Of course, creating a regular user account to do things like this mailing
list and stuff, will only serve to aid in your systems security.

Root is not for tasks like this.

Thanks,

Ron DuFresne

On Thu, 1 Feb 2001, Bernd Eckenfels wrote:

> On Thu, Feb 01, 2001 at 03:44:48PM -0600, Super-User wrote:
> >   What can I do to use real IP addresses in my internal network
> 
> just use them... where is your problem? But you should not do that :)
> 
> Greetings
> Bernd
> -- 
>   (OO)      -- [EMAIL PROTECTED] --
>  ( .. )  ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/
>   o--o     *plush*  2048/93600EFD  eckes@irc  +497257930613  BE5-RIPE
> (O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to