--- On Fri, 2012/3/30, Nataraj incoming-cen...@rjl.com wrote:
I have poked around in google and have seen a number of youtube videos,
but my question is whether anyone really has linux running on any kind
of tablet or tablet PC device in such a way that the touch screen can be
used
On 01/11/2012 11:07 AM, Les Mikesell wrote:
On Tue, Jan 10, 2012 at 3:50 PM, Daniel J Walshdwa...@redhat.com wrote:
That is not the way it works. SELinux Reference policy is a database
of rules that govern the default ways application run.
Yes, but it is application developers that know
On 01/11/2012 07:19 PM, Bennett Haselton wrote:
Well there is already a beginner-friendly introduction:
http://wiki.centos.org/HowTos/SELinux
The problem I had with it is that there are several statements that are
unclear, missing, or just wrong. That's not necessarily the fault of the
On 01/12/2012 03:18 AM, Bennett Haselton wrote:
Is this really supposed to get easier over time? :) Now my audit.log
file shows that SELinux is blocking my cgi script, index.cgi (which is
what's actually served when the user visits the front page of one of our
proxy sites like
On 01/12/2012 03:48 AM, Daniel J Walsh wrote:
In Fedora we currently dontaudit this leak.
audit2allow -i /tmp/t
#= httpd_sys_script_t ==
# This avc has a dontaudit rule in the current policy
allow httpd_sys_script_t httpd_t:udp_socket { read write };
Pow.
On 01/12/2012 04:49 AM, Les Mikesell wrote:
On Wed, Jan 11, 2012 at 1:23 PM, Lamar Owenlo...@pari.edu wrote:
On Wednesday, January 11, 2012 01:22:05 PM Les Mikesell wrote:
I don't think of myself as a 'normal user', but I still don't
appreciate it when a distribution goes out of its way to
On 01/11/2012 05:04 AM, Les Mikesell wrote:
On Tue, Jan 10, 2012 at 1:46 PM, Daniel J Walshdwa...@redhat.com wrote:
On Tue, Jan 10, 2012 at 7:47 AM, Daniel J Walsh
dwa...@redhat.com wrote:
Now if only more people used RHEL we could further enhance
the products. :^)
Why isn't it
On 12/30/2011 02:33 AM, Ljubomir Ljubojevic wrote:
I like to use serial numbers from MB, HDD, etc., as passwords. I never
use normal words for my passwords, and few other users (with ssh/cli
access) are carefully checked for their passwords.
If this formula is true (1/2 . 2 ^ 54 . 1s / 10)
On 12/30/2011 09:00 PM, ankush grover wrote:
Hi Friends,
I am trying to write a shell script which can merge the 2 columns into
3rd one on Centos 5. The file is very long around 31200 rows having
around 1370 unique groups and around 12000 unique user-names.
The 1st column is the groupname
On 12/31/2011 01:41 AM, m.r...@5-cent.us wrote:
Hey, supergiantpotato (and btw, this list is plain text, not unicode, and
most of us don't read Japanese...),
Thanks for the info
This is really complicated and fiddly. Look at the one awk script that was
posted, which is *far* simpler, and
On 12/31/2011 01:19 AM, Marko Vojinovic wrote:
On Friday 30 December 2011 19:40:55 夜神 岩男 wrote:
[snip]
We can start a 10,000 computer botnet (or, more realistically, a 10m
computer botnet these days, and this is a technique used right now)
working on the problem of assembling a new index
On 12/31/2011 01:56 AM, Craig White wrote:
On Dec 30, 2011, at 9:52 AM, m.r...@5-cent.us wrote:
Craig White wrote:
looked like English to me...
On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote:
Hey, supergiantpotato (and btw, this list is plain text, not unicode,
and most of us don't
On 12/30/2011 12:41 AM, Marc Deop wrote:
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
the hughe difference is: while having the same password (for the key)
it can not be used directly for brute-force und you need the password
and at least one time access to the key file
Explain
On 12/30/2011 01:33 AM, m.r...@5-cent.us wrote:
Marko Vojinovic wrote:
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using
On 12/29/2011 05:17 PM, Bennett Haselton wrote:
On Wed, Dec 28, 2011 at 6:10 AM, Johnny Hughesjoh...@centos.org wrote:
On 12/27/2011 10:42 PM, Bennett Haselton wrote:
2. Why have password logins at all? Using a secure ssh key only for
logins makes the most sense.
Well that's something
On 12/30/2011 12:00 AM, m.r...@5-cent.us wrote:
夜神 岩男 wrote:
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even though the
On 12/28/2011 02:01 PM, Bennett Haselton wrote:
Yeah I know that most break-ins do happen using third-party web apps;
fortunately the servers I'm running don't have or need any of those.
But then what about what my friend said:
For example, there was a while back ( ~march ) a kernel exploit
On 12/28/2011 04:40 PM, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Fosterrili...@me.com wrote:
On Dec 27, 2011, at 11:29 PM, Bennett Haseltonbenn...@peacefire.org
What was the nature of the break-in, if I may ask?
I don't know how they did it, only that the hosting
On 12/27/2011 11:32 PM, 夜神 岩男 wrote:
I'm trying to learn more about Plymouth, but am having trouble finding
sufficient documentation on it.
...
Perhaps the error message is just confusing me.
If it is just the background image, then what is not valid about the
splash.xpm.gz now? I've reduced
I'm trying to learn more about Plymouth, but am having trouble finding
sufficient documentation on it.
After a rebuild of Plymouth with a few theme changes, I am getting an
error message on boot Failed to read image and then it gives me the
grub screen to boot one of the three kernels
On 12/28/2011 01:29 PM, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste
seben...@weather.admin.niu.edu wrote:
On Tue, 27 Dec 2011, Bennett Haselton wrote:
Suppose I have a CentOS 5.7 machine running the default Apache with no
extra modules enabled, and with the
On 12/26/2011 09:45 PM, Timothy Murphy wrote:
夜神 岩男 wrote:
The hard part is developing an initial understanding of how certificates
are interpreted and managed -- and where insecurity in the system can
arise. Key and certificate management is, in fact, the hardest part of
staying
On 12/24/2011 08:54 PM, Timothy Murphy wrote:
夜神 岩男 wrote:
I'm trying to setup sendmail/dovecot on a new server running CentOS-6
(well, CentOS-6.2 now).
Everything seems to go well, but when I run fetchmail I get this warning:
[tim@grover ~]$ fetchmail
On 12/24/2011 11:34 AM, Timothy Murphy wrote:
I'm trying to setup sendmail/dovecot on a new server running CentOS-6
(well, CentOS-6.2 now).
Everything seems to go well, but when I run fetchmail I get this warning:
[tim@grover ~]$ fetchmail
On 12/08/2011 12:14 AM, Johnny Hughes wrote:
On 12/07/2011 09:09 AM, m.r...@5-cent.us wrote:
Lucian wrote:
On 7 December 2011 14:03, Reynolds McClatcheyr...@saf.com wrote:
Any workaround or do I just need to use adobe on WinXP?
Nobody should need to use windows.
On 08/04/2011 03:20 AM, Todd wrote:
Hi John,
what are you doing with this email when you recieve it, beyond just
saving it?
I plan to analysis the mail to group into e-mails on the same topic and
create a comprehensive answer to the topics. Along the lines of a FAQ
for topics that
On 08/03/2011 06:41 AM, Les Mikesell wrote:
But back to the original problem, why would anyone use ftp in this
century when rsync or http(s) are so much easier to manage?
Do we have Kerberized rsync yet? Or Globus rsync?
If so... please post a link and... (^.^)
Anyway, that sort of gets to
On 07/27/2011 11:39 PM, Jerry Geis wrote:
I do this for a reason as a post install step, then the system reboots
and it never happens again...
And so you will never be asked again, it seems.
I am trying to find how to set this checkbox which says never ask me
again and move on...
But it
On 07/28/2011 12:47 AM, Jerry Geis wrote:
Anyway, I'm just being silly above. The gconf key for this is:
/apps/gnome-session/options/show_root_warning
Thats awesome... I new the rest about setting values - I just didnt know
the name.
Thanks,
I've become a wizard at finding those things.
On 07/26/2011 01:32 PM, R P Herrold wrote:
On Tue, 26 Jul 2011, Mike Burger wrote:
If IBM can make this happen for their OS, and Red Hat certainly supports
such a process in the Fedora line of releases (including the ability to
list additional repositories for remote installation as part of
On 07/26/2011 02:07 PM, Mike Burger wrote:
But you are missing the point -- WHY spend the engineering
effort on trying to support such Major 'upgradeany's? A new
deployment takes mere minutes for a commercial shop, and by
NOT supporting such explicitly, the upstream avoids much
support and
On 07/21/2011 09:26 PM, Geoff Galitz wrote:
And more over, there is nothing earth-shatteringly new in the 3.0 kernel.
Linus said during the last kernel summit he wanted to change the versioning
scheme to make it easier for various developers in different realms to track
version changes.
On Mon, 2011-07-18 at 04:04 +0100, Always Learning wrote:
On Sun, 2011-07-17 at 22:37 -0400, Stephen Harris wrote:
On Sun, Jul 17, 2011 at 09:07:38PM -0500, Les Mikesell wrote:
There is no requirement for the greeting name to match any IP, and isn't
likely
RFC2821 says:
-
On Mon, 2011-07-18 at 15:00 +0100, Always Learning wrote:
In the example I mentioned, it was a specially created single purpose
email SMTP address (no POP etc.) used just once about 5? months ago. It
is easy for me to block it as the mail server (MTA Mail Transfer Agent)
which I have done.
On Mon, 2011-07-18 at 22:17 +0800, Christopher Chan wrote:
On Monday, July 18, 2011 09:19 PM, Stephen Harris wrote:
SPAM-L is that way == oh wait, it's dead...
Maybe we can keep discussions about blackhat, incompetent networks,
about SMTP, open proxies/relays, honeypots and what have you
On Mon, 2011-07-18 at 10:54 -0500, Les Mikesell wrote:
On 7/18/2011 10:27 AM, 夜神 岩男 wrote:
(6) Having to visit a web site and then log-on if one wants to respond.
I keychain the logins (I think most browsers have a function like this
now -- I think even elinks does, and elinks
On Mon, 2011-07-11 at 14:17 +0100, James Hogarth wrote:
Downloaded centos-release-6-0.el6.centos.5.x86_64.rpm and
redhat-logos-60.0.14-10.el6.noarch.rpm from CentOS repo
rpm -e --nodeps sl-release redhat-logos
rpm -hiv redhat-logos-60.0.14-10.el6.noarch.rpm
On Mon, 2011-07-11 at 16:00 -0700, Emmett Culley wrote:
On 07/11/2011 03:26 PM, b.j. mcclure wrote:
On Mon, 2011-07-11 at 14:35 -0700, Emmett Culley wrote:
The network configuration GUI is not to be found on any of the CentOS
repos or on EPEL. I am not interested in having NetworkManager
On Tue, 2011-07-12 at 10:46 +0100, James Hogarth wrote:
An idle question:
What is the advantage of switching to CentOS 6 if you already are
running SL6? Or at least... what is the purpose? I'm not really clear on
the difference (other than CentOS is the noisier bit of the party).
On Sat, 2011-07-09 at 16:21 -0500, John R. Dennison wrote:
On Sat, Jul 09, 2011 at 10:14:28PM +0100, Always Learning wrote:
Its time for the world to drift away from the M$ Windoze expensive
nightmare. Centos is a very good alternative.
While that might be true, the reality of the
On Sat, 2011-07-02 at 03:03 +0800, Emmanuel Noobadmin wrote:
On 7/1/11, Timothy Murphy gayle...@eircom.net wrote:
It seems to me that it should be possible
to have a simple, torch-battery operated, system
which will keep the machine alive long enough
to make a graceful exit.
A
42 matches
Mail list logo