> would be susceptible to network sniffing.  I've never really sniffed a network 
> and looked for yppasswd RPC transfers before.

I think the data is sent crypt'ed before it's sent.  And a version
of the old password appears to be sent along with it.  Wait... oh, the
new password is crypt'ed, but the old one is sent plain text.  I
suppose that is necessary for the NIS server to verify authenticity.
I suppose this is part of the NIS standard.  At least the new password
is crypted.

That leaves open the possibility of someone sniffing the old
password.  If they are somehow able to sniff the old password and
prevent the yppasswd request from completing, they might be able to
jump in and highjack your account.  It's likely that you would realize
right away, and this is a very small window of opportunity and seems
hard to do.  Still, I suppose it is possible, although this might fall
into the realm of tough enough that there needs to be real malicious
intent.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 04:34:08PM -0400, Warren Mansur <[EMAIL PROTECTED]> 
wrote:
> At least in Linux, if you are root, and you don't know the other user's password,
> then you can go to /etc/shadow (/etc/passwd on other unix systems).  Once there,
> you completely remove the encrypted password.  Then, you can log in regularly as
> that user, specifying no password (since it was just removed from /etc/passwd).
> The password authentication passes because no password is exactly what is in the
> /etc/passwd file.  Then you can change their password with no problem.
> 
> So, passwd doesn't protect the password from being changed if you are root, even
> though it asks for the previous password.  It probably is the same in Tru64 and
> yppasswd unless it does things totally differently than other UNIX environments.

Huh?  If you are using NIS, the only stuff in /etc/passwd is
local.  Hence, there's nothing to remove to begin with.  If you
decided to add the other user, you still wouldn't get access to their
files, as they aren't being exported to your machine.  Tru64, at
least, appears to do a pretty good job of saying "sure, you're root
there, but are you root *here*".

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 02:09:29PM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> 
> In a message dated: Thu, 22 Jun 2000 13:41:01 EDT
> Bob Bell said:
> 
> >On Thu, Jun 22, 2000 at 01:28:03PM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote
> >:
> >> No, but you could su to pll, then use yppasswd to change my password and 
> >> thereby gain access to my sudo priviledges, which most likely give you any 
> >> access you need on any machine at all.  All this would be mostly impossible 
> >if 
> >> root access weren't compromised in the first place.
> >
> >I'm still curious how being root on my machine can lead to getting
> >access to another users files on their machine or a common server.  On
> >Tru64, at least, yppasswd asks for the old NIS password.  Wouldn't
> >this prevent me from gaining access unless I actuall know the current
> >password?
> 
> Does it ask you for the old NIS passwd if you:
> 
>   bell@foo> su
>   root@foo> yppasswd pll
> 
> ?

Yes, in fact it still does.  I need to know the old user password
to change the password, even when logged in as root locally.  It asks
for the old NIS passwd even if I'm logged in as the user for which I
want to change the password.

Tru64 has a man page for yppasswd in section 3, which says in
part.

yppasswd(oldpass, newpw)
  char *oldpass;
  struct passwd *newpw;

If oldpass is indeed the old user password, this routine replaces the
password entry with newpw.

> Linux only asks you for the root password, which you already know, it does not 
> ask you for the users old passwd.  Solaris doesn't even ask you for that, 
> since it knows you're root, you must be okay :)

Yikes!  That doesn't sound good.

I wonder if communicating to yppasswdd is secure on Tru64 as well?

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 01:36:11PM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> Ayup!  Raytheon is like that too.  But let me ask this, did any machine in th
> at secret lab have a tape drive, floppy, or other writeable and removable 
> media.  Did they chack everyone leaving the building for classified materials. 
> How easy would it have been to leave the building with a floppy disk,
> paper-printout, etc.

I have no idea.  I was only there for one summer, and I wasn't
allowed in.  :-)  But you may be right.  I think the security level is
probably at the point where you could still do something if you really
wanted to, but you have to actually visit the lab.  You have to have
clearance to be in the lab, so hopefully that keeps the number of
malicious users low.  And I think you could probably leave with a
floppy disk, or even possibly a hard drive if there's no access to a
floppy, but at least they know who probably did it.

> Read "The Puzzle Palace", it's all about the inside scoop on the NSA, even 
> their security is a joke in this manner.

Sounds intriguing.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 01:28:03PM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> No, but you could su to pll, then use yppasswd to change my password and 
> thereby gain access to my sudo priviledges, which most likely give you any 
> access you need on any machine at all.  All this would be mostly impossible if 
> root access weren't compromised in the first place.

I'm still curious how being root on my machine can lead to getting
access to another users files on their machine or a common server.  On
Tru64, at least, yppasswd asks for the old NIS password.  Wouldn't
this prevent me from gaining access unless I actuall know the current
password?

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 12:17:05PM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> Which environment would you want to work at.  I'd prefer the latter, since 
> they take security seriously, I've worked in the former, and let me tell you, 
> security there was a joke! (Rule of thumb, if the gov't is at related, you bet 
> security is not seriously employed at that site.  Raytheon, Lockheed, FBI, CIA,
> NSA, Los Alamos, all of them have had serious breeches of security.)

Off topic, but I'll defend at least the one Lockheed Martin lab I
worked at (I realized there are a *bunch*).  At LM-ATL we did *not*
have the root password to our machines.  Additionally, there was a
special lab for secret stuff.  You had to have security clearance,
call security before entering and when exiting, and then use a keycard
to unlock the door.  Additionally, I believe the machines in that lab
were completely disconnected from the rest of the network.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 11:35:30AM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> Okay, let me ask a few questions:
> 
>   Do you know every person in the building?
>   Do you know all the security staff?
>   Do you know all the custodial staff?

Yes.  So there!

Okay, not really, we'll continue. :-)

> The majority of security measures are aimed at keeping people from the
> outside off the network.  Yet the majority of industrial espionage occurs
> from *within* the company.  If I were bent on obtaining corporate secrets
> from some company, the first thing I'd do is get a job on their custodial or 
> security staff, or just get a job at the company.  Once I have physical access 
> to the network, everything else is just mere details.  Look around your 
> company tonight as you leave.  How many people lock their screens or log out 
> before going home?  I'm willing to bet at least 10 people whose offices you 
> pass have left their systems logged in with no screen lock (I'm not saying 
> that screen locks are secure, but at least it's something).  No, pick any one 
> of those 10 or more people.  Imagine they have root access, and one window is 
> left logged in as root.  Next comes the janitor/industrial spy.  There's 
> absolutely no effort for him/her to now access most everything he/she needs 
> now that they have root.

Hmmm... Sure I'd bet not everyone locks their screens (I do, and
rather quickly).  Even without even granting sudo permissions or
giving out the root password, Mr. Janitor/Spy would be able to get
access to more than enough to cause problems.  Figure that a desktop
machine on which I am still a normal user has access to all official
project source code.  By firing up my email client, a spy could
quickly open source Tru64 :-) .  Root or sudo access isn't even
required for this, so why bring it up.

> Now they can su to any user at all and access anything they need to.

Oh, is that why.  I suppose this would cause a problem if I am
explicitly interested in Joe User's widget prototype, which is only
available when logged in as root or joeuser.  First of all, note that
again I still don't need root if I wait for Joe User to be the one to
forget to lock his screen.  Also, I do have root to my desktop here,
but I am unable to access another employee's files.  I am able to
become root on my own machine, and then even su to another user (say,
pll, just for the sake of argument :-) ).   However, pll's files
aren't available, as they are exported to my machine.  They are only
exported to pll's workstation(s) and the production servers.  However,
I am unable to become root or pll on those machines.  I can't log in
as root to those machines because I don't know the root password.  I
can't even try to su to root because I'm not part of the system group.

To summarize, I'm not seeing how giving me root in this setup
makes it any more likely for me to cause harm, beyond what I could
already do as a normal user (rogue employee or janitor/spy accessing
an unlocked screen).

> The point of security is to keep honest people honest, dishonest people out, 
> and hopefully force those with malicious intent to jump through enough
> hoops such that they get caught.

Well, at least we continue to agree on the point, if not the
implementation in all cases.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



root access

2000-06-22 Thread Bob Bell

Based on this (extended) conversion, here's what I here as far as
being applicable to my situation here.  Perhaps the situation most
appealing to sysadmins that would still work would be:

(1) I need complete root access to my testing machines.  I'm
mucking with a bunch of stuff, and I never know quite what I need to
muck with next.  You could use sudo to log all my access, but there's
really no point, as admins wouldn't care what I did to my test machine
anyway.  Also, part of my job involves installing the OS, so I'm going
to wind up setting the root password anyway.  So I'll have the root
password to my test machines.  However...

(2) I really don't need the password to my desktop machine.  I could
use somewhat-restricted sudo access for this and probably still get
done what I need to.

(3) My desktop machine and my testing machines are on different
networks, or at least different subnets.  My desktop machine is in a
production environment with other root-restricted machines running
released, proven software.

The drawbacks (or even problems) with this setup are:
(A) How do I handle information exchange between these networks?  If
they're separated for security, how do I put my latest patches onto
the test machines, or telnet in and run commands?  (You sysadmins may
have an answer, and I'm interested in the proper "secure" setup)

(B) While the production environment may be running different software
than the testing environment, it still is going to be somewhat recent.
We have what we call an IFT, or internal field test, where we install
our own unreleased but close-to-being-done software.  I can't see this
going away, as how can we tell a customer how good our product is when
we aren't even using it ourselves yet?  However, at this stage of the
game, there may still be some bugs in the product, perhaps (though
hopefully not) serious enough to cause security compromisses.

(C) Given that I have root on my own machine, the main thing we are
doing is keeping it separate from production machines.  Why?  It was
stated that anyone who knows what they are doing can extend root on
one machine to root on another in the same environment, exploiting
things like NIS.  Well, if such a problem exists, shouldn't it be
fixed?  Since we are writing all the software for a supposedly
high-end UNIX, shouldn't we be confident that these types of
situations shouldn't occur, and then rapidly fix them when they do?

(D) Keep in mind that a malicious employee is writing the software
that will eventually be used in the production environment.  If he is
really malicious, the possibility exists for him to specifically
overlook some security flaw he created and wait for that software to
be installed in the production environment.

(E) Let's not overlook the people factor.  I know you sysadmins would
probably disagree that this should be a considered factor, but I feel
obliged to at least point out the dissension (sp?) that may occur
among employees.  A company may find it harder to attract quality
engineers when they balk at not having root access to their own
machines.  If they are really good they'll recognize a properly
secured configuration, you say.  Perhaps, but let's at least keep this
factor in mind.


Please note that I am *NOT* trying to antagonize any sysadmins.  I
respect the quality of the sysadmins on this list, as they generally
appear to be higher knowledgeable, and I find this an interesting (and
classic) discussion.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Wed, Jun 21, 2000 at 09:41:14PM -0400, Kenneth E. Lussier <[EMAIL PROTECTED]> 
wrote:
> First off, no one said that engineers are untrustworthy. What was said
> was that no one *NEEDS* the root password other than those who are
> responsable for administering the system. As for how to prevent a
> laptop? DHCP with MAC address recognition. If they go so far as to spoof
> the MAC address, then it would seem obvious that malicious intent is
> present, and they should not be employeed. 

Two points:

(1) If an engineer is responsible for administering
his own system, he should likely have the root password then
(although, as mentioned, you may want to provide separation from the
production environment).

(2) You state that "if they go so far", they
should not be employeed.  How is this different from giving them root
on a machine and doing your best to make sure that NIS/NFS/etc. setups
won't let them get root on a "more valuable" machine.  You're
basically saying that you have to give up at some point and say
"Well, if they're that dedicated, there's nothing we can reasonable
do".  If that's the case, why not let a test machine on which I have
root access be on the same network as a production machine on which
sys admins prefer that I don't get root.  After all, if there is a bug
in NIS that allows this, we should fix it right?  Also, since I'm
writing the software that goes onto these machines (in my specific
case), I could "go so far" as to specifically overlook a bug that
would allow me root access in the future.  I guess I would just draw
the line at a different point.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: root access

2000-06-22 Thread Bob Bell

On Thu, Jun 22, 2000 at 02:15:41AM -0400, Derek Martin 
<[EMAIL PROTECTED]> wrote:
> >   Since engineers are obviously completely untrustworthy, how do you prevent
> > them from bring their own laptop in and hooking it up to that same ethernet?
> 
> What, you didn't think we'd have an answer?  Statically assigned IP
> addresses via DHCP based on MAC addresses.  
> 
> What's that?  Unrealistic you say?  WE'RE DOING IT.  RIGHT NOW.
> 
> No MAC address?  No network resources.  Period.

So couldn't I remove that network card and use it in my own
machine?  There's *always* a way; the goal is really to make it too
hard to be reasonable, right?

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



Re: Bashing sea shells and bash shell (was: How do you.....)

2000-06-21 Thread Bob Bell

On Wed, Jun 21, 2000 at 11:46:14AM -0400, Paul Lussier <[EMAIL PROTECTED]> wrote:
> >> I also never quite know what I am going to need to do next.  This
> >> makes it hard to just grant certain priveleges.  It would be a *huge*
> >> damper on productivity if I had to ask for permission each time I
> >> needed to try something different as root.  And what would be the
> >> point of using sudo to grant full access to everything?
> 
> Logging what was done and by whom.  When you fry your system, the sysadmin 
> team invariably gets the dubious responsibility of having to fix it.  If we 
> can look through the logs to find out what you (collectively) did, we have a 
> better chance of being able to fix it rapidly.

Understandable in most cases, just not in mine.  When I screw up a
system I've been working on, the sys admins don't really care.  It's
my job to figure out what went wrong and fix it.

As I believe Derek said, in my case I really do need the root
password.  As stated, the most secure way for such as setup is to make
machines on which I have root access not connected to the primary
network.  Due to the huge inconvenience this could cause, all machines
are connected to the production environment anyway.  Care is taken as
much as possible to prevent root on my machine from giving me root on
another.  I know that may not technically be the best setup security
wise, but I believe any other setup would cramp productivity.  If
someone were to cause serious security issues on unauthorized
machines, they would have to have serious malicious intent.
Fortunately, such instances appear to be few around here.

-- 
Bob BellCompaq Computer Corporation
Software Engineer   110 Spit Brook Rd - ZKO3-3/U14
TruCluster GroupNashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595

**
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**



  1   2   >