[SLUG] Re: Re: Preventing attacks
On Tue, Nov 09, 2004 at 06:14:23PM +1100, [EMAIL PROTECTED] wrote: On Tue, Nov 09, 2004 at 02:25:22PM +1100, James Gregory wrote: On Tue, Nov 09, 2004 at 03:31:50PM +1100, Toliman wrote: and it is 'relatively' secure, in that it would hopefully take a p4 a few hours to brute force... more likely in minutes. How long is 'a few hours'? I didn't think things were that dire. Are you talking about a straight brute force or some kind of known-plaintext attack or what? Isn't the kerberos ticket only valid for a few minutes anyway? Only if you want to be re-typing your password every few minutes. One of the features of Kerberos was supposed to be a single sign-on -- obtain a TGT (Ticket-Granting Ticket) and then use that as a password-equivalent until it times out, after which time you need to get another TGT by resupplying your credential (password). Think of it as longer-lived one-time passwords -- you don't have to keep typing your password all the time, but the password you do pass around has a limited life and gets recreated every few hours. - Matt signature.asc Description: Digital signature -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
[EMAIL PROTECTED] wrote: On Tue, Nov 09, 2004 at 02:25:22PM +1100, James Gregory wrote: On Tue, Nov 09, 2004 at 03:31:50PM +1100, Toliman wrote: and it is 'relatively' secure, in that it would hopefully take a p4 a few hours to brute force... more likely in minutes. How long is 'a few hours'? I didn't think things were that dire. Are you talking about a straight brute force or some kind of known-plaintext attack or what? Isn't the kerberos ticket only valid for a few minutes anyway? So 1 hour, few hours ... doesn't matter at the moment. Matt Yeah, that's the big thing. you have a limited period of time to use the token before you have to request another, losing any benefit to the original token. but if you look at the tools that are used to break in, it isnt a quick process. it usually involves surveillance and/or subversively tapping into less secure systems/users to gain elevated privileges over time. like WEP and other cracking methods, the strategy is to watch the KBC/network segment for traffic, to identify the traffic for extended periods and cryptanalyse the tokens for common data, like the domains used, hosts, passwords, users, vulnerabilities on the infrastructure, things like that. but it is essentially brute-force. it could take 1 attempt, or 20 million. or more. the central idea is to test the keyspace, the possible combinations of keys to choose from. since DES's key is 56 bits, the space to check is reduced, also using differential cryptananlysis and other methods. the same problem does not exist in 3DES, or AES, the brute force combinations are exponentially more difficult, it would require some very kooky math to weaken AES - reduce the possible combinations for a brute force to reduce the time necessary. hours might be pushing it, sure, and CISC/RISC processors are not that fast at non-specific tasks like DES cracking, so it might be a few hundred hours, split over hundreds of machines. anyway ... as long as the master password isn't cracked, and a few other major passwords/logins used to wrap the databases and traffic to and from the KDC, the system is very much secure. the token expires after a few minutes, and the number of DES combinations to brute-force is still a high number, in the order of ~2^53 combinations for DES. however, since DES was/is used to wrap/secure a lot of the data travelling around the economic sectors, there is a lot of value in (very ruthless and organised cartels, organisations, 'family businesses') spending some serious money on distributed parallel processing to break DES before tokens expire. for reference, the EFF proved how feasible it was in 1998, with a self-built FPGA setup, a deadline of 10 days in which to break the challenge, they developed a system to methodically crunch through ~92 billion combinations/day on a limited budget. We searched more than 88 billion keys every second, for 56 hours, before we found the right 56-bit key to decrypt the answer to the RSA challenge http://www.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19980716_eff_descracker_pressrel.html there's always the human factor too. http://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis Toliman. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] xcdroast DVD burner pioneer 108
Trying to get my brand spaking pioneer 108 working under FC2/xcdroast/cdrecord-ProDVD loading the cdrecord-Prodvdin my ~xcdroast/bin does not seem to work! error is : ** (xcdroast:19308): WARNING **: Invalid cdrecord-ProDVD version 2.01-dvd found.Expecting at least version 2.01a11 Start xcdroast with the -n option to override (not recommended!) Any ideas -- Linley Caetan 98108854 [EMAIL PROTECTED] www.lovelsretreat.com Your home in the blue mountains -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
On Tue, 2004-11-09 at 15:31 +1100, Toliman wrote: Ken Foskey wrote: On Mon, 2004-11-08 at 23:27 +1100, James Gregory wrote: Foes anyone know the ciphers that kerberos uses? I was going to ask the person that did cryptography in Uni recently :-) Kerberos uses DES, but the encryption method can be negotiated in versions v4. DES is still used in a lot of operational cryptographic applications,and it is 'relatively' secure, in that it would hopefully take a p4 a few hours to brute force... more likely in minutes. Which is why DES has been phased out for at least 5 years, replaced by AES in secure applications. OK this echos my research today (cost me a coffee :-) Kerberos by default uses DES encryption so a fully encrypted Kerberos telnet would use DES encryption by default. It is possible to put additional ciphers into kerberos but it is not part of the standard. By comparison ssh uses 3DES by default here are the cipher options from one version of ssh itself. For those that do not know 3DES is literally encrypt in DES three times, very secure, the man page notes that DES is insecure. AnyCipher: Any available cipher (apart from none) can be used. AnyStdCipher: Allows only standard ciphers, i.e. those ciphers mentioned in the IETF-SecSH-draft (excluding none). This is the default cipher value. AES128 Use 128-bit Advanced Encryption Standard (Rijndael) encryption. AES192 Use 192-bit Advanced Encryption Standard (Rijndael) encryption. AES256 Use 256-bit Advanced Encryption Standard (Rijndael) encryption. 3DES Use 3DES encryption. Blowfish: Use Blowfish encryption. Twofish: Use Twofish encryption. Arcfour: Use Arcfour encryption. CAST: Use CAST encryption. DES: Use DES encryption. DES is generally considered a very weak cipher, and its use is not recommended. It is offered as a fallback option only. none: Don't use encryption. Use this option for testing purposes only! OK my research is that using kerberos is NO MORE security that ssh but is significantly less secure than ssh by default. My apologies for being painful however but sometimes the likelihood of someone being right is inversely proportional to the number of people shouting them down. Here endeth the lesson on security. If someone tells you something is more secure you simply must do your own homework. What they are saying may be dated information which appears to be the case here, DES is certainly a dated protocol in security terms. -- Ken Foskey -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
Ken Foskey wrote: Arcfour: Use Arcfour encryption. I believe this is a reimplementation of RC4 is anyone is interested what i means. dave -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] Graphic Pen - the return
Hello all, Well. I've tried to resolve this myself with no success. A recap :) I have a Dolphin Graphic tablet and pen. USB Tablet Series Version 1.04 Manufacturer: AIPTEK International Inc. Speed: 1.5Mb/s (low) USB Version: 1.10 Device Class: 00(ifc ) Device Subclass: 00 Device Protocol: 00 Maximum Default Endpoint Size: 8 Number of Configurations: 1 Vendor Id: 08ca Product Id: 0010 Revision Number: 1.03 According to my reading, it is supposed to be a clone of the Hyperpen 8000U OR 12000U (originally thought it was a 600U) http://www.qbik.ch/usb/devices/showdev.php?id=745 The pen, when plugged in can be seen by Mandrake 10 Official (as above). Everything works, pressure, buttons on pen (there are no buttons on the tablet) etc... except: By scribing an area roughly an inch down and two across, the cursor covers the whole screen. The tablet it obviously much bigger - 150mm across by 115mm down. Now, I've tried a number of suggestions I've found on-line - the latest being: http://www.justlinux.com/forum/showthread.php?s=57aa4cce806209a6cb25c7477c2e1393threadid=128382highlight=aiptek (It's a little long and didn't want to paste it in) I've changed the baud rate in the suggestion to a slower speed and found that it makes no difference. X starts (I've crashed it that frequently that I can now replace the XF86Config-4 file in my sleep) okay with the changes suggested on the site above - but nothing is changed. I suspect (!) that the pen is NOT even reading what I've put in (pardon my expression, but I don't really know WHAT should be reading the configuring I've been doing :)) So... I'm now back to square one. I haven't buggered it up, I still have my original XF86Config-4 file (thanks to those who reminded me to do this earlier) and I still have my Mandrake box going and, barely, my self respect. Any and all suggestions most gratefully appreciated. Regards, Patrick -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
David Kempe wrote: Arcfour: Use Arcfour encryption. I believe this is a reimplementation of RC4 is anyone is interested what i means. dave Last time I checked, there was an interesting story about Arcfour. Effectively, RC4 was a trade secret of RSA, but someone released the details of the algorithm to the Cypherpunks mailing list in September 1994. As it was in the public domain, the trade secret status was lost, but RSA still has a trademark on the name RC4. Hence, Arcfour. It's actually specified in a (perhaps withdrawn) Internet Draft that's still mirrored on the Mozilla site, AFAIR. Stream cipher, big problems with statistical attacks on the initial part of the generated keystream, it's the source of some of the problems with WEP in wireless stuff. Don't use with the same IV and Key, etc. Standard stream cipher stuff applies. Go read applied crypto if you want to know more. Cheers, Jordan -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
Ken Foskey wrote: On Tue, 2004-11-09 at 15:31 +1100, Toliman wrote: Ken Foskey wrote: On Mon, 2004-11-08 at 23:27 +1100, James Gregory wrote: Foes anyone know the ciphers that kerberos uses? I was going to ask the person that did cryptography in Uni recently :-) Kerberos uses DES, but the encryption method can be negotiated in versions v4. DES is still used in a lot of operational cryptographic applications,and it is 'relatively' secure, in that it would hopefully take a p4 a few hours to brute force... more likely in minutes. Which is why DES has been phased out for at least 5 years, replaced by AES in secure applications. OK this echos my research today (cost me a coffee :-) Kerberos by default uses DES encryption so a fully encrypted Kerberos telnet would use DES encryption by default. It is possible to put additional ciphers into kerberos but it is not part of the standard. By comparison ssh uses 3DES by default here are the cipher options from one version of ssh itself. For those that do not know 3DES is literally encrypt in DES three times, very secure, the man page notes that DES is insecure. AnyCipher: Any available cipher (apart from none) can be used. AnyStdCipher: Allows only standard ciphers, i.e. those ciphers mentioned in the IETF-SecSH-draft (excluding none). This is the default cipher value. AES128 Use 128-bit Advanced Encryption Standard (Rijndael) encryption. AES192 Use 192-bit Advanced Encryption Standard (Rijndael) encryption. AES256 Use 256-bit Advanced Encryption Standard (Rijndael) encryption. 3DES Use 3DES encryption. Blowfish: Use Blowfish encryption. Twofish: Use Twofish encryption. Arcfour: Use Arcfour encryption. CAST: Use CAST encryption. DES: Use DES encryption. DES is generally considered a very weak cipher, and its use is not recommended. It is offered as a fallback option only. none: Don't use encryption. Use this option for testing purposes only! OK my research is that using kerberos is NO MORE security that ssh but is significantly less secure than ssh by default. My apologies for being painful however but sometimes the likelihood of someone being right is inversely proportional to the number of people shouting them down. Here endeth the lesson on security. If someone tells you something is more secure you simply must do your own homework. What they are saying may be dated information which appears to be the case here, DES is certainly a dated protocol in security terms. I am using MIT krb5-1.3.3 which was the latest release in April, 2004. The current release is MIT krb5-1.3.5.(http://web.mit.edu/kerberos/www/) This a snippet of what I have in my /etc/krb5.conf: default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 I use this in AFS (Andrew File System - http://www.openafs.org ) setup at home to test. Not only can I configure it to use triple des but in addition it is used in combination with others. Sources apart from MIT says kerberos5 is the stronger security encryption tool. This is easily check from the Internet. The yards to measure security for some tool or software is done by evaluating the product in its entirity and not only bits and pieces of it. Have some fun. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
O Plameras wrote: I am using MIT krb5-1.3.3 which was the latest release in April, 2004. The current release is MIT krb5-1.3.5.(http://web.mit.edu/kerberos/www/) This a snippet of what I have in my /etc/krb5.conf: default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 I also use this setup in my home network to test OpenLDAP as Authentication Server using Cyrus-SASL as my security transport layer. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
[EMAIL PROTECTED] wrote: Isn't the kerberos ticket only valid for a few minutes anyway? In kerberos Version 5 this has been changed to allow seconds as units. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Apache, CSS PHP
Howard Lowndes wrote: On Tue, 2004-11-09 at 10:37, Matthew Palmer wrote: On Tue, Nov 09, 2004 at 02:30:16AM +1100, Howard Lowndes wrote: I have a CSS file which has to be named *.css so that Apache knows to send it as a text/css mime type but I want to do some PHP processing on before it goes out; unfortunately Apache appears not to know to pass it through the PHP handler as it not named *.php so the embedded PHP code doesn't get processed. I assume I have to do something with Action, AddHandler and SetHandler directives, but just what exactly. When I want to add PHP processing to a file type, I just add the file extension to the AddType application/x-httpd-php line in my httpd.conf. You could do a similar thing with your .css files, but there's a problem -- I think, by default, any request that gets passed through PHP ends up with a content-type of text/html no matter what. Basically, at the time you delegate responsibility for a file to PHP, Apache says not my problem any more and lets PHP specify the content type. So, in your PHPified CSS files, you'll need to run something like header('Content-Type: text/css'); to specify the content-type of the file. By the time you do this to all of your CSS files, you're better off (as has been explained already) putting your dynamic CSS stuff into a .php file, referencing it in your LINK tags as such, and just telling the file to announce to the world (via the aforementioned header) that it's a CSS file, and proud! I can see what you are saying here, and I have the line in my head/head block that reads: link rel=stylesheet type=text/css name=cssname.php/link which is what I think you are saying but when the file name ends in .php it seemingly ignores the type statement so I guess PHP must be sending out different mime type headers, and it looks like I will have to do as Amos suggests. I'm not sure about the rest but I think he made it pretty clear that you can add a php command like: header('Content-Type: text/css'); at the very beginning of the CSS file (before a buffer gets flushed). (that's the PHP command I didn't know due to lack of experience with PHP). This will set the HTTP header of the response when the server sends away the CSS file after it was processed by PHP, which seems to be what eventually the browser looks at. Cheers, --Amos -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Apache, CSS PHP
On Wed, 2004-11-10 at 07:39, [EMAIL PROTECTED] wrote: Howard Lowndes wrote: On Tue, 2004-11-09 at 10:37, Matthew Palmer wrote: On Tue, Nov 09, 2004 at 02:30:16AM +1100, Howard Lowndes wrote: I have a CSS file which has to be named *.css so that Apache knows to send it as a text/css mime type but I want to do some PHP processing on before it goes out; unfortunately Apache appears not to know to pass it through the PHP handler as it not named *.php so the embedded PHP code doesn't get processed. I assume I have to do something with Action, AddHandler and SetHandler directives, but just what exactly. When I want to add PHP processing to a file type, I just add the file extension to the AddType application/x-httpd-php line in my httpd.conf. You could do a similar thing with your .css files, but there's a problem -- I think, by default, any request that gets passed through PHP ends up with a content-type of text/html no matter what. Basically, at the time you delegate responsibility for a file to PHP, Apache says not my problem any more and lets PHP specify the content type. So, in your PHPified CSS files, you'll need to run something like header('Content-Type: text/css'); to specify the content-type of the file. By the time you do this to all of your CSS files, you're better off (as has been explained already) putting your dynamic CSS stuff into a .php file, referencing it in your LINK tags as such, and just telling the file to announce to the world (via the aforementioned header) that it's a CSS file, and proud! I can see what you are saying here, and I have the line in my head/head block that reads: link rel=stylesheet type=text/css name=cssname.php/link which is what I think you are saying but when the file name ends in .php it seemingly ignores the type statement so I guess PHP must be sending out different mime type headers, and it looks like I will have to do as Amos suggests. I'm not sure about the rest but I think he made it pretty clear that you can add a php command like: header('Content-Type: text/css'); at the very beginning of the CSS file (before a buffer gets flushed). (that's the PHP command I didn't know due to lack of experience with PHP). This will set the HTTP header of the response when the server sends away the CSS file after it was processed by PHP, which seems to be what eventually the browser looks at. Yes that is the way I went - it works fine - tks to all. Cheers, --Amos -- Howard. LANNet Computing Associates; Your Linux people http://www.lannetlinux.com -- When you just want a system that works, you choose Linux; when you want a system that just works, you choose Microsoft. -- Flatter government, not fatter government; Get rid of the Australian states. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
On Wed, 2004-11-10 at 05:46 +1100, O Plameras wrote: I am using MIT krb5-1.3.3 which was the latest release in April, 2004. The current release is MIT krb5-1.3.5.(http://web.mit.edu/kerberos/www/) This a snippet of what I have in my /etc/krb5.conf: default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5 I use this in AFS (Andrew File System - http://www.openafs.org ) setup at home to test. Not only can I configure it to use triple des but in addition it is used in combination with others. Sources apart from MIT says kerberos5 is the stronger security encryption tool. This is easily check from the Internet. The yards to measure security for some tool or software is done by evaluating the product in its entirity and not only bits and pieces of it. Your assertion was 'kerberos is MORE secure that ssh' (to that effect). Your specific setup is NO MORE secure than ssh by default and less secure than you can make ssh by simple command line option (better ciphers) should you need that extra security. A novice could easily make themselves LESS secure with Kerberos by using default options. Yes or No? You (or your distro) had to configure kerberos to make it that secure plus by default not all kerberos servers can handle 3DES out of the box. (For the record you can change the default of ssh just as easily.) Yes or No? Kerberos servers are not as available as ssh servers? Yes or No? -- Ken Foskey -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
Ken Foskey wrote: Your assertion was 'kerberos is MORE secure that ssh' (to that effect). Your specific setup is NO MORE secure than ssh by default and less secure than you can make ssh by simple command line option (better ciphers) should you need that extra security. A novice could easily make themselves LESS secure with Kerberos by using default options. Yes or No? I compared ssh with kerberos using differences in their functionalities. I do not say, myself, that one or another is better. It's true I stated kerberos is stronger but that is a qoute from people who knows not MINE. BTW, I use OpenSSH myself (http://www.openssh.org/) and I do not say there is no place for it other than kerberos. In fact, there are circumstances when SSH is more appropriate than Kerberos in my judgement, but it is up to the user. So, I am not trying to convince anyone that my way is the only way. I am just exposing what's available and what other people say about it. I just try to expose the materials I am using and so that readers may compare them to what they have and discover why their experiences are different or the same as mine. You (or your distro) had to configure kerberos to make it that secure plus by default not all kerberos servers can handle 3DES out of the box. (For the record you can change the default of ssh just as easily.) Yes or No? I use MIT kerberos, so far. I am toying with the idea of also testing Heimdal. I think MIT kerberos is 3DES configured by default, but I have'nt checked. You can checked that when you have time. I believe that it will be useful if you check, http://www.ietf.org/rfc/rfc1510.txt because as always only snippets of what I know about kerberos I can say. But RFC1510 spells out comprehensive specifications about kerberos and I do not pretend to be expert in these things. I just say what needs to be said IMHO and I leave the rest to the readers and not ME to make judgements for them. Kerberos servers are not as available as ssh servers? I do not know what is specifically meant here and a 'yes' or 'no is not as simple as that in matters like this. It is up to the person who has conducted his research thoroughly to make that call. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] Re: Preventing attacks
O Plameras wrote: I use MIT kerberos, so far. I am toying with the idea of also testing Heimdal. I think MIT kerberos is 3DES configured by default, but I have'nt checked. You can checked that when you have time. I believe that it will be useful if you check, http://www.ietf.org/rfc/rfc1510.txt because as always only snippets of what I know about kerberos I can say. But RFC1510 spells out comprehensive specifications about kerberos and I do not pretend to be expert in these things. I just say what needs to be said IMHO and I leave the rest to the readers and not ME to make judgements for them. I meant to include this enhancements to RFC1510: http://ietfreport.isoc.org/idref/draft-ietf-krb-wg-kerberos-clarifications/ -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] Re: Recomendação de Mala direta, email, lista de emails
De todos este sites recomendo o Divulgamail. Comprei uma excelente listas de e-mail para divulgação. Pesquisei vários e eles tem o melhor serviço de fato. O endereço é: http://www.gueb.de/dvgamail Muito bom mesmo! Vale a pena conferir. Ricardo Costa Estou querendo divulgar meu site por email (mala direta virtual), mas não sei qual o site devo escolher. Alguém tem alguma dica ou recomendação? Mariana -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] Re: Recomendação de Mala direta, email, lista de emails
De todos este sites recomendo o Divulgamail. Comprei uma excelente listas de e-mail para divulgação. Pesquisei vários e eles tem o melhor serviço de fato. O endereço é: http://www.gueb.de/dvgamail Muito bom mesmo! Vale a pena conferir. Ricardo Costa Estou querendo divulgar meu site por email (mala direta virtual), mas não sei qual o site devo escolher. Alguém tem alguma dica ou recomendação? Mariana -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] Reminder: PostgreSQL Users Group meeting November 9th at James Squire Brew House
Hi all, Just a reminder that this month's postponed PostgreSQL Users Group meeting will kick off this evening, Tuesday the 9th at 6:30 at the James Squire Brew House. http://www.malt-shovel.com.au/brewhouse.asp?Sydney=true I will be giving a detailed tutorial on Point in Time Recovery and Tim Allen has offered to provide a case study of his company's use of PostgreSQL in their media asset management application. Any one interested in attending, irrespective of knowledge or experience, is welcome. Be sure to invite friends, colleagues and your MySQL or Oracle loving boss ;-) Thanks, Gavin -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] lost file
Hi all, I have misplaced a file that I downloaded to get my Dlink wireless card to work under Linux now I have tried to download it and it nolonger exists on the site did anyone from the group download the following file? DWLG650plus_utility_v.1.0.zip If you have it could you please email it to me off the group? Thanks Kevin -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] /etc/dhcpd.conf
Hi, I'm trying to configure /etc/dhcpd in order to set up a two machine home network using LTSP. The P1 client boots with etherboot but I can't start dhcpd. Below is my my most recent config attempt, together with the current error message when I try to start dhcpd. My DNS is 203.79.110.81 and the server IP used in successful Win config is 192.168.0.1 Any constructive ideas ? Adam Bogacki, [EMAIL PROTECTED] ... lost in Confusia's tender mercies ... default-lease-time 21600; max-lease-time 21600; option subnet-mask 255.255.255.0; option broadcast-address 203.79.110.255; option routers 203.79.110.81; option domain-name-servers 203.79.110.81; option domain-name paradise.net.nz; # --Fix this domain name option root-path 203.79.110.81:/opt/ltsp/i386; subnet 192.168.0.0 netmask 255.255.255.0 { range dynamic-bootp 192.168.0.1 192.168.0.253; } subnet 203.79.110.0 netmask 255.255.255.0 { use-host-decl-names on; option log-servers 203.79.110.81; Tux:/etc# dhcpd start Internet Software Consortium DHCP Server 2.0pl5 Copyright 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium. All rights reserved. Please contribute if you find this software useful. For info, please visit http://www.isc.org/dhcp-contrib.html No subnet declaration for start (0.0.0.0). Please write a subnet declaration in your dhcpd.conf file for the network segment to which interface start is attached. exiting. Tux:/etc# -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] Re: /etc/dhcpd.conf
On Wed, Nov 10, 2004 at 07:25:54PM +1300, Adam Bogacki wrote: Hi, I'm trying to configure /etc/dhcpd in order to set up a two machine home network using LTSP. The P1 client boots with etherboot but I can't start dhcpd. Below is my my most recent config attempt, together with the current error message when I try to start dhcpd. My DNS is 203.79.110.81 and the server IP used in successful Win config is 192.168.0.1 No subnet declaration for start (0.0.0.0). Please write a subnet declaration in your dhcpd.conf file for the network segment to which interface start is attached. Show the the output of 'ipconfig -a', and what exact command line (you may have to dig through your startup scripts) you're using to start dhcpd. If you can't work out how exactly dhcpd is being started, write back with distro, version, etc, and more help will be provided. I suspect that you have an active interface called 'start' which doesn't have an IP address, but which dhcpd is being told to listen on. But let's see whether the above data helps decide that. - Matt signature.asc Description: Digital signature -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
[SLUG] Re: usb
: 40 ,. HDD USB- . . ,: 1.2004 2.2004 3. 4. 2003 5. 6. 2003 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 2003 17. 2004 HDD: . . ( HDD ) ( HDD 1. ), 1 . (" ") : 15000 .. . ., . : 8 (095) 589-44-17 E, . fduvrjji.jpg-- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
Re: [SLUG] lost file
Googling for this file name got me the link at http://www.linuxquestions.org/hcl/showproduct.php?product=1125 which points to a non-existing file, but if you try to browse that FTP directory you can see files which might contain later versions? (dwlg650plus_driver_eu_v2.04.zip, dwlg650plus_WPA-utility-driver_2.02.zip) Try: ftp://ftp.dlink.de/dwl-products/dwl-g650PLUS/Treiber_Firmware/ Also, if you have such a non-working link in some other site then maybe you can try to trim the last part of that URL and see what you get. HTH, --Amos Kevin Saenz wrote: Hi all, I have misplaced a file that I downloaded to get my Dlink wireless card to work under Linux now I have tried to download it and it nolonger exists on the site did anyone from the group download the following file? DWLG650plus_utility_v.1.0.zip If you have it could you please email it to me off the group? Thanks Kevin -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html