qw er wrote:
It really sucks. it is slow.
I was going to avoid this, but I can't...
I can say qw er sucks, [s]he is really dumb, but it really doesn't
prove much in the grand scheme of things.
What part of OpenBSD do you think sucks, and no more trolling. What
part is slow? It's quick
I prefer base64 encoded printouts, to be rekeyed by interns should the
system fail.
I don't trust the interns so I use FIRE to encrypt the base 64 after it's been
printed.
I would really recommend against using rdate like this, it jumps the
clock. ntpd skews the clock (makes it run slightly fast or slow until
the time is correct), so you don't miss out on any seconds (which
sometimes skips cron jobs, makes logging more confusing, and can
cause a lot of trouble
I decided to get the time syncronization for all those boxes. In the
gateway machine, i managed to get the following in crontab:
*/5 * * * * /usr/sbin/rdate -4ncva
ptbtime1.ptb.de | /usr/bin/logger -t NTP
snip
Everything is working ok except because of those two
Hi.
i looking tutorial for install vpn in obsd 4.1 with client
microsoft xp or mac also support netbios for file or print sharing
so what can i use openvpn , ipsec , vpn ?
You obviously haven't looked very far? OpenVPN and pptp are in
Ports. I use OpenVPN for ease of use on *BSD,
i have no formal CS background so am at a loss for good candidates.
the applications in question are click here, prints
something in a text
box, etc ones that are not very complex. a language that
allows me to
generate GUIs quickly and securely would be nice.
I've been hacking with Qt on
Um, can you site a single *real world* example of where md5 sums
have been co-opted in any way? Yes, md5 now has a weakness, but
really, are there any cases of anyone having actually exploited it?
It's that kind of attitude that is responsible for probably more than
half of the breaches that
I find 'return' to be easier to work with. The LAN I am primarily
thinking about is both infested with Windows and accessible via VPN -
and the VPN has some Windows clients. Considering the people on said
LAN, who are both sweet and smart but not in general
computer-savvy, I'd
be highly
The solution I came to is very simple. Currently I only need one of em
(dual card), so I disabled the second one. When I boot the router, my
network usage rises up to 96%. I simlpy mark that unusable interface
(em1) as up and few seconds later I mark the same interface down. My
network usage
My computer is connected to internet through a router whose internal
address is 192.168.1.1.
Here is some interesting stuff after the vpn as been brought up:
ifconfig tun0
tun0: flags=8011UP,POINTOPOINT,MULTICAST mtu 1500
groups: tun
inet 132.204.232.32 -- 132.204.2.20
Any idea how to diagnose the problem?
Turn on as much verbose logging as you can and see what you get. Do you
get any kernel crash messages on the console when the machine hangs or
does it just hang up and die?
Your first port of call is to get the system logs out of the machine.
Sending
them
Hi,
Would anyone else consider that a good indicator? I mean, that would
be great if that was the case all around. I got to know the return
guy at Best Buy so well, he let me bring my laptop in, and opened
boxes to find wireless for them... I open 5 different ones before we
had to
to summarize matthew 17:20, nothing is impossible, but that
does not
mean that doing something that is not impossible is a good
idea. i would
recommend not making it out of wood for the following reasons:
Wood burns better than aluminium or steel too... in the unfortunate
event that one of
I recently wrote Linus Torvalds asking why I don't see his name listed
on the OpenBSD donations page (http://www.openbsd.org/donations.html),
since I figured he uses OpenSSH.
Apart from the fact that was a private email from Linus to you and you
broadcast it publically (if you really did email
I'm sure you'll give some really good reason why the files have to be
named that way...
Try admining boxes which are used by EvilOS users - all of their
files will be called My\ blah.
I scp'd a file called 'a b' to an openbsd server here, then scp'd it
back a couple time in different ways. It worked only when using the
quotes AND escaping, like so:
scp [EMAIL PROTECTED]:a\ b .
That's because of the shell.
The shell on the client sees the quotes and doesn't escape the
snip
Investigate PPP. You can start a PPP server on one and a PPP
client on the other and they will immediately be able to to talk
and share data.
If all you need is remote login from one to the other investigate
putting a console on the serial port of one machine then using
something like
Right. As long as we understand that it sucks, it's OK to use? I know
when I think about securing my data I'm interested in keeping only the
average joes out.
I don't know about you, but I use wireless security as an extra layer.
It might suck, but it keeps the next door neighbour's laptop
no, you're not. it's not that easy. (and I just leave mine
wide open)
As far as I know, if you leave it open you're not liable because
you cannot prove who would have strolled by. If you put any
sort of security at all to prevent outsiders it can be reasonably
assumed that you were the person
It may not be the wisest thing to be trying PPTP. In addition to the
technical problems you are encountering, there seem to be some grave
issues with the protocol itself,
http://www.schneier.com/pptp-faq.html
which are apparently not resolved entirely even in later versions.
After all this talk about blob-only software... Skype is absolute
proof of why we shouldn't have blob-only software. The recent
hoo-ha about it grabbing BIOS dumps and sending them back to the
servers on X86 machines really shows that software can do nasty
things. Nobody even noticed because
If this works with a powered USB hub, then it is a result of
insufficient USB power from the Zaurus, during the early
startup time.
I put the usb hub out there for the single purpose of
powering it. Only
th eone pieve of gear on the hub, too, so need another idea.
Are you using a
You have a valid point: any bug is a security problem.
However, the topic is not my management practices and
the tradeoffs involved therein. The topic is the
efficacy of the security-announce list. If I knew
security-announce was broken I could write a screen-scraper
to check the errata
/dev/rwd0h: UNEXPECTED INCONSISTENCY; RUN fsck_fss MANUALLY.
/dev/rwd0d: file system is clean; not cheking
/dev/rwd0g: file system is clean; not cheking
/dev/rwd0e: file system is clean; not cheking
THE FOLLOWING FILE SYSTEM HAD AN UNEXPECTED INCONSISTENCY:
fss: /dev/rwd0h (/home)
24 matches
Mail list logo