Ok!
I've attached the files with configurations of PCI4800 and BR500 (external).
External bridge send an error:
E Radio Error : 3 CRC errors
Whereis problem ??
P.S. On the PCI4800 card Firmware v.4.25.30.
- Original Message -
From: Brooks Davis [EMAIL PROTECTED]
To: Dmitry A.
Not sure if I should blame current - but see the errors below. I've tried
an fsck and an fsck -f from single user mode on each of the affected disks
(7 disk, mix of ide/scsi give this).
FSCK comes through clean. Prior to running -CURRENT the disks where
attached to a 2.0.8 machine; and the dump
- run 'chio ielem' before you do anything. This may make the changer look
at what it has, and perhaps figure out that it doesn't really have a
source addresses for various elements.
- try moving every tape in the changer to some destination and back. The
fastest thing to do,
Usually remote MAC address. It's used for restricting users on a subnet. I
have an ugly hack that does this at present and am looking forward to the
MAC address support. Yes, I know users can conceivably change their MAC
addresses but most would never know how. They change their IP addresses to
On Sat, Jun 29, 2002 at 10:02:51AM -0700, Nielsen wrote:
Usually remote MAC address. It's used for restricting users on a subnet. I
have an ugly hack that does this at present and am looking forward to the
MAC address support. Yes, I know users can conceivably change their MAC
THERE IS MAC
several viruses do change the MAC address. The only real
security is to have one user per port and filter the ports.
Next step (but not as safe) is to wire down the arp table and only accept
things that are in there (will be easy to implement in the
new ipfw)
I think it would be easier to
On Sat, Jun 29, 2002 at 03:17:24PM -0300, Joao Carlos wrote:
several viruses do change the MAC address. The only real
security is to have one user per port and filter the ports.
Next step (but not as safe) is to wire down the arp table and only accept
things that are in there (will be
Hello, freebsd-hackers! How are you?
I want to write driver for some device, which is attached to
standard serial (COM, RS-232) port.
I want to make this driver full-featured -- with device node in
/dev, ioctl()s and other. But I don't want to re-implement all this
serial tty
On Sat, Jun 29, 2002 at 01:09:26PM +0200, [EMAIL PROTECTED] wrote:
Not sure if I should blame current - but see the errors below. I've tried
an fsck and an fsck -f from single user mode on each of the affected disks
(7 disk, mix of ide/scsi give this).
FSCK comes through clean. Prior to
in -current, we have a new netgraph node ng_device
that gives a device interface to netgraph.
We also have the ng_tty node that attaches to a tty
as a 'line disciplin'
adding a node between these to do you own stuff would give you what you
want.
(the ng_device node shuld be Merged from current
On 2002-06-26 02:44 +, Makoto Matsushita wrote:
scott You could simply pop up a couple directories and checkout the
scott given tag and date over your existing checkout. CVS is smart
scott enough to notice that you've already got something checked out,
scott and it will just update
Joao Carlos wrote:
several viruses do change the MAC address. The only real
security is to have one user per port and filter the ports.
Next step (but not as safe) is to wire down the arp table and only accept
things that are in there (will be easy to implement in the
new ipfw)
I
Seriously, I'm wondering what security restrictions are so
onerous that users are willing to change their IP addresses to
get around them, and why they are there in the first place?
Well in certain cases it's company policy that certain machines (ie: users)
can't browse the web during certain
Our sales aren't the only thing GROWING with this product!
Increase penis size 1-4...guaranteed!!
For complete information on how to gain back
your self esteem:
http://www.freehostchina.com/site2/69chevelle/index.html
+++
AS Seen On TV!!
Nielsen wrote:
Seriously, I'm wondering what security restrictions are so
onerous that users are willing to change their IP addresses to
get around them, and why they are there in the first place?
Well in certain cases it's company policy that certain machines (ie: users)
can't browse
Terry Lambert wrote:
Luigi is right: the only place you can really do this at this
level is under Windows.
Don't know what the heck happened here... it's supposed to read
on a per switch port basis. I think I lost part of a paragraph...
-- Terry
To Unsubscribe: send mail to [EMAIL
keramida So, the proper steps to get the files of a branch other than HEAD, in
keramida the revisions they had at a certain point in time would be:
keramida + Checkout using the branch as a sticky tag.
keramida + Update using both -D DATE and -r BRANCH_TAG.
No, it doesn't work as
On 2002-06-30 10:48 +, Makoto Matsushita wrote:
keramida So, the proper steps to get the files of a branch other than HEAD, in
keramida the revisions they had at a certain point in time would be:
keramida + Checkout using the branch as a sticky tag.
keramida + Update using
On Wed, 19 Jun 2002, Daniel Eischen wrote:
Andrew MacIntyre wrote:
{...}
The attached C code is a simple example of a signal handling situation
which works in the non-threaded interpreter, but fails in a threaded
interpreter.
{...}
Try the patch included at the bottom.
{...}
Index:
Sorry, hackers, I posted this twice in -questions and got no response.
If the problem is newreno, can somebody say how to up just that piece for
4.4 so as to be as non-disruptive, non-dice-rolling as possible on this
otherwise solid machine?
Thanks
Len
FreeBSD 4.4-RELEASE
On Sun, 30 Jun 2002, Andrew MacIntyre wrote:
On Wed, 19 Jun 2002, Daniel Eischen wrote:
Andrew MacIntyre wrote:
{...}
The attached C code is a simple example of a signal handling situation
which works in the non-threaded interpreter, but fails in a threaded
interpreter.
21 matches
Mail list logo