Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 06:58:35PM -0600, Mike McCarty wrote: > Andrew Sackville-West wrote: > >On Tue, Dec 05, 2006 at 07:08:54PM -0500, Douglas Tutty wrote: > > > >>Yes. But I don't want to loose any data at all. > > > > > >there is no way to guarantee this. you could improve your odds by > >having multiple storage locations with multiple copies and a rigorous > >method for routinely testing the backup media for corruption and > >making new replacement copies of the backups to prevent future loss. > > > >For example, make multiple identical backups. sprinkle them in various > >locations. on a periodic, routine basis, test those backups for > >possible corruption. If their clean, make a new copy anyway to put in > >rotation, throwing away the old ones after so many periods. If you > > Respectfully, I disagree with this last recommendation. You are > suggesting that he continually keep his backup media on the > infant mortality portion of the Weibull distribution. The usual > way for devices which are not subjected to periodic high stress > to fail is to have an infant mortality rate which is high, but falls > down to a low level, then begins to rise again with wearout. In this > case, wearout would be eventual degradation of the metallization > layer in the disc. > good point and one I hadn't thought of, though its obvious now that you mention it. I'm thinking of moldy floppies and aging cd's that definitely fall apart over time with probably less of the typical bathtub shape and more of a slippery slope... > >find a corrupt one, get one of your clean ones to reproduce it and > >start over. > > Be sure to use an odd number of copies. Don't want no tied votes > on whether a given bit is a 0 or a 1 :-) :) > > >there is now way, using only one physical storage medium, to guarantee > >no loss of data. > > There is no way, using any number of physical storage media, to > gurantee no loss of data. absolutely right. > > On any storage medium, if the probability of error in a data bit is less > than 50%, then given any e > 0 there exists an FEC method which reduces > the probability of data loss to be less than e. > > If the probability of error on any given bit is greater than 50%, > then there is no way, by adding additional information, to make > the eventual error rate be less than a single copy. The additional > bits are more likely to be in error than the original. > > >maybe I;'m reading this wrong , but it seems to be what you're asking for. > > There is no way to guarantee that every bit of computer information > on the Earth is not destroyed by a comet strike :-) That's why I'm hoping the universe is circular. I can catch the broadcast on the way back ;-) A ps. Mike, I got one of those bounces the other day and the whois pointed to US DOD servers. heh. signature.asc Description: Digital signature
Re: Unix socket question - TLS with Exim/Courier
On Tue, Dec 05, 2006 at 10:43:58PM -0800, Bill Moseley wrote: > failed to connect to socket /var/run/courier/authdaemon/socket: Permission > denied Oh, ran strace and can now see that the authdaemon directory is where the permissions are not correct. Lack of sleep doesn't always help with debugging. Never mind. ;) -- Bill Moseley [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Problem installing packages with apt-get, aptitude and dselect
On Tue, Dec 05, 2006 at 08:05:23PM -0500, José Alburquerque wrote: > Andrew Sackville-West wrote: > >check out the package apt-listbugs. It puls down critical (and maybe > >severe) bug reports and prompts you before installing packages. That's > >how I saw the segfault bug in apt and held my apt and apt-utils at the > >current version pending resolution. > > > >A > > > The funny thing is that I do have this package installed. Don't know > why I didn't catch this bug. When installation pauses because of a > pending bug, does that always mean that a package should not be installed? well, you answered your own question, but here's what I do. mostly I ignore anyhting marked as . Anything marked as (or other things, are there others?) I review carefully to see if it applies on my system. Often, the bugs are for different architectures or are things that aren't critical to me and I can safely ignore them. In fact this apt bug is the first one (in about 6 months of using apt-listbugs) that gave me pause and caused me to hold the package. so to answer your question again: no, just be cause a bug is listed doesn't mean you shouldn't install it. youmust research it a bit. I am curious what others do. A signature.asc Description: Digital signature
Re: Something different -- playing with the Hurd
On Tue, Dec 05, 2006 at 07:41:35PM -0600, Nate Bargmann wrote: > Okay, so I'm bored. > > Linux may be getting too complete, easy, and stable. ;-) > > So, what's a geek to do? *BSD? Nawww, too mature, and I don't like to > wander too far away from the Debian community (yes, there's Debian > GNU/kFreeBSD, but...). So, enter Debian GNU/HURD as an interesting > diversion. > > It's not too problematic to get going, almost too easy as well, but no > automatic installer and a bit of manual work is required. A lot of > Unstable seems to be working except for notably Aptitude. Dselect is > there. Shudder! > > There are rough edges as DHCP doesn't work so the network must be > manually configured each time. The Debian bits seem to be as easy as > on Linux while the Hurd bits seem to be the most immature. > > As I said, an interesting diversion and something different to learn > about. Anyone else giving the Hurd a spin? > > - Nate >> I've been thinking about it, but haven't had the time. Do you now have a working install? how about X? A signature.asc Description: Digital signature
Re: following recent upgrade
On Tue, 5 Dec 2006, Tom Allison wrote: ntpd returns a permission denied error! All the files are ntp owned... btdt :( every time I've seen that, there have been multiple ntpd daemons running - something in the postinst doesn't properly kill the prior daemon. do `ps aux | grep ntpd` (or just killall ntpd) - make sure none are about and then start it - it should now start fine -- Rick Nelson Avoid the Gates of Hell. Use Linux -- unknown source -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Odd Gnome behavior
On Tue, 05 Dec 2006 15:13:28 -0800 Freddy Freeloader <[EMAIL PROTECTED]> wrote: > On Tue, 2006-12-05 at 22:35 +, Liam O'Toole wrote: > > On Tue, 05 Dec 2006 13:41:54 -0800 > > Freddy Freeloader <[EMAIL PROTECTED]> wrote: > > > > > Hi All, > > > > > > I have run across an oddity in Gnome's behavior when running admin > > > tools from the gui. > > > > > > If I run any of the tools found in the Desktop -> Administration > > > menu, explicitly from that menu, Gnome asks me for the root > > > password. I enter the root password and it tells me I entered an > > > invalid password. However, if I run any of those same admin tools > > > from the Applications -> Debian -> Apps -> System menu Gnome > > > accepts the root password and they run just fine. > > > [...] > > > > Determine what commands are launched by the menu entries. You can do > > this by right-clicking on a menu entry and choosing "Add this > > launcher to desktop". You then right-click on the icon thus > > created, choose "Properties", then "Launcher" to determine the > > command. You should then be able to account for the observed > > behaviour. > > [...] > > Thanks for your reply. I already knew about the menu entry stuff, and > had taken a look at it. It all seems to be fine when compared to a > computer that works normally. > [...] So can you reproduce the problem by issuing the relevant commands in a terminal? That would be valuable information in a bug report ... -- Liam -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Unix socket question - TLS with Exim/Courier
I'm missing something obvious here. I have two Debian Stable boxes both running exim4-daemon-heavy 4.50-8sarge2 & courier-imap-ssl 3.0.8-4sarge5 One machine Exim can connect to the Courier authdaemon socket and the other I get permission denied on the socket. I have not been able to find the difference between the two setups. 2006-12-05 21:56:19 plain_courier authenticator failed for (me) [192.168.1.2] U=moseley: 435 Unable to authenticate at present (set_id=moseley): failed to connect to socket /var/run/courier/authdaemon/socket: Permission denied I'm not sure I understand socket permissions as the socket looks like this: ls -l /var/run/courier/authdaemon/socket srwxrwxrwx 1 root root 0 Dec 5 22:20 /var/run/courier/authdaemon/socket Exim is running as user Debian-exim on both machines, as normal. The Courier authdeamon is running as root. I found one post[1] that said they had to add group "daemon" to Debian-exim, but I don't understand why that would make a difference -- I don't see where the socket is group "daemon". Plus, on the machine where it's working Debian-exim is not part of the daemon group. Anyone familiar with domain sockets and/or the Exim+Courier setup to give me advice how to debug this? Thanks, [1] http://fplanque.net/Blog/devblog?cat=89 -- Bill Moseley [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Firefox crashing on gmail
Hi Sridhar, Does your firefox also crash on www.xilinx.com like mine? I'm sure it does. If so, like I said in my earlier mail, we definitely have the same problem. After reading this thread, I searched for a solution with renewed enthusiasm, and just now found this: --- https://launchpad.net/distros/ubuntu/+source/firefox/+bug/27626 --- There someone mentioned that the problem occurs only with DefaultDepth=16, not with 24bit depth. Sure enough, my xorg.conf had "DefaultDepth 16", changed it to use 24 bit, and firefox works normally now. In fact, I am writing this via gmail using firefox right now. I hope it solves your problem (although I have no idea what the reason for the problem was or how to actually 'solve' the problem) -Santanu -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/06 21:43, Mike McCarty wrote: > Douglas Tutty wrote: >> On Tue, Dec 05, 2006 at 07:55:40PM -0600, Mike McCarty wrote: >>> Douglas Tutty wrote: On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: > [snip] [snip] > If in X years you plug the drive into your machine, and smoke > pours out, you are going to have difficulty reading any medium > you may put into it. You are banking on the format of the tape > or whatever not changing in that time. If the format becomes > obsolete, and your drive fails, then you are SOL. Sadly, this is a perfect argument for why businesses go with "popular" instead of "best": you can still buy 9-track tape drives that read IBM and DEC formatted tapes, as well as 3480/3490 tapes and DEC TK50 tapes. There are a few companies that can even still read DECtapes. It's the esoteric stuff (3rd-tier and specialized equipment) that's impossible to read now. - -- Ron Johnson, Jr. Jefferson LA USA Is "common sense" really valid? For example, it is "common sense" to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that "common sense" is obviously wrong. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFdlgrS9HxQb37XmcRAnr1AKDckEcDRbVAq7IVFRZlztDpgqkeugCfQ3sc tytX60C3sU2k+TfwPt3kgd4= =r6NR -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Can't get etch rc1 kppp or ndiswrapper wireless to connect to the net.
2006/12/5, Mike Carter <[EMAIL PROTECTED]>: Hi, kppp won't load as user but will as root, even so won't connect. Ndiswrapper is loaded, states it is connected to lan but will not connect to net. Anyone have any ideas? It is driving me crazy. A few weeks ago etch was working on the net. Ndiswrapper fine, kppp worked in root ethernet connection then and now works. cheers do you have the permiss "pid" at the user? -- heba -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
mouse freaks out
My Logitech usb mouse (model M-BT96a) has a tendancy to freak out a couple of times per hour. When this happens, the mouse cursor suddenly goes to one of the screen corners. When I try to reorient myself by moving the mouse to see where it went, the mouse moves rapidly all over the screen. Normality is restored about 3 seconds after this happens. I've tried three different Logitech mice, and they all have this problem. I'm using Enlightenment with Debian Etch and kernel 2.6.16.13. Any idea what the problem is? Thanks, Jason -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: postfix relay smtp authentication
On Tue, Dec 05, 2006 at 11:58:26PM -0500, T wrote: > On Tue, 05 Dec 2006 21:27:45 -0600, Ron Johnson wrote: > > >> # cat /etc/postfix/sasl_passwd > >> upstream.mail.exchange[EMAIL PROTECTED]:password > > > > Can you have multiple entries, one per user? > > From > http://www.k2.on.lk/fourm/viewtopic.php?t=30 > > "u can list many servers as you like with defrant passwords and usernames > if you have tranport maps for domains" > > But I don't understand what exactly does it means. :-( > A transport map looks something like this: server.tldsmtp:[upstream.mail.exchange] .server.other.tld smtp:[other.mail.exchange] What you are referring to is the ability to have something like this in the sasl_passwd file: upstream.mail.exchange[EMAIL PROTECTED]:password other.mail.exchange [EMAIL PROTECTED]:password Where a different username/password is used for different mail servers. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: postfix relay smtp authentication
On Tue, Dec 05, 2006 at 11:55:25PM -0500, T wrote: > > what's the output of following command in your system? > > grep smtp_sasl /etc/postfix/main.cf > $ grep smtp_sasl /etc/postfix/main.cf smtp_sasl_auth_enable=yes smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_sasl_security_options = Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: backup archive format saved to disk
Douglas Tutty wrote: If FEC is used on all media (except CDROM), is there any value in adding my own FEC layer over top or should I just format the drive JFS and copy my tar.bz2 backup file to it and be done? (remembering that the drive in the bank is only one of the sets of data I keep). Only you can answer that question. I didn't say that FEC isn't used on CDROMs, I said I don't know whether it be used. It's something worth investigating, though! Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Douglas Tutty wrote: Thanks Mike, If I can attempt to summarize a portion of what you said: If the issue is resistance to data block errors, it doesn't matter if I use a file system or not so I may as well use a file system then if have difficulty, rip multiple copies of the file system bit by bit and do majority rules. Well, not quite. "Majority rules" is a simple BCH code which anyone could do with a simple program. All you need is an odd number of copies. The distance of the code is the number of copies, so the number of correctable errors (per bit, I mean) is (n-1)/2. So, with three copies, one can correct any single error, with five copies one can correct double errors (in a single bit), etc. It's not the most efficient, but it is very very simple. There's a package (forget the name) that will do this with files: take multiple damaged copies and make one good copy if possible. Multiple copies on a single medium are not, IMO, advisable. There are errors which can occur which prevent reading a single bit anywhere. If you sit on a CDROM, you may make it completely unreadable :-) Does the kernel software-raid in raid1 do this? Would there be any advantage/disadvantage to putting three partitions on the drive and setting them up as raid1? (and record the partition table [sfdisk -d] separately)? I am not familiar with the internals of Linux' software RAID. Googling this topic, I find sporatic posts on different forums whishing for something like this but there doesn't seem to be anything off-the-shelf for linux. It seems to be what the data security companies get paid for (e.g. the veritas filesystem). Do you know of anything? I have used Veritas on some telephony equipment, and it worked well enough. I understand you description of FEC and I guess that's what we're talking about. In the absence of a filesystem that does it, I want a program that takes a data stream (e.g. a tar.bz2 archive) and imbeds FEC data in it so it can be stored, then later can take that data and generate the origional data stream. > Do I understand you correctly that the FEC-embedded data stream to be effective will be three times the size of the input stream? That is correct. The larger the Hamming distance used in the code, the more redundancy is required. It is unfortunate that the very best codes we have been able to design fall quite a bit short of what is the theoretical limit, which is itself somewhat disappointing to those with naive expectations. Generally, one uses about 1/3 data and 2/3 check bits. Does it matter if this FEC data is embeddded with the data or appended? Depends on what you mean by the question. First, you presuppose that in an arbitrary code, the original data survive intact, and some additional redundancy is added. This would be called a systematic code. Not all codes are systematic, though the very best practical block[1] codes we have can all be put into systematic form. The very best block codes we've cooked up for experimentation purposes are *not* systematic, and the original data do not survive in any distinct form apart from the entire code word. IOW, in these codes there aren't distinguishable "data bits" and "check bits", there are just "code bits", and without going through the decoding process, there is no simple way to get the data bits back. AFAIK, none of these experimental codes has ever been applied in a practical system, as coding and decoding are too problematic.[2] But they are much more compact codes, and more closely approach the theoretical limits on the total code word size required to achieve a given degree of correction ability. Second, one of the best ways to make a code which can correct bursts as well as independent bit errors (many media are susceptible to bursts) is to use interleaved codes. Here's a simple example. Let's go back to the "transmit each bit three times" example I gave of CDROMs. That code is an example of an interleaved code, which is one of the reasons it has such good burst correcting capabilities. If we used a non-interleaved code, we would simply record each bit three times on the disc, and let it span multiple discs. Then it would have single bit correcting ability, but no burst correcting ability. If, OTOH, we have three discs which are each a complete copy, then we can recover from any single burst which is less or equal to any single disc in length. This is an interleaved code. If we use 5x transmission, we can recover from any double bit error, and any burst of up to two bits as well. But if we use 5 separate discs, once again we can recover from any single burst which spans up to two discs. The code used on CDs for music are interleaved Reed-Solomon codes, one used for "fingerprints" (local errors) and another which spans about half the circumference for "track errors" or whatever they are called. Long bursts, anyway. That's AIUI; I'm n
Re: postfix relay smtp authentication
On Tue, 05 Dec 2006 19:55:39 -0500, Roberto C. Sanchez wrote: >> I have been succesfully running postfix on Sarge as a local mailserver >> relaying all outbound mail (from multiple internal accounts) to my ISP. >> >> However my ISP has just decided to require SMTP authentication. >> > > Here is what I have done when I had an ISP that required SMTP AUTH: > > # cat /etc/postfix/sasl_passwd > upstream.mail.exchange[EMAIL PROTECTED]:password > > # grep -r sasl_passwd /etc/postfix/ > /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd > > Then, make sure to run: > > # postmap hash:/etc/postfix/sasl_passwd what's the output of following command in your system? grep smtp_sasl /etc/postfix/main.cf -- Tong (remove underscore(s) to reply) http://xpt.sourceforge.net/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: postfix relay smtp authentication
On Tue, 05 Dec 2006 21:27:45 -0600, Ron Johnson wrote: >> # cat /etc/postfix/sasl_passwd >> upstream.mail.exchange[EMAIL PROTECTED]:password > > Can you have multiple entries, one per user? From http://www.k2.on.lk/fourm/viewtopic.php?t=30 "u can list many servers as you like with defrant passwords and usernames if you have tranport maps for domains" But I don't understand what exactly does it means. :-( -- Tong (remove underscore(s) to reply) http://xpt.sourceforge.net/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: postfix relay smtp authentication
On Tue, 05 Dec 2006 19:55:39 -0500, Roberto C. Sanchez wrote: >> I have been succesfully running postfix on Sarge as a local mailserver >> relaying all outbound mail (from multiple internal accounts) to my ISP. >> >> However my ISP has just decided to require SMTP authentication. > [...] > > Also, make sure that you have libsasl2-modules installed. That's the only extra package required for the OP's change? Do you have the following packages in the system as well? postfix-tls libsasl-modules-plain sasl-bin thanks -- Tong (remove underscore(s) to reply) http://xpt.sourceforge.net/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
keyboard problems on boot
Hi, I'm using a Goldtouch 4200U usb keyboard with Debian Etch, kernel 2.6.16.13. The keyboard layout resembles a laptop keyboard, with about half of the keys on the right half having dual function as a number pad. When I first start the computer, those keys don't work on the gdm login screen. If I press the "Num Lock" key twice (on, then off), all the keys work. Any idea what the problem is? Thanks, Jason -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 09:43:55PM -0600, Mike McCarty wrote: > Yes, FEC is used on all modern technology data storage that I know of, > with the possible exception of CDROMs. I haven't studied the low level > data storage format they use to know whether they use any FEC when > storing data as opposed to music. I know the music format uses nested > Reed-Solomon codes. For all I know, the ISO format has FEC embedded > in it as part of the FS, though I doubt it. If FEC is used on all media (except CDROM), is there any value in adding my own FEC layer over top or should I just format the drive JFS and copy my tar.bz2 backup file to it and be done? (remembering that the drive in the bank is only one of the sets of data I keep). > > >>>I'm focusing on the one-drive issue because this is one drive sitting in > >>>a bank vault. This is __archive__ (just like tape). I have backup > >>>procedures as a separate issue. One of the places that backup data goes > >>>to is the bank vault archive. > >> > >>If the issue is a drive, then you need more than one drive. If the > >>drive itself fails, then you are SOL. > > > >So drive failures are atomic? I.e. if in 5 years I go to read a drive > > If in X years you plug the drive into your machine, and smoke > pours out, you are going to have difficulty reading any medium > you may put into it. You are banking on the format of the tape > or whatever not changing in that time. If the format becomes > obsolete, and your drive fails, then you are SOL. > True. Thanks, Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Thanks Mike, If I can attempt to summarize a portion of what you said: If the issue is resistance to data block errors, it doesn't matter if I use a file system or not so I may as well use a file system then if have difficulty, rip multiple copies of the file system bit by bit and do majority rules. There's a package (forget the name) that will do this with files: take multiple damaged copies and make one good copy if possible. Does the kernel software-raid in raid1 do this? Would there be any advantage/disadvantage to putting three partitions on the drive and setting them up as raid1? (and record the partition table [sfdisk -d] separately)? Googling this topic, I find sporatic posts on different forums whishing for something like this but there doesn't seem to be anything off-the-shelf for linux. It seems to be what the data security companies get paid for (e.g. the veritas filesystem). Do you know of anything? I understand you description of FEC and I guess that's what we're talking about. In the absence of a filesystem that does it, I want a program that takes a data stream (e.g. a tar.bz2 archive) and imbeds FEC data in it so it can be stored, then later can take that data and generate the origional data stream. Do I understand you correctly that the FEC-embedded data stream to be effective will be three times the size of the input stream? Does it matter if this FEC data is embeddded with the data or appended? If this doesn't exist for linux, do you know of any open-source non-linux implementations that just need some type of porting? I've found a couple of technical papers discussing the algorithms (Reed-Solomon) used in the par2 archive that I'll study. Thanks, Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Douglas Tutty wrote: On Tue, Dec 05, 2006 at 07:55:40PM -0600, Mike McCarty wrote: Douglas Tutty wrote: On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: [snip] I'm not complaining Mike. Also, note who's saying what; there's a few voices in this conversation. Sorry, did I miss an attribution? If so, then I apologize. Please don't take my questions the wrong way. I am very gratefull for the wisdom. I'm just trying to tease apart where failures can occur and what can mitigate them. Fair enough. See my other message which describes hypothetical data recovery on a damaged set of CDROMs. I guess I don't know what the question is. Since I don't __know__ that it can, I'm assuming that it can't. I'm playing my own devils advocate and trying to find out how to plan to be able to read successfully off a drive with bad blocks after years of sitting on a shelf. IF this is what your goal is, then, as I pointed out, you can implement your own FEC. Yes I could. The origional question was to see if one existed already. Yes, FEC is used on all modern technology data storage that I know of, with the possible exception of CDROMs. I haven't studied the low level data storage format they use to know whether they use any FEC when storing data as opposed to music. I know the music format uses nested Reed-Solomon codes. For all I know, the ISO format has FEC embedded in it as part of the FS, though I doubt it. I'm focusing on the one-drive issue because this is one drive sitting in a bank vault. This is __archive__ (just like tape). I have backup procedures as a separate issue. One of the places that backup data goes to is the bank vault archive. If the issue is a drive, then you need more than one drive. If the drive itself fails, then you are SOL. So drive failures are atomic? I.e. if in 5 years I go to read a drive If in X years you plug the drive into your machine, and smoke pours out, you are going to have difficulty reading any medium you may put into it. You are banking on the format of the tape or whatever not changing in that time. If the format becomes obsolete, and your drive fails, then you are SOL. [snip] Hmm. You going to become an expert at designing ECC? I suggest you take a course in abstract algebra first. Can (or at least I used to be able to) do the algebra, but that's not the issue. There are programs like par2 that do the ECC stuff but put it in separate files. If I went that route, I just have to pack it all together. I don't understand that. It shouldn't matter where the correction bits get stored, so long as the number of bits that get damaged is less than what the code can correct. Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: postfix relay smtp authentication
On Tue, Dec 05, 2006 at 09:27:45PM -0600, Ron Johnson wrote: > On 12/05/06 18:55, Roberto C. Sanchez wrote: > > > > Here is what I have done when I had an ISP that required SMTP AUTH: > > > > # cat /etc/postfix/sasl_passwd > > upstream.mail.exchange[EMAIL PROTECTED]:password > > Can you have multiple entries, one per user? > I don't think so. You can check the docs to be sure, though. > > # grep -r sasl_passwd /etc/postfix/ > > /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd > > > > Then, make sure to run: > > > > # postmap hash:/etc/postfix/sasl_passwd > > > > This should leave you with a file called /etc/postfix/sasl_passwd.db > > which postfix which actually use as the source of the authentication > > information. > > > > Also, make sure that the sasl_passwd and sasl_passwd.db have mode 600 > > So the password would be in cleartext? > Yes. I'm not aware of another to do this, which is why I don't like it. > > and that you have libsasl2-modules installed. > Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: Command Language Reference Book (Website)
On Tue, Dec 05, 2006 at 04:39:44PM -0800, Baz wrote: >Hello. Will someone please recommend a reference book (or website) >about fundamental to mid-level command language (Unix/Linux/Debian)? http://www.cactus.org/~dak/shellscript.html http://www.google.com/search?q=bash+tutorial -- Eric Cooper e c c @ c m u . e d u -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: using bootchart
On Wed, Dec 06, 2006 at 10:54:24AM +0800, Yuwen Dai wrote: > On 12/6/06, Douglas Tutty <[EMAIL PROTECTED]> wrote: > > > >On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote: > >> Dear all, > >> > >> When I used bootchart to benchmark booting of Debian sarge, I found > >> S40hotplug took nearly 15 seconds. S40hotplug calls > >{pci,usb,isapnp}.rc, > >> and installing some modules. Is there any way to reduce this time? > > > >Upgrade to Etch. > > > >My amd64 Athlon 3800+ with 1 GB ram, dual 80 GB SATA drives > >raid1/lvm/JFS, goes from grub to login in 20 seconds. > > > It's realy fast. Have you optimize the boot process? > No. Stock Debian Etch amd64. > >Etch doesn't use hotplug. It _must_ use udev. > > > >How long does your boot sequence take total and on what hardware? > > > My computer is a Dell D600 laptop, with Intel pentium M processor 1.6Ghz, > 1GB memory, 60GB ata hard disk. > > The total time from init to gdm is 58 seconds. > I don't use gdm so when I say login I mean console login (although startx startup is about 10 seconds). I don't know about Pentium. I went with AMD. 58 seconds is about what my 486 does. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/06 21:20, Ron Johnson wrote: > On 12/05/06 19:33, Douglas Tutty wrote: >>> On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: >>> > [snip] >>> The question is, if a block is sucessfully written now, if the drive is >>> not used for 5 years then a read is attempted, is the drive able to >>> retreive that data using ECC (as a tape drive could)? > > Mike is correct, disk drive blocks do have ECC. > > Remember, though, that drives are delicate mechanisms, and so the > problem I see is the lubricating oil possibly thickening, and thus > the drive not spinning up properly. Hopefully the bad spin-up would > not cause the r/w head to gouge the platter. Otherwise, the data > could still be retrieved, easily, for a price, from a data recovery > company. Forgot to mention: for important data, we make multiple copies of the data, so if one of the tapes has too many errors for the EDAC to handle, the other tape hopefully won't be bad. I'd do the same thing with disks. - -- Ron Johnson, Jr. Jefferson LA USA Is "common sense" really valid? For example, it is "common sense" to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that "common sense" is obviously wrong. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFdjl2S9HxQb37XmcRAo07AJ0aNpxM6buYCerG3svIp6frmunHegCghvhZ Bo+aCHk0fbq0fD29QmuimNc= =Hzt/ -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
dhcp3, assign IP based on client
Hello, I wondering if I can assign a specific IP to a machine based on its name? I realize this can be done with hardware ethernet address, but I would prefer to use client-hostname if its even possible. A regular machine connecting to the dhcp3 server will add an entry to the dhcpd.leases file, something like: lease 10.0.0.60 { starts 3 2006/12/06 02:45:05; ends 3 2006/12/06 04:25:05; binding state active; next binding state free; hardware ethernet 00:17:f2:eb:2a:f8; uid "\001\000\027\362\353*\370"; client-hostname "laptop"; } Any chance I can use the client-hostname line and say; if this line equals "laptop" then give this machine an IP of 10.0.0.222 ? Thanks, Mike -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 08:45:51PM -0600, John Hasler wrote: > Doug writes: > > The difficulty is, having seen the code, how do I accomplish the same > > thing without using hints inherent in your code. Its like trying to > > write a literature-research paper; having read a hundred articles, I have > > to ensure that everything I say in my paper is either my own idea or is > > properly referenced. > > Copyright law does not require that. > > > Therefore, I don't even want to read code that I'm not free to take ideas > > from. > > You _are_ free to take ideas from copyrighted code. Copyright protects > expression, not ideas. > Legal or not, you can still get into hot water. Just look at the Davinchi Code court case where the authors of a scholary paper tried to sue the authors of the book based on the use if _ideas_ in their paper. It got thrown out and the publicity helped the book, but it was still hot water. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: postfix relay smtp authentication
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/06 18:55, Roberto C. Sanchez wrote: > On Wed, Dec 06, 2006 at 12:13:26AM +0100, Martin Fuzzey wrote: >> Hi, >> >> I have been succesfully running postfix on Sarge as a local mailserver >> relaying all outbound mail (from multiple internal accounts) to my ISP. >> >> However my ISP has just decided to require SMTP authentication. >> > > Here is what I have done when I had an ISP that required SMTP AUTH: > > # cat /etc/postfix/sasl_passwd > upstream.mail.exchange[EMAIL PROTECTED]:password Can you have multiple entries, one per user? > # grep -r sasl_passwd /etc/postfix/ > /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd > > Then, make sure to run: > > # postmap hash:/etc/postfix/sasl_passwd > > This should leave you with a file called /etc/postfix/sasl_passwd.db > which postfix which actually use as the source of the authentication > information. > > Also, make sure that the sasl_passwd and sasl_passwd.db have mode 600 So the password would be in cleartext? > and that you have libsasl2-modules installed. - -- Ron Johnson, Jr. Jefferson LA USA Is "common sense" really valid? For example, it is "common sense" to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that "common sense" is obviously wrong. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFdjixS9HxQb37XmcRAqMRAKCIB3wkmh3NHiKpF26OeZZQiJTyfQCguDTK bUB5ZbFClzHz7cA74+fSDPo= =kzzP -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/06 19:33, Douglas Tutty wrote: > On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: > > >>> You could implement your own FEC. A very simple form of FEC is simply >> Yes, but *why*? Tape storage systems have been using ECC for decades. >> >> There's a whole lot of "Linux people" who's knowledge of computer >> history seems to have started in 1991, and thus all the many lessons >> learned in 30 years of computing are lost. >> > > Hi Ron, > > I'm hoping someone who can remember computer history prior to 1991 can > give some perspective. > > It think (__please__ correct me if I'm wrong) that the tape systems had > the ECC as part of the hardware. Write a plain datastream to the drive > and the drive did the ECC part transparent to the user. Read the data > and a bad block gets fixed by the hardware ECC. > > I'm told that modern hard drives also do ECC but I can't find out how > that is implemented. I'm told that if a block starts to fail (whatever > that means) then the data is transferred to a new unallocated block, > transparent to the rest of the computer. Only if the drive runs out of > unallocated blocks does it give errors. > > The question is, if a block is sucessfully written now, if the drive is > not used for 5 years then a read is attempted, is the drive able to > retreive that data using ECC (as a tape drive could)? Mike is correct, disk drive blocks do have ECC. Remember, though, that drives are delicate mechanisms, and so the problem I see is the lubricating oil possibly thickening, and thus the drive not spinning up properly. Hopefully the bad spin-up would not cause the r/w head to gouge the platter. Otherwise, the data could still be retrieved, easily, for a price, from a data recovery company. [snip] > In the absence of an all-in-one archive format, I'll use tar (which can > detect errors just not fix them) to take care of names, owners, > permissions, etc. Then that tar needs to be made ECC and compressed. > If I want to throw in a monkey, I'll consider encryption. Remember what "tar" means: Tape ARchive. It's designed as a container file. OTOH, if you're backing up a hard disk, you could do file-by-file backups, compressing the big, compressible files, and leaving alone the not-so-compressible files. Thus, if a sector goes blooey, you've still got most of your data. > Yes tape drives do that. Its probably why they cost so much. Hard And lower production volumes. > drives are much cheaper and are supposed to be able to hang on to their > data (Seagate gives a 5 year warranty). But having seagate give me a > new drive when I can't get my data off after 4 years is cold comfort. > > The other problem with tapes is their fragility. Drop a DLT and I'm > told that its toast. Put that tape in the drive and I'm told it can > damage the drive. We've used DLT drives for years, and never had that problem. > A laptop drive in a ruggedized enclosure is much more > robust and has a wider environmental range. Drop a HDD and you've got worse problems. > Perhaps what I'm looking for doesn't exist. If it doesn't, I'll start > work on it. > > As far as computer history prior to 1991, I could never get the hang of > C. I'll stick with fortran77. Give me VAX COBOL. But then, I've always been on the DP side. - -- Ron Johnson, Jr. Jefferson LA USA Is "common sense" really valid? For example, it is "common sense" to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that "common sense" is obviously wrong. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFdjcNS9HxQb37XmcRAnHsAJ9c5OekXV/Q6K9DPIpWN7OZy4AQHACeKRQE hlA1v/E/xXqysk0iholtU84= =8624 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Firefox crashing on gmail
On Tue, Dec 05, 2006 at 06:53:06PM -0800, Scarletdown wrote: > > To me, the most sensible solution is to set up an actual email client > (like Evolution, for example) to access your GMail account(s) via POP > and SMTP. For receiving, the server is simply pop.gmail.com with SSL > Encryption and Password as the authentication type. > > For sending, it is smtp.gmail.com, SSL Encryption, Authentication Type: > Plain > Problem is, what was normally working has begun crashing. We are trying to look at a solution for that. Settinp up a mail retrieval and forwarding system, though a solution for mail issues, is not the answer I am looking at. FWIW, the gmail notifier extension for firefox works without a problem. The crash occurs when we try to read the mail. So far, the Inbox screen is displayed and within a second or so the browser crashes :-( I tried with swiftfox also. Same behaviour noticed. onqueror has not crashed, but I do not get the enhanced view of gmail. Thanks for your suggestion. Regards, -- Sridhar M.A. GPG KeyID : F6A35935 Fingerprint: D172 22C4 7CDC D9CD 62B5 55C1 2A69 D5D8 F6A3 5935 Three o'clock in the afternoon is always just a little too late or a little too early for anything you want to do. -- Jean-Paul Sartre signature.asc Description: Digital signature
Re: backup archive format saved to disk
Douglas Tutty wrote: On Tue, Dec 05, 2006 at 06:27:10PM -0600, Mike McCarty wrote: Douglas Tutty wrote: [snip] One thing to bear in mind is that, no matter how good an FEC method you use, you are going to have to store about 2x redundant data to get anything out of it. IOW, the data + parity information is going to be about 3x the size of the data alone for any reasonable ability to correct anything. Par2 seems to be able to do it at about 15%. It comes down to number theory and how many corrupted data blocks one needs to be able to handle. If 100 % of the data blocks are unavailable (worst case) then you need 100% redundant data (i.e. raid1). 15% to do what? I have designed some BCH FEC codes for a few systems, so I think I have a reasonable feel for what is involved. What you describe is correct only if each bit has only three values: 0, 1, and missing. If the transmission channel can only change a bit from 0 to missing, or 1 to missing, but no other values, then 100% redundancy is adequate for single error correction. If other types of damage may occur, then 100% redundancy is not adequate. A distance 2 code is adequate if the only changes the channel introduces is missing bits. But if not all bits may be distinguished as damaged, then at least a distance 3 code is required, which needs more than 100% redundancy. Separate files suggests that it be on a file system, and we're back to where we started since I haven't found a parfs. I don't understand this statement. If you have a means to create FEC checksums, and a way to store those, and a way to use the FEC checksums along with a damaged copy of the file to reconstruct it, then why do you need some special kind of FS to store it? My statement referrs to using par2 which doesn't touch the input file(s) but generates the error-corecting data as separate files. Wherever they get stored is irrelevant, except insofar as it may aid the code in burst detection and correction. What does FEC stand for? I think ECC stands for Error Checking and Correcting. FEC = Forward Error Correction. When a transmission channel makes error detection with request for retransmission infeasible (like with space missions, or when the data are recorded, and no other copy exists to use as a retransmission source, for examples) then one uses some form of FEC. ECC = Error Correcting Code, which refers to the code itself, not the technique. EDAC = Error Detection And Correction, which refers to any number of techniques which may include error detection with request for retransmit, or FEC, for examples. I suppose I could use par2 to create the ECC files, then feed the ECC files one at a time, followed by the main data file, followed by the ECC files again. Why two copies of the FEC information? What if two blocks on the drive fail, one containing data, the other containing the ECC info? Then the information in the check and data bits is used to correct them. In a properly designed code the check bits are themselves part of the correctable data, so that errors in them are correctable. The check bits are not treated any diffferently from any other bits. They are all just data. If the total number of bits which are damaged does not exceed the ability of the code to correct, then they are all recovered. I'll check out with my zip drive if I can write a tar file directly to disk without a fs (unless someone knows the answer). Why do you insist on not having a FS? Even if you don't have an FS, I don't see why you want to separate the FEC information, unless you don't have a program which can manage the information you're trying to store. If that be the case, then the FEC information won't do any good anyway. I don't insist on not having a FS. But how well does a FS work with bad blocks cropped up? If it doesn't encorporate ECC itself then it either drops the data from the bad blocks or at worst can't be mounted. The question is, do I need a FS? If I don't, isn't it just one more potential point of failure? How well does the disc work with bad blocks? If you have errors which the disc itself cannot correct, then you are going to have to do very low level recovery, indeed. That is why I suggested not doing that, but rather use your own FEC, by having redundant copies of the entire disc. In this wise, you don't have to go about trying to recover whatever high level information may be on the disc, and fixing the data storage format itself. If you do that, then it doesn't matter whether there is a file system present, and if it is present whether it can recover from corrupted blocks. You do the low level recovery, then whatever data were on the discs it is recovered. To put it another way, if the disc is unable to read its platters, then it can't and you aren't going to get data, anyway, for those sectors. It's better then, not to try to layer on top of something that is going to lose large blocks by trying to do it on the same device,
Re: what's the killer app for GNU/Linux systems?
Doug writes: > The difficulty is, having seen the code, how do I accomplish the same > thing without using hints inherent in your code. Its like trying to > write a literature-research paper; having read a hundred articles, I have > to ensure that everything I say in my paper is either my own idea or is > properly referenced. Copyright law does not require that. > Therefore, I don't even want to read code that I'm not free to take ideas > from. You _are_ free to take ideas from copyrighted code. Copyright protects expression, not ideas. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: using bootchart
On 12/6/06, Douglas Tutty <[EMAIL PROTECTED]> wrote: On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote: > Dear all, > > When I used bootchart to benchmark booting of Debian sarge, I found > S40hotplug took nearly 15 seconds. S40hotplug calls {pci,usb,isapnp}.rc, > and installing some modules. Is there any way to reduce this time? Thanks > in advance. Upgrade to Etch. My amd64 Athlon 3800+ with 1 GB ram, dual 80 GB SATA drives raid1/lvm/JFS, goes from grub to login in 20 seconds. It's realy fast. Have you optimize the boot process? Etch doesn't use hotplug. It _must_ use udev. How long does your boot sequence take total and on what hardware? My computer is a Dell D600 laptop, with Intel pentium M processor 1.6Ghz, 1GB memory, 60GB ata hard disk. The total time from init to gdm is 58 seconds. Yuwen Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Firefox crashing on gmail
On Tue, 2006-12-05 at 16:05 +0530, Sridhar M.A. wrote: > Hello all, > > since yesterday evening, firefox is crashing when I log on to the gmail > account. This happens across all accounts on my box. I get the following > message on the console after it crashes: > To me, the most sensible solution is to set up an actual email client (like Evolution, for example) to access your GMail account(s) via POP and SMTP. For receiving, the server is simply pop.gmail.com with SSL Encryption and Password as the authentication type. For sending, it is smtp.gmail.com, SSL Encryption, Authentication Type: Plain -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Couldn't open directory /lib/modules/2.6.12: No such file or directory
Hi; I am using a debian linux-2.6.17 system to build a linux-2.6.x (x = 12 or 9). After `make install` the newly built kernel, I could boot up the new kernel without error. However, when I boot up the system back to the original default linux-2.6.17, I am stumbled into the error above and dropped into single user shell where I could type anything on the keyboard now. My question is, what has gone wrong with any configuration in /boot that could have miss-led the original default linux-2.6.17 to load modules from the wrong directories; directories which are supposed to be used by the respective linux kernel when it boots up? Any insight is appreciated. Thanks & Regards, KH
Re: Problem installing packages with apt-get, aptitude and dselect
José Alburquerque wrote: When installation pauses because of a pending bug, does that always mean that a package should not be installed? Oops I didn't realize that the man page for apt-listbugs sort of explains it. Never mind the simplistic question. :-) -- Sincerely Jose Alburquerque -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
Nate writes: > I have no beef with automatic Copyright, I just claim it's useless. Can > you find any case law where automatic Copyright has been invoked? Every case filed in the US under current copyright law. Automatic copyright is the only kind there is. > Try releasing something into public and then trying to regain your > Copyright in a couple of years if it gets wildly popular just because you > changed your mind. If you explicitly release it into the public domain you have licensed it. If you "release" it with no license at all it will never become popular because no one will distribute it. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: using bootchart
On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote: > Dear all, > > When I used bootchart to benchmark booting of Debian sarge, I found > S40hotplug took nearly 15 seconds. S40hotplug calls {pci,usb,isapnp}.rc, > and installing some modules. Is there any way to reduce this time? Thanks > in advance. Upgrade to Etch. My amd64 Athlon 3800+ with 1 GB ram, dual 80 GB SATA drives raid1/lvm/JFS, goes from grub to login in 20 seconds. Etch doesn't use hotplug. It _must_ use udev. How long does your boot sequence take total and on what hardware? Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 07:55:40PM -0600, Mike McCarty wrote: > Douglas Tutty wrote: > >On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: > > > > > > >The question is, if a block is sucessfully written now, if the drive is > >not used for 5 years then a read is attempted, is the drive able to > >retreive that data using ECC (as a tape drive could)? > > I thought the question was "How can I be sure I can get my data back?" > So far, some people have suggested few techniques to accomplish that, > but all I've seen is complaints in response. I'm not complaining Mike. Also, note who's saying what; there's a few voices in this conversation. Please don't take my questions the wrong way. I am very gratefull for the wisdom. I'm just trying to tease apart where failures can occur and what can mitigate them. > > I guess I don't know what the question is. > > >Since I don't __know__ that it can, I'm assuming that it can't. I'm > >playing my own devils advocate and trying to find out how to plan to be > >able to read successfully off a drive with bad blocks after years of > >sitting on a shelf. > > IF this is what your goal is, then, as I pointed out, you can implement > your own FEC. > Yes I could. The origional question was to see if one existed already. > >I'm focusing on the one-drive issue because this is one drive sitting in > >a bank vault. This is __archive__ (just like tape). I have backup > >procedures as a separate issue. One of the places that backup data goes > >to is the bank vault archive. > > If the issue is a drive, then you need more than one drive. If the > drive itself fails, then you are SOL. > So drive failures are atomic? I.e. if in 5 years I go to read a drive and it has errors, everything is toast? I'm wanting a data-stream format (call it a file system, an archive format, whatever) that can withstand those errors. > >In the absence of an all-in-one archive format, I'll use tar (which can > >detect errors just not fix them) to take care of names, owners, > >permissions, etc. Then that tar needs to be made ECC and compressed. > >If I want to throw in a monkey, I'll consider encryption. > > > >Yes tape drives do that. Its probably why they cost so much. Hard > >drives are much cheaper and are supposed to be able to hang on to their > >data (Seagate gives a 5 year warranty). But having seagate give me a > >new drive when I can't get my data off after 4 years is cold comfort. > > Hard disc drives use FEC (usually a BCH 11 bit redundant code). > If you want to be able to read more reliably than the FEC already > present, you'll have to add your own. > > >The other problem with tapes is their fragility. Drop a DLT and I'm > >told that its toast. Put that tape in the drive and I'm told it can > > The most common cause of that is edge damage. > > >damage the drive. A laptop drive in a ruggedized enclosure is much more > >robust and has a wider environmental range. > > > >Perhaps what I'm looking for doesn't exist. If it doesn't, I'll start > >work on it. > > Hmm. You going to become an expert at designing ECC? I suggest you take > a course in abstract algebra first. > Can (or at least I used to be able to) do the algebra, but that's not the issue. There are programs like par2 that do the ECC stuff but put it in separate files. If I went that route, I just have to pack it all together. > >As far as computer history prior to 1991, I could never get the hang of > >C. I'll stick with fortran77. > > Which progamming language one uses is less important than the algorithm > implemented. > True. Thanks. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: apache2 memory footprint
On Tue, Dec 05, 2006 at 10:42:35AM -0800, Paul Yeatman wrote: > Hi, I've recently noticed that two of the four apache2 processes I have > running are consuming about 240Mb of memory each. I'm not doing > anything fancy. A very basic, default web server. I'm running Etch > which is using apache 2.2.3-3.1. I remember that new apache2 packages > were recently released and I don't remember apache2 using this much > memory previously. I tried stopping the apache service and restarting > it should something have been awry. I am seeing tthe same memory usage, > however, since restarting. Is anyone else getting this? > What modules are loaded? Are you using mod_rewrite? If so, are your rules correct? It is very easy to get mod_rewrite rules mixed up to the point of having the server process chew up lots of memory. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: postfix relay smtp authentication
On Wed, Dec 06, 2006 at 12:13:26AM +0100, Martin Fuzzey wrote: > Hi, > > I have been succesfully running postfix on Sarge as a local mailserver > relaying all outbound mail (from multiple internal accounts) to my ISP. > > However my ISP has just decided to require SMTP authentication. > Here is what I have done when I had an ISP that required SMTP AUTH: # cat /etc/postfix/sasl_passwd upstream.mail.exchange[EMAIL PROTECTED]:password # grep -r sasl_passwd /etc/postfix/ /etc/postfix/main.cf:smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd Then, make sure to run: # postmap hash:/etc/postfix/sasl_passwd This should leave you with a file called /etc/postfix/sasl_passwd.db which postfix which actually use as the source of the authentication information. Also, make sure that the sasl_passwd and sasl_passwd.db have mode 600 and that you have libsasl2-modules installed. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: signature invalid: BADSIG 010908312D230C5F Debian Archive Automatic Signing Key (2006)
On Sat, Dec 02, 2006 at 06:12:49PM -0500, Rick Thomas wrote: > > Does anybody know why I'm getting this message when I do "aptitude > update" > > >W: GPG error: http://mirrors.usc.edu etch Release: The following > >signatures were invalid: BADSIG 010908312D230C5F Debian Archive > >Automatic Signing Key (2006) <[EMAIL PROTECTED]> > > A couple of days ago, I was getting the same message, but from > debian.lcs.mit.edu, instead of mirrors.usc.edu. Both sites are in my > sources.list file. > Please use Google. There are probably thousands of hits discussion this very problem. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 05:44:14PM -0700, Nate Duehr wrote: > > I knew some pedantic schmuck would say that. > > Pretend that I left those OFF the message, because trying to make the > point in the message is difficult without saying it explicitly, so just > use your tiny little imagination and pretend none of that explanation > was there). > > Twit. > Do you always feel compelled to be so abusive? I think that he made his point about your point quite elegantly. Had you *not* had those statements in your message, he would not have been able to assume that he had rights to redistribute the code at all. Regards, -Robeto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: opening URLs in Firefox from Thunderbird using upstream programs
On Sun, Dec 03, 2006 at 05:38:33PM -0800, Marc Shapiro wrote: > I am running Etch and want to continue to use the branded Firefox (2.0) > and Thunderbird. I do not want to switch to Icedove and IceWeasel. I > have been running the upstream Firefox 2.0 for a while, now, with no > problems. When I switched from debian-thunderbird to the upstream > version (1.5.0.8) urls stopped opening in firefox. They have, in fact, > stopped opening in anything. > > I have made sure that /etc/alternatives/x-www-browser is pointing to the > proper firefox binary and I don't know what else to check. I can not > find any configuration option, or preference, that says where links > should open, only where html attachments should open. Can anyone tell > me what I am missing? > Have you tried going into Firefox preferences and setting Firefox as the default browser again? When things got messed for me (using Debian version on Sarge), I did that and everything went back to opening in Firefox again. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: Checking integrity of cached debs
On Sat, Dec 02, 2006 at 05:05:30PM -0500, Winston Smith wrote: > Does apt-get check the integrity of cached debs before installing them? > For example, if I did > > apt-get --download-only install > > which downloads the package to the file > > /var/cache/apt/archives/.version.deb > > but doesn't install it, and then sometime later, after the above file > became corrupt because of a faulty hard drive, did > > apt-get install > > (which required no new download because there is no version change) would > the corruption be detected? > > In other words, is the check done after the download, before the > installation, or both? > Basically, yes. The md5sum is stored by apt. It checks the downloaded deb before installing against the stored md5sum. > Is there an easy way to check the integrity of cached debs and remove > corrupt ones? Also, is there an easy way to check the integrity of the > unchanging parts of installed packages? > Try debsums. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: following recent upgrade
On Tue, Dec 05, 2006 at 08:39:02PM -0500, Tom Allison wrote: > ntpd returns a permission denied error! > > > All the files are ntp owned... > What is the exact message from the logs? What happens if you stop it and start it or restart it? Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: using bootchart
On Wed, Dec 06, 2006 at 09:34:09AM +0800, Yuwen Dai wrote: > Dear all, > > When I used bootchart to benchmark booting of Debian sarge, I found > S40hotplug took nearly 15 seconds. S40hotplug calls {pci,usb,isapnp}.rc, > and installing some modules. Is there any way to reduce this time? Thanks > in advance. > Don't reboot the machine. Unless it is laptop, there isn't a really compelling reason to power it down. Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: Command Language Reference Book (Website)
On Tue, Dec 05, 2006 at 04:39:44PM -0800, Baz wrote: > Hello. Will someone please recommend a reference book (or website) about > fundamental to mid-level command language (Unix/Linux/Debian)? Thanks. > Sebastian > If by command language you mean shell, then you need to pick a reference that is specific to the shell you run (most likely bash). I would recommend the "Advance Bash-Scripting Guide": http://tldp.org/LDP/abs/html/ Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote: > > Code does NOT inherently *require* licensing or Copyright. You just > think it does. > Except that code, like every other creative endeavor gains the benefit of copyright on its creation. You must explicitly uncopyright it, or release it under license which allows free redistribution or modification, or go one step further and place it into the public domain (at least in places where such a thing as the public domain exists). > What would you like me to send you? A two line BASIC program? > > 10 PRINT "HELLO" > 20 GOTO 10 > > Look - there you go. Free code. No Copyright, no license. Freely > distributed. > Actually, you can make a reasonable argument that your code snippet is in the public domain. I wager that if you go back far enough you will find a publication of that code which is old enough to be in the public domain, or a previous release of it which is public domain. > I would tell you to do with it what you wish, but that would insinuate > that you need to follow my wishes. You don't. It has no license or > copyright. (Many countries call this "Public Domain".) You may > incorporate my code into your own works freely without any encumberances > of any kind. Enjoy. Or don't. Your choice. > > Do you get it now? > I think you fail to get it. Without the statements in your previous paragraph, I have no right to redistribute or modify and then redistribute your creative work (not the little code snippet above, but some original work which you create). Regards, -Roberto -- Roberto C. Sanchez http://people.connexer.com/~roberto http://www.connexer.com signature.asc Description: Digital signature
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 05:44:14PM -0700, Nate Duehr wrote: > Douglas Tutty wrote: > >On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote: >> > >>What would you like me to send you? A two line BASIC program? > >> > >>10 PRINT "HELLO" > >>20 GOTO 10 > >> > >>Look - there you go. Free code. No Copyright, no license. Freely > >>distributed. > > > >This would be your licence. Thank you. > > > >>I would tell you to do with it what you wish, but that would insinuate > >>that you need to follow my wishes. You don't. It has no license or > >>copyright. (Many countries call this "Public Domain".) You may > >>incorporate my code into your own works freely without any encumberances > >>of any kind. Enjoy. Or don't. Your choice. > >> > > > >Clause two of your licence. Thank you. > > I knew some pedantic schmuck would say that. > > Pretend that I left those OFF the message, because trying to make the > point in the message is difficult without saying it explicitly, so just > use your tiny little imagination and pretend none of that explanation > was there). > > Twit. > > Nate LOL:-) If those messages weren't there and the code was unique enough that it represented some intelectual property, then I wouldn't touch it without you permission. The difficulty is, having seen the code, how do I accomplish the same thing without using hints inherent in your code. Its like trying to write a literature-research paper; having read a hundred articles, I have to ensure that everything I say in my paper is either my own idea or is properly referenced. It takes great disipline to ensure that a bright idea at 9:00 in the morning isn't the result of reading something at 2:00 in the morning that I forgot to cite. Therefore, I don't even want to read code that I'm not free to take ideas from. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Douglas Tutty wrote: On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: > You could implement your own FEC. A very simple form of FEC is simply Yes, but *why*? Tape storage systems have been using ECC for decades. There's a whole lot of "Linux people" who's knowledge of computer history seems to have started in 1991, and thus all the many lessons learned in 30 years of computing are lost. Hi Ron, I'm hoping someone who can remember computer history prior to 1991 can give some perspective. It think (__please__ correct me if I'm wrong) that the tape systems had the ECC as part of the hardware. Write a plain datastream to the drive and the drive did the ECC part transparent to the user. Read the data and a bad block gets fixed by the hardware ECC. The 9 track tape drives had two forms of EDAC. One was the fact that each byte was written with a 9th check bit, even parity IIRC, allowing some detection, and some FEC on a block basis, IIRC. I'm told that modern hard drives also do ECC but I can't find out how that is implemented. I'm told that if a block starts to fail (whatever that means) then the data is transferred to a new unallocated block, transparent to the rest of the computer. Only if the drive runs out of unallocated blocks does it give errors. That's the way fixe discs work, usually with 11 bit BCH code, and also the way DAT works. Whatever other tapes may be in use, I don't know what they do. CDs also use some FEC (two Read-Solomon codes, one for thumbprint correction, and one for long-burst errors), but I don't know whether they do that when using a data format, as opposed to music. The question is, if a block is sucessfully written now, if the drive is not used for 5 years then a read is attempted, is the drive able to retreive that data using ECC (as a tape drive could)? I thought the question was "How can I be sure I can get my data back?" So far, some people have suggested few techniques to accomplish that, but all I've seen is complaints in response. I guess I don't know what the question is. Since I don't __know__ that it can, I'm assuming that it can't. I'm playing my own devils advocate and trying to find out how to plan to be able to read successfully off a drive with bad blocks after years of sitting on a shelf. IF this is what your goal is, then, as I pointed out, you can implement your own FEC. I'm focusing on the one-drive issue because this is one drive sitting in a bank vault. This is __archive__ (just like tape). I have backup procedures as a separate issue. One of the places that backup data goes to is the bank vault archive. If the issue is a drive, then you need more than one drive. If the drive itself fails, then you are SOL. In the absence of an all-in-one archive format, I'll use tar (which can detect errors just not fix them) to take care of names, owners, permissions, etc. Then that tar needs to be made ECC and compressed. If I want to throw in a monkey, I'll consider encryption. Yes tape drives do that. Its probably why they cost so much. Hard drives are much cheaper and are supposed to be able to hang on to their data (Seagate gives a 5 year warranty). But having seagate give me a new drive when I can't get my data off after 4 years is cold comfort. Hard disc drives use FEC (usually a BCH 11 bit redundant code). If you want to be able to read more reliably than the FEC already present, you'll have to add your own. The other problem with tapes is their fragility. Drop a DLT and I'm told that its toast. Put that tape in the drive and I'm told it can The most common cause of that is edge damage. damage the drive. A laptop drive in a ruggedized enclosure is much more robust and has a wider environmental range. Perhaps what I'm looking for doesn't exist. If it doesn't, I'll start work on it. Hmm. You going to become an expert at designing ECC? I suggest you take a course in abstract algebra first. As far as computer history prior to 1991, I could never get the hang of C. I'll stick with fortran77. Which progamming language one uses is less important than the algorithm implemented. Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 06:27:10PM -0600, Mike McCarty wrote: > Douglas Tutty wrote: > >I've looked at par2. It looks interesting. For me, the question is how > >to implement it for archiving onto a drive since the ECC data are > >separate files rather than being included within one data stream. > > You could implement your own FEC. A very simple form of FEC is simply > three copies, which you can do by hand. Another possibility is simply > have two copies of the BZ2 and read any bad blocks from the other > copy. This corresponds more closely to the request retransmission > model than FEC, but is reasonable in this circumstance. > > One thing to bear in mind is that, no matter how good an FEC method > you use, you are going to have to store about 2x redundant data > to get anything out of it. IOW, the data + parity information is going > to be about 3x the size of the data alone for any reasonable ability > to correct anything. Par2 seems to be able to do it at about 15%. It comes down to number theory and how many corrupted data blocks one needs to be able to handle. If 100 % of the data blocks are unavailable (worst case) then you need 100% redundant data (i.e. raid1). > > >Separate files suggests that it be on a file system, and we're back to > >where we started since I haven't found a parfs. > > I don't understand this statement. If you have a means to create FEC > checksums, and a way to store those, and a way to use the FEC checksums > along with a damaged copy of the file to reconstruct it, then why > do you need some special kind of FS to store it? My statement referrs to using par2 which doesn't touch the input file(s) but generates the error-corecting data as separate files. What does FEC stand for? I think ECC stands for Error Checking and Correcting. > > >I suppose I could use par2 to create the ECC files, then feed the ECC > >files one at a time, followed by the main data file, followed by the ECC > >files again. > > Why two copies of the FEC information? > What if two blocks on the drive fail, one containing data, the other containing the ECC info? > >I'll check out with my zip drive if I can write a tar file directly to > >disk without a fs (unless someone knows the answer). > > Why do you insist on not having a FS? Even if you don't have an FS, > I don't see why you want to separate the FEC information, unless you > don't have a program which can manage the information you're trying > to store. If that be the case, then the FEC information won't do > any good anyway. > I don't insist on not having a FS. But how well does a FS work with bad blocks cropped up? If it doesn't encorporate ECC itself then it either drops the data from the bad blocks or at worst can't be mounted. The question is, do I need a FS? If I don't, isn't it just one more potential point of failure? Thank you all for the discussion. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: signature invalid: BADSIG 010908312D230C5F Debian Archive Automatic Signing Key (2006)
On Dec 2, 2006, at 6:12 PM, Rick Thomas wrote: Does anybody know why I'm getting this message when I do "aptitude update" W: GPG error: http://mirrors.usc.edu etch Release: The following signatures were invalid: BADSIG 010908312D230C5F Debian Archive Automatic Signing Key (2006) <[EMAIL PROTECTED]> A couple of days ago, I was getting the same message, but from debian.lcs.mit.edu, instead of mirrors.usc.edu. Both sites are in my sources.list file. [EMAIL PROTECTED] wrote: Have you tried installing: http://packages.debian.org/unstable/misc/debian-archive-keyring The error message has moved back to debian.lcs.mit.edu. It's gone from mirrors.usc.edu for the time being. By removing the mit site from my sources.list file I was able to do "aptitude update && aptitude dist-upgrade" which updated the debian-archive-keyring package to the November 22, 2006 version. But when I put the mit site back in, the error was still there. Anybody got any ideas? Rick -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Something different -- playing with the Hurd
Okay, so I'm bored. Linux may be getting too complete, easy, and stable. ;-) So, what's a geek to do? *BSD? Nawww, too mature, and I don't like to wander too far away from the Debian community (yes, there's Debian GNU/kFreeBSD, but...). So, enter Debian GNU/HURD as an interesting diversion. It's not too problematic to get going, almost too easy as well, but no automatic installer and a bit of manual work is required. A lot of Unstable seems to be working except for notably Aptitude. Dselect is there. Shudder! There are rough edges as DHCP doesn't work so the network must be manually configured each time. The Debian bits seem to be as easy as on Linux while the Hurd bits seem to be the most immature. As I said, an interesting diversion and something different to learn about. Anyone else giving the Hurd a spin? - Nate >> -- Wireless | Amateur Radio Station N0NB | Successfully Microsoft Amateur radio exams; ham radio; Linux info @ | free since January 1998. http://www.qsl.net/n0nb/ | "Debian, the choice of My Kawasaki KZ-650 SR @| a GNU generation!" http://www.networksplus.net/n0nb/ | http://www.debian.org -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
following recent upgrade
ntpd returns a permission denied error! All the files are ntp owned... -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
no bold font in X
Dear all, I found there're no bold fonts in someplace where they should appear. For example, the gmail, the new arrived emails use bold font. Should I install anything or do configuration? My system is Debian Sarge. Best regards, Dai Yuwen
using bootchart
Dear all, When I used bootchart to benchmark booting of Debian sarge, I found S40hotplug took nearly 15 seconds. S40hotplug calls {pci,usb,isapnp}.rc, and installing some modules. Is there any way to reduce this time? Thanks in advance. Best regards, Dai Yuwen
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 06:57:38PM -0600, Ron Johnson wrote: > > > You could implement your own FEC. A very simple form of FEC is simply > > Yes, but *why*? Tape storage systems have been using ECC for decades. > > There's a whole lot of "Linux people" who's knowledge of computer > history seems to have started in 1991, and thus all the many lessons > learned in 30 years of computing are lost. > Hi Ron, I'm hoping someone who can remember computer history prior to 1991 can give some perspective. It think (__please__ correct me if I'm wrong) that the tape systems had the ECC as part of the hardware. Write a plain datastream to the drive and the drive did the ECC part transparent to the user. Read the data and a bad block gets fixed by the hardware ECC. I'm told that modern hard drives also do ECC but I can't find out how that is implemented. I'm told that if a block starts to fail (whatever that means) then the data is transferred to a new unallocated block, transparent to the rest of the computer. Only if the drive runs out of unallocated blocks does it give errors. The question is, if a block is sucessfully written now, if the drive is not used for 5 years then a read is attempted, is the drive able to retreive that data using ECC (as a tape drive could)? Since I don't __know__ that it can, I'm assuming that it can't. I'm playing my own devils advocate and trying to find out how to plan to be able to read successfully off a drive with bad blocks after years of sitting on a shelf. I'm focusing on the one-drive issue because this is one drive sitting in a bank vault. This is __archive__ (just like tape). I have backup procedures as a separate issue. One of the places that backup data goes to is the bank vault archive. In the absence of an all-in-one archive format, I'll use tar (which can detect errors just not fix them) to take care of names, owners, permissions, etc. Then that tar needs to be made ECC and compressed. If I want to throw in a monkey, I'll consider encryption. Yes tape drives do that. Its probably why they cost so much. Hard drives are much cheaper and are supposed to be able to hang on to their data (Seagate gives a 5 year warranty). But having seagate give me a new drive when I can't get my data off after 4 years is cold comfort. The other problem with tapes is their fragility. Drop a DLT and I'm told that its toast. Put that tape in the drive and I'm told it can damage the drive. A laptop drive in a ruggedized enclosure is much more robust and has a wider environmental range. Perhaps what I'm looking for doesn't exist. If it doesn't, I'll start work on it. As far as computer history prior to 1991, I could never get the hang of C. I'll stick with fortran77. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Firefox crashing on gmail
On Tue, Dec 05, 2006 at 10:35:36AM -0600, Hugo Vanwoerkom wrote: > > Dumb question perhaps, but did you try running ldconfig? That is what is > usually the prob if "they are there" and also "not found". > That was the first thing that I did once I saw the 'not found' messages. For completeness here is it again: # ldconfig # ldd firefox-bin | grep "found" ./firefox-bin: /usr/lib/libnss3.so: version `NSS_3.11.1' not found (required by ./firefox-bin) libmozjs.so => not found libxpcom.so => not found libxpcom_core.so => not found libsmime3.so => not found libssl3.so => not found libsoftokn3.so => not found libxpcom_compat.so => not found Regards, -- Sridhar M.A. GPG KeyID : F6A35935 Fingerprint: D172 22C4 7CDC D9CD 62B5 55C1 2A69 D5D8 F6A3 5935 miracle: an extremely outstanding or unusual event, thing, or accomplishment. -- Webster's Dictionary signature.asc Description: Digital signature
APM no kernel support ? Use Software suspend 2 ? how ?
[This message has also been posted to linux.debian.user.] I had sarge on a Compaq Armada 3500 notebook. No ACPI, but APM suspend to disk was working with an upstream kernel with APM compiled in. Fresh etch install on the same system, 2.6.17-2-686. modprobe apm gives apm: BIOS version 1.2 Flags 0x03 (Driver version 1.16ac) apm: overridden by ACPI FATAL: Error inserting apm ([path]/apm.ko) no such device." I added acpi=off to the kernel command line in GRUB, but I got ACPI anyway. Is there some boot time kernel argument to shut off ACPI in this kernel? Should I use Software Suspend 2? Is it in Debian's kernel already or do I have to make my own? There's a Debian page in the Suspend2 Wiki but it was written when sarge was testing and it's not clear what still applies. Cameron -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Ron Johnson wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/06 18:27, Mike McCarty wrote: You could implement your own FEC. A very simple form of FEC is simply Yes, but *why*? Tape storage systems have been using ECC for decades. You are the only one who can answer this question. AFAIK, tape systems have *not* been using FEC. The systems I've used have implemented ED, but not EDAC. There's a whole lot of "Linux people" who's knowledge of computer history seems to have started in 1991, and thus all the many lessons learned in 30 years of computing are lost. I can't help that. How about stating some measureable goals in the form of requirements instead of just complaining that some systems don't meeet your needs? Then perhaps some of us could suggest possible solutions. At present, I feel like whatever I suggest is going to be met with another objection that an as-yet-unstated requirement is not being met. You seem to have just added a requirement that what you use be something which was used on tape before 1991. Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Problem installing packages with apt-get, aptitude and dselect
Andrew Sackville-West wrote: check out the package apt-listbugs. It puls down critical (and maybe severe) bug reports and prompts you before installing packages. That's how I saw the segfault bug in apt and held my apt and apt-utils at the current version pending resolution. A The funny thing is that I do have this package installed. Don't know why I didn't catch this bug. When installation pauses because of a pending bug, does that always mean that a package should not be installed? -- Sincerely Jose Alburquerque -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Tyler MacDonald wrote: [snip] When the /dump partition starts to get a bit full somewhere, I create a DVD image of some of the tarballs and burn off 4 copies. Two stay at home, one goes to my friend that is managing the repo, and one gets mailed to a friend in austria. You are effectively using a BCH code with a Hamming distance of 2. This same distance can be achieved with only three copies. Now, if you have a way to know which copy got corrupted (IOW, you have three states for any given bit: 0, 1, missing, as opposed to just 0, 1) then your method is better, because correcting mising bits takes less information than corrected corrupted bits. But if you have no way to detect missing bits, then you are doing effectively no better than you could with just three discs. [snip] Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Andrew Sackville-West wrote: On Tue, Dec 05, 2006 at 07:08:54PM -0500, Douglas Tutty wrote: Yes. But I don't want to loose any data at all. there is no way to guarantee this. you could improve your odds by having multiple storage locations with multiple copies and a rigorous method for routinely testing the backup media for corruption and making new replacement copies of the backups to prevent future loss. For example, make multiple identical backups. sprinkle them in various locations. on a periodic, routine basis, test those backups for possible corruption. If their clean, make a new copy anyway to put in rotation, throwing away the old ones after so many periods. If you Respectfully, I disagree with this last recommendation. You are suggesting that he continually keep his backup media on the infant mortality portion of the Weibull distribution. The usual way for devices which are not subjected to periodic high stress to fail is to have an infant mortality rate which is high, but falls down to a low level, then begins to rise again with wearout. In this case, wearout would be eventual degradation of the metallization layer in the disc. find a corrupt one, get one of your clean ones to reproduce it and start over. Be sure to use an odd number of copies. Don't want no tied votes on whether a given bit is a 0 or a 1 :-) there is now way, using only one physical storage medium, to guarantee no loss of data. There is no way, using any number of physical storage media, to gurantee no loss of data. On any storage medium, if the probability of error in a data bit is less than 50%, then given any e > 0 there exists an FEC method which reduces the probability of data loss to be less than e. If the probability of error on any given bit is greater than 50%, then there is no way, by adding additional information, to make the eventual error rate be less than a single copy. The additional bits are more likely to be in error than the original. maybe I;'m reading this wrong , but it seems to be what you're asking for. There is no way to guarantee that every bit of computer information on the Earth is not destroyed by a comet strike :-) Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/06 18:27, Mike McCarty wrote: > Douglas Tutty wrote: >> On Tue, Dec 05, 2006 at 05:47:23PM -0600, Mike McCarty wrote: >>> Johannes Wiedersich wrote: Douglas Tutty wrote: > I'm going to be backing up to a portable ruggedized hard drive. > Currently, my backups end up in tar.bz2 format. > [snip] [snip] >>> [snip] [snip] >> I've looked at par2. It looks interesting. For me, the question is how >> to implement it for archiving onto a drive since the ECC data are >> separate files rather than being included within one data stream. > > You could implement your own FEC. A very simple form of FEC is simply Yes, but *why*? Tape storage systems have been using ECC for decades. There's a whole lot of "Linux people" who's knowledge of computer history seems to have started in 1991, and thus all the many lessons learned in 30 years of computing are lost. - -- Ron Johnson, Jr. Jefferson LA USA Is "common sense" really valid? For example, it is "common sense" to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that "common sense" is obviously wrong. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFdhWCS9HxQb37XmcRAqfhAKCVL2+Da0wBAI9FCvNDvXPCfbB+7QCgz+kx IFQUOeS/tHQ+WptZkwapY0s= =hXfa -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
Andrew Sackville-West writes: > you release code anonymously into public domain. companyA sees that code, > likes it, grabs it, incorporates it, copyrights and distributes it in a > closed source application. this of course is their right as there are no > licenses or rights attached to the code. simultaneously, userB sees it, > grabs it, incorporates it, and releases it under gpl. later, companyA, > having lost track of how it got the code, sees it in userB's gpl code and > sues userB claiming that they stole it, violated companyA's > copyright. userB ends up in court trying to defend themselves. If there > is no other record available of this code being in public domain, nor any > clear release from the author, then userB is effectively screwed. CompanyA has to show that userB had access to their source code. Copyright is not patent. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
John Hasler wrote: Copyright law is what it is, not what we want it to be. Agreed, but that doesn't require us to pay any attention to it, or give it more than it deserves. Nate -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
Douglas Tutty wrote: On Tue, Dec 05, 2006 at 03:03:53PM -0700, Nate Duehr wrote: Thus, copyright in the real world only matters if the author chooses to exercise it. Since copywrite exists unless released within a licence, who would want to open themselves (or their company) to the risk of a legal battle, or tarnishing of a reputation. Their view of the real risks are skewed then. Ask any company who's put GPL'ed code inside a product and gotten away with it because no one could tell it was there. You naive enough to think that hasn't, and isn't happening daily? Do those people give a whit about the license or the Copyright? Nope. Do they just have a copy of the code. Yep. You (as copyright holder) have to prove they're using your code. (Re: SCO.) You can't prove it, then what good did your automatic Copyright do for you? Absolutely nothing. By your definition, you could have hit reply with quoting turned on in your MUA to my code example I sent -- and then you would have been a law breaker! No. The forums are clearly stated on the web-site (not just assumed by the culture) that they and anything posted to them are public. This releases the rest of us from liability if we redistribute your code. Where? What forum? This is a mailing list you can sign up for without ever seeing a web page. I could start sprinkling code into my signature line and then sue everyone who quotes it on a mailing list? Yeah, right. It'd actually be fun to see someone try that and see how far it got in the legal system. You obviously don't agree with automatic copyright. However, to change it you would have to change international law. I have no beef with automatic Copyright, I just claim it's useless. Can you find any case law where automatic Copyright has been invoked? Try releasing something into public and then trying to regain your Copyright in a couple of years if it gets wildly popular just because you changed your mind. Won't happen. Most Judges just aren't that stupid. Nate -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
Douglas Tutty wrote: On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote: Roberto C. Sanchez wrote: On Fri, Dec 01, 2006 at 09:52:16PM -0700, Nate Duehr wrote: I can send you some non-GPL'ed non-Copyrighted code right now. Would you like some? You're adding things that simply don't need to exist. They *do* exist for *some* code, including GPL'ed code, but licensing of ANY sort (including Copyright, which is nothing more than another contrived license allowed by law in many places) *restricts* the use of code in some fashion. The only truly FREE code is code without any license at all. Code does NOT inherently *require* licensing or Copyright. You just think it does. What would you like me to send you? A two line BASIC program? 10 PRINT "HELLO" 20 GOTO 10 Look - there you go. Free code. No Copyright, no license. Freely distributed. This would be your licence. Thank you. I would tell you to do with it what you wish, but that would insinuate that you need to follow my wishes. You don't. It has no license or copyright. (Many countries call this "Public Domain".) You may incorporate my code into your own works freely without any encumberances of any kind. Enjoy. Or don't. Your choice. Clause two of your licence. Thank you. I knew some pedantic schmuck would say that. Pretend that I left those OFF the message, because trying to make the point in the message is difficult without saying it explicitly, so just use your tiny little imagination and pretend none of that explanation was there). Twit. Nate -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Installation process Debian Etch
Date: Sun, 03 Dec 2006 14:56:01 Magnus Pedersen wrote: aa dd wrote: I want to install debian etch. Now installation process is asking for domain name, what should I give? I don't have a domain setup. I've 4 winxp computers under a workgorup named Workgroup. So do I keep the field for domain name empty in the installation process? If i use a madeup domain, do i have to do anything special to my winxp computers' settings in order to share files? I'm asking this because the installation also says that I've to use that same domain name to all my windows computers. Thanks. Just leave it empty. Thanks Magnus. --S.R. _ Enter the "Telus Mobility Xbox a Day" contest for your chance to WIN! Telus Mobility is giving away an Microsoft Xbox® 360 every day from November 20 to December 31, 2006! Just download Windows Live (MSN) Messenger to your IM-capable TELUS mobile phone, and you could be a winner! http://www.telusmobility.com/msnxbox/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Command Language Reference Book (Website)
Hello. Will someone please recommend a reference book (or website) about fundamental to mid-level command language (Unix/Linux/Debian)? Thanks. Sebastian "...heart and soulone will burn." - Joy Division
Re: what's the killer app for GNU/Linux systems?
Douglas Tutty writes: > No. The forums are clearly stated on the web-site (not just assumed by > the culture) that they and anything posted to them are public. This > releases the rest of us from liability if we redistribute your code. I don't think it does. We are free to download the code and read it and probably run it, but I don't see how we get any distribution rights. Nate Duehr wrote: > I could start sprinkling code into my signature line and then sue > everyone who quotes it on a mailing list? Yeah, right. It'd actually be > fun to see someone try that and see how far it got in the legal system. There is clearly an implied license (in addition to fair use) to quote such things. However, if there was enough code to qualify for copyright protection you might very well be able to prevent me from selling copies of it. Copyright law is what it is, not what we want it to be. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Mozilla resolving host problem
On 12/2/06, David Shultz <[EMAIL PROTECTED]> wrote: Whenever I browse any website, mozilla says "Resolving www.google.com" and waits for about 15 seconds to resolve the host. I've disabled ipv6 but the problem is still there. Also I've checked the isp nameserver and they are fine. Does anyone has the same problem? First of all I apologize for late reply. I messed up my system so had to reinstall everything. Sorry about that. After reinstall everything is working fine now. Don't have that delay. If anything goes wrong, I'll post back later. Again thanks to all for helping me. --David
Re: can't boot with Spurious ACK with kernel 2.6.19
On Tue, Dec 05, 2006 at 10:09:00AM -0500, bernd wrote: > I'm trying to upgrade my Debian box to kernel 1.6.19. > The boot process immediatly locks in a loop with the message: > "atkbd.c: Spurious ACK on isa0060/serio0. Some program might be trying access > hardware directly." > > The box is running fine with kernel 1.6.18.4. > Did anybody discovered similar issues ar have any ideas on how to solve that? > > Here's my BIOS information based on dmidecode: > > BIOS Information > Vendor: Phoenix Technologies, LTD > Version: 6.00 PG > Release Date: 08/19/2003 > Address: 0xE > Runtime Size: 128 kB > ROM Size: 512 kB > Characteristics: > ISA is supported > PCI is supported > PNP is supported > APM is supported > BIOS is upgradeable > BIOS shadowing is allowed > ESCD support is available > Boot from CD is supported > Selectable boot is supported > BIOS ROM is socketed > EDD is supported > 5.25"/360 KB floppy services are supported (int 13h) > 5.25"/1.2 MB floppy services are supported (int 13h) > 3.5"/720 KB floppy services are supported (int 13h) > 3.5"/2.88 MB floppy services are supported (int 13h) > Print screen service is supported (int 5h) > 8042 keyboard services are supported (int 9h) > Serial services are supported (int 14h) > Printer services are supported (int 17h) > CGA/mono video services are supported (int 10h) > ACPI is supported > USB legacy is supported > AGP is supported > LS-120 boot is supported > ATAPI Zip drive boot is supported > > ( .. more info available if useful ..) > Based on the email "xtables/iptables and atkbd.c Spurious ACK on isa0060/serio0" from [EMAIL PROTECTED] I checked my configuration. And yes, I have CONFIG_NETFILTER_XTABLES=m and CONFIG_IP_NF_IPTABLES=m as well. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Andrew Sackville-West <[EMAIL PROTECTED]> wrote: > For example, make multiple identical backups. sprinkle them in various > locations. on a periodic, routine basis, test those backups for > possible corruption. If their clean, make a new copy anyway to put in > rotation, throwing away the old ones after so many periods. If you > find a corrupt one, get one of your clean ones to reproduce it and > start over. Here's what I do with my systems: I use backup2l to make incremental backups to a partition in /dump. These backups are then GPG-encrypted, with the key of the owner of each server. They are then rsynced to a central repository on one of the servers, and from there rsynced down to my home system. So each server's backup data is always in three locations: It's own machine, the repo, and my home machine. When the /dump partition starts to get a bit full somewhere, I create a DVD image of some of the tarballs and burn off 4 copies. Two stay at home, one goes to my friend that is managing the repo, and one gets mailed to a friend in austria. This system works well, but that's mainly because we have less than 300GB of data that needs to be backed up and we have long backup cycles -- a new level-1 backup is generated maybe once every six months. If anyone wants to check out the backup2l.conf and associated files, let me know and I'll send it to you off-list. Cheers, Tyler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Douglas Tutty wrote: On Tue, Dec 05, 2006 at 05:47:23PM -0600, Mike McCarty wrote: Johannes Wiedersich wrote: Douglas Tutty wrote: I'm going to be backing up to a portable ruggedized hard drive. Currently, my backups end up in tar.bz2 format. [snip] Now, to something completely different If data integrity is your concern, than maybe a better solution than compression is to copy all your data with rsync or another backup tool that 'mirrors' your files instead of packing them all together in one large file. If something goes wrong with this large file you might loose the backup of all your files. If something goes wrong with the [snip] My understanding of the BZ2 format is that it compresses individual blocks independently, and that the loss of a block will not compromize the entire archive, only those files which are contained in a given block. Yes. But I don't want to loose any data at all. Of course not. I was responding to Johannes' statement that one risks entire loss. This is true with, for example, gzip of a tar, but not with bzip2. I've looked at par2. It looks interesting. For me, the question is how to implement it for archiving onto a drive since the ECC data are separate files rather than being included within one data stream. You could implement your own FEC. A very simple form of FEC is simply three copies, which you can do by hand. Another possibility is simply have two copies of the BZ2 and read any bad blocks from the other copy. This corresponds more closely to the request retransmission model than FEC, but is reasonable in this circumstance. One thing to bear in mind is that, no matter how good an FEC method you use, you are going to have to store about 2x redundant data to get anything out of it. IOW, the data + parity information is going to be about 3x the size of the data alone for any reasonable ability to correct anything. Separate files suggests that it be on a file system, and we're back to where we started since I haven't found a parfs. I don't understand this statement. If you have a means to create FEC checksums, and a way to store those, and a way to use the FEC checksums along with a damaged copy of the file to reconstruct it, then why do you need some special kind of FS to store it? I suppose I could use par2 to create the ECC files, then feed the ECC files one at a time, followed by the main data file, followed by the ECC files again. Why two copies of the FEC information? I'll check out with my zip drive if I can write a tar file directly to disk without a fs (unless someone knows the answer). Why do you insist on not having a FS? Even if you don't have an FS, I don't see why you want to separate the FEC information, unless you don't have a program which can manage the information you're trying to store. If that be the case, then the FEC information won't do any good anyway. Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Bad mirror error during network installation
On Tue, Dec 05, 2006 at 06:56:12PM -0500, Wayne Topa wrote: > > Today the best one [1], for me, keeps dropping out while I'm > upgraiding. > > [1] debian.fifi.org I use debian.midco.net and it always works great for me. check out apt-spy. A signature.asc Description: Digital signature
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 07:08:54PM -0500, Douglas Tutty wrote: > > Yes. But I don't want to loose any data at all. there is no way to guarantee this. you could improve your odds by having multiple storage locations with multiple copies and a rigorous method for routinely testing the backup media for corruption and making new replacement copies of the backups to prevent future loss. For example, make multiple identical backups. sprinkle them in various locations. on a periodic, routine basis, test those backups for possible corruption. If their clean, make a new copy anyway to put in rotation, throwing away the old ones after so many periods. If you find a corrupt one, get one of your clean ones to reproduce it and start over. there is now way, using only one physical storage medium, to guarantee no loss of data. maybe I;'m reading this wrong , but it seems to be what you're asking for. > A signature.asc Description: Digital signature
Re: Bad mirror error during network installation
maarten fiege([EMAIL PROTECTED]) is reported to have said: > LS > > I'm trying to install debian using a network > installation. Everything works great untill my pc > searches for a debian mirror. I've tried several > mirrors included the recommended mirrors and even the > "official" US mirror, but the the massage bad mirror > keeps coming up. > > What can be the problem, it doesn't seem likey that > these are all bad mirrors. I recently ran into the same problem. I went looking for a mirror that would work and found only 5, from the US mirror list, that worked. Today the best one [1], for me, keeps dropping out while I'm upgraiding. [1] debian.fifi.org Wayne -- The reason computer chips are so small is computers don't eat much. ___ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Mdadm Corruption
Hi Johannes, Thanks for the reply, I'm well aware the device is a hardware raid controller, but like most cheap raid card this unit uses the host CPU to do the raid striping. I was concerned that if the card failed I would lose my raid array, So I wanted to use mdadm so that I could just replace the card with some other and have it continue working, as there is no really advantage to the card as it uses the host CPU any way. The other reason I choose the card is that it has 4 sata ports and my current machine doesn't have any. The cards driver allows you to disable the raid part of the controller and simply use it as a sata expansion card. And as for mdadm its been working fine untill now (18 Months). I belive it was a power shortage but I'm not 100% sure, but the issues doesn't lie with the card nor its abillities the issue is FSCK getting caught in a perpetual loop. I'm running debain 2.6.8-3-386 version 3.1 the SATA card is use the open source driver proved by highpoint and has 4 x 200 GB western didgital drives connected in a raid 5 configuration. Thanks Alex Johannes Wiedersich wrote: > Maxus wrote: > > Hi Linux Pepole, > > > > I have a debian box (sarge (I think)) with a 2.6.8-3.386 kernel. I > > recently upgraded to 2.6.18 to get checkarray working in Mdadm (it > > needs a kernel high than 2.6.15 to function) as there is not a lot of > > point in having a raid system if it doesn't keep an eye on itself :) > > > > Anyhow well it went very wrong not 100% sure how, I'm running a > > highpoint 1640 with the 2.16 driver with 4 x WD 200 GB drives. Now when > > the system goes to mount the array it stats the array is corrupted. > > Correct me, if I am wrong, but from google, I get the impression that > this is a _hardware_ raid controller. > > mdadm is a _software_ raid program: > ~# aptitude show mdadm > [...] > Description: Manage MD devices aka Linux Software Raid > [...] > > This is meant to implement raid on computers *without* a _hardware_ raid > controller. > > > So, Any suggestion or ideas how to fix it? Would love to try and get > > some of the data off the drive. > > Don't confuse software raid with hardware raid, ie. don't use tools for > software raid on a hardware raid controller. > > http://en.wikipedia.org/wiki/RAID#Hardware_vs._software > > HTH, > Johannes > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 06:55:21PM -0500, Douglas Tutty wrote: > On Tue, Dec 05, 2006 at 03:03:53PM -0700, Nate Duehr wrote: > > > > Thus, copyright in the real world only matters if the author chooses to > > exercise it. > > Since copywrite exists unless released within a licence, who would want > to open themselves (or their company) to the risk of a legal battle, or > tarnishing of a reputation. > I can't believe I'm jumping into this but... ISTM, that this is an interesting scenario: you release code anonymously into public domain. companyA sees that code, likes it, grabs it, incorporates it, copyrights and distributes it in a closed source application. this of course is their right as there are no licenses or rights attached to the code. simultaneously, userB sees it, grabs it, incorporates it, and releases it under gpl. later, companyA, having lost track of how it got the code, sees it in userB's gpl code and sues userB claiming that they stole it, violated companyA's copyright. userB ends up in court trying to defend themselves. If there is no other record available of this code being in public domain, nor any clear release from the author, then userB is effectively screwed. If one had instead released the code with explicit copyright releases attached, then userB could attribute the code properly and be defendable. it seems irresponsible to just throw code out there with the idea that anybody could use it without making some statement to that effect. this all assumes the existence of automatic copyright etc. Without automatic copyright, I suppose the situation would be pretty similar though. my .02 as IANAA or coder at this point. /me runs and hides A signature.asc Description: Digital signature
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 05:47:23PM -0600, Mike McCarty wrote: > Johannes Wiedersich wrote: > >Douglas Tutty wrote: > > > >>I'm going to be backing up to a portable ruggedized hard drive. > >>Currently, my backups end up in tar.bz2 format. > >> > >>It would be nice if there was some redundancy in the data stream to > >>handle blocks that go bad while the drive is in storage (e.g. archive). > >> > >>How is this handled on tape? Is it built-into the hardware > >>compression? > >> > >>Do I need to put a file system on a disk partition if I'm only saving > >>one archive file or can I just write the archive to the partition > >>directly (and read it back) as if it was a scsi tape? > >> > >>Is there an archive or compression format that includes the ability to > >>not only detect errors but to correct them? (e.g. store ECC data > >>elsewhere in the file) If there was, and I could write it directly to > >>the disk, then that would solve the blocks-failing-while-drive-stored > >>issue. > > > > > >Now, to something completely different > >If data integrity is your concern, than maybe a better solution than > >compression is to copy all your data with rsync or another backup tool > >that 'mirrors' your files instead of packing them all together in one > >large file. If something goes wrong with this large file you might loose > >the backup of all your files. If something goes wrong with the > > [snip] > > My understanding of the BZ2 format is that it compresses individual > blocks independently, and that the loss of a block will not compromize > the entire archive, only those files which are contained in a given > block. Yes. But I don't want to loose any data at all. I've looked at par2. It looks interesting. For me, the question is how to implement it for archiving onto a drive since the ECC data are separate files rather than being included within one data stream. Separate files suggests that it be on a file system, and we're back to where we started since I haven't found a parfs. I suppose I could use par2 to create the ECC files, then feed the ECC files one at a time, followed by the main data file, followed by the ECC files again. I'll check out with my zip drive if I can write a tar file directly to disk without a fs (unless someone knows the answer). Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Problem installing packages with apt-get, aptitude and dselect
On Tue, Dec 05, 2006 at 06:01:51PM -0500, José Alburquerque wrote: > Andrew Sackville-West wrote: > >what version of apt-get? > > > >check out bug 401263. > > > >Interestingly, though the bug says it applies to 0.6.46.2, I am > >running that with no problems. (k7 arch). but there are a variety of > >possible solutions posted. > > > >you may have to use dpkg to manually install an older(or newer) apt until > >it > >gets resolved. > > > >hth > > > >A > > > Thanks so much for your guidance! I'm running version 0.6.46.3 of apt, > but thanks to your pointing out of the bug report I was able to fix the > segfaulting by following the temporary solution given in the bug > report. I'll most probably contribute to the bug report. > check out the package apt-listbugs. It puls down critical (and maybe severe) bug reports and prompts you before installing packages. That's how I saw the segfault bug in apt and held my apt and apt-utils at the current version pending resolution. A > signature.asc Description: Digital signature
Re: postfix relay smtp authentication
On Wed, Dec 06, 2006 at 12:13:26AM +0100, Martin Fuzzey wrote: > > This works BUT only for a single user since the postfix version in sarge > (2.1.5) doesn't implement the smtp_sender_dependent_authentication > option and my ISP actually wants the correct password for each email > address (not just a single one for all addresses associated with the > account. I've not used postfix, but maybe this can help. I use exim4 with a smarthost and only use one of several accounts to send the mail. The headers in the outgoing mail have various return/from addresses, but we only login to the smtp host using one of those accounts. so whether mail actually comes from bob or joe or mary, the mailserver here logs into the smtp server as joe and then sends the message. ymmv. A signature.asc Description: Digital signature
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 03:03:53PM -0700, Nate Duehr wrote: > John Hasler wrote: > > >If you give or sell me a copy of a work of yours I own that copy and can do > >as I please with it (that includes running it if it is a computer program) > >with no need for a license. However, copyright law forbids me to make and > >distribute copies of it without your permission. > > Feel free to feel bound and to limit your own freedom if you so choose. > > It's a self-imposed limitation in the case of my example of > non-licensed, non-attributed code that I typed into the mailing list. > > >Code is protected by copyright by default and may not be copied and > >distributed without permission of the copyright owner. > > If you feel you need to follow that law in every circumstance, go right > ahead. Breaking copyright in the case of someone releasing something > without a license appears to be a victim-less crime. > > Thus, copyright in the real world only matters if the author chooses to > exercise it. Since copywrite exists unless released within a licence, who would want to open themselves (or their company) to the risk of a legal battle, or tarnishing of a reputation. > > By your definition, you could have hit reply with quoting turned on in > your MUA to my code example I sent -- and then you would have been a law > breaker! > No. The forums are clearly stated on the web-site (not just assumed by the culture) that they and anything posted to them are public. This releases the rest of us from liability if we redistribute your code. > I could start sprinkling code into my signature line and then sue > everyone who quotes it on a mailing list? Yeah, right. It'd actually > be fun to see someone try that and see how far it got in the legal system. You obviously don't agree with automatic copyright. However, to change it you would have to change international law. If you have the energy and effectivness to pull that off, I'd rather you spend your talents on climate change. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
raidutil + debian stable + 2.6.17.11
Hi, I'm trying to monitor the RAID on a IBM x345 with 6 1RPM scsi drives on the built in RAID controller (Adaptec ServeRaid). I'm not having any luck. raidutil from the stable package says: xa:~# raidutil -L all Engine connect failed: COMPATIBILITY number osdIOrequest : File /dev/dpti17 Could Not Be Opened raidutil 0.0.6 compiled and run in place (not installed that is) gives me the same error. Any ideas on how to get this to work or what other tool I can use? Is it the "I2O Bus Adapter OSM" (see below)? A. Info: xa:~# uname -r 2.6.17.11-vs2.0.2 [linux vserver - this is on the mothership, not a virtual machine] xal:~# lspci -vv :08:02.0 RAID bus controller: Adaptec ServeRAID Controller (rev 02) Subsystem: IBM ServeRAID-xx Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV+ VGASnoop- ParErr + Stepping+ SERR+ FastB2B- Status: Cap+ 66MHz+ UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- SERR- Latency: 64 (32000ns min), Cache Line Size: 0x08 (32 bytes) Interrupt: pin A routed to IRQ 169 Region 0: Memory at f3fff000 (32-bit, non-prefetchable) [size=4K] Region 2: Memory at f400 (32-bit, prefetchable) [size=64M] Expansion ROM at f108 [disabled] [size=512K] Capabilities: [c0] Power Management version 2 Flags: PMEClk- DSI- D1+ D2- AuxCurrent=0mA PME (D0-,D1-,D2-,D3hot-,D3cold-) Status: D0 PME-Enable- DSel=0 DScale=0 PME- Capabilities: [d0] Message Signalled Interrupts: 64bit+ Queue=0/1 Enable- Address: Data: Capabilities: [e0] PCI-X non-bridge device. Command: DPERE- ERO- RBC=0 OST=3 Status: Bus=8 Dev=2 Func=0 64bit+ 133MHz+ SCD- USC-, DC=bridge, DMMRBC=1, DMOST=3, DMCRS=1, RSCEM- make menuconfig: Device Drivers ---> I2O device support ---> I2O support [*] Enable LCT notification [*] Enable Adaptec extensions [*]Enable 64-bit DMA I2O Configuration support [*]Enable ioctls (OBSOLETE) < > I2O Bus Adapter OSM I2O Block OSM I2O SCSI OSM I2O /proc support -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: what's the killer app for GNU/Linux systems?
On Tue, Dec 05, 2006 at 11:02:12AM -0700, Nate Duehr wrote: > Roberto C. Sanchez wrote: > >On Fri, Dec 01, 2006 at 09:52:16PM -0700, Nate Duehr wrote: > I can send you some non-GPL'ed non-Copyrighted code right now. Would > you like some? > > You're adding things that simply don't need to exist. They *do* exist > for *some* code, including GPL'ed code, but licensing of ANY sort > (including Copyright, which is nothing more than another contrived > license allowed by law in many places) *restricts* the use of code in > some fashion. The only truly FREE code is code without any license at all. > > Code does NOT inherently *require* licensing or Copyright. You just > think it does. > > What would you like me to send you? A two line BASIC program? > > 10 PRINT "HELLO" > 20 GOTO 10 > > Look - there you go. Free code. No Copyright, no license. Freely > distributed. This would be your licence. Thank you. > > I would tell you to do with it what you wish, but that would insinuate > that you need to follow my wishes. You don't. It has no license or > copyright. (Many countries call this "Public Domain".) You may > incorporate my code into your own works freely without any encumberances > of any kind. Enjoy. Or don't. Your choice. > Clause two of your licence. Thank you. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
Johannes Wiedersich wrote: Douglas Tutty wrote: I'm going to be backing up to a portable ruggedized hard drive. Currently, my backups end up in tar.bz2 format. It would be nice if there was some redundancy in the data stream to handle blocks that go bad while the drive is in storage (e.g. archive). How is this handled on tape? Is it built-into the hardware compression? Do I need to put a file system on a disk partition if I'm only saving one archive file or can I just write the archive to the partition directly (and read it back) as if it was a scsi tape? Is there an archive or compression format that includes the ability to not only detect errors but to correct them? (e.g. store ECC data elsewhere in the file) If there was, and I could write it directly to the disk, then that would solve the blocks-failing-while-drive-stored issue. Now, to something completely different If data integrity is your concern, than maybe a better solution than compression is to copy all your data with rsync or another backup tool that 'mirrors' your files instead of packing them all together in one large file. If something goes wrong with this large file you might loose the backup of all your files. If something goes wrong with the [snip] My understanding of the BZ2 format is that it compresses individual blocks independently, and that the loss of a block will not compromize the entire archive, only those files which are contained in a given block. Your other points are (as usual) well taken. Mike -- p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} This message made from 100% recycled bits. You have found the bank of Larn. I can explain it for you, but I can't understand it for you. I speak only for myself, and I am unanimous in that! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: New PC, new install, new problems!
On Tue, Dec 05, 2006 at 10:49:33AM -0600, Hugo Vanwoerkom wrote: > Truer words were never spoken, but... > It is extremely difficult to get before the purchase answers of more > recent mobo's. E.g. try to get a Linux perspective from any of the > hundreds of boards available thru NewEgg. > > You end up in an unending search of mobo manufacturers forums to see if > anyone said anything about Linux. When you find an answer... the mobo is > no longer available. > > The Linux databases that *are* available are almost always for stuff > that is outdated. > > I'd like to hear of just one example of a recent mobo that is discussed > anywhere from a Linux perspective. Before I bought my Asus M2N-SLI Deluxe, I found a discussion related to it somewhere using google. I don't think the discuss was about wheter it would work with linux but on some other matter. However, it was clear from the discussion that linux was running on it. So now I have it and everything seems hunky dory. Although I haven't tried sound yet. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
postfix relay smtp authentication
Hi, I have been succesfully running postfix on Sarge as a local mailserver relaying all outbound mail (from multiple internal accounts) to my ISP. However my ISP has just decided to require SMTP authentication. I have set up SASL following the postfix documentation and the authentication phase succeeds, *however* postfix does not include the authenticated sender address in the AUTH section of the MAIL FROM message and my ISP is still refusing the message :(( Looking at the source in src/smtp/smtp_proto.c: /* * We authenticate the local MTA only, but not the sender. */ #ifdef USE_SASL_AUTH if (var_smtp_sasl_enable && (state->features & SMTP_FEATURE_AUTH) && state->sasl_passwd) vstring_strcat(next_command, " AUTH=<>"); #endif I have "fixed" this with the following patch to the postfix code: --- postfix-2.1.5/src/smtp/smtp_proto.c 2006-12-04 22:08:23.0 +0100 +++ postfix-2.1.5/src/smtp/smtp_proto.c.new 2006-12-04 22:33:35.943911483 +0100 @@ -755,8 +755,11 @@ #ifdef USE_SASL_AUTH if (var_smtp_sasl_enable && (state->features & SMTP_FEATURE_AUTH) - && state->sasl_passwd) - vstring_strcat(next_command, " AUTH=<>"); + && state->sasl_passwd) { + // Patch MF 4/12/2006 Authenticate sender (for Tele2...) + QUOTE_ADDRESS(state->scratch, request->sender); + vstring_sprintf_append(next_command, " AUTH=<%s>", vstring_str(state->scratch)); + } #endif next_state = SMTP_STATE_RCPT; break; This works BUT only for a single user since the postfix version in sarge (2.1.5) doesn't implement the smtp_sender_dependent_authentication option and my ISP actually wants the correct password for each email address (not just a single one for all addresses associated with the account. I've tried similarly patching the etch version of postfix - I can build the package but it won't install due to an unsatisified dependency on lsb_base (> 3.0.6) So does anyone have any better ideas of how to make this work? Regards, Martin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Odd Gnome behavior
On Tue, 2006-12-05 at 22:35 +, Liam O'Toole wrote: > On Tue, 05 Dec 2006 13:41:54 -0800 > Freddy Freeloader <[EMAIL PROTECTED]> wrote: > > > Hi All, > > > > I have run across an oddity in Gnome's behavior when running admin > > tools from the gui. > > > > If I run any of the tools found in the Desktop -> Administration > > menu, explicitly from that menu, Gnome asks me for the root > > password. I enter the root password and it tells me I entered an > > invalid password. However, if I run any of those same admin tools > > from the Applications -> Debian -> Apps -> System menu Gnome accepts > > the root password and they run just fine. > > > > Does anyone know what is going on with this? I do the vast majority > > of my work from the bash prompt, but on occasion I will want to just > > look at a setting and will choose to do that from the gui tools. > > Although this problem is easily worked around I'm stumped as to why > > this is happening. > > > > BTW, this behavior started when I changed the behavior of sudo from > > the Debian default of not requiring a password to requiring one. > > I've since reversed that to see if that is responsible for the change > > in behavior in the gui, but it has made no difference whatsoever. > > > > Any clues as to where to look would be appreciated. > > > > > > Determine what commands are launched by the menu entries. You can do > this by right-clicking on a menu entry and choosing "Add this launcher > to desktop". You then right-click on the icon thus created, choose > "Properties", then "Launcher" to determine the command. You should then > be able to account for the observed behaviour. > > You can also discover launch commands by searching through the files in > the /usr/share/applications and /usr/share/menu directories. > > -- > > Liam > > Thanks for your reply. I already knew about the menu entry stuff, and had taken a look at it. It all seems to be fine when compared to a computer that works normally. I didn't, however, know about the /usr/share/applications and /usr/share/menu ways of looking at things. Thanks. It's too bad I didn't find anything out of the ordinary there. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Odd Gnome behavior
On Tue, 2006-12-05 at 23:14 +0100, Sven Arvidsson wrote: > On Tue, 2006-12-05 at 13:41 -0800, Freddy Freeloader wrote: > > If I run any of the tools found in the Desktop -> Administration menu, > > explicitly from that menu, Gnome asks me for the root password. I enter > > the root password and it tells me I entered an invalid password. > > However, if I run any of those same admin tools from the Applications -> > > Debian -> Apps -> System menu Gnome accepts the root password and they > > run just fine. > > > > Does anyone know what is going on with this? I do the vast majority of > > my work from the bash prompt, but on occasion I will want to just look > > at a setting and will choose to do that from the gui tools. Although > > this problem is easily worked around I'm stumped as to why this is > > happening. > > > > BTW, this behavior started when I changed the behavior of sudo from the > > Debian default of not requiring a password to requiring one. I've since > > reversed that to see if that is responsible for the change in behavior > > in the gui, but it has made no difference whatsoever. > > > > Any clues as to where to look would be appreciated. > > Hi, > > g-s-t, when launched from the gnome menu, uses gksu for authorisation, > when launched from the debian menu, it uses something built in, i think. > > gksu can be configured via gconf-editor. > Thanks for answering, but I'd already tried this. The settings on my desktop, where the problem exists, are no different than the settings on laptop, where everything works normally. I also realize that I haven't explained the problem in great enough detail. What happens is if it's the first time I try during a session to use one of the admin tools it will first ask for the password to the keyring. After I give it the screen will clear for a fraction of a second, and the app will show up behind a second request for root's password. That request for a password is always returned as an invalid password. I have tried the keyring password, my password, and root's password. All are denied. If I configure gsku to use sudo-mode I will be asked for root's password twice, and the second time it asks for it the password will be rejected. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Problem installing packages with apt-get, aptitude and dselect
Andrew Sackville-West wrote: what version of apt-get? check out bug 401263. Interestingly, though the bug says it applies to 0.6.46.2, I am running that with no problems. (k7 arch). but there are a variety of possible solutions posted. you may have to use dpkg to manually install an older(or newer) apt until it gets resolved. hth A Thanks so much for your guidance! I'm running version 0.6.46.3 of apt, but thanks to your pointing out of the bug report I was able to fix the segfaulting by following the temporary solution given in the bug report. I'll most probably contribute to the bug report. Thanks again. -- Sincerely Jose Alburquerque -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: dedicated debian hosting
Tom Allison wrote: Can anyone direct me towards debian based dedicated server hosting companies? I might be interested in other levels of hosting, but I might need more root-level access than some configurations would permit. Many thanks to everyone who responded on and off the list. This will make a great starting point for me. This is great! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Odd Gnome behavior
On Tue, 05 Dec 2006 13:41:54 -0800 Freddy Freeloader <[EMAIL PROTECTED]> wrote: > Hi All, > > I have run across an oddity in Gnome's behavior when running admin > tools from the gui. > > If I run any of the tools found in the Desktop -> Administration > menu, explicitly from that menu, Gnome asks me for the root > password. I enter the root password and it tells me I entered an > invalid password. However, if I run any of those same admin tools > from the Applications -> Debian -> Apps -> System menu Gnome accepts > the root password and they run just fine. > > Does anyone know what is going on with this? I do the vast majority > of my work from the bash prompt, but on occasion I will want to just > look at a setting and will choose to do that from the gui tools. > Although this problem is easily worked around I'm stumped as to why > this is happening. > > BTW, this behavior started when I changed the behavior of sudo from > the Debian default of not requiring a password to requiring one. > I've since reversed that to see if that is responsible for the change > in behavior in the gui, but it has made no difference whatsoever. > > Any clues as to where to look would be appreciated. > > Determine what commands are launched by the menu entries. You can do this by right-clicking on a menu entry and choosing "Add this launcher to desktop". You then right-click on the icon thus created, choose "Properties", then "Launcher" to determine the command. You should then be able to account for the observed behaviour. You can also discover launch commands by searching through the files in the /usr/share/applications and /usr/share/menu directories. -- Liam -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: backup archive format saved to disk
On Tue, Dec 05, 2006 at 10:53:13AM +0100, Johannes Wiedersich wrote: > Douglas Tutty wrote: > > I'm going to be backing up to a portable ruggedized hard drive. > > Currently, my backups end up in tar.bz2 format. > > > > It would be nice if there was some redundancy in the data stream to > > handle blocks that go bad while the drive is in storage (e.g. archive). > > > > How is this handled on tape? Is it built-into the hardware > > compression? > > > > Do I need to put a file system on a disk partition if I'm only saving > > one archive file or can I just write the archive to the partition > > directly (and read it back) as if it was a scsi tape? > > > > Is there an archive or compression format that includes the ability to > > not only detect errors but to correct them? (e.g. store ECC data > > elsewhere in the file) If there was, and I could write it directly to > > the disk, then that would solve the blocks-failing-while-drive-stored > > issue. > > Now, to something completely different > If data integrity is your concern, than maybe a better solution than > compression is to copy all your data with rsync or another backup tool > that 'mirrors' your files instead of packing them all together in one > large file. If something goes wrong with this large file you might loose > the backup of all your files. If something goes wrong with the > transmission of one file in the rsync case you will only 'loose' the > backup of that one file and just restart the rsync command. > > Well, at least I much prefer to spend a bit more on storage and have all > my files copied individually. It adds the benefit that it is > straightforward to verify the integrity of the backup via 'diff -r'. > > As far as redundancy is concerned I would prefer to use a second disk > (and while you are at it store it in a different location, miles away > from the other). I have one backup at home and another one at my > mother's house, adding several layers of security to my data. > > Johannes > Thanks Johannes, Yes I use JFS for my file systems. I have raid1 on my main drives. I will have one portable drive at home, so several layers of backup here. The issue is off-site backup and that's where the disk in the bank comes in. The problem is that a journal on a hard disk only protects the filesystem from an inconsistant state due to power failure. It does nothing to protect the data if it was written correctly 5 years ago and never mounted since. If a block or two goes bad then that piece of data is lost. It could make the filesystem unmountable. I haven't been able to find a filesystem that provides redundancy that is free. The companies that pioneered disk-based virtual tape serves have their own (e.g. Veritas). This is why I'm looking at archive formats. The idea is that a format with built-in error-correcting would scatter the redundancy around the disk so that if a few blocks are bad, the data can still be retreived. Even raid1 doesn't accomplish this. With raid1 and two disks, if both disks have bad blocks appear, even if they are on different spots on each drive, as far as I can tell raid1 can't create a virtual pristine partition out of several damaged ones. Searching aptitude, there seem to be a few packages that address this issue obliquely (given two corrupted archives, can create a single pristine archive) but need two complete archive sets. I have to look at the par spec. Basically, I want to do for my archives what ECC does for memory. With ECC memory, for every 8 bits, there's one extra bit of storage. It can fix single-bit errors. If I'm remembering my math right, ECC adds 15% to the size of an archive __prior_to_compression__. Its impossible to do with less than 1:1 (100%) on compressed data. Its therefore best done from __within__ the compression algorithm. Take a block of data from the input stream, make the ECC data, compress the block of data, append the ECC, and spit this to the output stream and write the ECC data to an ECC stream. At the end of the input stream, take the ECC stream, make ECC data for that, compress the ECC stream, append the ECC for that, spit this to the output stream. If par doesn't do what I need and I can't find an alternative, I'll just write my own, modeled first in python, then done in Fortran77 for speed. If I go to all this trouble, I'd probably throw in AES for good measure. It would make a fun project but I hate reinventing perfectly good wheels. Then again, I know people who jump out of perfectly good airplanes. Go figure. Doug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: evolution vs firebird (or mozilla calendar)
On 12/1/06, H.S. <[EMAIL PROTECTED]> wrote: I have been trying out evolution for a few months now, mainly as task manager or calendar application (appointments, schedules, etc.). However, it appears that it is not possible to keep two location in sync as far as the Evolution calendar goes (home (Debian Etch) and university (Ubuntu)). I am now thinking of trying out mozilla calendars (firebird?). I guess that it has a calendar export feature, which I haven't been able to find in evolution. Firebird is a (non-Mozilla) database. Sunbird is the Mozilla calendar. That being said, I'm not sure how easy it is to sync up. If you use the calendar extension ("Lightning" is, I believe, the new name) for Thunderbird/Icedove (if you're using that as your mail client), there's SyncKolab, which stores your calendar entries as IMAP messages (if you're using IMAP). That places a lot of assumptions on your system, and I don't recall if it does updates particularly gracefully. I know I tried that approach for a little while, and at the time SyncKolab was sufficiently flaky that it drove me to Google Calendar, with which I've been fairly happy. The other function of SyncKolab, synchronizing address books, is still something I lack. (Also, I do not want to have a calendar server running anywhere at all.) Does Google count? If you want to get really wacky, keep your .ics file in CVS, updated remotely through ssh. I don't know if the calendar-refresh issue gets any easier, though. -- Michael A. Marsh http://www.umiacs.umd.edu/~mmarsh http://mamarsh.blogspot.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Can't get etch rc1 kppp or ndiswrapper wireless to connect to the net.
Hi, kppp won't load as user but will as root, even so won't connect. Ndiswrapper is loaded, states it is connected to lan but will not connect to net. Anyone have any ideas? It is driving me crazy. A few weeks ago etch was working on the net. Ndiswrapper fine, kppp worked in root ethernet connection then and now works. cheers -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Odd Gnome behavior
On Tue, 2006-12-05 at 13:41 -0800, Freddy Freeloader wrote: > If I run any of the tools found in the Desktop -> Administration menu, > explicitly from that menu, Gnome asks me for the root password. I enter > the root password and it tells me I entered an invalid password. > However, if I run any of those same admin tools from the Applications -> > Debian -> Apps -> System menu Gnome accepts the root password and they > run just fine. > > Does anyone know what is going on with this? I do the vast majority of > my work from the bash prompt, but on occasion I will want to just look > at a setting and will choose to do that from the gui tools. Although > this problem is easily worked around I'm stumped as to why this is > happening. > > BTW, this behavior started when I changed the behavior of sudo from the > Debian default of not requiring a password to requiring one. I've since > reversed that to see if that is responsible for the change in behavior > in the gui, but it has made no difference whatsoever. > > Any clues as to where to look would be appreciated. Hi, g-s-t, when launched from the gnome menu, uses gksu for authorisation, when launched from the debian menu, it uses something built in, i think. gksu can be configured via gconf-editor. -- Cheers, Sven Arvidsson http://www.whiz.se PGP Key ID 760BDD22 signature.asc Description: This is a digitally signed message part