Re: Wedding picture...
On Mon, 20 May 2002, Jon Hall [EMAIL PROTECTED] wrote: Well, we can assume that it is after the actual wedding (since the groom is in the presence of the bride in her full regalia), but before they actually left for the honeymoon. Hmmm, my computer is probably the last thing that I would be using at that time, but I note that both of them are busy at the keyboard, so it looks like a long and happy relationship. Perhaps some last minute double checking of certain HOWTO's? (please forgive me!) Congrats Ken! Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Tape Backups
Hi, Out of this thread Bill Freeman and I got onto a side discussion of the compression efficiency of gzip(1) vs blocksize. This led to an experiment to take the first 2MB of /usr/doc/HOWTO/* and /bin/* and see how well that blob compresses when broken up into blocks where each block is gzip compressed separately. (for blocksizes 128, 256, 512, ... to 2MB.) The results are below, in the form: blocksize, compression-ratio, compressed-size/uncompressed-size This could be useful background info to keep in the back of one's mind... Even small blocks of 1-2K get a reasonable fraction of the full compression. /usr/doc/HOWTO/* total size: 200 128 0.9773 1954520/200 256 0.7569 1513703/200 512 0.6234 1246810/200 1024 0.5348 1069536/200 2048 0.4703940685/200 4096 0.4240847974/200 8192 0.3896779129/200 16384 0.3637727375/200 32768 0.3427685395/200 65536 0.3283656661/200 131072 0.3206641290/200 262144 0.3166633217/200 524288 0.3146629162/200 1048576 0.3136627276/200 200 0.3134626753/200 /bin/* total size: 200 128 1.0111 2022191/200 256 0.8391 1678176/200 512 0.7242 1448394/200 1024 0.6346 1269181/200 2048 0.5748 1149687/200 4096 0.5370 1073970/200 8192 0.5130 1026006/200 16384 0.4961992103/200 32768 0.4837967453/200 65536 0.4758951601/200 131072 0.4730946040/200 262144 0.4710942082/200 524288 0.4704940761/200 1048576 0.4692938445/200 200 0.4693938545/200 * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Tape Backups
On Thu, 02 May 2002, [EMAIL PROTECTED] wrote: How much does each /dev/null cost? Is there a limit to how much one can hold? Btw, I forgot to mention, if you *really* want to save money and time, it is most efficient to use /dev/null for your back up device. Even though it's a device technology dating back over 30 years at this point, it somehow still holds infinitely more data than even the largest and most expensive tape silo you can purchase for many millions of dollars! It's *reall, really* fast too :) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Tape Backups
On Thu, 2 May 2002, Benjamin Scott [EMAIL PROTECTED] wrote: GNU tar does this. Seriously. If checks to see if the target device is /dev/null, and if so, skips some of the I/O operations. I discovered this when I wanted to exercise a disk, so I tried tar'ing it up to /dev/null, and what should have taken minutes completed in seconds! :-) Yes, I found this too. I believe it does this so one can quickly get a listing (say) of the output from tar without having tar read all of the files from the disk. Useful if you had some complicated exclude/include directives and wanted to test what would be backed up quickly. I suppose this would get around it: tar -cf - /foo | cat /dev/null * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
cat an Exchange inbox?
Is it possible to cat an Exchange/Outlook mailbox from a unix shell? I thinking of something simple for remote quick-and-dirty viewing reading of email that exists in an Exchange environment. We have WinVNC and that works fine, but it is not always operative. I'm thinking along the lines of being able to view (but not download) ones POP/IMAP email via fetchmail like: % fetchmail -k -m cat mailhost | more (or collect to a file and run pine/elm/mutt/mailx on it). One could do this on the road w/o having to modify mailbox. I know nothing about how Exchange works... is something like this possible? Thanks, Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: statically compiling?
On Wed, 1 May 2002, mike ledoux [EMAIL PROTECTED] wrote: I downloaded a source package that I need to compile statically so I can move the binary to another machine which does not have all the necessary packages. How do I do that? The package comes with the standard gnu autoconf configure script, but I didn't see anything in there or in the resultant Makefile to indicate a static build. Typically adding '-static' to the linker options is enough. Often adding '--enable-static=yes' to your configure command line does this for you, but not always. I would suggest not statically linking the whole executable, but rather just statically link in only the archive libraries (.a's) you do not expect to be on the target machines (as shared objects .so's). I say this because if you statically link in the low-level libraries (libc, libnsl, ...) then that executable has a higher chance of breaking down the road, the reason being you've statically bolted libc.a into it, and that code may become out of sync with the system/kernel at a later date. Better to use the shared object libc.so.6 that has a good chance of shielding you from changes in the system. Off the top of my head, with gcc the only way I know how to do this is to change the final cc/link line from something like: cc -o theprogram ... -lX11 -ltheywonthaveit -lgtk -lglib to have the full path to the .a archive: cc -o theprogram ... -lX11 /usr/local/lib/libtheywonthaveit.a -lgtk -lglib With other compilers you can turn on and off with -Bstatic and -Bdynamic (for example) and sandwich the -ltheywonthaveit with them. Also, for Linux/GLIBC I don't know why but its /usr/lib/libc.a is insanely huge. 30MB for libc.a vs 1MB for libc.so.6. You likely won't statically link in all of libc.a... but what you do link in will fatten up the executable quite a bit, wasting disk space and RAM. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Shell scripting tips and tricks (was: I need a date! )
On Mon, 22 Apr 2002, Tom Buskey [EMAIL PROTECTED] wrote: As I said in not so many words, modern shells have it built in. I don't consider Bourne a modern shell. I believe Jerry is saying some of the newer implementations of /bin/sh have [ as a builtin. For example, [ has been a builtin on Solaris forever. This improves performance of scripts, e.g. a big loop with lots of if tests. Speaking of builtin commands vs. Unix commands. While setting the PATH environment variable in a script is a good idea, specifying the full path to a standard command may be a better way. The user may have aliased the commands: alias rm='rm -i' So, in your script (or makefile), setting a variable for the command will bypass any aliases: RM=/bin/rm Or RM=\rm so that aliasing is negated. I don't alias rm and my root accounts don't either. I don't believe user's aliases are active at all in a general script. The ~/.bashrc ~/.profile, etc are not sourced for non-interactive shells. Only in an interactive shell will the these aliases be available. Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: On GNU/Linux
On Sun, 21 Apr 2002, Paul Iadonisi [EMAIL PROTECTED] wrote: On Sun, Apr 21, 2002 at 01:56:47AM -0400, Derek D. Martin wrote: Oh, boy! I think you may have just stirred a hornets nest. I, for one, agree with your essay 100%. I, for one, don't believe even 1% of it. Didn't we already have a storm on the list about this? Nothing's changed. Call it whatever you want. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: console access through serial port?
On Thu, 18 Apr 2002, Benjamin Scott [EMAIL PROTECTED] wrote: On 18 Apr 2002, at 10:36am, Cole Tuininga wrote: I definitely agree with Ben wrt this being a handy debugging tool. The reason I said the above is that (at least, in my experience) turning on the support for console on serial port turns off your ability to use it as a login console (which I got the impression the op wanted to do). H. I am pretty sure I had both working when I was using it for debugging. Unfortunately, that particular system (my laptop) has since been wiped and redone with a different distro, so the configuration I used is gone. :( I'm using serial console as a backup to access my firewall (for whenever I really screw up the networking :-) During boot I can see and interact with the LILO prompt. After boot I get the login: prompt and can log in fine. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: New Question
On Wed, 17 Apr 2002, Thomas M. Albright [EMAIL PROTECTED] wrote: The dates are stored as mm/dd/. When the Payment Due date is equal to today + 90 days (IOW: 90 days before the due date) I want to send out an email containing an invoice to Contact email. Most of that I can figure out on my own. The only problem I really have is with the dates. I know 'date +%x` will output the current date as mm/dd/. `date +%j` will give me the day of the year (eg.: today is 107). Using that format quits working sometime in October tho. (10/3 is 276 + 90 = 366) I like to write shell scripts that are portable to all Unixes, but using gnu date is my one vice :-) Indeed, I install it as gdate on most machines I use so I can do time manipulation in sh scripts. I think your problem can be solved by using the gnu date n days, n days ago, etc, tricks in the -d date string option: % date Wed Apr 17 22:55:55 EDT 2002 % date -d 90 days ago Thu Jan 17 22:56:02 EST 2002 % date -d 90 days Tue Jul 16 22:56:06 EDT 2002 Works the same with days replaced by seconds, minutes, years, etc. It even does n months ago somehow. There can also be a real date in the -d string, e.g. -d 01/12/1989 90 days ago So I think your case would look like: DUEDATE=`somehow read it in` if [ $DUEDATE = `date +%m/%d/%Y -d 90 days` ]; then echo Please pay me $AMOUNT | mail -s Invoice $CUSTOMER fi or something like that. If instead of a test for = you need a test for = I suggest using +%s for *both* dates and doing a numerical compare. Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: OpenOffice
On 09 Apr 2002 09:37:52, Mark Komarinski [EMAIL PROTECTED] wrote: OO doesn't want to take over the desktop like 5.2 did. That's the biggest thing. On the down side, there is some functionality missing, most notably the database access and much of the clipart. I don't need either, so it doesn't bother me. (sorry I deleted the later posts) I believe Mark is referring to that in OpenOffice and Staroffice 6.0 the documents appear as separate toplevel X windows (e.g a new X window for each doc, presentation, spreadsheet, ...) rather than having them all inside one container window. For my own work I definitely prefer having separate windows, however I wonder if the all-in-one container might be better for some cases. I am thinking if, say, I installed a OO solution for a school or non-charitable association as a Windows/Office replacement primarily for non-technical folks. Maybe even first time computer users. The all-in-one container probably has a less steep learning curve. It even had its own web browser (not great, but it worked), and email client. With those removed now, one would have to deal training the users wrt the WM interaction, netscape/mozilla, mail client, and perhaps some other issues we don't even think about since are no longer newbies... * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: X11, VNC performance (was: Linux-Outlook (ouch) question)
On Fri, 5 Apr 2002, Benjamin Scott [EMAIL PROTECTED] wrote: Karl Runge is on the right track. X is very senstive to latency. The bandwidth requirements can actually be fairly minor for simple constructs (e.g., a GNU Emacs window), but a high-latency link will kill you. Yes, and I wanted to point out that tcl/tk apps (like exmh) and big motif-ish apps (like netscape) usually become unbearable under dialup-level latency (100-300ms). OTOH, I find the response of lightweight gui X apps (e.g. Xaw based ones like my mail reader) to be acceptable under most conditions. Then again, having used remote computers almost daily for the past 18 years has likely made me very patient wrt interactive response :-) I did an exmh test just now to a ssh/vnc landing pad I have in the west coast (120ms ping times from here): exmh thru a ssh X redir (no vnc) was OK for the changing text, but the gui widget aspects (dialog popups, menus, etc) were painfully slow (e.g. often 2-6 secs to map the new windows). exmh via vnc on the ssh link had much better response (e.g. 1 sec to map the new windoes), most all aspects seemed tolerable/usable. (it goes w/o saying no fancy backgrounds or polished metal, translucifying, wm's for the vnc session (I use fvwm + solid bg)) Of course the response will never be as good as running exmh on the local box, but I am firm believer in stretching my MUA's view of my mail over to my remote location (the fastest being ssh + a cmdline MUA, like pine), rather than teeing my mailbox to my remote location. But, of course, YMMV. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Linux-Outlook (ouch) question
On Fri, 05 Apr 2002, John Abreau [EMAIL PROTECTED] wrote: Well, one option is run exmh in a VNC session which can then be connected to. One of the exmh-users members mentioned he does this. I believe there's a way to run VNC over ssh. VNC? Ugh. Doesn't that just ship around a big pixmap of the desktop? That would chew up bandwidth a lot more than just running exmh remotely. I would guess bandwidth is not the problem, but rather latency. tcl/tk (aka wish, that I believe emxh is written in) is really terrible thru a remote link, not because the bandwidth is saturated, but rather all those serial ping-pong interactions with the X server. E.g. ~15 secs to map a popup menu. VNC only sends compressed diffs of the desktop, and if many of the regions are of solid color, so much the better. My guess is exmh displayed via VNC tunnelled thru ssh would have better response than exmh going thru a ssh X redir. Try it and see! I have done and continue to these sorts of things and I find them acceptable. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
RE: slide show software (fwd)
On 23 Mar 2002 20:12:20, Kenneth E. Lussier [EMAIL PROTECTED] wrote: Also, I have little doubt that, with some sweat, Gimp could be made to do most anything up to and including your dishes. Someday, I'll actually -learn- the darn application. The GIMP can do all sorts of things to accomplish a slideshow-like performance. One of the things that you can do is create an animated Gif where each frame is a separate image. There are also several animation filters that you can use. It's been a while since I've used it. As a alles-free replacement to xv I wonder if anyone has something to say about the Eye of Gnome program eog? Unfortunately in my latest gnome build eog evidently failed, but I have used it before and it seemed ok... Since GIMP, great tool that it is (my kids use it daily, and have become really good at it) is so slow and fat, one wants a fast loading app like xv for general image viewing (e.g. called from scripts). If one doesn't like xv's license, it may be that eog fits the bill... If anyone has experience with eog, I'd appreciate a comparison with xv. Thanks, Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: GNHLUG addresses (was: Laptop help)
On Thu, 21 Mar 2002, mike ledoux [EMAIL PROTECTED] wrote: On Thu, Mar 21, 2002 at 05:50:01PM -0800, Karl J. Runge wrote: True, but couldn't the user construct a procmail line that would force the issue for the user's mailer? :0 Hfw * ^[EMAIL PROTECTED] | formail -I From: [EMAIL PROTECTED] This may not by right, but the idea is the f in Hfw means filter the mail thru the pipe and have it continue on... Ugh. Please don't. Aside from making it very difficult for anyone using that to reply only to the original sender, that will break attribuitions completely, making this much more painful for the rest of us. Whoops!, too tired last night. I believe I meant Reply-To: not From: | formail -i Reply-To: [EMAIL PROTECTED] (btw, Mike suggests the use of -i to force formail to retain any original header in Old-Reply-To:). The basic idea here is that if a user does not like gnhlug's Reply-To policy, they can change it this way if they want to. If they find that makes their life harder they can stop using it! Also, if their mailer respects some special headers, say X-Mutt-Reply-To, they could play around with that. One can see formail(1) for more info. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: GNHLUG addresses (was: Laptop help)
On Thu, 21 Mar 2002, Benjamin Scott [EMAIL PROTECTED] wrote: You misunderstand. procmail filters mail as it comes *in* to a system. It has nothing to do with the address we *reply* to. That is ultimately controlled by the user sending the mail. Myself, I make it a habit to check and edit my headers before sending, such that I always send my replies to the canonical list address. True, but couldn't the user construct a procmail line that would force the issue for the user's mailer? :0 Hfw * ^[EMAIL PROTECTED] | formail -I From: [EMAIL PROTECTED] This may not by right, but the idea is the f in Hfw means filter the mail thru the pipe and have it continue on... * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Lindows vs. Windows.
On Mon, 18 Mar 2002, Jerry Feldman [EMAIL PROTECTED] wrote: That's just a bump on the log. Microsoft will encounter more competition and may lose some market share to Linux and BSD, but I don't think that their dominance of the industry will be diminished short of a major anti- trust breakup. True, but I think Ken meant the name Windows won't be (tm)'d anymore. Not that this is means a big deal. On 18 Mar 2002 at 9:13, Ken D'Ambrosio wrote: I know that most everyone here has likely already read the Slashdot story posted on Friday(?), but this page is filled with some really juicy quotes. Methinks that MS has stubbed their toe, and that Windows(tm) will shortly be a thing of the past: * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Please remove all 'mediaone.net' addresses
On Mon, 18 Mar 2002, [EMAIL PROTECTED] wrote: Mark, It appears that ATT has finally done away with the 'mediaone.net' domain, and now, e-mails to the GNHLUG list are bouncing to any '@mediaone.net' address. Could also do a s/mediaone.net/attbi.com/ in the list file. This is the change that ATT Broadband Internet (attbi) did. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Re: Please remove all 'mediaone.net' addresses
On Mon, 18 Mar 2002, Bayard Coolidge USG [EMAIL PROTECTED] wrote: Karl J. Runge [EMAIL PROTECTED] said: Could also do a s/mediaone.net/attbi.com/ in the list file. This is the change that ATT Broadband Internet (attbi) did. NO!! There was NOT necessarily a 1:1 change made - there were some username conflicts whereby the former mediaone.net customers had to acquire new usernames in the attbi.com namespace. OK, OK, sorry for the 90% solution. (The unix way, btw!) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: watchdog timers
On Sun, 17 Mar 2002, [EMAIL PROTECTED] (Michael O'Donnell) wrote: ... W83877F (EMACS) Watchdog Timer(NEW) WTF?!? Hardware to watch if EMACS is using too much RAM, CPU, or is otherwise causing the machine to run hot? :-) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Apache codered looming???
Call me chicken little, but I am getting worried about the looming Apache/PHP vulnerability out there: http://news.com.com/2100-1001-850752.html?tag=cd_mh http://security.e-matters.de/advisories/012002.html http://www.cert.org/advisories/CA-2002-05.html If you have a webserver on the internet with PHP I encourage you to patch it NOW. If the estimate of 1 million vulnerable php servers is correct, then as soon as someone creates a worm program that can get a shell on a vulnerable machine then all 1 million servers will be infected in about 2 hours (assuming one machine can try to infect 10 random IP's/sec). That would be worse than code red and a huge blow to Apache OSS. :-( I hope I turn out to be chicken little... Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Apache codered looming???
On Tue, 5 Mar 2002, Benjamin Scott [EMAIL PROTECTED] wrote: My understanding is that this hole does not lead directly to privilege elevation. In other words, it might lead to compromise of the nobody account or similar, but not full root access (like CodeRed). Am I correct here? I believe you are correct. I am just talking about the bad PR aspect of this vulnerability leading to a fast-spreading worm. Certainly from a site administrators point of view a remote root compromise would be much worse. An amusing statistic to know would be what fraction of the ~9 million apache servers are misconfigured and running at elevated privileges, e.g. root :-) (I am aware of the amount of damage even an unprivileged user can do, and that root compromise is generally a short step away from an unprivileged compromise, but I want to make sure my understanding of this PHP hole itself is correct.) Right, I suppose the worm writer could leave a backdoor program running that would yield a shell as nobody for hackers to scan for come in trying to capture root. Not a warm thought: now all the local root compromises become remote ones... * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Mystery C question
This compiles, I think the mystery *mystery you had is not good to have an identifier name also be that of a type. I changed mystery to mystery_VAR below. (not sure it is doing what you want, though). struct mysteryStruct { struct mysteryStruct *next; int dontCare; }; typedef struct mysteryStruct mystery; mystery *nextMystery;/* Pointer declaration - no problem */ mystery mysteryPool[ 200 ];/* Array of structs - no problem */ mystery * /* Function type - no problem */ problem( mystery *mystery_VAR ) /* Parameter declaration - no problem */ { mystery *hosed;/* Auto variable declaration - choke and die! */ hosed = mystery_VAR-next = nextMystery; nextMystery = mystery_VAR; return( hosed ); } * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: GPG and different mailers
Since we can't convince you GPG guyz :-) .procmailrc: :0 Bf * -BEGIN PGP | pgp_clean pgp_clean: #!/bin/sh -- # A comment mentioning perl eval 'exec perl -S $0 ${1+$@}' if 0; while () { $msg .= $_ } $msg =~ s/-BEGIN PGP SIGNED(.|\n)*?Hash:.*\n\n//; $msg =~ s/-BEGIN PGP SIGNATURE(.|\n)*?-END PGP SIGNATURE-\n//; print $msg; * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Newbie article...
On Tue, 12 Feb 2002, Bill Sconce [EMAIL PROTECTED] wrote: Truly so. And the man pages have no index; Not a full index, but man -k keyword (aka apropos(1)) and whatis(1) are fairly useful for this. No? The gnu special: man -K keyword is slow (at least on my old HW) but I guess technically acts as an index... * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Diddling /etc/{passwd,shadow}
On Mon, 11 Feb 2002, [EMAIL PROTECTED] (Michael O'Donnell) wrote: It appears that this approach does not work: Password: su: Authentication failure Sorry. Well, have him paste this into /etc/shadow in the password slot: haystack[105] perl -e 'print crypt(foo, sa), \n' sa8ufSVwLUHVU that should be a password of foo (using salt sa) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Weird resumable ssh redir question...
Hi, Some of you may remember the talk I did last Nov. at the MELBA meeting. The basic idea is that one uses ssh to connect to work, say, and redirect a bunch of ports (login shells, X window apps, webserver, etc) to yield a poor man's VPN between the two points. For a couple of weeks I'll need to do this sort of VPN via dialup modem from a location with only 1 phone line. That's not too bad, but I anticipate having to bring the connection up and down quite a few times a day (since there is only 1 phoneline and no cell phone coverage). I am wondering if one could rig up something to *suspend* the active connections, bring down ppp, use the phone, and then re-establish the ppp connection and resume the connections data flow. I think in principle this can be done, here is the first hack that comes to mind, you tunnel a 2nd ssh connection (B) thru an existing one (A): local remote (ppp dialup) ssh(A) - sshd(A) | | prog prog | | ssh(B)sshd(B) The ssh(A) connection is the volatile one, it is kind of like a link layer. prog could be as simple as a perl script that passes the data thru and can act as valve to block the data flow and re-establish connections to the ssh(A) link when it comes back up. The ssh(B)'s are persistent and do the shell, X app, etc redirs. I'm not claiming the above would be any good, just to show that it probably can be done. I'm interested in people's general thoughts on how to solve this problem; maybe it's been done already. Biggest worry I have is if timeouts (e.g. tcp) can be avoided... Thanks, Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Weird resumable ssh redir question...
Yes, I use VNC a good deal for certain tasks in my current telecommuting (via cable modem) and will definitely be using it under my upcoming dialup situation. However, I think doing a full day of work at = 33 Kb/s thru VNC will prove too frustrating and tedious (even with something like tightvnc). So I know I will be using a bunch of local xterms containing remote shells for the bulk of my work. It will be interesting to see if I can cook up a way to suspend restore them... Thanks, Karl On Sun, 10 Feb 2002, Dan Jenkins [EMAIL PROTECTED] wrote: The remote X, login shells, at least, could be handled through VNC (over SSH). Here's a good article on an interesting way to configure a VNC/SSH connection: http://www.linuxjournal.com/article.php?sid=5499 You can pickup where you left off easily with VNC. I use it this way all the time. Though, I have not (yet) forwarded the whole environment (both locally and remotely) as in the above article. I will be experimenting with it soon. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Mailer errors question
I noticed my domainname would not resolve for most of the day and I got got a whole bunch of mailer-daemon messages. I apologize to all who received similar errors due to problems with my domain. Have we had any discussion on the list on the policy of where errors should be directed? We seem to have all errors propagate back to the poster. I believe Steven Orr told me most other lists set the Errors-To: header so all go to a collection pot (on, say, the list machine). This collection could just be discarded, or perhaps grepped periodically for dead email addresses. Anyone have opinions about this? * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Mailer errors question
On Sun, 10 Feb 2002, Benjamin Scott [EMAIL PROTECTED] wrote: The problem is a political one, not a technical one. The situation is not going to change. Yes, that is too bad. :-( Errors-To is non-standard and depreciated. The proper solution is to set the SMTP envelope FROM address to some sort of robot which can identify dead addresses and un-subscribe them. Oh, OK, Steve may have been talking about this. I naively thought Errors-To: was the only way to do this. (I grepped and saw this string in the majordomo code, but that was likely regarding subscription, etc, activities, not posts) Let me see if I understand you, a posting's header might look like: From [EMAIL PROTECTED] Date: ... From: Benjamin Scott [EMAIL PROTECTED] To: Greater NH Linux Users' Group [EMAIL PROTECTED] ... So replies would (likely) go to the From: address, but errors to the From address? * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
The Hacks of our lives [Was: GNOME's future]
Miguel gave a long response to his Mono/.NET stuff that is at: http://mail.gnome.org/archives/gnome-hackers/2002-February/msg00031.html After reading that I stumbled on this The Hacks of our lives humorous post (e.g. The Days of our lives) that I found to be hilarious (if a bit crude): http://mail.gnome.org/archives/gnome-hackers/2002-February/msg00030.html * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: RH 7.2 bash 2.05.8(1) whacked?
On Mon, 04 Feb 2002, Paul Lussier [EMAIL PROTECTED] wrote: Derek D. Martin said: LANG=en_US LC_COLLATE=C export LANG LC_COLLATE Couldn't you just: export LANG=C That's not as portable as what Derek wrote. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: RH 7.2 bash 2.05.8(1) whacked?
On Mon, 04 Feb 2002, Paul Lussier [EMAIL PROTECTED] wrote: That's not as portable as what Derek wrote. That may be so, but unless you're outside the US, or non-English speaking, how much would that matter? I've always had LANG=C, and I've never needed to change anything. Sorry, I wasn't clear. Just a nit: I only meant 'export FOO=bar' is bash specific. Some people work only on Linux where sh - bash, but in a heterogeneous environment it could make a difference... (no sh wars pls). * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Userfriendly on AOL Redhat buyout
Userfriendly has an amusing view of the AOL / Redhat buyout rumor: http://www.userfriendly.org/cartoons/archives/02jan/xuf003850.gif This view actually correlates with my initial take: no way is there a significant market of ordinary people ready for what we call Linux (or anything close to what we call Linux). It would have to be an embedded appliance type thingie or maybe something like the relationship Mac OS X == FreeBSD. (and, heh, heh, look at the great things *that* has done for popularizing FreeBSD ;-) An advantage, though, to doing something like this is that over time they could add important OSS as long as they could sanitize it for the un-washed masses. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Mozilla home page customization
Have you looked in the defaults/pref directory? I see: % pwd .../mozilla0.9.1/defaults/pref % ls all.js editor.js mailnews.jsunix.js config.js initpref.jssecurity-prefs.js xpinstall.js What happens if you change things in those files? * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: ext2 fragmentation (was: A fairly simple question)
On Fri, 11 Jan 2002, zeroK [EMAIL PROTECTED] wrote: Using Linux Kernel 2.2.19 Ext2 [Slackware 8.0], I notice that after making major changes or after a *crash* [due to numerous power outages here], at startup filesystem check I will get a (3% non-contiguous) message [percentages vary, but are small]. Then at next reboot and file system check it will have been fixed (I assume the absence of said message implies that). I believe that is output from the e2fsck command: # e2fsck -f /dev/hda1 e2fsck 1.12, 9-Jul-98 for EXT2 FS 0.5b, 95/08/09 Pass 1: Checking inodes, blocks, and sizes Pass 2: Checking directory structure Pass 3: Checking directory connectivity Pass 4: Checking reference counts Pass 5: Checking group summary information /dev/hda1: 17274/128520 files (0.5% non-contiguous), 235988/514048 blocks ^^ If the filesystem is clean (i.e. after a normal shutdown+reboot), I don't think it will report the fragmentation. It may just say something like: # e2fsck /dev/hda1 e2fsck 1.12, 9-Jul-98 for EXT2 FS 0.5b, 95/08/09 /dev/hda1: clean, 17274/128520 files, 235988/514048 blocks I don't know how much time it takes to compute the fragmentation, it may choose to skip the computation if the filesystem is clean... * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Python follow-up [modadlug]
On Tue, 8 Jan 2002, Benjamin Scott [EMAIL PROTECTED] wrote: Great, now instead of a debate over which language is best, we're having a debate over whether or not we're having a debate over which language is best. ;-) Well, both languages allow recursion... (as in recursive descent into hell :-) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Bash question...
On Thu, 3 Jan 2002, Brian Chabot [EMAIL PROTECTED] wrote: Is there an easy way to tee the $HISTFILE to more than one location? What I want is a mirror of .bash_history stored elsewhere in case the It's probably not be the best way to proceed, but I have an LD_PRELOAD hack that tees writing to /dev/dsp to a temp file (i.e. to capture raw audio). I imagine it could be used to tee writes to ~/.bash_history. It's not clear to me one would want to interpose something as important /bin/bash via LD_PRELOAD... But you asked for easy, other options would seem to require modifying bash and/or kernel source. Another angle to consider is to turn on accounting. I've never used accouting (perhaps I played with it once Solaris long ago...) but I believe the system call is acct(2). * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: daemon-mode fetchmail failures
I believe we are seeing the same problem. My wife has this cronjob set up to run every two hours: 20 */2 * * *fetchmail -d 600 m1x $HOME/.fetchmail.err 21 m1x is her mediaone alias in ~/.fetchmailrc Every week or so (sometimes more frequent) the fetchmail process will get hung somehow and not try to fetch any new mail. Sometimes for days if we don't notice (my wife is somewhat lax about her personal email... we'd have fix this by now if it was her work mail :-) The only thing I can think of is to kill the fetchmail process periodically from another cron entry just to keep things going. How frequently does it go into this state for you? Ours is too infrequent to debug easily. I will try to do some more diagnostics (netstat, lsof, ...) next time fetchmail gets in this state. On Sat, 29 Dec 2001, [EMAIL PROTECTED] (Michael O'Donnell) wrote: I instruct fetchmail to go into the background and contact my ISP's POP server every so often to haul newly arrived messages onto the local disk. It seems that every so often the daemon gets stupid, continuing to run but failing to notice newly arrived email, even if I kick it in the prescribed manner with another (non-daemon) instance. I'll notice after a while that I've not seen any new messages for some time so I'll kill and restart the fetchmail daemon and that new incarnation will then notice and transfer all the waiting messages that the stuporous incarnation had been seemingly unaware of. I haven't yet gone to the trouble of doing a serious debug (like with strace) of this problem, yet. Anybody heard of this problem or have any ideas about what could be wrong? * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: PGP question
On Thu, 27 Dec 2001, Paul Iadonisi wrote: So instead of revoking the key that was sitting in the key server databases, I submitted a second key. And you guessed it -- because I hadn't really used the key, I've forgotten the passphrase. As a result, I can't revoke the key. It may be possible to try a dictionary attack against the passphrase. The idea being YOU know vastly better than anyone else what sort of passphrases YOU come up with. With that extra knowledge that may vastly cut down the space that has to be searched... Ideally, though, the act of coming up with the algorithm to write the program to perform such a search would jog your memory as to what the passphrase was :-) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: rfc2505
FWIW, One thing I have found useful for personal SPAM filtering is to have procmail deliver the spam Hits go to a separate spam folder. Then each night a cronjob perl script runs over this folder looking for any new entries. It gathers up all of the new From and Subject lines and sends them to me in a single email. That way I can dispense with it in about 5-10 seconds in the morning and not accidentally discard any mail I really wanted. Currently the volume of spam I get is not so huge to make it difficult to quickly scan the email. WRT spam volume who knows what the future bring: it may become onerous just to read the list of spams that come in 1 day... It is possible a similar scheme would be useful in a group (rather than personal) SPAM filtering environment... * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: rfc2505
RFC's aside, wouldn't it be great if it were *illegal* to send spam w/o some sort of header(s): X-Unsolicited-Bulk-Mail: ... and they could only remove that header if you replied back somehow saying yeah, it's ok to send me more of your crap. One could imagine even more structure in the required headers, e.g. AD category (Diet, XXX, ...) and even the sender's ID. I see some spam coming in these days where they at least say at the bottom that they are complying with Calif + other states Anti-spam laws where they provide you with way to unsubscribe... I say let's take it to the next level where being able to automatically filter (e.g. to separate folder or to /dev/null) is required by law. I dunno how practical this would play out... Anyone know of any discussion going on in this vein? * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Library
On Sat, 22 Dec 2001, Ed Robitaille [EMAIL PROTECTED] wrote: I am a trustee for our local town library. We share the library with the local elementry school. Our computer that we use is ano-name running W$ 95. As You can imagine, we suffer from crashes, setting changes, file deletions, viruses (viri ?) and other non-system type problems. I am very tempted to switch to dual-boot $W2k and Linux. The biggest concern I have is that many patrons use the computer for word-processing. If it is an older machine but uses DIMM memory it may be a good idea to upgrade the memory for this project. I recently upgraded all the PC's in the house (except my workstation: SIMM's only :-( ). One can get a good quality (e.g. crucial.com) 128 or 256 MB DIMM stick for reasonably small cost (maybe $40 for the 256, but prices seem to be going up...) The additional RAM will help running Gnome / KDE / StarOffice used in this project (and W2K). If the CPU is slow VMware will be extremely slow, and so VMware would not be a good idea (and is not free). StarOffice is slow to boot but has acceptable performance once (and can be left running on the desktop). * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: [OFF-TOPIC] Web hosting recommendations?
THANKS! (I assume that's you Bruce...) style and diction, I couldn't remember the latter one. I'll install them and write a perl script to download and filter all of Ben's posts right away :-) On Tue, 18 Dec 2001, [EMAIL PROTECTED] wrote: Yes. I remember it. I believe it was part of something called the Writers Workbench. p Used to be one could purchase a copy of it from Bell Labs/ATT/, but I haven''t heard about it for a long time. Google turned up a a href=http://linux.oreillynet.com/pub/a/linux/2000/05/05/LivingLinux.html;Living Linux article/a that indicated that its now re-written and is a GNU project. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: [OFF-TOPIC] Web hosting recommendations?
On Tue, 18 Dec 2001, Benjamin Scott [EMAIL PROTECTED] wrote: On Tue, 18 Dec 2001, Michael O'Donnell wrote: ... and can peak English ... Well, we can certainly see why you'd want to outsource... ;- ;- LOL! I guess my spell chqeue dew knot work write. :-) Spell check works fine since peak is a word (which I believe is your joke if only you got cheque right :). One would need a higher level checker to find that peak was wrong. This reminds me: does ANYONE out there remember a program on UNIX from the late 80's that was called style or something like that You would pass it some text you wrote and it would make nasty comments and suggestions on how to improve the grammar and wording style. As much as the program made be feel deficient, I'd like a copy! I think it was on BSD. But it could have even been on VMS for all I know... Thanks, Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Glue partitions together?
Has anybody done this? Is it as simple as I am thinking it is? To get a modest sized partiton (500MB) to play around with some things I want to glue together the hda1 hda2 and hda3 partitions of my /dev/hda: [root@haystack runge]# fdisk -l /dev/hda Disk /dev/hda: 255 heads, 63 sectors, 1582 cylinders Units = cylinders of 16065 * 512 bytes Device BootStart End Blocks Id System /dev/hda1 * 1 32 257008+ 6 DOS 16-bit =32M /dev/hda233 48 128520 82 Linux swap /dev/hda349 64 128520 82 Linux swap /dev/hda465 1582 121933355 Extended /dev/hda565 80 128488+ 82 Linux swap /dev/hda681 96 128488+ 82 Linux swap /dev/hda797 1582 11936263+ 83 Linux native Can I just go into fdisk, delete the first 3 and then create a bigger hda1? I have NT 4.0 on /dev/hda1 and haven't booted it in years; it would be fun to delete and recycle it along with the swap :-) I understand the hda* names will (may?) all change, and I am prepared to fix this in /etc/lilo.conf and /etc/fstab. I have a sinking feeling I am forgetting something here... please remind me before it is too late! * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Wireless Router Questions
On Mon, 10 Dec 2001, Benjamin Scott [EMAIL PROTECTED] wrote: The biggest issue with 802.11b is security; it is basically non-existence. Flaws in the implementation of the algorithms render even the so-called strong or 128-bit encryption worthless. I recommend treating 802.11b networks as you would the public Internet: completely un-trustworthy. Amen to that; seek an independent solution, e.g. freeswan. For those not convinced see the cracking tool: http://airsnort.sourceforge.net/ The following may not be a big deal to most folks, but one should also note that the thruput for 802.11b is hampered quite a bit by its wireless overhead. So the 11Mbs signalling rate does *not* mean it is faster than 10Mbs ethernet. I did some ftp tests and checked the web, and it seem 11Mbs maxes out at roughly 3-4 Mb/s of actual tcp data streaming. Less with walls, etc, in the way. If anyone can get faster than that please let me know how you did it :-) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: xinetd and custom programs
I don't use xinetd, but I am used to nowait in inetd.conf for tcp services. Maybe try wait = no ? On Sat, 8 Dec 2001, Jeff Macdonald [EMAIL PROTECTED] wrote: Hi, Anybody runnig their own program out of xinetd? I can't get event simple stuff to work like ls: service unlisted { type= UNLISTED protocol= tcp socket_type = stream wait= yes user= root server = /bin/ls server_args = / port= 666 } I keep getting this in /varlog/messages: Dec 8 21:58:59 localhost xinetd[3113]: warning: can't get client address: Transport endpoint is not connected * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Linux Friendly DSL (Update)
Kenny, That sounds pretty good. What is their stated policy on having your machine be a hackerz' scanbox? ATT Broadband seems to have a two strikes and you're out policy. I.e. if it happens twice that a hacker breaks into your machine and uses to scan other machines or DDOS, you lose your service. Thanks, Karl On Mon, 03 Dec 2001, Kenneth E. Lussier [EMAIL PROTECTED] wrote: All, Several people wanted updates on Direct TV's DSL service. Well, so far I'm impressed. $50/month. Here is what I have: 768K down / 256k up Static IP address Upto 6 accounts/e-mail addresses through them. Express permission to run smtp, dns, web, ftp, etc. Install instructions for Linux/UNIX. DirectTV will act as primary or secondary DNS for my domain if I want them to. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: ipchains/ssh
Is the syntax actually -s any/0? What happens if you remove -s any/0 completely (that should be the same as matching anything, right?) On Tue, 04 Dec 2001, Joseph L. Hill [EMAIL PROTECTED] wrote: Hi, I added the following rule to ipchains.sh on a RH 7.2 server but I still can't ssh into that server. ipchains -A input -j ACCEPT -i eth0 -s any/0 --dport 22 -p tcp if I stop the ipchains service then I can ssh in, (so it's not a tcpwrap issue). * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: ATT, Excite@Home and MediaOne
I think we (former MediaOne customers) are OK; I believe this is because M1 had all of the infrastructure in place before ATT bought it, i.e. networks and servers (dns, dhcp, smtp, pop, etc..), and that was kept. We were offered to go thru the Excite@Home Portal, but I'd gather most on the list feel that is no big loss (portals are for weenies). http://help.broadband.att.com/faq.jsp?content_id=lobid=1 Has ATT Broadband migrated its former MediaOne Road Runner customers to the Excite@Home platform? No. We have not migrated customers to Excite@Home's platform nor does ATT Broadband use the Road Runner network. As part of previously announced agreements, we have incorporated parts of the former Road Runner network into an ATT Broadband network. Customers served by this network do receive Excite@Home content. I may be misinterpreting this, but I think we are OK. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: ext3
Some newbie questions if you don't mind... If you are running ext3 (or xfs) on a, say, 20GB partition, and you pull the power plug out and then back in, how much longer is the boot process over that of a clean boot? Also, suppose, as an expt, I was untarring a big 100MB tarball when I pulled the plug. Any notable plusses over the state of the file system after reboot vs. the same expt done on ext2 (and after ext2's fsck)? Thanks, Karl On Mon, 03 Dec 2001, Paul Lussier [EMAIL PROTECTED] wrote: We are about to set up a webserver here (RH 7.2), and would be very interested in anyones experience with any of the journaling filesystems particularly ext3 since that's what RH provides. ext3 is reportedly pretty stable. It has the andvantage of being able to be seen as ext2 in case you need to re-install with something that doesn't support ext3. I don't know how it performs, though, since I really haven't done much with it. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Hi
* To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Hi
OK, no cracks about the null email. I went spasmo with ^D instead of ^C. Let me take this opportunity to correct a statement I made at last night's MELBA meeting: I implied my wife doesn't have the root passwd on her Linux desktop, upon reflection she does! With a passwd she chose way back in 1995 no less. Sorry for the noise, Karl On Fri, 30 Nov 2001, [EMAIL PROTECTED] (Karl J. Runge) wrote: * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. * * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Remapping Mouse buttons
On Tue, 13 Nov 2001, mike ledoux [EMAIL PROTECTED] wrote: Wow. I've been wanting to do this for years, and couldn't figure out how. Good! I hope it works. I feel there are a lot of untapped jewels in the accessx and other /usr/X11R6/lib/X11/xkb/compat functions of the X server, I just haven't had the time to play with them all. Now my fvwm configuration is complete, and I can throw away all my mice. I'd be interested in seeing the xmodmap's you came up with. I tried to go mouseless: in addition to the MouseKeys button click mappings, in Fvwm I make Alt+arrowkey move the mouse 15% (of screen length) in the arrow direction, and Shift+Alt+arrowkey move mouse 1% for finer control. Alt-O warps the mouse to center of screen. These are useful in emergencies or when using the laptop, but I found it too awkward to get used to it for moving the mouse in general. If you found a better set of mappings that allows you to go mouseless more easily I'd like to see them! Speaking of minimizing the mouse, there is a great utility called xwit(1) (X window interface tool) for manipulating the mouse and other X things from inside shell and perl scripts (or any of your scripts or programs). I use it as a very cheap way to make X applications using xterm and a shell script. Suppose, for example, you have a program that is launched via: xterm ... -e my_shell_script (lauched, say, by hotkey, some program, or other event) Then in my_shell_script you can do things like: xwit -iconify # iconify the window (e.g. xterm in this example) xwit -pop # de-iconify the window xwit -warp 5 5 # warp the mouse to the window (5 pixels from corner) and lots of other fun stuff (e.g. translate the whole window or resize it). I even call it from tcl/tk scripts since it can warp the mouse w/o much fuss. My point here, WRT going mouseless, is that the application you write can automatically warp the mouse for you to set the focus to the application, instead of the user having to physically move the mouse. Sometimes useful. Unfortunately xwit is usually not included in distros; I always carry around Linux and Solaris binaries of it where ever I go. http://www.ensta.fr/internet/unix/misc/xwit.html * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: XFree86 4.1.0 problems
On Fri, 16 Nov 2001, Benjamin Scott [EMAIL PROTECTED] wrote: Well, when you only have 5 different video cards and a dozen monitors, support is easy. We PC folks have things a bit harder. Of course, we can buy 10 PCs for what one Sun costs :-) Please let me know where I can pick up these PC's with 256MB RAM, 20GB HD, 8MB Video RAM, 17 monitor, and 48x CD-ROM for $150 each. 32-bit is OK. I'll buy a couple of those for my kids for Xmas, that beats the heck out of American Girl doll prices. ;-) http://www.sun.com/desktop/sunblade100/ http://store.sun.com/catalog/doc/BrowsePage.jhtml?catid=60357 * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: And now for a rant...
Hi Paul, Could you give more detail on what you are trying to do? It sounds like you are trying to write a program or script that is portable across the various distros (or, how dated of me, multiple Unixes). That sort of portability is a GoodThing! Anyway, from your listing of the /etc/ release files it seems like you are on the road to an alogorithm and I just wanted to know what sort of problem you were currently addressing. On Wed, 14 Nov 2001, Paul Lussier [EMAIL PROTECTED] wrote: Why can't there be some standard way of discovering release information from the various distributions? For example: RH has /etc/redhat-release Mandrake has /etc/mandrake-release Debian has /etc/debian_version SuSE has /etc/SuSE-release And each one of them is completely different, to the point where writing a script to provide uname(1) like output for the various pieces of data one would care about from a distribution is almost a futile effort. (actually, Debian in this case is the real pain, since they don't even provide a release number!) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Remapping Mouse buttons
I don't know how to do exactly this, but I do know how to map Keystrokes to Button clicks using the MouseKeys functionality: --- #!/bin/sh # From X11 MouseKeys feature, see /usr/X11R6/lib/X11/xkb/compat/mousekeys echo Press the \Home\ key to toggle this feature on and off echo Press the \End\ key to simulate a Button1 doubleclick xmodmap -e keycode 97 = Pointer_EnableKeys # Home key for toggling xmodmap -e keycode 103 = Pointer_DblClick1# Map End to doubleclick 1 # one could use 103 = 115 to use the Left Windoze Flag button. --- So, after running the above, you would hit Home, hear a long beep, then hitting End send DblClick1. Hit Home again to get back to normal End. I use the above sort of thing to simulate various button clicks and even drags on my laptop (I remap those stupid windows only keys 115, 116, and 117). With a little playing around you could get this to map Button 2 to to Pointer_DblClick1, but I don't see how. I imagine it could be done... HTH, Karl On Tue, 13 Nov 2001, Paul Lussier [EMAIL PROTECTED] wrote: Hi all, Does anyone know how to remap the functions of the standard mouse buttons? A friend asked me if he could remap mouse button 2 to be the same as a double-clicked button 1 instead of paste. I looked all over the menus on his system (RH7.2/Gnome/Sawfish) but couldn't find where to configure this. Anyone have any ideas? * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Remapping Mouse buttons
On Tue, 13 Nov 2001, Paul Lussier [EMAIL PROTECTED] wrote: ... Thanks Karl, I'm going to remap my keyboard now so I never need to use a mouse again :) Good, glad you're happy! Downside: once you enable mousekeys via the Pointer_EnableKeys mapping (Home in the example) it seems to time out after a couple of minutes and you have to hit the enable key again. The only way around this I have found is to pass +accessx 0 to the server: e.g.: startx -- :0.0 +accessx 0 ... (timeout of 0 secs means never timeout) I don't know of a config file that sets the +accessx 0 (besides hacking the startx script). I have trained my family to start their X sessions from the cmd line using wrapper script I wrote that sets all of these good things. BTW, mousekeys is from the handicapped/accessibility part of X11. Good stuff in there. Not well documented, you have to look around in /usr/X11R6/lib/X11/xkb/compat and search usenet, etc. I'm guessing one could figure out how to map Button_2 - DblClick_1 but I don't have the time to play with it. Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Streaming media (was: NHPR bitcasts)
FWIW, here is a LUG that at least tries (tried?) to broadcast its meetings via multicast. I'm not saying it is easy, but at least it can be done, even on this small a scale. I agree the chances of multicast being used by the unwashed masses seems to be pretty slim, oh well. http://www.svlug.org/mbone.shtml On Sat, 10 Nov 2001, Benjamin Scott [EMAIL PROTECTED] wrote: On Sat, 10 Nov 2001, Philip M wrote: Multicast is not used because it is a myth in the context of the internet. I was afraid the answer was going to be something like that. *sigh* * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: VPN via SSH (was Proxy Question)
On Wed, 7 Nov 2001, Ken Ambrose [EMAIL PROTECTED] wrote: ... policy violation), is VPN via SSH. Honest-to-goodness VPN, that is, no pansy port-redirection. Wot!? Only a pantywaist would tunnel PPP thru ssh! Real-men (and Real-women, e.g. my wife :-) build their own VPN's with ssh and a whole lotta port redirs (web, shells, X, vnc, ...). Inelegant, yes, but it works around a number of the the other VPN issues (IPs, routing, DNS, ...) nicely. Please note: ;-) (I myself use the ppp+ssh trick on occasion when it is more appropriate, but most of time I find a slew of port redirs optimal for what I do.) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: VPN via SSH (was Proxy Question)
On Thu, 8 Nov 2001, Joshua S. Freeman [EMAIL PROTECTED] wrote: is there any place you can point newbies to that discusses the subtleties of port redirection on Linux? (or any other OS, for that matter) These may be a good start. Port redirection is a method used in all of them, you may have to search around for it. Some are out of date, (I think I am the last person on earth using term :-) but explain the concepts well. http://www.ibiblio.org/mdw/HOWTO/mini/Remote-X-Apps.html http://www.ibiblio.org/mdw/HOWTO/mini/Secure-POP+SSH.html http://www.ibiblio.org/mdw/HOWTO/mini/SLIP-PPP-Emulator/index.html http://www.ibiblio.org/mdw/HOWTO/mini/Term-Firewall.html http://metalab.unc.edu/pub/Linux/docs/HOWTO/unmaintained/Term-HOWTO Please feel free to ask me (on- or off-line) any questions or how to do an example you are interested in. Before you know it, you'll be doing your own gnarly port plumbing :-) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Sawfish, Enlightenment.. any RH 7.1 WM
On Mon, 05 Nov 2001, Rodent of Unusual Size [EMAIL PROTECTED] wrote: Thanks! Something persistent and generic would be great; at this point, I'll take any stort in a prom, and that sounds like a good one. Okey, I'm askin'. The thing that stumps me [most] is making/keeping the association with the different desktops/viewports. Ah, you replied! You've called my bluff, now let's see if I help you out. One simple model is to assume the windowmanager does the right thing when given an XY geometry position that is outside the screen width or height: i.e. it will plop it over into the desired view port. E.g. suppose your screen res is 1280x1024. Does a command like: rxvt -geometry +1300+1100 plop the rxvt over one horizontal viewprot and down one verticle viewport? This works for tvtwm, cvwm, olvwm, fvwm, and enlightenment. Does it work on sawfish? I don't know; I don't have it installed. I would HOPE something like this would persist, but one cannot count on it absolutely. So suppose you made the following script and called it rxvt.launch and your ~/.xinitrc (or whatever) calls rxvt.launch (say near the bottom): - #!/bin/sh -- # A comment mentioning perl eval 'exec perl -S $0 ${1+$@}' if 0; $LX = 1280; $LY = 1024; # try to adjust to local display screen size: if ( `xdpyinfo` =~ /dimensions.*\s(\d+)x(\d+)\s.*pixels/ ) { $LX = $1; $LY = $2; } $yshift = int(0.35 * $LY); # Y shift downward in each room. $cmd = -e sh -c 'date; sleep 10; tput bel'; # for testing, they beep and exit. #$cmd = ; # for real # place windows in the various virtual rooms: foreach $nx (0, 1) { foreach $ny (0, 1) { foreach $m (0, 1, 2) { $x = $nx * $LX; $y = $ny * $LY + $m * $yshift; system(rxvt -title 'I_AM:$nx,$ny,$m' -geometry 80x25+$x+$y $cmd ); } } } - Then this will start up 12 (!) rxvt's: 3 in each viewport (aligned vertically and flush left) in each of viewports 0,0 0,1 1,0 and 1,1. I hope this is close to what you want. Instead of code you can just hardwire in 12 rxvt -geometry ... calls in ~/.xinitrc if you want. To go onto other virtual desktops, there is a mechanism in fvwm where you can say something like: xterm -xrm *Desk:2 -geometry +1300+1100 and that will put it in viewport 1,1 on the 3rd virtual desktop. I do not know if any other window managers besides fvwm supports the Desk:N X resource hint. Also, some apps barf on the -xrm (X resource manager) cmd line option. Your rxvt for example :-( HTH Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Sawfish, Enlightenment.. any RH 7.1 WM
On Sun, 04 Nov 2001, Rodent of Unusual Size [EMAIL PROTECTED] wrote: I really don't have a lot of time or energy to devote to figuring out and debugging this crap; I need a cookbook. Does anyone have any idea how I can tell either Sawfish or Enlightenment -- or some other easy option -- that I want two rxvt windows placed *here* in desktop 0, two placed *there* on desktop 1, and so on -- and have it remember all the pertinent details? Why not do it the old fashioned way in your ~/.xinitrc shell script; just write a little loop or two to launch the rxvts. This separation may help you from getting bitten the next time you change WM or GUI. If you don't know what I am talking about for this little loop in .xinitrc, just ask me. Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Quantum DLT 7000 drive hardware compression
On Sat, 03 Nov 2001, Paul Lussier [EMAIL PROTECTED] wrote: I agree that bzip2 is great, however, isn't there some instance where gzip works and bzip2 doesn't? I seem to remember something about bzip2 doesn't work well with streaming I/O due to it's block-based design. I don't know what you mean by not work well. My guess is it would always work (in addition to the advantage of block recovery). Seems you could always force the issue by: # tar -cf - dirs | bzip2 | dd of=/dev/nrmt0 bs=NN # dd if=/dev/nrmt0 bs=NN | bzip2 -d | tar -xf - ... then I can't see how tar or the tape drive know anything about the stream being bzip2, gzip, or raw data... On my next backup of my home LAN (4-5 4GB tapes) I'll try to rememeber to use bzip2 instead of gzip and let you know if there were any problems. Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: Quantum DLT 7000 drive hardware compression
Why don't you guys try bzip2(1). The b stands for block compression, and so can recover from bad blocks. bzip2recover evidently aids in this. Also, bzip2 compression seems to be about 10-20% better than gzip... (e.g. the linux .bz2 kernel src tarballs) On Sat, 3 Nov 2001, Benjamin Scott [EMAIL PROTECTED] wrote: Hiss! The problem with tar+gzip is that gzip lacks error recovery. If you have just one bad block, the entire archive from that point on is toast. I had that happen once. That was one time too many. I don't doubt what you say, however, I believe the problem has been rectified. As far as I know, it has not. None of the documentation for gzip or tar say it has, and the docs for tar says it has *not*. Can you point to something somewhere that says otherwise? I would be glad to believe you! But I'm paranoid, and really would like to ensure that data written by one drive can be read by a different one :) I'm paranoid, too, which is why I won't trust gzip+tar, without some evidence that gzip's error recovery has improved. :-) * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: kernel sources
On Fri, 2 Nov 2001, Ken Ambrose [EMAIL PROTECTED] wrote: Oh: speaking of sentimental FTP sites, we've got some x-DEC-ies on this list -- whatever happened to ftp://gatekeeper.dec.com? It's still there, Speaking of sentimental FTP sites that are close to the GNH area how about ftp://tsx-11.mit.edu ? The toplevel welcome there thanks maddog for the DEC hardware. The response to that machine from my home is so quick, it seems like it is on my LAN! Too bad the site is getting a bit old, the latest kernel tree they have there is v2.3... duckforcover Come to think of it, with all the VM woes, the current kernel still *is* in the 2.3 tree :-) /duckforcover * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: kernel sources
Doesn't sound weird to me... www.kernel.org Here's a weird question. Where does one go to get a set of kernel sources ? I'm looking for something distribution neutral. I've done it once but can't figure out where I got it. * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
Re: linux file sharing
On Sun, 28 Oct 2001, Derek D. Martin [EMAIL PROTECTED] wrote: On Sun, Oct 28, 2001 at 08:58:21AM -0500, Ron Peterson wrote: NFSv2 and v3 are both insecure. If the client computer is on my desktop, I can reinstall Linux, give myself root, and then connect as any user I want. ... If you want to learn how to manage Kerberos, that may work for you... But I'm not sure if there is a good implementation of kerberized NFS for Linux. I think this again may be in the realm of NFSv4. If someone is bold enough to try it, I'd love to hear a report of how NFSv4 works in solving this problem on Linux in a business situation. An open source implementation is at: http://www.citi.umich.edu/projects/nfsv4/index.html I don't know how robust this is, but perhaps it is ready for some folks to do a limited test deployment (i.e. some guinea pigs at work). Or even just a careful critique w/o actually installing it. Personally, I am not so interested in the bugs in the above implementation since those can be fixed, but I am more interested in if this sort of thing effectively solves this file-sharing problem in the Real World(tm). Presumably when a user logs in (on a machine) correctly with his Unix passwd that gets a kerberos ticket to allow access to the NFS shares and etc. This sounds good but I can see some things that are out of scope (e.g. the physical security of a box: an evil employee installs a hacked nfsv4-ized linux kernel on a lab machine and waits for an unsuspecting employee to log into it). Karl * To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *
PrismII WLAN driver recommendations?
Hi, I just slurped up some D-Link 802.11b wireless lan cards (DWL-650) at Best Buy for $69 (after rebate) per PCMCIA card. This is to upgrade my 2 Mb/s wlan to 11 Mb/s, I hope it goes smoothly... I see at: http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/ there seem to be several Linux drivers that support this PrismII chipset orinoco_cs, wvlan_cs, prism2_cs (wlan_ng?), and perhaps others. Does anyone have any recommendations among these drivers? We occasionally need to boot Win98 on a laptop that will have one of the D-Link cards and have it interoperate with a linux gateway with a card. Also, I believe I'd like to have the WEP encryption as well, but, sadly, WEP has recently been cracked: http://airsnort.sourceforge.net/ :-( Thanks, Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: IP Address
On Tue, 23 Oct 2001, Derek D. Martin [EMAIL PROTECTED] wrote: Yes! # ifdown ethX # ifup ethX Where X is the ethernet interface number, i.e. eth0. This works for Red Hat, not sure about others. It may depend also on the client you use to get your IP. RH uses pump by default, but many others use dhcpcd. YMMV. But there's definitely a way to do it. I've never used pump, but it seems to have --release (-r) and --renew (-R) options. dhcpcd will do a release when it gets SIGHUP (dhcpcd -k will do this for you), but I don't see how to make it do a renew. All that said, I use Derek's ifdown/ifup method meself. :) Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: canonical pathnames
Have a look at realpath(3). I think it is close to what you want. It is a C interface, so you'd have to write a tiny C program to call it if you want to access it from scripts, etc. Perl may also have access to realpath thru a module, so it could be embedded in a script that way. I haven't checked. Karl On Sat, 20 Oct 2001, [EMAIL PROTECTED] (Michael O'Donnell) wrote: Let's call the canonical pathname of a given file the absolute pathname which is most direct ie. has no instances of . or .. in it. So, if I have two directories /a/b/c and /d/e/f and a file named XYZZY in c, we can refer to it by many different pathnames, both absolute and relative. For example, assuming we're standing in directory e all of the following can refer to XYZZY but only the last is the canonical pathname: f/../../../a/b/c/XYZZY ./f/../../../a/b/c/XYZZY ../../a/b/c/XYZZY ../../a/b/../b/c/XYZZY /a/b/c/../c/XYZZY /a/b/c/../c/./XYZZY /a/b/c/XYZZY What I'm looking for is something that will provide the canonical pathname of a file no matter how one refers to it. I can write a script to do this if I must but I'm hoping this capability already exists. ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: no keyboard/mouse
I might be missing what you are referring to... but what is wrong with just unplugging them and turning the computer back on? My firewall box is a 486 with no keyboard, mouse, or monitor (it has an old video card, I haven't tried removing the video card yet: I'm curious what happens!!!). Once it boots I just access it thru ethernet or, as backup, via a serial cable (getty) between it and my workstation. On Thu, 18 Oct 2001, Tom Rauschenbach [EMAIL PROTECTED] wrote: OK, I'll admit I have not read the HOWTO or the FAQ. Reason is, I don't know what HOWTO or FAQ to read. I've got a machine I'd like to be able to run with no keyboard, mouse and ultimatly, no monitor. Does anyon know how to do this ? Can it even be done ? Hopefully I can find this out without subscibing to a Beowoulf group. ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Setting your own IP address manually
On Thu, 18 Oct 2001, Benjamin Scott [EMAIL PROTECTED] wrote: I don't believe this is possible. to use other Cable modem IP's Some people seem to think it is. I wouldn't know -- I can't get cable Internet! :-( Anyone out there on my ATT cable modem subnet: 24.147.88.0 - 24.147.95.255 (Bedford/Manchester NH) is free to try my current IP: 24.147.89.149. Please let me know what you find out :-) In fact, I vaguely remember a few months ago Ben pooh-poohing my statement that the DOCSIS CM encryption and authentication ... Er, I didn't even know DOCSIS CM *had* encryption and authentication of that sort. I vaguely remember stating that I wouldn't trust the cable company to keep things secure for you, but I can't even find that much in my sent mail archives. I went to http://www.mail-archive.com/gnhlug@zk3.dec.com/ and found the thread was from Sep 2000. Where has the year gone! Anyway, you made a good point something like: It is a false sense of security if your internet connection is encrypted from Cable-Modem to the Head-End, but then goes out in the clear to the internet. I agree with this, and wouldn't want to lead anyone to think the DOCSIS Cable modem encryption leads to a complete security solution, but I still feel it is a pretty good thing to keep one's Cable modem subnet neighbors from sniffing or trying to impersonate you. The CM by the way it works (with the MAC) currently makes this rather difficult, coupling that with DOCSIS Baseline security it would be extremely difficult (DES is crackable, but still very expensive). For those interested, a description of the DOCSIS Baseline Security is at: http://www.broadcom.com/ed-security.html ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Linux on Dell Inspiron 8100
On Tue, 16 Oct 2001, Ken Ambrose [EMAIL PROTECTED] wrote: It does -- most certainly. I've been in *DOS*, doing *NOTHING*, and the fans come on on my Sony. Beats the hell out of me what's going on. Boot to Linux, and, after the initial kernel load and boot, the fan's off within 20 seconds. Go figger. (I've also observed similar behavior in other notebooks, and all flavors of Windows.) The OS can send the CPU the halt instruction (I think it is called HLT on Intel) when there is no work to do. This saves power. Early versions of DOS and Windows didn't do this, they just let the CPU run full bore. At some point Windows switched over to using the HLT instruction, I don't know when, but as a pure guess I'd say Win98. BTW, distributed computing projects like distributed.net say things like put your wasted CPU cycles to use!. Well, having the CPU non-idle actually does cost more money in the extra power it uses. Not a lot, but it is not really completely free as they seem to be implying... I don't know if 20 Watts is a good estimate for how much power is saved by idling the CPU, but if so that is about $20/year. That's not much, but if you have SETI running on 100 lab machines at a university, that's maybe $2000/year... Linux kernel does the intel HLT stuff in the file: linux_src/arch/i386/kernel/process.c ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Setting your own IP address manually
On Wed, 17 Oct 2001, Benjamin Scott [EMAIL PROTECTED] wrote: stealth mode firewalls, etc and when you think you have found an unused IP address, there could be, and likely is, somebody using it. The fact that this is even possible is yet another reason why cable Internet, while nice and all, is just not all it is cracked up to be. I don't believe this is possible. The MAC address of the cable modem plays an important role. The cable modem (CM) decodes from the downstream only the part of the signal intended for it. It is *not* as simple as ethernet, where you can pretend to be someone else just by typing their IP into your config. Or can listen to everything on the segment in promiscuous mode. The head-end equipment must set this (CM-MAC + PC-IP correlation) up in the downstream signal it broadcasts. Consider this puzzle: if two CM's were associated with the same IP at the same time how would the head-end know when to flip the MAC's back and forth in the stream of packets returning to that IP via downstream? My guess is that it would be fixed on one of them. I have since deleted the earlier posts, where I think people have claimed this works, and I can't recall the details of their claims. I would guess there is a window of opportunity to reuse an IP before another CM gets associated with it and that probably explains how this manual use of IP's seems to work. (I have done this by hand myself when dhcpcd wasn't working, and I just ran ifconfig with my previous IP manually, and it worked) I also believe I read that the CM intercepts the PC's dhcp requests and takes care of it between the head-end equipment and the DHCP server. My guess is that the correlation between CM-MAC and PC-IP takes place at that point (also, the PC's MAC is evidently used for ID). Note, if one is an electronics wizard one could build his *own* CM that sniffs the RF and listens in on traffic to or from for any CM+IP in the local area, and similarly could transmit data via a bogus RF signal masquerading as the CM corresponding to that IP. But that is different from what people were claiming. In fact, I vaguely remember a few months ago Ben pooh-poohing my statement that the DOCSIS CM encryption and authentication (it uses public-private RSA keys between modem and head-end to exchange a session key for use between the CM and headend) is a Good Thing. It solves exactly the problem Ben is saying is a pitfall of Cable internet! Anyway, I apologize for rambling on and not really proving anything! Perhaps I should have dug around on the net to find answer whether this is possible or not. Too sleepy now... maybe someone on the list who worked at Lancity knows the full answer? Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Secure Linux.
Actually, the amusing part, to me, was that mainstream operating systems often lack critical security features that could enforce the confidentiality and integrity of network communications. I wonder what mainstream OS's they might be talking about :-) Nice try, but I imagine they mean stock Linux, OpenBSD, AIX, Solaris, ... and Windoze do not have the security features they are talking about. I'm not an expert, but this stuff they are talking about has to with access controls and careful data flow protection way down in the kernel. They are not making any changes to the application that run on Linux/Unix. Sun has Trusted Solaris (www.sun.com/trustedsolaris) which I believe is in the same ballpark. I'm sure the other Unix vendors have similar offerings. ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Microsoft retires Windows NT
Most people don't know it, but NT stood for New Terminology ;-) No need for people to be melancholy since this Rename and Claim spirit is alive and well at M$... On Thu, 4 Oct 2001, Mark Fearer [EMAIL PROTECTED] wrote: Subject: Microsoft retires Windows NT http://microsoft.com/ntserver/ProductInfo/Pricing/discon.asp ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Windowing changes from RH 6.2 to 7.1
On Thu, 04 Oct 2001, Rodent of Unusual Size [EMAIL PROTECTED] wrote: I *really* detest seamful upgrades.. Me too. That and laziness is why all of my machines here at home run RH 5.2 :- Nobody seems to agree with me, but IMHO I feel problems like what you described are one of if not the biggest thing that will hold back OSS. Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: 2.4.10 rocks :-)
Is it someone's desktop or is it just a remote server / compile box? FWIW, my armchair theory is that the VM mis-management is seen most obviously for a desktop box, with say lots of piggish interactive apps running. E.g. takes 30 secs to de-iconify a netscape window. I may be wrong, since the above description applied to the 2.1.120+ poor VM algorithm I mentioned earlier (ancient history I guess...). There, if I had a tar ... | gzip foo.tar.gz pipeline running, involving say 50 MB of data, the kernel would over-eagerly try to cache/buffer all of that data in RAM in case it needed it again (as a good server might want to do). However, this caused all the big interactive apps (netscape, acroread, xemacs) to rapidly page out, making interactive response awful. This scenario may not apply to 2.4.x series, but it may be something close. Thankfully, I have not done more than 1 hr of work on a machine running 2.4 kernel. Karl On Tue, 02 Oct 2001, [EMAIL PROTECTED] (Michael O'Donnell) wrote: I can testify that not ALL instances of 2.4.x are broken. One of the machines I use at work is an SMP Mac that normally has multiple users logged in running multiple simultaneous builds and generally beating on the system pretty thoroughly with heavy compute and I/O loads (kernel compiles) and memory loads high enough that we drive it into swap even though it has 512Mb of RAM. It ran for nearly a year on 2.4.0-test10 and basically never went down except during power failures or for maintenance. We upgraded it to 2.4.10-pre8 approx 1 month ago and I see no difference in reliability so far. ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: 2.4.10 rocks :-)
Do we mean rocks or simply does not suck? I have not followed the kernel development mailing list for a very long time... Does anyone know why the linux kernel often seems to lurch back and forth with respect to VM/memory management? I remember a terrible sequence of kernels late in 2.1.x development where VM/MM got really bad and for a few cycles people would say, oh that's been fixed in 2.1.x+1, but it wasn't (maybe it was fixed for *their* machine). That was the last time I ran the current linux kernel on any of my machines... I'm sad to see this go-round of poor VM is evidently still settling out after 10 cranks of the stable 2.4 series! ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Woman's Lawsuit Targets Technology
On Tue, 25 Sep 2001, Charles C. Bennett, Jr. [EMAIL PROTECTED] wrote: Check this out - a Fair Use lawsuit in play. http://dailynews.yahoo.com/h/ap/20010919/tc/cd_suit_1.html Does anyone know what happens if you put one of these SunnComm protected CD's in a Linux box? Given that the CD's are supposed to play in older equipment, I'd half guess they would work on Linux ... ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Woman's Lawsuit Targets Technology
On Tue, 25 Sep 2001, Rich C [EMAIL PROTECTED] wrote: My guess is they've dinked around with the multisession format of the CD. Don't forget, the average dumb CD player has to find the audio tracks in the normal way. It's the computer that can't. So they probably formatted it as a multisession CD, but somehow the CD-ROM drivers only recognize it as a single session digital CD, and don't see the extra audio tracks on the disc. I think you're on the right track (pun intended??), there is a good discussion at: http://www.cdrfaq.org/faq02.html#S2-4-4 The idea behind this protection is to make it hard for CD-ROM drives to identify the disc as being an audio CD. The disc is multisession, and uses a hacked TOC, so track rippers and disc copiers have trouble dealing with it. ... ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: rdate server?
On Tue, 25 Sep 2001, Stephen Ingham [EMAIL PROTECTED] wrote: I am trying to set up a time server on an isolated network (No Internet = Access) that the clients can use 'rdate' to synchronize their system = times. Question: What time server program should I use? (I haven't been able = to get 'ntpd' to work) If you are going to be using rdate (which I think is fine for nearly all setups, unless sub-second synchronization is needed) then something like this in /etc/inetd.conf is what you want: timestream tcp nowait nobody /usr/sbin/tcpd in.timed timedgram udp waitnobody /usr/sbin/tcpd in.timed The server is /usr/sbin/in.timed in this case. I hear that modern Redhat versions use /etc/xinetd.conf instead of the above, so it could be slightly different. Please ask if you need more details. ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Nimda worm/virus attacks Microsoft systems (was: What happened?)
On Fri, 21 Sep 2001, Benjamin Scott [EMAIL PROTECTED] wrote: On Thu, 20 Sep 2001, Karl J. Runge wrote: Consider what happen would if an execute arbitrary commands exploit in Apache httpd popped up. Then attackers would be able to execute arbitrary commands as the nobody user, which has no access to anything on a proper system. Agreed (and I said the above in my post). Even still it would be a COMPLETE MESS. The net would be swamped as it was with code-red IIS exploits and all vulnerable servers would be exploited within a few hours because apache is the most used webserver. (BTW this would require exploit in the core/default apache functionality to be as fast as code-red). Exploited websites would be easily defaced by the modified server (e.g. this could be done entirely in RAM). And what fraction of the 18 million apache servers are free from a local root exploit? (I know Ben's answer: 1 - the fraction that deserve to be 0wned :-) Apache is well designed and delivered, and the Unix model and practice is way better than Microsoft's. Still, I think there is some reasonable chance this sort of thing could happen to apache. Besides the mess, just the thought of the FUD marketing Microsoft would spew from widespread apache exploit makes me want to go start my own personal audit of httpd! ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Nimda worm/virus attacks Microsoft systems (was: What happened?)
On Thu, 20 Sep 2001, Jerry Feldman [EMAIL PROTECTED] wrote: We should not gloat over Microsoft's security lapses. While there are many many security holes in Windows and related products, the sheer number of installed product makes them by far a prime target. As the Linux (and BSD) market shares grow, we will become targets, and many of our security weaknesses will be exposed. We (our colective OS) have a much more stable system, but must not become too complacent. Indeed. Consider what happen would if an execute arbitrary commands exploit in Apache httpd popped up. I doubt the majority of web administrators would patch it quickly enough to prevent something like code-red happening. (running as user nobody likely helps a lot, but it would still be pretty ugly PR is my guess ...) Question to Ken Coar: Is there an apache tiger team working to prevent this sort of exploit? ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Need advise on a dead keyboard.
One thing to do in this case is to telnet in from the other machine, become root and run a command like: # switchto 2 which should switch you to VC #2. Hopefully that will give you a live keyboard. If the keyboard was working but the output missing (I've found running some games can do this), then you could type (blindly) in the switchto(1) command at the console. Setting up restoretextmode(1) (say via a short alias) can be useful too. It may also be possible to start up xdm (or even startx) from the remote login (perhaps open(1) is required can't recall...). There is some chance when the X server restarts it resets the keyboard and mouse. Karl BTW: I assume at the frozen keyboard you have already tried things like Ctrl-Alt-F2 or Alt-F2 to try to shift over to, say, VC #2, on the off chance it is stuck in VC #7 (the VC X typically uses). On Sun, Sep 09, 2001 at 11:27:55PM -0400, Steven W. Orr wrote: I have an intermittent behavior regarding my keyboard and I was hoping someone here might have a clue what's going on here: Every so often, I decide to exit X just for the purpose of restarting it (X). The server can get pretty large after a while. Sometimes, not everytime, I'll exit out of X and my keyboard will be dead. The lights will not respond or anything else on the keyboard. Also the mouse is dead. If I go to another machine and telnet over, I can reboot it. But I'm getting pretty damn tired of this. I'm running RH-71./XFree86-4.0.3/kde/2.1.2 Any advise from anyone here? ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Political activism for Linux users/advocates
Not that one should (that is, for optimal effect upon lawmakers) admit association with or act like RMS, but his Right to Read fictional piece seems to be getting less fictional as the years go by... http://www.gnu.org/philosophy/right-to-read.html ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Celebrate Unix time hitting 1 billion tomorrow...
On Sat, 08 Sep 2001, Jerry Feldman [EMAIL PROTECTED] wrote: My department is having a party tonight. Then you all should party like it's 9 :) It's good timing for a rollover party here in the East: Sat evening. With more notice maybe we could have scheduled a Martha's get-together (however that would require someone with wireless internet, i.e. NTP, access). Anybody know of any utilities that will break because of the rollover? I imagine some homebrew programs and scripts will break (e.g. using time() as a timestamp label, and then sorting lexically instead of numerically) but I doubt anything big will have problems. Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Celebrate Unix time hitting 1 billion tomorrow...
People like me w/o lives are invited to a party tomorrow night at: Sat Sep 8 21:46:40 EDT 2001 when Unix time will rolls from 9 to 10. As good a reason to have a party as any other ;-) Cheers, Karl % date +%s -d 'Sat Sep 8 21:46:39 EDT 2001' 9 % date +%s -d 'Sat Sep 8 21:46:40 EDT 2001' 10 ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Quote of the day
On Fri, 7 Sep 2001, Benjamin Scott [EMAIL PROTECTED] wrote: From this article: http://www.cfo.com/printarticle/1,4580,0|83|AD|4818,00.html It [Linux] actually has been mildly frustrating that so many people are unwilling to pay us for service and support because the damn thing never breaks.-- Daniel D. Frye, Director, IBM Linux Technology Center IBM, of all companies, shouldn't have too much trouble remedying that ;-) ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Derek Martin's email unreadable?
On Mon, 3 Sep 2001, Jerry Eckert [EMAIL PROTECTED] wrote: During the past two weeks I've received several messages from Derek Martin (posted to the list) which have been unreadable in MS Outlook 98. In each case the message flag was set, and I get the error Can't open this item. A follow-up flag must be 100 characters or less. when I attempt to open the message. Has anyone else experienced this problem? No problem from Linux, but I did note that Derek has an angry young man message header: X-message-flag: MS-Outlook is not Internet standards compliant and contains numerous major security flaws. Please upgrade to a proper mail client, such as Pine (www.washington.edu/pine/) or Mutt (www.mutt.org) which is pretty long. Derek: keep the header, shorten up the message ;-) ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
RE: Derek Martin's email unreadable?
Looking into this a bit more I went to the http://www.rodos.net/outlook/ I believe someone on the list pointed us too. As an aside, I see there a pointer to a link to a M$ page that has this gem of an FAQ about Outlook, mail readers and virii: Will the virus impact my Macintosh if I am using a non-Microsoft e-mail program, such as Eudora? If you are using an Macintosh e-mail program that is not from Microsoft, we recommend checking with that particular company. But most likely other e-mail programs like Eudora are not designed to enable virus replication. http://www.microsoft.com/mac/products/office/2001/virus_alert.asp Now that's pretty funny! not designed to enable virus replication. ;-) ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: a good laugh
On Tue, 28 Aug 2001, Joseph L. Hill [EMAIL PROTECTED] wrote: This is good for a laugh; Microsoft decided to dropped support for the plug-ins -- additional software that lets users play music, watch videos or perform other tasks -- in favor of Microsoft technology called ActiveX. Microsoft spokesman Jim Cullinan said the move was for increased security. I'd laugh, except for the fact that Microsoft marketing has a very good chance of successfully pulling off things like this. All part of the XP nirvana you are headed toward! ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Privates visible in public?
It's OK to use private IP addresses in creating a bridge and other sorts of junctions, correct? I'm not saying this what mod saw is a bridge, but remember how traceroute works: it sends UDP packets but sets the total number of hops (TTL) so that it won't get there to the destination, then it waits for the ICMP error packet to come back and looks at where the ICMP error packet came from. Then it increments the TTL by one and repeats. Unrelated to this, I've had numerous problems going to some websites where it sent back TCP packets with SOURCE addresses in the private IP range. Weird. My linux firewall drops these and that's how I noticed them. ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Viruses in PDF files revisited
On Thu, 9 Aug 2001, Rich Cloutier [EMAIL PROTECTED] wrote: I don't remember with whom, but we were discussing whether this was possible a while back. I of course was wrong. Here is the proof: http://www.sophos.com/virusinfo/analyses/vbspeachypdfa.html Yes, but it requires the full Acrobat composer, not just acroread (a pdf viewer only). Also, it is based on Visual Basic somehow, so I'd guess that would not affect Acrobat on Unix. I don't remember the discussion and what was claimed, but I just wanted to point out it does not appear to attack Unix or acroread. BTW, I apologize if I've shown this before, but here is a postscript file .ps that not terribly long ago (several years?) could be used to attack ghostscript/ghostview on Linux boxes: %!PS- (%pipe%xterm -e yes Wheee!) (r) file quit but we're all safe now... (is there a smiley that looks like a guy with his fingers crossed???) ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: Code Red math
On Fri, 3 Aug 2001, James R. Van Zandt [EMAIL PROTECTED] wrote: ... I read that the original worm used a fixed seed to generate its random addresses, but that later varients used a random seed. Ah, that would explain what I am seeing better. Thanks! Anyway, just when I thought my analysis method was well established (maybe I could measure how the number of infected systems decreases with time...) I got deluged with 300 additional port 80 hits this afternoon!!! It seems to be a variant (same IIS exploit but different payload) and is coming to me primarily from Mediaone Cable modem (a /16 subnet). Anyone see this today or know what it is? Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: C Question
Perhaps use the pthread_mutex* functions? In particular use pthread_mutex_trylock in polling? (perhaps in a select or usleep loop.. yuck.) Just a quick thought, haven't thought it through... Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: kcookie.netscape.com
On 18 Jul 2001 23:48:57, [EMAIL PROTECTED] (Kevin D. Clark) wrote: Also, I assume that a hidden javascript in a cookie attack is somehow based on trusted zones for a browser (e.g. local html is trusted to run programs, etc). I believe IE has these... does Netscape on Unix? IIRC, for Java, *yes*, Netscape on Unix trusted local HTML. Do you mean something other than the cert advisory on BrownOrifice: CA-2000-15 Netscape Allows Java Applets to Read Protected Resources http://www.cert.org/advisories/CA-2000-15.html that was a bug in Netscape's implemenation of java? If so, do you recall roughly how it goes? Thanks, Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **
Re: kcookie.netscape.com
On Wed, 18 Jul 2001, Lowell Bruce McCulley [EMAIL PROTECTED] wrote: Aha, this may explain some of the occasional glitches and netscape lockups I've been encountering once in a while. Hmm, now I have a better idea of where to start looking for the culprits. THANKS! Do you really think so? Do you feel these lockups are due to someone posting malicious html with links like: a href=file:.netscape/cookiesClick here!/a (or more realistic, say via autoloading somehow..., the above doesn't actually work unless you put in file:/home/mcculley/.netscape/cookies) ? I think there are so many bugs in netscape that is the reason it hangs, not malicious HTML. Also, I assume that a hidden javascript in a cookie attack is somehow based on trusted zones for a browser (e.g. local html is trusted to run programs, etc). I believe IE has these... does Netscape on Unix? FWIW, here are some fun ones I remember from way back when the web was young: a href=file:/dev/zero Trust your Browser? #1 /a a href=file:/dev/mouse Trust your Browser? #2 /a (be careful, netscape still seems to fail them :-) Karl ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body* (*not* the subject line) of the letter: unsubscribe gnhlug **