It isn't that Linux isn't a target. It is. Just not as 'popular' a
target. There are antivirus that can be run on Linux, but they tend to
focus on PC virus, partly because Linux is used often as storage server,
and scanning the users files is a reasonable thing to do.
In my experience, Linux
This is the same argument often heard in regards to MacOS in the late 90s and
early 00s when Windows was rife with viruses. In fact the reason MacOS was
more secure then and Linux is (still) secure has more to do with the CERT and
the development model of Unix itself (from whence MacOS 10
I have used Linux for a long time. If you don't go 'trolling' un-trusted
web sites and using email on the same computer you use for EMC,
there is no need to worry.
Why? Linux is a 'less valuable' target for hackers than commodity windows
and even Apple machines. There are also fewer of them in
On Monday 04 April 2016 17:20:36 John Dammeyer wrote:
> I'm sure you are going to have lots of fun with this. I suspect you
> might be over simplifying it too.
>
> It's not really that important that you can generate 1 Mhz stepping
> frequencies using the hardware timer on the micro-processor.
It may be useful to consider what hostmot2 does, before deciding whether
to do it the same way or differently.
The command to the step generator is a velocity or frequency command
(e.g., in units of 20ns is convenient for a DDS-type generator running
at 50MHz and can express step rates down to
The upper end is no problem, it come by itself then DMA was used to feed values
but the lower end I had to twiddle with a bit to get frequency down.
Synchronization is not by itself a problem but values are received from
Linuxcnc with quite large jitter. I could add a little bit of lag and even
Thanks a lot for this post!
On 2016-04-04 23:20, John Dammeyer wrote:
> I'm sure you are going to have lots of fun with this. I suspect you might
> be over simplifying it too.
>
> It's not really that important that you can generate 1 Mhz stepping
> frequencies using the hardware timer on the
I'm sure you are going to have lots of fun with this. I suspect you might
be over simplifying it too.
It's not really that important that you can generate 1 Mhz stepping
frequencies using the hardware timer on the micro-processor. Nowadays
that's probably a first or second year college lab
Then don't encrypt or select the option to allow the company to hold the key as
well...
> On Apr 4, 2016, at 2:51 PM, Nicklas Karlsson
> wrote:
>
> On Mon, 4 Apr 2016 14:00:42 -0400
> Tom Easterday wrote:
>
>> Always good to have a local backup
I am currently implementing a stepper generator on micro controller which may
output square waves with clock frequency accuracy with use of built in timer
peripheral. It may generate square wave probably up to at least in the MHz
range and be extended downwards as far as needed by some
On Mon, 4 Apr 2016 14:00:42 -0400
Tom Easterday wrote:
> Always good to have a local backup as well, but offsite backup is essential
> if you really care about the data. With CrashPlan there is an option, I
> believe, where they hold the key as well and can therefore decrypt
Always good to have a local backup as well, but offsite backup is essential if
you really care about the data. With CrashPlan there is an option, I believe,
where they hold the key as well and can therefore decrypt data if you happen to
lose the key.
However, making sure you don't lose the
On Monday 04 April 2016 10:43:10 Nicklas Karlsson wrote:
> A backup of important files stored at other location or other place
> not likely to be affected by the same misshap is always good.
>
>
I'll second that. amanda grabs the lcnc related stuff from all of my
machines, and all of this
On Monday 04 April 2016 09:55:16 Rick Lair wrote:
> Hello Guys,
>
> Is there any need for any anti-virus/malware/spyware software on my
> linux machines, I have never thought about, but last week I switched
> my desktop over to Mint from XP, and wasn't sure what security
> measures are needed, I
You certainly do not need to BUY any additional software. But you do need
to set up the Linux machine reasonably. Mostly this means
1. Never use an admin login account for normal work. Set yourself up as a
normal user then use "su" or whatever to do what you need.
2. use good passwords on
On 04/04/2016 10:00 AM, Tom Easterday wrote:
> For offsite backup I would highly recommend of CrashPlan. It works on Mac,
> Win, and Linux. It allows for strong private key encryption of all data
> during backup and on the servers. Recovery of files is easy and since you
> are downloading
On 04/04/2016 09:54 AM, Jeff Epler wrote:
>
> I don't think any of the common web or e-mail threats have payloads that
> work on Linux anyway. But if you have an open ssh port and your root
> password is "root", you will end up with unwanted software installed,
> such as an IRC server to control
On 04/04/2016 09:49 AM, Rick Lair wrote:
> So what would you recommend on my desktop PC in my office, that I do
> everything on, that I just converted over to Linux Mint?
>
>
Is it behind a firewall? Does it use NAT, so the desktop
has no WAN address? That's the best security.
Use good
On Monday 04 April 2016 09:37:08 Nicklas Karlsson wrote:
> > Maybe. OTOH, I can probably knock up something in eagle or geda/pcb,
> > and carve it on my machine by the time UPS could make a drop here.
> > Those pictured boards Farnell shows me are quite simple, and adding
> > another thru-hole
On 04/04/2016 08:55 AM, Rick Lair wrote:
> Hello Guys,
>
> Is there any need for any anti-virus/malware/spyware software on my
> linux machines, I have never thought about, but last week I switched my
> desktop over to Mint from XP, and wasn't sure what security measures are
> needed, I wasn't
I would consider lost key quite a serious risk. I have copy of files I worked
on the last months on CD/DVD or whatever they name the disks nowaday.
If computer break down or does not work for other reason i install the software
again.
On Mon, 4 Apr 2016 11:00:35 -0400
Tom Easterday
For offsite backup I would highly recommend of CrashPlan. It works on Mac,
Win, and Linux. It allows for strong private key encryption of all data during
backup and on the servers. Recovery of files is easy and since you are
downloading it is usually quite fast assuming you have fast
Here are the security measures I use on my Linux machines:
* Have a back-up plan so that you can restore your computer after
a problem (not limited to finding malware, but more likely problems
such as a failed disk/SSD)
* Firewall that allows incoming connections only on specific
So what would you recommend on my desktop PC in my office, that I do
everything on, that I just converted over to Linux Mint?
Rick
On 04/04/2016 10:43 AM, Nicklas Karlsson wrote:
> A backup of important files stored at other location or other place not
> likely to be affected by the same
A backup of important files stored at other location or other place not likely
to be affected by the same misshap is always good.
On Mon, 4 Apr 2016 07:33:21 -0700
Jerry Scharf wrote:
> Rick,
>
> The family of software you mentioned are there to try to protect you when
>
Rick,
The family of software you mentioned are there to try to protect you when
you bring new things onto the machine.
Anti-virus is for finding bad programs that have been added to the machine.
If you stick to only installing things that are downloaded from the debian
distro and things you can
For spyware I guess it depend. If you market the machined parts they could it
see them in the broschure or wherever you put them anyway.
On Mon, 4 Apr 2016 09:55:16 -0400
Rick Lair wrote:
> Hello Guys,
>
> Is there any need for any anti-virus/malware/spyware software on
Hello Guys,
Is there any need for any anti-virus/malware/spyware software on my
linux machines, I have never thought about, but last week I switched my
desktop over to Mint from XP, and wasn't sure what security measures are
needed, I wasn't ever really concerned about the CNC's, but now with
> Maybe. OTOH, I can probably knock up something in eagle or geda/pcb, and
> carve it on my machine by the time UPS could make a drop here. Those
> pictured boards Farnell shows me are quite simple, and adding another
> thru-hole for the supply bypassing those chips ought to have would be
>
On Monday 04 April 2016 01:52:42 Nicklas Karlsson wrote:
> > > > > ISO7421
> > > >
> > > > Now thats sweet, and a heck of a lot better thought out than the
> > > > last such chip I looked at a decade ago. Needs a 4 wire cable
> > > > from each direction, but I don't see as that as a problem
Lemme clarify- whether or not you're galvanically isolating, any RS485
transceiver needs either 3-wire or 4-wire logic due to its half-duplex
nature, OR to be protocol-aware.
I don't know if the RTS could be used that way. RTS is hardware flow
control, which is obsolete now and often not
> That's a bare unidirectional isolator. OK for RS232. Problem being,
> Modbus is over RS422/RS485, a bidirectional protocol and there's a lot
> of difficult problems in creating buffers of any sort. It doesn't know
> which direction it's supposed to drive at any given time.
>
>
That's a bare unidirectional isolator. OK for RS232. Problem being,
Modbus is over RS422/RS485, a bidirectional protocol and there's a lot
of difficult problems in creating buffers of any sort. It doesn't know
which direction it's supposed to drive at any given time.
33 matches
Mail list logo