Slavic parsing
Guys I am looking for Slavic language parser + maintainer. Slavic as in Polish and Russian. Computer language as in C, Perl, Ruby or Python. Reply to me offlist at [EMAIL PROTECTED] Thanks -- Danny Lieberman Software Security Specialists www.software.co.il - Deliver secure software to your customers www.controlpolicy.com - Reduce operational risk of information security www.software.co.il/pta - Download a free copy of the PTA-Practical threat analysis tool Tel Aviv + 972 3 610-9750 US + 1-301-841-7122 Cell + 972 54 447-1114
Re: archiving parts in linux.
try DAR (Disk ARchiver), should be a good one although doesn't ship standardly with Linux. http://dar.sf.net or just apt-get install dar. The term for splitting files is called 'slice'. - Oren Tzahi Fadida wrote: Hi, I wish to archive a 50mb file into several parts of 5mb files in linux. I also need to be able to open the files in windows. For some unknown reason, i can't find a way (other than using a non-free rar) to do this. I tried zipsplit but it says something about the file being too large or something like this. I tried 7z but after about 12% of archiving it gives a weird error: Error: System error: Too many open files (and this file was never opened :). What can i do? Also, i am trying to backup my files (many thousands of them). is there a way to cause tar or something else not to use a local tmp directory (since i don't have enough room) and also, it seems to eat too much memory till my kde programs starts to close. 10x. = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
On Monday 29 January 2007 04:29:17 Amos Shapira wrote: Have to read it to believe it... Substitute Teacher Faces Jail Time Over Spyware A 40-year-old former substitute teacher from Connecticut is facing prison time following her conviction for endangering students by exposing them to pornographic material displayed on a classroom computer. http://blog.washingtonpost.com/securityfix/2007/01/substitute_teacher_faces _jail.html Some 16 year old kid got arrested and charged with possession of child porngraphy. http://sex.goleshet.com/home/516 pgp4v0SJLu2ve.pgp Description: PGP signature
Re: archiving parts in linux.
Tzahi Fadida wrote: Hi, I wish to archive a 50mb file into several parts of 5mb files in linux. I also need to be able to open the files in windows. For some unknown reason, i can't find a way (other than using a non-free rar) to do this. The canonical way (although maybe not the most comfortable one) is using dd. dd if=bigfile of=part1 bs=5m count=1 dd if=bigfile of=part2 bs=5m skip=1 count=1 dd if=bigfile of=part3 bs=5m skip=2 count=1 .. To reassemble them on unix, use 'cat part1 part2 part3 ... bigfile'. To reassemble on windows, use 'copy /b part1+part2+part3... bigfile'. You can also use the 'split' command. The GNU version has an option '-b' for that. Standard unix versions do not, and only split by lines. That's why traditionally dd is used. I also have a feeling (did not check) that dd is much faster. -- Didi
Re: [OT] - The dangers of using windows
Hi Yuval, Ok, another example. So what difference would using Linux or FOSS have made? - yba On Mon, 29 Jan 2007, Yuval Langer wrote: Date: Mon, 29 Jan 2007 11:33:58 +0200 From: Yuval Langer [EMAIL PROTECTED] To: Linux-IL linux-il@linux.org.il Subject: Re: [OT] - The dangers of using windows On Monday 29 January 2007 04:29:17 Amos Shapira wrote: Have to read it to believe it... Substitute Teacher Faces Jail Time Over Spyware A 40-year-old former substitute teacher from Connecticut is facing prison time following her conviction for endangering students by exposing them to pornographic material displayed on a classroom computer. http://blog.washingtonpost.com/securityfix/2007/01/substitute_teacher_faces _jail.html Some 16 year old kid got arrested and charged with possession of child porngraphy. http://sex.goleshet.com/home/516 -- EE 77 7F 30 4A 64 2E C5 83 5F E7 49 A6 82 29 BA~. .~ Tk Open Systems =}ooO--U--Ooo{= - [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il - = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
On 29/01/07, Jonathan Ben Avraham [EMAIL PROTECTED] wrote: Hi Yuval, Ok, another example. So what difference would using Linux or FOSS have made? I'm not Yuval, and maybe I'm naive, but it seems pretty obvious to me that the chances of this happening to him on a recent Linux distro or an OS-X machine or even a well configured Firefox on Windows are much smaller, even if they had 90+% of the desktop market share. (Excluding Linspire(?) - which at least used to encourage using the system as root, maybe they got better since). --Amos
Re: booting into linux from windows98
On Mon, 29 Jan 2007, Dotan Cohen wrote: The paranoid survive. Yes, but they feel like they're being watched all the time for some reason. McAfree, PartitionMagic and Norton are already in bed with MS. Keeping big business afloat while drowning the little guy is something that MS has done many times in the past. What does MS care if MoshePartition suddenly stops working? MS cares more about MoshePartitions than about big business. Big business does not buy functionality, it buys 'deals'. 50% off the license bundle and a service contract and the buying suit gets a bonus from his leader suits. 1000 cubicles and 50 IT support personnel will weep over this for two years. The suit won't weep, all expenses paid bonus trips to Bahamas or Cancun don't make people weep. Also the deal will figure prominently under 'achievements' in his CV. He might even have used the 'L' word to get the 50% off. The MoshePartitions must be kept happy with animations, buzzwords and sufficient service on the phone to prevent them from starting class action suits. Notice that suits never start class action suits (hehe) for some reason. Keeping MoshePartitions happy is harder than satisfying suits, since the beta testing is continuous and hard to influence by lobby or bonuses. When m$ was caught financing self-prozelytization by paying off bloggers (with free laptops among other things), the reaction was predictable. For every corporate user there must be 1000 individual users out there. Even if only 10% of them are paying promptly they outnumber the corporate users 10:1. Making sure that something simple and inexpensive will keep the MoshePartitions going (like reinstalling) has been what has kept m$ systems going for the little user, together with hypnotizing small users into the idea that backups are expensive and that data loss is a given thing. That includes data loss by 'upgrading' to incompatible file formats. And most suits who buy quality or make uptime commitments think thrice about what exctly they buy. With uptimes at most in the 0.9 range (including network) a 10 machine installation means a 0.35 probability for any machine to work right at any given time. In fact the highest number of networked machines with 0.9 such that the probability for any one of them to be up (= 0.5) is 6 ;-) It follows that networks with more than 6 computers need a technician chained to the desk or a support contract. The fact that most servers used are not of the m$ variety is not an accident, it is a consequence of what happens to business when they go down. Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - Somee dangers of living under the United States of American law system[ was The dangers of using windows]
El lun, 29-01-2007 a las 11:55 +0200, Jonathan Ben Avraham escribió: Hi Yuval, Ok, another example. So what difference would using Linux or FOSS have made? The difference is that security flaws in FOSS, which are easier to be noticed about and therefore to fix them, were not extensively exploited yet. But the real threat do not reside in the software, spyware or *ware but in the United States of America law system. Fortunately me, as other many members of this mailing list, do not live there. julian - yba On Mon, 29 Jan 2007, Yuval Langer wrote: Date: Mon, 29 Jan 2007 11:33:58 +0200 From: Yuval Langer [EMAIL PROTECTED] To: Linux-IL linux-il@linux.org.il Subject: Re: [OT] - The dangers of using windows On Monday 29 January 2007 04:29:17 Amos Shapira wrote: Have to read it to believe it... Substitute Teacher Faces Jail Time Over Spyware A 40-year-old former substitute teacher from Connecticut is facing prison time following her conviction for endangering students by exposing them to pornographic material displayed on a classroom computer. http://blog.washingtonpost.com/securityfix/2007/01/substitute_teacher_faces _jail.html Some 16 year old kid got arrested and charged with possession of child porngraphy. http://sex.goleshet.com/home/516 -- Julian Daich [EMAIL PROTECTED] = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
On Mon, 29 Jan 2007, Amos Shapira wrote: On 29/01/07, Jonathan Ben Avraham [EMAIL PROTECTED] wrote: Hi Yuval, Ok, another example. So what difference would using Linux or FOSS have made? I'm not Yuval, and maybe I'm naive, but it seems pretty obvious to me that the chances of this happening to him on a recent Linux distro or an OS-X machine or even a well configured Firefox on Windows are much smaller, even if they had 90+% of the desktop market share. Hi Amos, Perhaps there would be less malware on the machine, but not necceraily any less illegal content. A student could access say a legitimate message board that does not properly check user input. An attacker could upload a CSRF attack to then make the school's machine download a whole slew of inappropriate material when the student accesses the message board. The school's content filtering mechanism would not necassarily catch this (especially due to the licensing issue that they claim they had). This attack would work on Firefox running on Linux, because it used AJAX to run locally on the browser. -- - Josh = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
Hi Amos, Assuming that Linux is less susceptible to spyware, and it was spyware that downloaded the incriminating content, then using Linux alone would have prevented the problem, unless maybe the user was using IE over wine. Regarding FireFox, what configuration would help? - yba On Mon, 29 Jan 2007, Amos Shapira wrote: Date: Mon, 29 Jan 2007 21:21:02 +1100 From: Amos Shapira [EMAIL PROTECTED] To: Linux-IL linux-il@linux.org.il Subject: Re: [OT] - The dangers of using windows On 29/01/07, Jonathan Ben Avraham [EMAIL PROTECTED] wrote: Hi Yuval, Ok, another example. So what difference would using Linux or FOSS have made? I'm not Yuval, and maybe I'm naive, but it seems pretty obvious to me that the chances of this happening to him on a recent Linux distro or an OS-X machine or even a well configured Firefox on Windows are much smaller, even if they had 90+% of the desktop market share. (Excluding Linspire(?) - which at least used to encourage using the system as root, maybe they got better since). --Amos -- EE 77 7F 30 4A 64 2E C5 83 5F E7 49 A6 82 29 BA~. .~ Tk Open Systems =}ooO--U--Ooo{= - [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il - = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
On 29/01/07, Jonathan Ben Avraham [EMAIL PROTECTED] wrote: Hi Amos, Assuming that Linux is less susceptible to spyware, and it was spyware that downloaded the incriminating content, then using Linux alone would have prevented the problem, unless maybe the user was using IE over wine. 1. lock down the linux configuration - just google lock down linux. I'm pretty sure I saw projects aimed towards this (maybe also add kiosk to the search terms list). 2. http://www.hermann-uwe.de/blog/towards-a-moderately-paranoid-debian-laptop-setup--part-1-base-system. For instance I'll try to see how I can make use of SELinux in the next network I install. 3. Debian-specific: http://www.debian.org/doc/manuals/securing-debian-howto/ Regarding FireFox, what configuration would help? Personally I use NoScript (after being hammered about this in the Security Fix blog), AdBlock and AdBlock Filterset.G, others might be more paranoid than me (Flashblock, for instance). Look - just installing Linux is a huge step towards security, IMHO, but to repeat the most common cliché in security: the chain is as strong as the weakest link, which is still the user, so you still have to work to keep users from shooting themselves (and your network) while using the system. There are much bigger security experts on this forum than me, so take my advise with a grain of sea-salt, and they might save you some googl'ing. Cheers, --Amos
OT discussion on MS vs. the world [Was: booting into linux from windows98]
On Mon, 2007-01-29 at 12:28 +0200, Peter wrote: For every corporate user there must be 1000 individual users out there. Even if only 10% of them are paying promptly they outnumber the corporate users 10:1. Making sure that something simple and inexpensive will keep the MoshePartitions going (like reinstalling) has been what has kept m$ systems going for the little user That is an incredibly naive approach that has nothing at all to do with reality. The original poster talked about ISVs, and why MS doesn't care about pissing them off, but as you went on a tangent and started to talk about OS customers, I won't bother speculating about the original issue either. The sad fact of the matter, is that individual users, as a mass - not as specific individuals - are not buying operating systems. They never have and they never will. They buy pre-installed computers. That is why Vista is going to sell like hot buns and why Microsoft doesn't care about users - Microsoft's customers, the people that they need to satisfy in order to sell software, are large corporations buying bulk software licenses (as you successfully noted), OEMs and recently - Hollywood. Not users, never users. That is why MS-Windows looks the way it is and behaves they way it is. -- Oded ::.. He looked a lot bigger when I didn't see him -- Jayne (Adam Baldwin), Firefly = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
Hi Josh, Are these precautions are sufficient to prevent the CSRF attack that you described? - yba On Mon, 29 Jan 2007, Amos Shapira wrote: Date: Mon, 29 Jan 2007 22:29:40 +1100 From: Amos Shapira [EMAIL PROTECTED] To: Linux-IL linux-il@linux.org.il Subject: Re: [OT] - The dangers of using windows On 29/01/07, Jonathan Ben Avraham [EMAIL PROTECTED] wrote: Hi Amos, Assuming that Linux is less susceptible to spyware, and it was spyware that downloaded the incriminating content, then using Linux alone would have prevented the problem, unless maybe the user was using IE over wine. 1. lock down the linux configuration - just google lock down linux. I'm pretty sure I saw projects aimed towards this (maybe also add kiosk to the search terms list). 2. http://www.hermann-uwe.de/blog/towards-a-moderately-paranoid-debian-laptop-setup--part-1-base-system. For instance I'll try to see how I can make use of SELinux in the next network I install. 3. Debian-specific: http://www.debian.org/doc/manuals/securing-debian-howto/ Regarding FireFox, what configuration would help? Personally I use NoScript (after being hammered about this in the Security Fix blog), AdBlock and AdBlock Filterset.G, others might be more paranoid than me (Flashblock, for instance). Look - just installing Linux is a huge step towards security, IMHO, but to repeat the most common clich? in security: the chain is as strong as the weakest link, which is still the user, so you still have to work to keep users from shooting themselves (and your network) while using the system. There are much bigger security experts on this forum than me, so take my advise with a grain of sea-salt, and they might save you some googl'ing. Cheers, --Amos -- EE 77 7F 30 4A 64 2E C5 83 5F E7 49 A6 82 29 BA~. .~ Tk Open Systems =}ooO--U--Ooo{= - [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il - = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
Hi Josh, Are these precautions are sufficient to prevent the CSRF attack that you described? Hi Yonatan, Turning off client side scripting will go a long way in securing your browser, but is it a realistic approach for securing a regular user's PC? From my experience, about 80% of the web applications that I audit are vulnerable to either XSS or CSRF, which means that even if you use the NoScript Firefox plugin to allow only client side script execution from acceptable web sites, you will be either severely limiting the web sites available or allowing potentially dangerous code to run on your browser. In either case I don't this this is the correct approach for regular users. In my experience there are just too many web apps that do not function properly under Firefox and MSIE under wine, to expect my grandmother to put up with. Perhaps a better solution for a school with a limited budget would be to run their web browsing boxen under vmware and have the machine revert to a known clean snapshot everyday. This does not solve most CSRF issues, though it would get rid of any unwanted material downloaded that day. CSRF attacks are a server side issue, you could solve them by removing client side scripting, but again that is not an acceptable solution for most users (and does not address HTML based attacks). -- - Josh = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
Hi Josh, Ok, there is apparently no solution that prevents the attacks because it is the server that is in fact attacked. So the solution to the content problem on the client side has to be to put the browser in some kind of sandbox and have a mechanism for cleaning the sandbox every X minutes. This probably means erasing or disabling the local browser cache and using a single central caching server that removes cached items after a few minutes and only accepts connections from authenticated browsers. The user would need a secure means for moving material that he intentionally downloaded into his home directory. By secure I mean that it would be almost impossible for material to get into the home directory without user intent. As you say - when it comes to incriminating content, the risk is not limited to Windows, the FOSS world is at risk too. - yba On Mon, 29 Jan 2007, Josh Zlatin-Amishav wrote: Date: Mon, 29 Jan 2007 14:25:31 +0200 (IST) From: Josh Zlatin-Amishav [EMAIL PROTECTED] To: Linux-IL linux-il@linux.org.il Cc: [EMAIL PROTECTED] Subject: Re: [OT] - The dangers of using windows Hi Josh, Are these precautions are sufficient to prevent the CSRF attack that you described? Hi Yonatan, Turning off client side scripting will go a long way in securing your browser, but is it a realistic approach for securing a regular user's PC? From my experience, about 80% of the web applications that I audit are vulnerable to either XSS or CSRF, which means that even if you use the NoScript Firefox plugin to allow only client side script execution from acceptable web sites, you will be either severely limiting the web sites available or allowing potentially dangerous code to run on your browser. In either case I don't this this is the correct approach for regular users. In my experience there are just too many web apps that do not function properly under Firefox and MSIE under wine, to expect my grandmother to put up with. Perhaps a better solution for a school with a limited budget would be to run their web browsing boxen under vmware and have the machine revert to a known clean snapshot everyday. This does not solve most CSRF issues, though it would get rid of any unwanted material downloaded that day. CSRF attacks are a server side issue, you could solve them by removing client side scripting, but again that is not an acceptable solution for most users (and does not address HTML based attacks). -- - Josh = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED] -- EE 77 7F 30 4A 64 2E C5 83 5F E7 49 A6 82 29 BA~. .~ Tk Open Systems =}ooO--U--Ooo{= - [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il - = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: [OT] - The dangers of using windows
Hello Jonathan, So the solution to the content problem on the client side has to be to put the browser in some kind of sandbox and have a mechanism for cleaning the sandbox every X minutes. There is sandbox app for windows: http://googlesystem.blogspot.com/2006/09/sandbox-for-windows-applications.html On linux the sandbox can be done by running firefox or ie6-in-wine in chroot. Other option is to build dedicated browsers box to run the browsers remotely. Both options would require some hoops jumping for downloading and uploading files. -- Arieh
Hosting Recommendations
Can anyone recommend a shared hosting service located in Israel with reasonable prices for a decent hosting package. Requirements for the hosting package include: 25 GB storage space PHP / MySQL support Good connection speed Excellent uptime Outstanding support ASP support is an advantage Able to provide references of current long term customers To be honest, I usually do my hosting outside of Israel but for a particular client they are interested in specifically using a hosting service in Israel. Thanks, -- David Suna [EMAIL PROTECTED] = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: archiving parts in linux.
On 29/01/07, Yedidyah Bar-David [EMAIL PROTECTED] wrote: I also have a feeling (did not check) that dd is much faster. -- Didi You're probably partial to dd because it's your name! Dotan Cohen http://what-is-what.com/what_is/computer.html http://slashedot.com = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: archiving parts in linux.
2007/1/29, Dotan Cohen [EMAIL PROTECTED]: On 29/01/07, Yedidyah Bar-David [EMAIL PROTECTED] wrote: I also have a feeling (did not check) that dd is much faster. -- Didi You're probably partial to dd because it's your name! Obviously :-) You can guess I heard by now many jokes regarding this ... And if we are getting this OT, I'll add that I thought for many years that dd is 'copy and convert' as it's manpage says, only 'cc' was already used for 'c compiler' so they took 'dd'. But the reality is that it's named after a OS 360 JCL command with the same name, similar functionality and similar syntax, which also explains the odd, non-unixy syntax it has. Google if you are interested. -- Didi
list message filtering / censorship
I have tried to send a message three times to the linux-il list today. All three messages did not arrive. Some minor explicit language was used in the messages. I hereby ask whether this list has ANY kind of content filtering operating, or indulges in ANY kind of content censorship, automated or manual. thanks, Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: list message filtering / censorship
The spam filter ate them:) and actually with pretty high precentage. spam is becoming a bit overwhelming so please try to use less spammy langauge:) Ely On 1/29/07, Peter [EMAIL PROTECTED] wrote: I have tried to send a message three times to the linux-il list today. All three messages did not arrive. Some minor explicit language was used in the messages. I hereby ask whether this list has ANY kind of content filtering operating, or indulges in ANY kind of content censorship, automated or manual. thanks, Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: list message filtering / censorship
On Mon, 29 Jan 2007, E L wrote: The spam filter ate them:) and actually with pretty high precentage. spam is becoming a bit overwhelming so please try to use less spammy langauge:) WHY is there a spam filter on a closed access list ?! There is no such filter on any other list I'm on. And g*d knows they are big and heavy. Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: OT discussion on MS vs. the world [Was: booting into linux from windows98]
On Mon, 29 Jan 2007, Oded Arbel wrote: On Mon, 2007-01-29 at 12:28 +0200, Peter wrote: For every corporate user there must be 1000 individual users out there. Even if only 10% of them are paying promptly they outnumber the corporate users 10:1. Making sure that something simple and inexpensive will keep the MoshePartitions going (like reinstalling) has been what has kept m$ systems going for the little user That is an incredibly naive approach that has nothing at all to do with reality. The original poster talked about ISVs, and why MS doesn't care about pissing them off, but as you went on a tangent and started to talk It seems like you provoked me into spamfilter-triggering responses. Oops. Here is the short version: I don't think I'm naive. The roots of the problem lie much deeper than it appears. m$ is into growth, and the market is limited in available expenditure. Eventually they will go after even the smallest guys. Interoperability is undesirable for them, excepting when it opens the door on a new prey (like a chess program sacrificing a piece for a larger positional gain a few moves later). A system war is on. There are specific provisions in new eulas and in ntfs patents and such which specifically prohibit their use on other systems, including running windows under an emulator for example. They are there because it has become possible to do just that. They were not there before. How and when they will be enforced is the question, not whether. In the land of all possibilities there are some possibilities which imho should not be exercized. Like certain patents for example. But they might be. Remember LZW ? Small ISVs do not exist unless they create something threatening (like Lindows did, or Novell). When that happens they apply a set of 'book moves'. Usually one of them works. For example imho they are OS2-ing Novell now, and at the time they sued Lindows into Linspire and defanged it (as far as they are concerned) although they lost the lawsuit. For the same reason a small change in a file format or system call here and there sometimes accidentally (and rarely, but cases are documented, deliberately) breaks some ISV's product. The 'tangent' is necessary in this context. Achieving 'interoperability' immediately starts the other side counteracting it, if it is worth anyhting in their scheme of world domination. File systems, boot sector wiping, file formats, emulators, executing under a different system, you name it, there is a war out there. When you achieve 'interoperability' you just conquered ant hill 101. Congratulations, you will go on forever, as they are about to counterattack and there are 711 more hills ahead, not counting those they are building right now. Aditionally, working on 'interoperability' you are behind the curve, wasting resources in trying to catch up with something that is usually second best technically. This all goes back to the very lax requirements etc on software. The benchmark is 'compatibility' - but with what ? With this year's file formats ? What happens next year ? This rhetorical question is answered by the 'upgrade wave' sales model. You know who is using it .. Speaking of which, the EC is just picking over m$ because of their new file formats for Vista. Apparently they even did something that is to replace pdf. This is not an incentive to stop. For many hac^H^H^Hprogrammers the coding is the fun, no matter how much it infuriates ceos and corporate lawyers. So back to the booting problem: Changing systems at runtime on obsolete hardware under an obsolete OS while making it appear as if it is not a reboot is like wanting to keep the cake and eat it too while it appears that there is no cake at all. You can't. Yet there is a 'need' for this but it is very limited. Maybe someone will write code to do it. If it will be worth anything, then they will fight it. Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: list message filtering / censorship
well, we had people registering the list for sending spam, we also have people who accidently send messages from the wrong address and have thier message lost in a sea of spam. Anyhow the fact you haven't known it's there until now, means that it does a generally good work. Ely On 1/29/07, Peter [EMAIL PROTECTED] wrote: On Mon, 29 Jan 2007, E L wrote: The spam filter ate them:) and actually with pretty high precentage. spam is becoming a bit overwhelming so please try to use less spammy langauge:) WHY is there a spam filter on a closed access list ?! There is no such filter on any other list I'm on. And g*d knows they are big and heavy. Peter
Re: list message filtering / censorship
On Tue, 30 Jan 2007, E L wrote: well, we had people registering the list for sending spam, we also have people who accidently send messages from the wrong address and have thier message lost in a sea of spam. Anyhow the fact you haven't known it's there until now, means that it does a generally good work. No, it means that I am civil in speech and manner until provoked ... thanks, Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
message frequency ?
Does this list have an archive ? What is the approximate message frequency ? thanks, Peter = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
PPTP issues and Barak over cable
Sorry for starting a new thread, due to connection issues I have patial net access. I connect to the internet over cable (hot) using barak with a pptp connection. Thursday night they upgraded their system (don't know more details) and since then I can't connect using linux anymore. Windows works fine, so it's not a hardware issue. I tried two machines, one debian stable (powerpc) both with the standard pptp package and the latest version compiled from source. The other is debian unstable. Both machines show the same symptoms. The machine connects, bringing up the ppp connection and recieves an IP. It then seems to send (according to ifconfig) about 300MB to 1GB over the course of a minute and a half or so and the connection then dies. I tried both sycronous and asyncronous connections but it didn't help Ifconfig: --- ppp0 Link encap:Point-to-Point Protocol inet addr:89.0.121.41 P-t-P:172.26.255.17 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1 RX packets:4 errors:0 dropped:0 overruns:0 frame:0 TX packets:884278 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:3 RX bytes:64 (64.0 b) TX bytes:321621278 (306.7 MiB) Tcpdump produces the following output (repeating over and over) which I don't know how to decipher: 02:23:26.104538 IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885576, length 108: IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885562, length 72: IP [|ip] 02:23:26.104666 IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885577, length 144: IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885563, length 108: IP [|ip] 02:23:26.104790 IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885578, length 180: IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885564, length 144: IP [|ip] 02:23:26.104946 IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885579, length 432: IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885568, length 396: IP [|ip] 02:23:26.105275 IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885580, length 1480: IP truncated-ip - 36 bytes missing! 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885569, length 1480: IP [|ip] 02:23:26.105381 IP 172.29.214.255 172.26.255.17: gre 02:23:26.107608 IP 172.29.214.255 172.26.255.17: GREv1, call 63029, seq 885581, length 72: IP 172.29.214.255 172.26.255.17: gre The output in syslog: Jan 30 02:21:16 litshi kernel: ppp_async: Unknown symbol crc_ccitt_table Jan 30 02:21:37 litshi pptp[20157]: anon log[main:pptp.c:267]: The synchronous pptp option is NOT activated Jan 30 02:21:37 litshi pptp[20160]: anon log[ctrlp_rep:pptp_ctrl.c:251]: Sent control packet type is 1 'Start-Control-Connection-Request' Jan 30 02:21:37 litshi pptp[20160]: anon log[ctrlp_disp:pptp_ctrl.c:738]: Received Start Control Connection Reply Jan 30 02:21:37 litshi pptp[20160]: anon log[ctrlp_disp:pptp_ctrl.c:772]: Client connection established. Jan 30 02:21:38 litshi pptp[20160]: anon log[ctrlp_rep:pptp_ctrl.c:251]: Sent control packet type is 7 'Outgoing-Call-Request' Jan 30 02:21:38 litshi pptp[20160]: anon log[ctrlp_disp:pptp_ctrl.c:857]: Received Outgoing Call Reply. Jan 30 02:21:38 litshi pptp[20160]: anon log[ctrlp_disp:pptp_ctrl.c:896]: Outgoing call established (call ID 0, peer's call ID 63029). Jan 30 02:21:38 litshi pppd[20163]: pppd 2.4.4 started by root, uid 0 Jan 30 02:21:38 litshi pppd[20163]: using channel 2 Jan 30 02:21:38 litshi pppd[20163]: Using interface ppp0 Jan 30 02:21:38 litshi pppd[20163]: Connect: ppp0 -- /dev/pts/2 Jan 30 02:21:38 litshi pppd[20163]: sent [LCP ConfReq id=0x1 asyncmap 0x0 magic 0xc56c1737 pcomp accomp] Jan 30 02:21:40 litshi kernel: Shorewall:net2fw:DROP:IN=eth0 OUT= MAC=08:00:46:5b:70:62:00:05:00:e7:dd:9b:08:00 SRC=172.26.255.17 DST=172.29.214.255 LEN=54 TOS=0x00 PREC=0x00 TTL=253 ID=51790 PROTO=47 Jan 30 02:21:40 litshi pptp[20158]: anon log[decaps_gre:pptp_gre.c:388]: accepting packet 2 Jan 30 02:21:40 litshi pppd[20163]: rcvd [LCP ConfAck id=0x1 asyncmap 0x0 magic 0xc56c1737 pcomp accomp] Jan 30 02:21:41 litshi pppd[20163]: sent [LCP ConfReq id=0x1 asyncmap 0x0 magic 0xc56c1737 pcomp accomp] Jan 30 02:21:41 litshi pptp[20158]: anon log[decaps_gre:pptp_gre.c:388]: accepting packet 3 Jan 30 02:21:41 litshi pppd[20163]: rcvd [LCP ConfAck id=0x1 asyncmap 0x0 magic 0xc56c1737 pcomp accomp] Jan 30 02:21:42 litshi pptp[20158]: anon log[decaps_gre:pptp_gre.c:388]: accepting packet 4 Jan 30 02:21:42 litshi pppd[20163]: rcvd [LCP ConfReq id=0x2 auth pap magic 0xd088f19e] Jan 30 02:21:42 litshi pppd[20163]: sent [LCP ConfAck id=0x2 auth pap magic 0xd088f19e] Jan 30 02:21:42 litshi pppd[20163]: sent [LCP EchoReq id=0x0 magic=0xc56c1737] Jan 30 02:21:42 litshi pppd[20163]: sent [PAP AuthReq id=0x1 user=lipshi password=hidden] Jan 30 02:21:42 litshi pptp[20158]: anon log[decaps_gre:pptp_gre.c:388]: accepting packet 5 Jan 30 02:21:42