> -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Chad Thompson > Sent: Tuesday, May 08, 2007 5:39 PM > To: freebsd-questions@freebsd.org > Subject: FOSS movement in Eugene Oregon is looking for help. > > > Attention Free and Open Source Software advocates!! > > The City of Eugene, Oregon, U.S.A. is currently looking for an > *Infrastructure > > *Subtle art: When ever the subject of FOSS is brought up in the > office, the > answer is a resounding "NO!" or "NEVER!".
Hmm - I guess Eugene probably doesen't even know they are utterly dependent on it! whois# nslookup Default Server: dns1.ipinc.net Address: 65.75.192.10 > set type=soa > eugene-or.gov Server: dns1.ipinc.net Address: 65.75.192.10 Non-authoritative answer: eugene-or.gov origin = cens.ci.eugene.or.us mail addr = dnsadmin.ris.lane.or.us serial = 12 refresh = 900 (15M) retry = 600 (10M) expire = 86400 (1D) minimum ttl = 3600 (1H) Authoritative answers can be found from: eugene-or.gov nameserver = phloem.uoregon.edu eugene-or.gov nameserver = cesrvddw.ci.eugene.or.us phloem.uoregon.edu internet address = 128.223.32.35 > exit whois# nmap -O -v phloem.uoregon.edu Starting nmap 3.93 ( http://www.insecure.org/nmap/ ) at 2007-05-08 18:18 PDT Initiating SYN Stealth Scan against phloem.uoregon.edu (128.223.32.35) [1668 ports] at 18:18 Discovered open port 53/tcp on 128.223.32.35 The SYN Stealth Scan took 26.59s to scan 1668 total ports. For OSScan assuming port 53 is open, 67 is closed, and neither are firewalled Host phloem.uoregon.edu (128.223.32.35) appears to be up ... good. Interesting ports on phloem.uoregon.edu (128.223.32.35): (The 1665 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE 53/tcp open domain 67/tcp closed dhcpserver 68/tcp closed dhcpclient Device type: general purpose|broadband router Running: Linux 2.4.X|2.5.X, D-Link embedded OS details: Linux 2.4.0 - 2.5.20, Linux 2.4.18 - 2.4.20, Linux 2.4.26, Linux 2.4.27 or D- -------->^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Link DSL-500T (running linux 2.4) Uptime 470.190 days (since Mon Jan 23 12:45:26 2006) TCP Sequence Prediction: Class=random positive increments Difficulty=3780165 (Good luck!) IPID Sequence Generation: All zeros Nmap finished: 1 IP address (1 host up) scanned in 35.632 seconds Raw packets sent: 3355 (135KB) | Rcvd: 20 (1032B) whois# Ted _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"