* Marcel Welschbillig ([EMAIL PROTECTED]) [011205 16:35]:
I have ip tables running and i did a test with the -c flag but i get the
following response.
proxy:/home# iptables -A INPUT -s 10.10.1.31 -i eth0 -c ACCEPT
iptables v1.2.4: -c requires packet and byte counter
What am i missing ?
Vineet Kumar [EMAIL PROTECTED] writes:
* Robert Epprecht ([EMAIL PROTECTED]) [011208 02:31]:
I need ssh to access some cvs servers. As the files are stored locally
below /usr/local/ and ordinary users have no write access there I called
ssh-keygen as root.
Rather than root, add your user
On Tue, Dec 11, 2001 at 01:46:11PM +0900, Olaf Meeuwissen wrote:
...
Thanks to everyone who responded. I should have been a little clearer
on the system setup. The machine in question consists of a main unit
and a bunch of externally attached hard disks connected to a network.
It has no
On Tue, Dec 11, 2001 at 01:33:41AM +, Andrew Bolt wrote:
...unless you are from Hollywood - in which case a good encryption
scheme is one that can be cracked by having lots of digits flash
up on the screen, and gradually have individual digits lock into
the correct key.
Some wierd
On Mon, Dec 10, 2001 at 10:00:19AM +1000, mdevin wrote:
Here is what I did:
[snip clean solution :) ]
The only remaining question I have is: Is this the correct way to use
the - and + permission setting in /etc/security/access_conf ? 'Cause
what I have done here is to allow specific
* Marcel Welschbillig ([EMAIL PROTECTED]) [011205 16:35]:
I have ip tables running and i did a test with the -c flag but i get the
following response.
proxy:/home# iptables -A INPUT -s 10.10.1.31 -i eth0 -c ACCEPT
iptables v1.2.4: -c requires packet and byte counter
What am i missing ?
Vineet Kumar [EMAIL PROTECTED] writes:
* Robert Epprecht ([EMAIL PROTECTED]) [011208 02:31]:
I need ssh to access some cvs servers. [ ... ]
I'm not sure I completely understand your situation, [ ... ]
nor do I ;-) That's why I ask...
Actually I want to do *two* different things (my
On Tue, Dec 11, 2001 at 01:46:11PM +0900, Olaf Meeuwissen wrote:
...
Thanks to everyone who responded. I should have been a little clearer
on the system setup. The machine in question consists of a main unit
and a bunch of externally attached hard disks connected to a network.
It has no
On Tue, Dec 11, 2001 at 01:33:41AM +, Andrew Bolt wrote:
...unless you are from Hollywood - in which case a good encryption
scheme is one that can be cracked by having lots of digits flash
up on the screen, and gradually have individual digits lock into
the correct key.
Some wierd
On Mon, Dec 10, 2001 at 10:00:19AM +1000, mdevin wrote:
Here is what I did:
[snip clean solution :) ]
The only remaining question I have is: Is this the correct way to use
the - and + permission setting in /etc/security/access_conf ? 'Cause
what I have done here is to allow specific users
10 matches
Mail list logo