Re: apt-get 'search'?

2004-10-02 Thread Brett Carrington
man apt-cache


On Sat, 2 Oct 2004 10:26:01 -0400, Tony Uceda Velez
<[EMAIL PROTECTED]> wrote:
> Anyone know what is comparable to Gentoo's 'emerge search' in apt-get?  Man
> pages didn't reflect something similar?  Want to search for list of packages
> that start with a certain string.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: limiting resources

2004-09-20 Thread Brett Carrington
On Mon, 20 Sep 2004 16:57:21 +0200, martin f krafft <[EMAIL PROTECTED]> wrote:
> I operate a shell server with about 200 users. Spamassassin powers
> the machine, and users use sa-learn to teach it about spam and ham.
> The machine receives about 5-20 mails per second and the hardware
> keeps the load between 0.15 and 0.30.
> 
> Every now and then, coincidence will have it that 10 or 20 users
> invoke spamassassin at the same time. Spamassassin is a resource
> hog and that will cause the machine to basically become unusable,
> with the load going to 30 and higher. It usually takes it about half
> an hour to get back to a usable state (after all backup MX delivered
> the queued mail, causing it to receive up to 30 mails per second.
> 
> Obviously, I have put limits on local deliveries so that postfix
> itself does not ever screw up the machine. Now I need to limit the
> local users. Other than PAM limits, which seems to only work on
> number of processes, is there a way to dynamically limit the load
> a shell-user can cause? I am talking load-balancing ... give each
> user 100% unless others want slices too.
> 
> Do you know of a solution I could employ?
I had a similar problem. My solution was to disallow the use of
spamassassin and force users to use spamc. This requires your server
to run spamd as well. The spamassassin docs have info on the benefits
and risks of this method.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: System Monitor

2004-09-13 Thread Brett Carrington
On Mon, 13 Sep 2004 18:31:40 -0500, John Fleming <[EMAIL PROTECTED]> wrote:
> What easy (newbie) way could I get a report of CPU and memory use averaged
> over 24 hrs?  I've had some issues with SpamAssassin using a lot of
> available memory recently (probably too many network tests and rulesets).  I
> can watch it using top but would like a 24 hr average report.  An emailed
> report would be super.  Thanks - John
> 
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 

Try cacti.
cacti - Frontend to rrdtool for monitoring systems and services

apt-get install cacti


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: CUPS printing over router network?

2004-09-07 Thread Brett Carrington
On Tue, 7 Sep 2004 13:44:49 -0700 (PDT), [EMAIL PROTECTED]
<[EMAIL PROTECTED]> wrote:
> My roommate and I are on a Linksys router and I have a HP DeskJet working
> great with CUPS. My question is can my roommate (running OS X) print on my
> printer through the network or connecting to my CUPS port or something
> that doesn't involve connecting my printer to his box? Thanks in advance.
> 
> -Garrett
> 
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 
Yes. In your CUPS configuration make sure his IP is allowed access.
Also try enabling Browsing on the server and the Mac may autodetect
your CUPS server. (Read the manual for more info on these topics.)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: [OT] Yahoo's Antispam proposal

2004-05-20 Thread Brett Carrington
On Thu, May 20, 2004 at 05:25:24PM -0400, Bojan Baros wrote:
> > Bojan wrote:
> >>
> >>  0.5 FORGED_YAHOO_RCVD  'From' yahoo.com does not match 'Received'
> >>  headers
> >>  0.8 PRIORITY_NO_NAME   Message has priority setting, but no
> >>  X-Mailer
> >>  4.3 CONFIRMED_FORGED   Received headers are forged
> >>
> >
> > Ahh the irony. You forge your From address and that's exactly the kind
> > of message Yahoo! propose to drop.
> >
> 
> Lol, yeah.  My side project, creating email my own way.
> 
> BTW, I am not saying that this is the future, that it's good, yada yada
> yada, I just wanted other people's opinions.  And obviously, this exposes
> a flaw with this approach.  If I want to use a qualified email address, do
> I have to send it through that specific server?  Or through my own?
> 
> And about the idea that Bill Gates floated out there, about solving a
> computer puzzle that would require 10 seconds or so of CPU time to send
> the email...  Spammers already use distributed computing (some computers
> are doing it willingly, others not quite so) to send out spam.  This would
> not create a huge problem if you have plenty of CPU cycles to spare.

Gates' idea is being put to use every day on this very mailing list.
Notice those GnuPG signatures lots of us seem to use? Try assigning higher
"non-spam" scores to GnuPG signed messages.

I'm not suggesting Grandma and everyone else use crypto, but just
pointing out there is no need for a fancy vendor solution. It already
exists.


pgpeg3IxNIILs.pgp
Description: PGP signature


Re: OT: establish private network (no wires)

2004-02-29 Thread Brett Carrington
On Sun, Feb 29, 2004 at 06:54:54PM +0100, Karsten Bolding wrote:
> Hello 
> 
> I'm seeking advice on a technical matter. I want to establish a
> private (wireless) network in an area of say 5x5 km2. In this area there
> are a number of vehicles moving around and each of the vehicles should
> constantly - every second - be updated about the position of the other
> vehicles (obtained via GPS). In addition to the position other types of
> data might need to be exchanged/distributed as well. 
> Each of the vehicles will have a laptop onboard which will be used for
> processing the information obtained from the other vehicles.
> Since it is not possible to cover the area with normal wireless access points 
> I'm seeking another carrier of the signal. GSM/GPRS is not really an 
> option either due to the cost of having around 25 phones running 24/7. 
> Does anybody know of another technical solution which I can use to create 
> such a network?
Regular "Wireless access points" (as in 802.11x) can _absolutely_ cover
this distance. All you need is a good antenna and powerful transmitter.
In America you need a license to transmit as very high powers so you
should check with your local govt. I bet if you looked around your neck
of the woods for amateur radio operators they'd be glad to explain how
to do this. There are other solutions too, like short wave radio or the
like. Using regular commodity WiFi however will be easiest to integrate
with laptops though.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Not sure whatn I'm looking for (WWW related)

2004-02-18 Thread Brett Carrington
On Thu, Feb 19, 2004 at 03:21:58AM +0100, Richard Lyons wrote:
> On Thursday 19 February 2004 02:13, Brett Carrington wrote:
> > On Wed, Feb 18, 2004 at 05:10:18PM -0800, Steve Lamb wrote:
> > > I run a small leased machine for my own web/mail services as well as
> > > anything else that strikes my fancy.  I do provide a few mail accounts to
> > > friends and family and recently have wanted to provide a simple page for
> > > them to go to where I could give basic news on what's happening with the
> > > machine.
> >
> > [snip]
> > http://www.noahgrey.com/greysoft/
> 
> Oh, that looks neat.  It's giving me 404 error on the download page, but i 
> assume that's temporary.
It uses a pretty stupid download page:
http://www.greymatterforums.com/download/gm1.3.tar.gz


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Not sure whatn I'm looking for (WWW related)

2004-02-18 Thread Brett Carrington
On Wed, Feb 18, 2004 at 05:10:18PM -0800, Steve Lamb wrote:
> I run a small leased machine for my own web/mail services as well as 
> anything else that strikes my fancy.  I do provide a few mail accounts to 
> friends and family and recently have wanted to provide a simple page for 
> them to go to where I could give basic news on what's happening with the 
> machine.
[snip]
http://www.noahgrey.com/greysoft/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: nslookup & bind problem on internal network

2004-02-18 Thread Brett Carrington
On Thu, Feb 19, 2004 at 12:29:56AM +, Mark C wrote:
> On Thu, 2004-02-19 at 00:11, CW Harris wrote:
> 
> > As a guess-- did you define your internal network to be funkypenguin.net
> > and authoritative for the domain?  Thus there is no DNS path out of your
> > LAN to the real authority for funkypenguin.net?
> > 
> > Give us more info on how you have your domain setup.
> 
> Yes, I have set up the internal  name server to be authoritative for the
> funkypenguin.net domain, I'm forward requests that I'm not authoritative
> for out to my ISP's nameservers and the name server is only serving the
> internal systems.
> 
> what further info do you require?
Maybe something like this will help you:

apt-get install dnstracer
dnstracer -os . funkypenguin.net


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: AW: Bonjour

2004-02-18 Thread Brett Carrington
On Wed, Feb 18, 2004 at 10:01:03AM -0800, Paul Johnson wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On Wed, Feb 18, 2004 at 08:11:13AM -0800, Troy Truchon wrote:
> > Heck america isn't even english only, despite what many claim. Sadly I never
> > learned quebecois as my father never picked it up.
> 
> Mostly because they dropped English literacy for some bizarre reason
> from being an immigration requirement.  This isn't a bad idea,
> however...you just can't make it without English in the US.
Living in Miami, Florida I know for a fact you can get by here with out
speaking a word of English.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: dhcpd configuration

2004-02-16 Thread Brett Carrington
On Mon, Feb 16, 2004 at 08:38:53PM -0500, Adam Aube wrote:
> On Monday 16 February 2004 07:57 pm, Peter Quackenbush wrote:
> > First, I'm not sure if this is the correct mailing list.
> 
> Since your question is a general DHCP client question, this list is the 
> right place.
> 
> > Is there some configuration I can give to the dhcp clients to tell them
> > which dhcp server to use?
> 
> From the man page for dhclient.conf:
> 
>   reject ip-address;
> 
>   The reject statement causes the DHCP client to reject offers from
>   servers who use the specified address as a server identifier. This
>   can be used to avoid being configured by rogue or misconfigured dhcp
>   servers, although it should be a last resort - better to track down the
>   bad DHCP server and fix it.
> 
The problem is that it requires configuration on EVERY SINGLE cluster
machine. It's not really optimal if you want a real netboot kind of
cluster. The OP is trying to do something DHCP wasn't designed to do.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Spamassassin backport/log flood

2004-02-16 Thread Brett Carrington
I have spamassassin 2.63-0.backports.org.1 installed and it does it's
job fine, but the follow floods the log:

[EMAIL PROTECTED] tail /var/log/syslog
Feb 16 17:28:33 aion spamd[4885]: Failed to run FROM_AND_TO_SAME
SpamAssassin test, skipping: ^I(Can't locate object method
"check_for_from_to_equivalence" via package
"Mail::SpamAssassin::PerMsgStatus" (perhaps you forgot to load
"Mail::SpamAssassin::PerMsgStatus"?) at
/usr/share/perl5/Mail/SpamAssassin/PerMsgStatus.pm line 2251. ) 
Feb 16 17:28:33 aion spamd[4885]: Failed to run SUBJ_MISSING
SpamAssassin test, skipping: ^I(Can't locate object method
"subject_missing" via package "Mail::SpamAssassin::PerMsgStatus"
(perhaps you forgot to load "Mail::SpamAssassin::PerMsgStatus"?) at
/usr/share/perl5/Mail/SpamAssassin/PerMsgStatus.pm line 2251. ) 
Feb 16 17:28:33 aion spamd[4885]: Failed to run DIFFERENT_REPLY_TO
SpamAssassin test, skipping: ^I(Can't locate object method
"check_for_spam_reply_to" via package "Mail::SpamAssassin::PerMsgStatus"
(perhaps you forgot to load "Mail::SpamAssassin::PerMsgStatus"?) at
/usr/share/perl5/Mail/SpamAssassin/PerMsgStatus.pm line 2251. ) 

There are actually plenty of other similar failure for just about every
test type and I assume per message processed. The package actually still
manages to mark mail as spam or not and does it's job perfectly: it's
just filling up my logs to the point of uselessness. (I also figure that
getting these tests to -work- would be good.

Any ideas?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: requirements for building a kernel module

2004-02-11 Thread Brett Carrington
On Thu, Feb 12, 2004 at 05:00:31AM +0200, Micha Feigin wrote:
> I was wondering what would be the minimal requirements
> (packages/settings) in order to build a kernel module that is external
> to the kernel source tree using make-kpkg --added-modules for a stock
> debian kernel.
apt-get build-dep 

That'll install any build dependancies required to build some package
by itself (which though doesn't solve your entire problem might help
you!)


signature.asc
Description: Digital signature


Re: how to tell if anything evil lurking in an .xls file?

2004-02-11 Thread Brett Carrington
On Thu, Feb 12, 2004 at 02:52:53AM +0800, Dan Jacobson wrote:
> All along there is no tool to view all of what's inside an .xls file
> in cleartext or whatever.  All I can use is less(1). 
Maybe the output of 'strings' would be useful too? I've not worked with
xls files before but it may help if 'less' is helping.


signature.asc
Description: Digital signature


Re: upgrade woody -> sarge not working

2004-02-09 Thread Brett Carrington
On Mon, Feb 09, 2004 at 01:37:09PM -0800, Roger Chrisman wrote:
> I use 'testing' instead of 'sarge' in /etc/sources.list.
> 
> I understand 'testing' == 'sarge', but are they also interchangablely in 
> sources.list in that way? Produce identical results?
This is what I understand from it:
When sarge is 'stable' it will be updated to the 'stable' tag.

So, if you have 'testing' in your sources all your packages will
be upgraded to the _current_ testing (which I guess would be stuff
from unstable moved to testing?)

If you have 'sarge' in your sources then when sarge goes stable
you're packages will not be upgraded to the 'new' testing.

Note that 'unstable' is always called 'sid' and sid is never moved
anywhere.


signature.asc
Description: Digital signature


Re: Securing it properly

2004-02-07 Thread Brett Carrington
On Sat, Feb 07, 2004 at 10:18:42PM +0100, Henrik Johansson wrote:
> 
> On Sat, Feb 07, 2004 at 09:48:56PM +0100, Henrik Johansson wrote:
> I see! Thx!
> 
> I just do: 
>   apt-get remove apache
>   apt-get install apache2
> 
> Right?
> 
> Is the apt-get command really as good as
> the doc implies?
> With dependencies i mean.
> This was a bugger on rh...
> 
  Yes it is that good. You may want to try using the program aptitude
as well. (apt-get install aptitude) and then run either 'aptitude'
alone or use it like apt-get (aptitude install apache2).
> A final comment:
> The install procedure is not half as hard as everyone
> said! Refreshing actually!
It's refreshing because it's The Right Way(tm). ;)


signature.asc
Description: Digital signature


Re: Securing it properly

2004-02-07 Thread Brett Carrington
On Sat, Feb 07, 2004 at 09:48:56PM +0100, Henrik Johansson wrote:
> Why is the standard webserver Apache 1.3
> and not 2.0? I thought it was stable.
If you want to run 2.0 use the package 'apache2'. Because of the
many changes between the 1.3 tree and 2.0 of apache, Debian has
put apache2 in it's own package. This is good because 1.3 is still
being maintained and it doesn't require 1.3 users to upgrade to the
different paradigm of 2.0.


signature.asc
Description: Digital signature


Re: 2.6 Kernel, Strange System Lock (not kernel panic)

2004-02-05 Thread Brett Carrington
On Thu, Feb 05, 2004 at 09:54:15PM -0800, Kenward Vaughan wrote:
> > Rebooting fixes it. I've only had it do this after idle time (but I'm
> > probably always running spamassassin on incoming mail.)
> > 
> > I'm running testing with no backports from unstable or anything like
> > that.
> 
> Power management?  APMD or APIC?
Neither.


signature.asc
Description: Digital signature


Re: 2.6 Kernel, Strange System Lock (not kernel panic)

2004-02-05 Thread Brett Carrington
On Thu, Feb 05, 2004 at 10:45:31PM +0200, Micha Feigin wrote:
> I am not sure if its going to catch anything but you may try running
> top in a visible window when you leave your computer.
> If you computer locks up you will get a list of the active processes
> (probably not all since there will be more then fits on screen). This
> is true as long as the monitor is on (no screen saver).
> Its not very pretty but may give some hints.
> Also, are there any logs in /var/log/(syslog|kern.log|messages) that
> look suspicious?
Nothing useful at all in the logs. I'll try catching it with top.


signature.asc
Description: Digital signature


Re: 2.6 Kernel, Strange System Lock (not kernel panic)

2004-02-05 Thread Brett Carrington
On Thu, Feb 05, 2004 at 06:02:51PM +0200, Micha Feigin wrote:
> On Thu, Feb 05, 2004 at 07:07:11AM -0500, Brett Carrington wrote:
> > A few days after I upgraded to the 2.6 tree (using debian's precompiled
> > packages) something very bad happened.
> > 
> > I'm not very knowledgable about this kind of problem, but could
> > it be memory or disk problems?
> > 
> 
> Does rebooting solve the problem, and does it return if you leave the
> computer standing again, is it consistent in how long it takes and does
> it matter if you are working (does it only happen when the computer is
> idle or only when it is running)?
> Did you upgrade anything other then the kernel?
> Do you still have a 2.4 kernel installed and does it run ok?
> I am assuming you are using unstable or testing if you upgraded to 2.6.
Rebooting fixes it. I've only had it do this after idle time (but I'm
probably always running spamassassin on incoming mail.)

I'm running testing with no backports from unstable or anything like
that.


signature.asc
Description: Digital signature


2.6 Kernel, Strange System Lock (not kernel panic)

2004-02-05 Thread Brett Carrington
A few days after I upgraded to the 2.6 tree (using debian's precompiled
packages) something very bad happened.

I left my box idle for a while, came back, and nothing would work.
Well, kind of:


# any command
Segmentation fault.
# any other command
Segementation fault.

I had mutt and screen running too and they each crashed and I believe
screen complained it couldn't write to the utmp file.

I'm not very knowledgable about this kind of problem, but could
it be memory or disk problems?

Thanks in advance.


signature.asc
Description: Digital signature


Re: A letter for Mr. Darl McBride - personal use

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 07:49:32PM -0600, John Hasler wrote:
> Brett Carrington writes:
> > So is that what might allow me, for example, to use Microsoft software I
> > purchased without accepting the EULA?
> 
> If you can get Microsoft to sell you a copy without requiring as part of
> the purchase agreement acceptance of the EULA.  The EULA is a contract.  It
> says that in return for a copy of the subject work you agree to abide by
> the terms of the EULA, which forbid you to do some things that you would be
> allowed to do in its absence.  The GPL, in contrast, only grants you rights
> that you would not have in its absence.
So why am I giving Joe Bob's Computer Depot money for a box with disks
in it? The box doesn't say anything about my purchase being part of
a contract does it?


signature.asc
Description: Digital signature


Re: A letter for Mr. Darl McBride - personal use

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 07:09:37PM -0600, John Hasler wrote:
> No license is required to use a work.  Legal possession of a copy suffices.
> Copyright limits only the making of copies and the creation of derivatives.
> The right to make temporary copies incidental to normal use as in copying a
> program into memory is implicit.
So is that what might allow me, for example, to use Microsoft software
I purchased without accepting the EULA?


signature.asc
Description: Digital signature


Re: A letter for Mr. Darl McBride - personal use

2004-02-01 Thread Brett Carrington
On Mon, Feb 02, 2004 at 02:04:22AM +0100, Martin Dickopp wrote:
> On Sun, Feb 01, 2004 at 07:33:23PM -0500, Brett Carrington wrote:
> > The GPL should be accepted in any case though,
> 
> No, it states that the user is not required to accept it in Section 5:
> "You are not required to accept this License, since you have not signed
> it."
> 
[snip]
> Could you please quote the part of the GPL which grants usage rights
> according to your understanding?
I'll shut up now! If the GPL doesn't grant usage rights, how can
a user be sure they are entitled to this? (N.B. I said it 'should be'
accepted not that 'you are required.')


signature.asc
Description: Digital signature


Re: A letter for Mr. Darl McBride - personal use

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 06:27:59PM -0600, John Hasler wrote:
> Brett Carrington writes:
> > Music artists expect royalties programmers expect wages...
> 
> These people are creating their works as part of some sort of bargain.
> 
> > ...or in GPL'd code, license compliance...
> 
> I release my software under the GPL.  However, users do not need to agree
> to the GPL because under US copyright law legal possession of a copy gives
> them all the rights they need.
> 
> > I don't think the majority of leaches are in good karma-standing w.r.t
> > this.
> 
> I inferred that you were calling those who use Free Software without
> "giving back" leaches.  That is what I responded to.
Sorry, I misunderstood. The GPL should be accepted in any case though,
otherwise a user can not be sure he has the right to use a copyrighted
work. This assumes you don't have another free license they can accept.

It's my understanding that you still have to give explicit permission
to let someone use your copyrighted work. The GPL allows this and more.


signature.asc
Description: Digital signature


Re: A letter for Mr. Darl McBride - personal use

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 05:45:48PM -0600, John Hasler wrote:
> I wrote:
> > You are not a leach.  A leach takes something away from the host: when
> > the leach is done the host has less blood then he had before.  When you
> > make a copy of my software you gain but I lose nothing.
> 
> Brett Carrington writes:
> > Except a chance to be paid back for you hard work, in either money or
> > source code improvements.
> 
> "Paid back" implies a bargain: that he told me "If you write this software
> I will pay you back with x."  No such bargain existed.  I wrote the
> software for my own reasons.  Now that it exists it costs me nothing to
> share it with him.
> 
> > That's what you lose.
> 
> After he copies my software I possess everything I had before he copied
> it.  Thus I lose nothing.  Absence of gain != loss.
Sorry if I missed a part of the thread then. My point is that a huge
portion of things "leached" do have an expectation receiving "pay back."
Music artists expect royalties, programmers expect wages (or in GPL'd
code, license compliance), and so forth. I don't think the majority
of leaches are in good karma-standing w.r.t this.


signature.asc
Description: Digital signature


Re: A letter for Mr. Darl McBride - personal use

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 04:42:25PM -0600, John Hasler wrote:
> [EMAIL PROTECTED] wrote:
> > I admit it I am a leach, I take stuff off Usenet for my personal gain
> > once in a while I post something of value, but overall I take more than I
> > give.
> 
> You are not a leach.  A leach takes something away from the host: when the
> leach is done the host has less blood then he had before.  When you make a
> copy of my software you gain but I lose nothing.
Except a chance to be paid back for you hard work, in either money or
source code improvements. That's what you lose.


signature.asc
Description: Digital signature


Re: stable or testing?

2004-02-01 Thread Brett Carrington
On Mon, Feb 02, 2004 at 11:37:28AM +1300, Simon Buchanan wrote:
> Being a post-redhat user, i have downloaded the 'testing' version of debian,
> installed on my test bench, then on the in-house development server and am
> VERY impressed! So the next step is to go after our 4 live servers one by
> one My question is:
> 
> Should i be using stable or testing for the live servers? Be aware i am only
> just getting to grips with 'the debian way'... I guessing 'stable'?
Stable stable stable. Stable is the only release that is 100% sure to
get timely security updates. This is the main reason why you should
pick stable. I'm sure someone else can fill in the other ones.


signature.asc
Description: Digital signature


Re: viewing jpg files on text terminal

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 01:24:12PM -0500, Bijan Soleymani wrote:
> Brett Carrington <[EMAIL PROTECTED]> writes:
> 
> > On Sun, Feb 01, 2004 at 11:21:34AM -0600, Bill Kalebaugh wrote:
> >> [snip lots of stuff about text consoles and jpegs] 
> > So this got me thinking. Is there anything to display jpegs on a
> > terminal as ASCII art? I think aalib can do this? The package
> > `hasciicam` does something similar but I don't know if it can
> > just simply display a jpeg to the console as ASCII art.
> > Any ideas?
> 
> Yes, apt-cache show aview:
> Description: A high quality ASCII art image viewer and video player
>  aview is a high quality ASCII art image viewer and video player. It is
>  especially useful with a text-based browser such as lynx, links or w3m.
>  .
>  It supports the pnm, pgm, pbm and ppm image formats, as well as
>  the FLI and FLC video formats. It also supports output via stdio,
>  (n)curses and slang and even has support for gpm.
It doesn't support JPEG. What package would have something like
jpg2p[ngbp]m?


signature.asc
Description: Digital signature


Re: viewing jpg files on text terminal

2004-02-01 Thread Brett Carrington
On Sun, Feb 01, 2004 at 11:21:34AM -0600, Bill Kalebaugh wrote:
> [snip lots of stuff about text consoles and jpegs] 
So this got me thinking. Is there anything to display jpegs on a
terminal as ASCII art? I think aalib can do this? The package
`hasciicam` does something similar but I don't know if it can
just simply display a jpeg to the console as ASCII art.
Any ideas?


signature.asc
Description: Digital signature


Re: Apache 2

2004-01-31 Thread Brett Carrington
On Sat, Jan 31, 2004 at 10:33:45PM -0500, Timothy M. Spear wrote:
> Hi,
>   I am getting ready to rebuild a server with debian. Has anyone ported
> Apache 2.0 to Sarge and posted the APT files?
Apache 2 is in the package apache2, versions less than 2 stay in the old
apache package.


signature.asc
Description: Digital signature


Re: Email client programs

2004-01-31 Thread Brett Carrington
On Fri, Jan 30, 2004 at 09:00:00PM -0800, Day Brown wrote:
> Perhaps I have not expressed myself well, but the point is, that it is
> more difficult to use email now than it used to be; given the reputation
> of the computer business for 'progress', that's odd.
So are you looking for a solution? Because their are plenty. Mailers
like mutt and a perl script with procmail (or similar) can do all of the
image-viewing and quoting you want. I get the quoted text color changed too.

No, we don't have all the fancy ANSI terminal colors. HTML is also not
the way to get them. But e-mail is a way to communicate information 
(at least for me) and not dazzle me with terminal escape codes.


signature.asc
Description: Digital signature


Re: dynamic IP questions?

2004-01-19 Thread Brett Carrington
On Mon, Jan 19, 2004 at 10:24:33PM -0500, Vikki Roemer wrote:
> I recommend ipcheck.py (apt-get install ipcheck) to update the addy.
> However, don't ask me how to *automate* the update script, because I'm still
> trying to figure that out myself.
You could use a cronjob to update. I recommend using 'ddclient' though,
available in apt.

Take a look at the services HammerNode  provides too. Same
thing as dyndns but IMHO 'more free.'


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-19 Thread Brett Carrington
On Mon, Jan 19, 2004 at 06:37:18PM -0800, Paul Johnson wrote:
> On Mon, Jan 19, 2004 at 09:34:24PM -0500, Brett Carrington wrote:
> > On Mon, Jan 19, 2004 at 06:31:04PM -0800, Paul Johnson wrote:
> > > What difference does it make?  Quality mail providers give you
> > > IMAP4-SSL and POP3-SSL anyway...
> > > 
> > Any major ISP's do this? My RBOC doesn't for DSL.
> 
> Not that I know of.  But who said you had to get everything from one
> person?  Hey, you use Debian:  Why not just serve it yourself?
I do! But when you need a message that
absolutely-positively-can't-get-lost because of routing errors, poor DSL
connects, no backup MX, or power outage, it helps to have someone else
responsible.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-19 Thread Brett Carrington
On Mon, Jan 19, 2004 at 06:31:04PM -0800, Paul Johnson wrote:
> What difference does it make?  Quality mail providers give you
> IMAP4-SSL and POP3-SSL anyway...
> 
> 
Any major ISP's do this? My RBOC doesn't for DSL.

> You're almost 10 years behind on your knowledge about cable
> networks, it seems.
There is truth to that.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-19 Thread Brett Carrington
On Mon, Jan 19, 2004 at 05:23:07PM -0800, Paul Johnson wrote:
> On Mon, Jan 19, 2004 at 06:53:04PM -0500, Brett Carrington wrote:
> > But can you tell if encryption is on?
> 
> What difference does it make?  It's still going to hit a fairly public
> network not protected by the hardware after the very first hop anyway.
True. But plain-text POP3 passwords (or heck, your PPPoE login) are more
likely to be sniffed in that 'local loop' than anywhere else. Assessing
risk is a factor in who to trust.

Besides, I've been arguing against any of cable's shared bandwidth
vulnerabilities and their new security is only a mild curiosity. I
wouldn't use such a connection.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-19 Thread Brett Carrington
On Mon, Jan 19, 2004 at 05:39:49PM -0600, Aaron Hall wrote:
[snip]
> Of course, BPI only works (I believe) if the modem is DOCSIS 1.1
> compliant or better. Older modems won't be able to use it. In those
> cases, Cox falls back to ordinary unencrypted transmission.
> 
But can you tell if encryption is on? If that technology fails for a
moment (service enhancement/repairs!) you are unprotected. I think the
obscurity would be equivalent to a circuit-switched line (DSL) but there
really ought to be a move to encrypt-or-nothing. (And while IPsec et.
al. exist, find me one ISP that requires or even provides an end-point.)


signature.asc
Description: Digital signature


Re: Postfix

2004-01-18 Thread Brett Carrington
On Mon, Jan 19, 2004 at 02:00:31AM +0100, Bronislav Klu?ka wrote:
> Hi,
> I've got a problem with postfix. I vant to use virtual_mailbox_limit stuff
> but it can be only done by patching postfix (I've got 2.0.16), but I cannot
> patch it, cause I've installed it as debian package so there is no source
> code to patch. I've download source code for postfix, but I'm not able to
> `make` it (there is some libdb4.1-dev missing and it's not accessible using
> apt-get). So I want to ask if somebody has compiled postfix with VDA patch
> and can send it to me.
> 
Try using 'apt-get source postfix', patching the source download, and
then running apt-get again with --build. Can someone tell me if this is
the correct method?


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 06:35:02PM -0500, Antonio Rodriguez wrote:
> On Sun, Jan 18, 2004 at 02:05:02PM -0800, Nano Nano wrote:
> Another theoretical question: Is it possible to receive and decode in your 
> computer the tv channels that are coming through to your house? Or the
> cable modem allows only the frequency of over wich the internet works?
The cable modem is only going to give you the actual network data AFAIK
and modulate/demodulate it back and forth from digital to the regular
analog cable service. 

There are plenty of ways you can recieve and decode with a computer
though. Take a look around Google for TV Tuner cards and some of the
Linux TiVo-like setups.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 02:05:02PM -0800, Nano Nano wrote:
> On Sun, Jan 18, 2004 at 04:56:53PM -0500, Bijan Soleymani wrote:
> [snip]
> > 
> > Yes all the channels and the traffic are coming on the same wire. Each
> > channel is at a different frequency (kind of like for regular antenna
> > reception), and the tv picks out whichever channel you want.
> 
> Could a device in theory record every channel simultaneously?
> Could it in practice?

Yes, but it's probably not very cheap. You'd need a seperate tuner for
each channel. When you change the channel your TV just re-tunes to the
freq. of the station on the wire. To record every channel you'd need to
be tuned to every station at the same time and then you'd need to find a
way to record it


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 01:42:06PM -0800, Paul Johnson wrote:
> Probably just turned on switching on the headend, and giving everyone
> a virtual segment.
>
See Nano Nano's response which seems to make my argument moot then. But
I recall the cable system is like this:
   H  H  H H
   |  |  | |
Main   - <--- Shared Lines
--[_ <--- Shared Lines
Trunk  |  | | | 
   H  H H H

I assume the only 'head end', the [ in the diagram, could be off and on
for each of the smaller shared lines but that isn't going to stop those
few H's (houses) from seeing their lines.

If cable could really be turned off like this then "cable theft" would
disappear.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 01:26:29PM -0800, Paul Johnson wrote:
> On Sun, Jan 18, 2004 at 01:07:04PM -0800, Nano Nano wrote:
> > I don't know how it's done, but it's totally true: everything on your 
> > cable modem can be intercepted easily by people on your same subnet.
> 
> Not these days.  Cable companies got a bit more security conscious
> about 5 years ago.
But how? The lines are -still- shared, they didn't change the entire
infastructure. Is each user's cable connection now encrypted end-to-end?
I imagine any amount of secure encryption would really hurt people
trying to play bandwidth-heavy games. (Not in actual bandwidth but computational
time on what I assume are minimally powered cable modems.)


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 01:07:04PM -0800, Nano Nano wrote:
> On Sun, Jan 18, 2004 at 02:57:59PM -0600, Jeffrey L. Taylor wrote:
> [snip]
> > In anycase, it is pointless paranoia.  A much more plausible scenario
> > is a disgruntled employee at any of the computers between you and the
> > destination sniffing packets.  Or someone hacking those
> > computers/routers.
> 
> I don't know how it's done, but it's totally true: everything on your 
> cable modem can be intercepted easily by people on your same subnet.
>
I'd guess the cable modems are ignoring data not meant for you
specifically. The actual cable line still carries all data however and
it's just a simple matter of modulating/demodulating it.

I'm curious to know if you could ARP poision machines on your subnet and
perform attacks based on that.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 10:39:05AM -0600, Mac McCaskie wrote:
> For security, a $40 - $60 router/hub/firewall works wonders and I have 
> no complaints with mine.
> 
>
That router/hub/firewall is giving you no data security. Since you share
your cable line ANYONE can see ANY DATA (including unencrypted credit
card numbers or passwords) you send over your cable connection.

The only solution to this is a VPN or other end-to-end encryption from
your house/termination to the provider.

No amount of firewalling or NAT-ing will protect plain-text data. No
amount.


signature.asc
Description: Digital signature


Re: Recommended ISP's

2004-01-18 Thread Brett Carrington
On Sun, Jan 18, 2004 at 10:47:33AM -0500, John Kerr Anderson wrote:
> We've been using SBC Yahoo Dsl, but were so outraged at their arrogance,
> poor quality service, and lack of support that we decided to cancel.  Can
> anyone recommend an ISP that is actually good?
> 
> We're thinking of switching to charter cable internet, but rumour is
> they're partnered with Micro$oft.  Any recommendations???

I wouldn't recommend cable for the pure fact that you are sharing the
cable line with everyone on your block. Kiddie MP3 trader guys will sap
your bandwidth but malicious hacker #434 can sniff anything on that
line.

As for DSL, you (unfortunately) should stick with the local phone
monopoly. They usually suck but they are the only company who can repair
lines and actual deal with -real- issues. A reseller of DSL can only
report actual problems to the local phone RBOC/monopoly and if the
problemn isn't effecting their actual customers they might just take
their sweet time.

Barring everything else, if you'd like a Linux/server-friendly and
reasonable DSL provider check out .


signature.asc
Description: Digital signature


Re: Documentation and Usability

2004-01-17 Thread Brett Carrington
On Sat, Jan 17, 2004 at 08:37:27PM -0600, Mac McCaskie wrote:
> 
> The obvious solution to this quandry, would be to put the URL in the man 
> page if the page applied to that implementation.  Shouldn't that be easy 
> to do?  (but it does leave out those poor unfortunates that do not have 
> internet access for whatever reason, say power loss, stupid security 
> features, too broke, etc.  I love the Road Runner help desk when I can't 
> connect, they tell me to access the web site if I need help!)
> 
> 
> 
>

I don't doubt that Debian is used where there is -no- Internet access or
where Internet access is prohibited. Besides this, websites move, URLs
change and documentation doesn't.

Could you imagine a man page pointing you to a file on a gopher server?


signature.asc
Description: Digital signature


Re: gpg help

2004-01-17 Thread Brett Carrington
On Sat, Jan 17, 2004 at 01:42:55PM +0100, Ritesh Raj Sarraf wrote:
> hello all,
> 
> i recently formatted my os. i had created my public and private keys in gpg. 
> Before format, I backed up my $HOME/.gnupg directory. Now I need to setup 
> everything. How do I use my private key back ?
>

Assuming you backed up the entire .gnupg directory, you can just drop it
in to your new home directory as-is. If you had the private key
somewhere else though you are out of luck. You may want to consider
storing your private keys ASCII-armored on paper somewhere very, very safe.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: X program from cron

2004-01-15 Thread Brett Carrington
On Thu, Jan 15, 2004 at 10:24:30PM +, Antony Gelberg wrote:
> Hi all,
> 
> I want to update my wallpaper at time intervals.  So, I've set up a
> crontab:
> # DO NOT EDIT THIS FILE - edit the master and reinstall.
> # (/tmp/crontab.bCmoxk/crontab installed on Thu Jan 15 21:07:39 2004)
> # (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp
> # $)
> 0 * * * *   $HOME/bin/wallpaper_rotate $HOME/pics/wallpaper/
> 
> wallpaper_rotate is a dirty shell script:
> #!/bin/sh
> NEXTFILE=`ls $1 | rl -c 1`
> wmsetbg $1$NEXTFILE
> 
> Now that's coding.  Anyway, it works.  However, cron reports:
> wmsetbg fatal error: could not open display
> 
> I guess this is because it is not being run from my X session.  Question
> is, is there anything I can do to get it to work the way that I want?
>

Set DISPLAY at the top of your crontab. This is probably not "The Right
Way" though. `wmsetbg' is asking to use your X server's display (for
whatever reasons it may have) but cron knows nothing about your
display(s). A better solution would be to find another way to change the
background (that doesn't need to access the display.)


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Changing the name of my computer

2004-01-07 Thread Brett Carrington
> On Wed, Jan 07, 2004 at 06:53:28PM +, Tendril wrote:
> ie. my computer is called achilles and I would like to change it to 
> something else. I would look in the help files, but I don't know what 
> this process is called.

See the manpage for hostname: `man hostname'
It has a little more information then editing a file like /etc/hostname
will give you.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: idea search

2004-01-05 Thread Brett Carrington

On Mon, Jan 05, 2004 at 11:41:29PM -0500, [EMAIL PROTECTED] wrote:
> 
>   Any ideas for what servers to use, or have I over complicated 
>   everything?
> 
> 
>   Thanks for anything,
>   Paul

Here are some: fetchmail for POP3, fetchyahoo (I'm pretty sure that's
available in Debian) for yahoo's non-POP3 mail, and horde/imp for
webmail. These are all available in Debian and just giving the
documentation a read will give you the right direction.

You may also like `fetchmailconf'


signature.asc
Description: Digital signature


Re: Is there any encrypted or secure NFS?

2004-01-05 Thread Brett Carrington
On Mon, Jan 05, 2004 at 09:14:27PM -0500, Mark Roach wrote:
> > This might be encrypted, but hardly secure, for instance if user A has 
> > physical access to NFS client
> > and user B has physical access to nfs client, what prevents user A from 
> > accessing user B's files through VPN?
> 
> File permissions.
>

Even so, you'd have this problem with or without an IPSec VPN. The VPN's
job, in this case, is lower-layer encryption. File systems on your
host/NFS Client are out of the spectrum of what a VPN can do. A VPN is
only going to protect your data from snoopers of NFS packets.


signature.asc
Description: Digital signature


Re: adding new hard disk

2004-01-04 Thread Brett Carrington
On Sun, Jan 04, 2004 at 09:44:55PM -0800, panda wrote:
> Lou Losee wrote:
> 
> >Hi Anita,
> >
> >* Anita Rohani <[EMAIL PROTECTED]> [2004-01-04 23:30]:
> > 
> >
> >>Hi
> >>
> >>A few hard disk partitions on our current Debian
> >>system are close to becoming full. I would like to
> >>install an addtional hard disk and extend the
> >>partitions on the current disk to the new disk. Is it
> >>possible to do so and are there any instructions
> >>avaliable on how to add and configure additional hard
> >>disks on Debian?
> >>
> >>   
> >>
> >I do not think you can actually extend the existing partitions - that is
> >make them span the old and the new disks.  However. you can install the
> >new disk, use fdisk to create partitons on it and then move the data
> >from some of the existing partitions to the new disk.  Then you can
> >mount the new partitons.
> >
> >This way you could, for instance, create a larger /home or /var or /usr
> >etc. on the new disk to replace the partitons on the old disk.  Once
> >this is done, you could delete the old partions and use a tool such as
> >parted or QTparted to resize the partitions on the old disk and make
> >them larger also.
> >
> >HTH
> >
> >Lou
> >
> >
> > 
> >
> Hi
> 
> Actually her question brings up an interesting point. Suppose this 
> needed to be done in a big corporation where it is necessary to maintain 
> some level of service and the question of scalability is a very 
> important one.
> 
> They would prefer some means of doing the same adding disks to the 
> system to allow for greater storage with minimal disruption. It would be 
> really costly if they had to resort to something like copy everything 
> and then resize.
> 
>

Couldn't something like RAID spanning being used? I think this would be
overkill for a big corporation's goal of 'scalability' though. (At least
for client desktops.)


signature.asc
Description: Digital signature