Dne 6.12.2011 22:26, Joshua Thijssen napsal(a):
I've updated the RN for 6.0 with the latest texts, plus I've used the
include sections. The dutch word for dutch is Nederlands so it should be:
* [:Manuals/ReleaseNotes/CentOS6.0/Dutch:Nederlands (ne)] - Joshua Thijssen
Since this is located
CentOS Errata and Bugfix Advisory 2011:1786
Upstream details at : http://rhn.redhat.com/errata/RHBA-2011-1786.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
c90bfbb0f5b499cbfd34d67088025759
CentOS Errata and Bugfix Advisory 2011:1786
Upstream details at : http://rhn.redhat.com/errata/RHBA-2011-1786.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
a6655ce732cb311b47e691fded408f57 acpid-1.0.4-12.el5.i386.rpm
CentOS Errata and Bugfix Advisory 2011:1784
Upstream details at : http://rhn.redhat.com/errata/RHBA-2011-1784.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
b3bb8b45f31cd2da986d3f37ea45d093
CentOS Errata and Bugfix Advisory 2011:1784
Upstream details at : http://rhn.redhat.com/errata/RHBA-2011-1784.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
0207e02fc689092a767facf1fcb8
CentOS Errata and Enhancement Advisory 2011:1789
Upstream details at : https://rhn.redhat.com/errata/RHEA-2011-1789.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
085b01a2392f719fb0e7e779971deb99
Hola,
Tengo un servidor web y deseo acceder a las páginas de una forma más
amigable escribiendo por http://mipagina.miservidor.com en lugar de
http://192.168.0.2/mipagina
Gracias por su ayuda.
Att. Alex Rojas
___
CentOS-es mailing list
Pues tienes varias opciones:
- Cambiar tu fichero /etc/hosts manualmente.
- Usar servicios como dyndns.
- Contratar un servicio de DNS con tu dominio.
Sin dar más indicaciones poco más te vamos a poder decir
Miguel
On 06/12/2011 16:36, Alexander Rojas Garcia wrote:
Hola,
Tengo un
Hola,
Espero alguien me pueda ayudar con el siguiente error que tengo:
Tengo un servidor (no lo configure yo) tenía CentOS 5.4 (y por error le
hice la actualización a CentOS 5.7)
Todo parecia trabajar bien, excepto que hoy, no sé si exim o dovecot (no me
adquiere de la base de datos) el usuario
Hola, César!
No tengo instalado vsftp, pero lo normal, en estos casos es enjaular a
los clientes para que sólo, y además por seguridad, puedan conectarse a
la carpeta que deseas.
Respecto al segundo punto, para las instalaciones que hago suelo crear
un grupo (en este caso el del dominio) y
Hola,
Soy nuevo en la lista y también en CentOS aunque hace años que juego con
Debian y Ubuntu. Hace un par de meses he cambiado de trabajo y me he
tenido que ir metiendo con CentOS ya que hay varios ordenadores con este
sistema y también con RedHat Enterprise Linux. El problema que tengo es
Estimados:
Buenos días.
Para consultarles si conocen de una herramienta o herramientas libres que
monitoree variables de bases de datos y genere estadísticas de estas en el
tiempo, es decir que el monitoreo no solo se limite a verificar que el
puerto este ok, o se haga ping al servidor, sino que
Por lo que veo tienes dos tarjetas, tienes que ver por que ip esta
escuchando el apache busca en el archivo de configuracion del apache, la
linea Listen X.X.X.X donde la direccion debe ser 192.168.10.2 o 192.168.1.4
lo unico que tienes que hacer es agregar la otra linea a el archivo de
Hola a tod@s,
Siguiendo los pasos del manual The Underground PHP and Oracle
Manual.pdf me encontrado con este error al compilar PHP:
# export ORACLE_HOME=/usr/lib/oracle/11.2/client64/
# ./configure \
--with-apxs2=/usr/sbin/apxs \
--with-oci8=$ORACLE_HOME \
--enable-sigchild
alguien me puede dar una mano para montantar un servidor dns les
agradeceria por la ayuda
___
CentOS-es mailing list
CentOS-es@centos.org
http://lists.centos.org/mailman/listinfo/centos-es
hola amigo acudo a ustedes para preguntarles como puedo hacer funcionar el
syslog que instale en mi servidor cacti
estuve observando varios lik en internet pero ninguno me funciono
Gracias
Luis Nuñez
___
CentOS-es mailing list
CentOS-es@centos.org
Estoy instalando el servidor NIS con el manual de Joel Barrios.
Sigo todos los pasos pero cuando llego a la parte de ...
service portmap restart (me dice service desconocido).
Tengo instalado un CentOS 6.
[root@geounsl var]# rpcinfo -u localhost ypserv
rpcinfo: RPC: Port mapper failure -
On Sat, 2011-11-12 at 10:36 -0400, Luis Nuñez wrote:
alguien me puede dar una mano para montantar un servidor dns les
agradeceria por la ayuda
claro! Aquí puedes ver:
http://www.ecualug.org/2011/12/06/comos/%C2%BFc%C3%
B3mo_configurar_un_dns_de_cach%C3%A9_con_dnsmasq
saludos
epe
On Sat, 2011-12-03 at 15:56 -0500, Weplica wrote:
Hola,
Tengo CentoOS 6 en un servidor dedicado con acceso SSH recien
instalado, el bind funcionando correctamente pero no consigo abrir el
puerto 53 para las consulta DNS
netstat -na | grep LISTEN
el puerto 53 está abierto
tcp 0 0
El 18/11/11, daniel danielog2...@gmail.com escribió:
Por lo que veo tienes dos tarjetas, tienes que ver por que ip esta
escuchando el apache busca en el archivo de configuracion del apache, la
linea Listen X.X.X.X donde la direccion debe ser 192.168.10.2 o 192.168.1.4
lo unico que tienes que
On Mon, 2011-12-05 at 10:05 -0500, Rilindo Foster wrote:
. Which version of grub are you running and from which distro?
Distro = C 5.7
Regrettably the command:
grub --version
yields:-
grub (GNU GRUB 0.97)
But this is insufficient information because it
On 12/05/2011 07:00 PM, m.r...@5-cent.us wrote:
I thought CentOS6 didn't come with a non-PAE kernel, more specifically,
the standard 32bit kernel requires PAE even if it doesnt have PAE in its
name.
I hadn't followed that development. *sigh*
I believe that is true of CentOS-5 as well.
-
On Mon, 2011-12-05 at 10:05 -0500, Rilindo Foster wrote:
. Which version of grub are you running and from which distro?
Distro = C 5.7
Regrettably the command:
grub --version
yields:-
grub (GNU GRUB 0.97)
But this is insufficient information because it
Vreme: 12/06/2011 01:42 PM, Always Learning piše:
On Mon, 2011-12-05 at 10:05 -0500, Rilindo Foster wrote:
. Which version of grub are you running and from which distro?
Distro = C 5.7
Regrettably the command:
grub --version
yields:-
grub (GNU GRUB 0.97)
On Monday, December 05, 2011 06:58:53 PM Ljubomir Ljubojevic wrote:
I plan on releasing unofficial CentOS Desktop oriented LiveDVD with all
the goodies like newest Firefox and ElRepo kernel modules for NIC's and
wireless, and upgrade repository with missing or newer packages of
Desktop
As much as I hate to be the bearer of news, I saw over 400 updates this morning
on my upstream 6.1 box checking the upstream website, yeah, EL6.2 is out,
at least for updates. I didn't see ISO's in my subscribed channel yet, though.
I figured someone would notice soon enough.
So before
2011/12/6 Lamar Owen lo...@pari.edu:
As much as I hate to be the bearer of news, I saw over 400 updates this
morning on my upstream 6.1 box checking the upstream website, yeah, EL6.2
is out, at least for updates. I didn't see ISO's in my subscribed channel
yet, though.
Vreme: 12/06/2011 03:58 PM, Lamar Owen piše:
On Monday, December 05, 2011 06:58:53 PM Ljubomir Ljubojevic wrote:
I plan on releasing unofficial CentOS Desktop oriented LiveDVD with all
the goodies like newest Firefox and ElRepo kernel modules for NIC's and
wireless, and upgrade repository with
On 6 December 2011 15:40, Eero Volotinen eero.voloti...@iki.fi wrote:
2011/12/6 Lamar Owen lo...@pari.edu:
As much as I hate to be the bearer of news, I saw over 400 updates this
morning on my upstream 6.1 box checking the upstream website, yeah,
EL6.2 is out, at least for updates. I
On 12/06/2011 08:08 AM, Lamar Owen wrote:
As much as I hate to be the bearer of news, I saw over 400 updates this
morning on my upstream 6.1 box checking the upstream website, yeah, EL6.2
is out, at least for updates. I didn't see ISO's in my subscribed channel
yet, though.
I figured
On 05.12.2011 22:49, Fajar Priyanto wrote:
[...]
Is there something I can do to prevent this ? Is there a gui interface
to enable NAT over a VPN connection that cooperates with
system-config-network ?
You mean system-config-securitylevel?
It's pretty useless. Pls take a look at Fwbuilder.
Vreme: 12/06/2011 06:06 PM, Timothy Madden piše:
On 05.12.2011 22:49, Fajar Priyanto wrote:
[...]
Is there something I can do to prevent this ? Is there a gui interface
to enable NAT over a VPN connection that cooperates with
system-config-network ?
You mean system-config-securitylevel?
This is probably something any SA should know... but I don't!
On CentOS 5 I can see what a process's current soft and hard
limits are; /proc/pid/limits
However this isn't in the C4 kernel. Is there any easy way of determining
what the process rlimit values are?
% uname -a ; cat
On Tue, Dec 06, 2011 at 01:08:32PM -0500, Stephen Harris wrote:
This is probably something any SA should know... but I don't!
...
% uname -a ; cat /etc/redhat-release
Linux c4 2.6.20.7 #3 Sun May 2 16:30:15 EDT 2010 i686 i686 i386 GNU/Linux
CentOS release 4.8 (Final)
(yes, I know this
We're just using Linux software RAID for the first time - RAID1, and the
other day, a drive failed. We have a clone machine to play with, so it's
not that critical, but
I partitioned a replacement drive. On the clone, I marked the RAID
partitions on /dev/sda failed, and remove, and pulled the
On Tue, Dec 06, 2011 at 07:25:26PM +0100, Tru Huynh wrote:
On Tue, Dec 06, 2011 at 01:08:32PM -0500, Stephen Harris wrote:
% uname -a ; cat /etc/redhat-release
Linux c4 2.6.20.7 #3 Sun May 2 16:30:15 EDT 2010 i686 i686 i386 GNU/Linux
CentOS release 4.8 (Final)
(yes, I know this machine
On Tuesday, December 06, 2011 10:40:30 AM Eero Volotinen wrote:
2011/12/6 Lamar Owen lo...@pari.edu:
As much as I hate to be the bearer of news, I saw over 400 updates this
morning on my upstream 6.1 box checking the upstream website, yeah,
EL6.2 is out, at least for updates. I
Am 06.12.2011 19:28, schrieb m.r...@5-cent.us:
We're just using Linux software RAID for the first time - RAID1, and the
other day, a drive failed. We have a clone machine to play with, so it's
not that critical, but
I partitioned a replacement drive. On the clone, I marked the RAID
On 12/06/2011 09:08 AM, Lamar Owen wrote:
As much as I hate to be the bearer of news, I saw over 400 updates this
morning on my upstream 6.1 box checking the upstream website, yeah, EL6.2
is out, at least for updates. I didn't see ISO's in my subscribed channel
yet, though.
I
On Mon, 05 Dec 2011 19:24:29 +0100, Ljubomir Ljubojevic wrote:
[]
You are special case user, not many even heard of those apps, let alone
use them.
Probably true, for now. But the Baby Boomers have been following
me at a remove of two to five years since they were born;
Reindl Harald wrote:
Am 06.12.2011 19:28, schrieb m.r...@5-cent.us:
We're just using Linux software RAID for the first time - RAID1, and the
other day, a drive failed. We have a clone machine to play with, so it's
not that critical, but
I partitioned a replacement drive. On the clone,
On Tue, 2011-12-06 at 13:12 -0600, Johnny Hughes wrote:
On 12/06/2011 09:08 AM, Lamar Owen wrote:
As much as I hate to be the bearer of news, I saw over 400 updates this
morning on my upstream 6.1 box checking the upstream website, yeah,
EL6.2 is out, at least for updates. I didn't
On Tuesday, December 06, 2011 02:21:09 PM m.r...@5-cent.us wrote:
Reindl Harald wrote:
the device name is totally uninteresting, the IDs are
mdadm /dev/mdx --add /dev/sdex
No, it's not uninteresting. I can't be sure that when it reboots, it won't
come back as /dev/sda.
The RAIDsets will
On Tuesday, December 06, 2011 02:12:04 PM Johnny Hughes wrote:
You should see 6.2 significantly faster than 6.1 ... especially the CR rpms.
Thanks for the info, Johnny. Looking forward to it.
___
CentOS mailing list
CentOS@centos.org
Lamar Owen wrote:
On Tuesday, December 06, 2011 02:21:09 PM m.r...@5-cent.us wrote:
Reindl Harald wrote:
the device name is totally uninteresting, the IDs are
mdadm /dev/mdx --add /dev/sdex
No, it's not uninteresting. I can't be sure that when it reboots, it
won't come back as /dev/sda.
Am 06.12.2011 20:21, schrieb m.r...@5-cent.us:
Reindl Harald wrote:
Am 06.12.2011 19:28, schrieb m.r...@5-cent.us:
We're just using Linux software RAID for the first time - RAID1, and the
other day, a drive failed. We have a clone machine to play with, so it's
not that critical, but
On 12/06/2011 07:24 PM, Louis Lagendijk wrote:
I am still not able to install ipa-server due to 2 missing packages:
pki-ca and pki-silent. Will they be in the 6.1 release, please, pretty
please?
these will be there in the next day or so, the 6.1 media load is going
to create a bit of
On Tue, 2011-12-06 at 19:51 +, Karanbir Singh wrote:
On 12/06/2011 07:24 PM, Louis Lagendijk wrote:
I am still not able to install ipa-server due to 2 missing packages:
pki-ca and pki-silent. Will they be in the 6.1 release, please, pretty
please?
these will be there in the next
On Wed, Nov 30, 2011 at 12:40 PM, Johnny Hughes joh...@centos.org wrote:
On 11/30/2011 12:05 PM, m.r...@5-cent.us wrote:
There's an article on slashdot about the Duqu team wiping all their
intermediary cc servers on 20 Oct. Interestingly, the report says that
they were all (?) not only linux,
On Tuesday, December 06, 2011 02:46:24 PM m.r...@5-cent.us wrote:
Booting purposes is the point: /dev/md0 is /boot. And as the slot's ATA0,
it should come up as sda. You mention getting the bootloader sectors over
- do you mean, after it's rebuilt and active, to then rerun grub-install?
Either
i have tried a lot but not able to get wireless ...i am
using dell 1470 14-r
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
On 12/06/2011 08:09 PM, Les Mikesell wrote:
Any luck on the specific attack path yet? The linked article
suggests Centos up to 5.5 was vulnerable.
We dont have access to the actual machines that were broken into - so
pretty much everything is second hand info.
But based on what we know and
On Tuesday, December 06, 2011 03:09:42 PM Lamar Owen wrote:
I've seen that happen before. It was a tad disconcerting at first, but, yes,
in the case I saw it a reboot made it back to sda.
Oh, and /dev/sda is not necessarily the BIOS boot device, by the way. For
instance, on my upstream EL
Lamar Owen wrote:
On Tuesday, December 06, 2011 02:46:24 PM m.r...@5-cent.us wrote:
Booting purposes is the point: /dev/md0 is /boot. And as the slot's
ATA0, it should come up as sda. You mention getting the bootloader
sectors over - do you mean, after it's rebuilt and active, to then rerun
Lamar Owen wrote:
On Tuesday, December 06, 2011 03:09:42 PM Lamar Owen wrote:
I've seen that happen before. It was a tad disconcerting at first, but,
yes, in the case I saw it a reboot made it back to sda.
Oh, and /dev/sda is not necessarily the BIOS boot device, by the way. For
instance,
On 12/06/11 12:12 PM, Gagan Chohan wrote:
i have tried a lot but not able to get wireless ...i am
using dell 1470 14-r
according to Dell's site, the Inspiron 14R is a N4010 or N4110, and the
1470 is a 14Z
the 14Z (1470) can use any of...
* Dell™ Wireless 365 Bluetooth
Lamar Owen wrote:
On Tuesday, December 06, 2011 03:09:42 PM Lamar Owen wrote:
I've seen that happen before. It was a tad disconcerting at first, but,
yes, in the case I saw it a reboot made it back to sda.
Right, forgot to mention: I need to partition the drive before I use it,
anyway, and
On Tue, Dec 6, 2011 at 12:28 PM, m.r...@5-cent.us wrote:
We're just using Linux software RAID for the first time - RAID1, and the
other day, a drive failed. We have a clone machine to play with, so it's
not that critical, but
I partitioned a replacement drive. On the clone, I marked the
On Tue, Dec 6, 2011 at 1:46 PM, m.r...@5-cent.us wrote:
Booting purposes is the point: /dev/md0 is /boot. And as the slot's ATA0,
it should come up as sda. You mention getting the bootloader sectors over
- do you mean, after it's rebuilt and active, to then rerun grub-install?
Remember, the
On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org wrote:
On 12/06/2011 08:09 PM, Les Mikesell wrote:
Any luck on the specific attack path yet? The linked article
suggests Centos up to 5.5 was vulnerable.
We dont have access to the actual machines that were broken into -
Les Mikesell wrote:
On Tue, Dec 6, 2011 at 1:46 PM, m.r...@5-cent.us wrote:
Booting purposes is the point: /dev/md0 is /boot. And as the slot's
ATA0, it should come up as sda. You mention getting the bootloader
sectors over - do you mean, after it's rebuilt and active, to then
rerun
Les Mikesell wrote:
On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org
wrote:
On 12/06/2011 08:09 PM, Les Mikesell wrote:
Any luck on the specific attack path yet? The linked article
suggests Centos up to 5.5 was vulnerable.
We dont have access to the actual machines
On Tuesday, December 06, 2011 03:39:06 PM m.r...@5-cent.us wrote:
Ack! So I actually need to run grub-install, and do it for both; didn't
know that (always had /boot as a plain vanilla primary partition)?!
If /dev/sdb doesn't have the stage1.5 in the first 60 or so sectors after the
MBR (which
On Tue, Dec 6, 2011 at 2:40 PM, m.r...@5-cent.us wrote:
But based on what we know and what we have been told and what we have
worked out ourselves as well, its almost certainly bruteforced ssh
passwords.
So, coincidence that they were CentOS, and pre-5.6? Did they have
admins in common?
On Tue, Dec 6, 2011 at 2:39 PM, m.r...@5-cent.us wrote:
Booting software RAID1 is kind of an oddball case. You actually boot
on the disk that bios considers your boot drive only, and it works
because the drives are mirrored and happen to look the same whether
you look at the partition or
Les Mikesell wrote:
On Tue, Dec 6, 2011 at 2:39 PM, m.r...@5-cent.us wrote:
Booting software RAID1 is kind of an oddball case. You actually boot
on the disk that bios considers your boot drive only, and it works
because the drives are mirrored and happen to look the same whether
you look
On 12/06/2011 02:36 PM, Les Mikesell wrote:
On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org wrote:
On 12/06/2011 08:09 PM, Les Mikesell wrote:
Any luck on the specific attack path yet? The linked article
suggests Centos up to 5.5 was vulnerable.
We dont have access to
On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote:
If I had to guess, I would say that the attackers probably developed
their code on CentOS, so they were looking for a CentOS machine to
deploy their code on in the wild. That would be why I would say CentOS
was the OS used.
I
Dec 7, 2011 5:58 AM Lamar Owen lo...@pari.edu 작성:
On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote:
If I had to guess, I would say that the attackers probably developed
their code on CentOS, so they were looking for a CentOS machine to
deploy their code on in the wild. That
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote:
I happen to have a copy of an older brute-forcer dictionary here (somewhere)
and it's very large and has lots of very secure-seeming passwords in it.
I ran down the copy I have; here's an excerpt of one of the dictionaries:
Dec 7, 2011 2:43 AM Stephen Harris li...@spuddy.org 작성:
I can't upgrade these machines in a reasonable time period (production
outage on core infra? Ugh) and need the values on the current systems.
I also have few important systems that are stuck in Centos 4.x. Can't afford
the downtime.
Is there an etiquitte to posting bounties to the centos community for OSS to be
packaged in rpm form for centos?
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- -
- Jason Pyeron PD Inc.
On Tue, Dec 06, 2011 at 06:01:50PM -0500, Jason Pyeron wrote:
Is there an etiquitte to posting bounties to the centos community for
OSS to be packaged in rpm form for centos?
Or, for a novel approach, you might save your money and consider
learning to package such applications yourself.
On Tue, Dec 6, 2011 at 3:45 PM, Johnny Hughes joh...@centos.org wrote:
Any luck on the specific attack path yet? The linked article
suggests Centos up to 5.5 was vulnerable.
We dont have access to the actual machines that were broken into - so
pretty much everything is second hand info.
On Tuesday, December 06, 2011 05:31:58 PM Fajar Priyanto wrote:
Dec 7, 2011 5:58 AM Lamar Owen lo...@pari.edu 작성:
I happen to have a copy of an older brute-forcer dictionary here (somewhere)
and it's very large and has lots of very secure-seeming passwords in it.
Why not don't allow root
Dec 7, 2011 7:05 AM Lamar Owen lo...@pari.edu 작성:
On Tuesday, December 06, 2011 05:31:58 PM Fajar Priyanto wrote:
Dec 7, 2011 5:58 AM Lamar Owen lo...@pari.edu 작성:
I happen to have a copy of an older brute-forcer dictionary here
(somewhere) and it's very large and has lots of very
2011/12/6 Fajar Priyanto fajar...@arinet.org:
I happen to have a copy of an older brute-forcer dictionary here
(somewhere) and it's very large and has lots of very secure-seeming
passwords in it.
Why not don't allow root login from ssh? That's basic yet effective.
This particular
On Tue, 2011-12-06 at 18:12 -0600, Les Mikesell wrote:
I'd expect it to be at least typical to firewall direct ssh access
from the internet.
A Linux newcomer, untrained and a self-learner, I made an abrupt
immersion into Linux on 1 June 2010. It was a steep learning-curve.
The first thing I
- Original Message -
| On Tue, 2011-12-06 at 18:12 -0600, Les Mikesell wrote:
|
| I'd expect it to be at least typical to firewall direct ssh access
| from the internet.
|
| A Linux newcomer, untrained and a self-learner, I made an abrupt
| immersion into Linux on 1 June 2010. It was a
On Tue, Dec 6, 2011 at 7:06 PM, James A. Peltier jpelt...@sfu.ca wrote:
Admins are not the incompetent ones. The users are! Any decent admin is
going to ensure that there are the most layers and defensive systems in place
to ensure a level of security that doesn't require the *USERS* to
On Tue, 2011-12-06 at 17:06 -0800, James A. Peltier wrote:
| The first thing I did was to make a 20-odd character password for Root
| with lowercase, uppercase and digits (using my former address in
| Germany).
Great! I'll do a little Google'ing and see if I can find out what that
might
On 12/6/2011 7:12 PM, Les Mikesell wrote:
2011/12/6 Fajar Priyantofajar...@arinet.org:
I happen to have a copy of an older brute-forcer dictionary here
(somewhere) and it's very large and has lots of very secure-seeming
passwords in it.
Why not don't allow root login from ssh? That's basic
On 06/12/11 23:01, Jason Pyeron wrote:
Is there an etiquitte to posting bounties to the centos community for OSS to
be
packaged in rpm form for centos?
The generally accepted route is to make a request on the mailing list of
an appropriate repository, for example, repoforge (rpmforge):
-Original Message-
From: centos-boun...@centos.org
[mailto:centos-boun...@centos.org] On Behalf Of John R. Dennison
Sent: Tuesday, December 06, 2011 17:58
To: centos@centos.org
Subject: Re: [CentOS] [OT] posting bounties for rpms
compatible with centos?
On Tue, Dec 06, 2011 at
Vreme: 12/07/2011 01:45 AM, Always Learning piše:
The first thing I did was to make a 20-odd character password for Root
with lowercase, uppercase and digits (using my former address in
Germany).
I like using serial numbers from Motherboards and other hardware. It's
more random.
--
-Original Message-
From: centos-boun...@centos.org
[mailto:centos-boun...@centos.org] On Behalf Of Ned Slider
Sent: Tuesday, December 06, 2011 21:15
To: centos@centos.org
Subject: Re: [CentOS] [OT] posting bounties for rpms
compatible with centos?
On 06/12/11 23:01, Jason
Op Woensdag, 7 december 03:45 +0100, Ljubomir Ljubojevic wrote:
Vreme: 12/07/2011 01:45 AM, Always Learning piše:
The first thing I did was to make a 20-odd character password for Root
with lowercase, uppercase and digits (using my former address in
Germany).
I like using serial
Vreme: 12/07/2011 03:49 AM, Always Learning piše:
Op Woensdag, 7 december 03:45 +0100, Ljubomir Ljubojevic wrote:
Vreme: 12/07/2011 01:45 AM, Always Learning piše:
The first thing I did was to make a 20-odd character password for Root
with lowercase, uppercase and digits (using my former
Hi !
Since the last couple of months, we had a few problems with the maner we
designed our clustered filesystem and we are planing to do a re-design
of the filesystems and how they are used.
Our cluster is composed of 8 nodes, connected via fibre channel, to a
raid enclosure where we have 6
89 matches
Mail list logo