writing a letter in LaTeX
Hi: I tried using Lyx to write a letter and, in the end, had to resort to Star Office 5 because of an apparent bug in LaTeX. The Lyx output looked fine, but LaTeX did not include either the 'from' or 'to' addresses in the output DVI file. I was pretty shocked by this, since a long time back when I was an Atari ST user, I had LaTeX set up there as my word processor and never had a problem like this. My setup is a current (as of 30 Nov) 'slink' distribution. Here is what I have installed: p2 14:11 press-rcb[152] dpkg --list tetex\* Desired=Unknown/Install/Remove/Purge | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad) ||/ NameVersionDescription +++-===-==- ii tetex-base 0.9.981030-2 basic teTeX library files ii tetex-bin 0.9.981031-3 teTeX binary files pn tetex-dev none (no description available) pn tetex-doc none (no description available) ii tetex-extra 0.9.981030-2 extra teTeX library files pn tetex-frenchnone (no description available) ii tetex-nonfree 0.9.981030-2 non-free teTeX library files pn tetex-src none (no description available) p2 14:29 press-160[153] dpkg --list lyx\* ~ Desired=Unknown/Install/Remove/Purge | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad) ||/ NameVersionDescription +++-===-==- ii lyx 0.12.0.final-0 High Level Word Processor (BETA version) Here is a sample document I could reproduce the problem with: \documentclass{letter} \begin{document} \address{John Jones\\ 123 A St.\\ Anytown, AW AB3 4AA} \begin{letter}{Mr. Joe Smith\\ 2345 Princess St. \\ Edinburgh, EH1 1AA} Each letter is a `letter' environment, whose argument is the name and address of the recipient. For example, you might have: \end{letter} \end{document} If I run 'latex test.tex', the DVI once again is missing the address information. Is this a bug or do I just have a messed up installation? Thanks, --- Roy Bixler The University of Chicago Press [EMAIL PROTECTED]
Re: writing a letter in LaTeX
On Tue, 1 Dec 1998, Peter S Galbraith wrote: I tried using Lyx to write a letter and, in the end, had to resort to Star Office 5 because of an apparent bug in LaTeX. The Lyx output looked fine, but LaTeX did not include either the 'from' or 'to' addresses in the output DVI file. Try adding the \opening{} command like so: \documentclass{letter} \begin{document} \address{John Jones\\ 123 A St.\\ Anytown, AW AB3 4AA} \begin{letter}{Mr. Joe Smith\\ 2345 Princess St.\\ Edinburgh, EH1 1AA} \opening{Dear Sir,} Each letter is a `letter' environment, whose argument is the name and address of the recipient. For example, you might have: \end{letter} \end{document} I added the appropriate section in Lyx and it worked. Any ideas why Latex acts this way? For example, reading the documentation, it's plain why Latex treats your letter as personal if you include an \address section and otherwise assumes some sort of letterhead. It's not clear to me why the lack of an \opening section makes the specified addresses irrelevant. Thanks! --- Roy Bixler The University of Chicago Press [EMAIL PROTECTED]
Re: kde (and K memory leak question)
I also have another question about K. I seem to be experiencing fairly signifigant memory leaks from it. I started and quit X a few times today andended up losing about 5 megs of memory somewhere. I've run other windowmanagers and this doesn't happen. Does anyone else experience this? I am running K 1.0pre2 which I compiled from the source code on a Debian slink system. There's little doubt to me that it leaks memory. It's frustrating because it's hard to pin down what's causing it. I used to think it was caused by using the file manager 'kfm' to view Web pages (I commonly open up a new 'kfm' window to look at some Web page or other), but now I'm not so sure. The only thing I know is that the X server process keeps getting bigger without bound as I accrue more uptime in KDE. -- Roy Bixler The University of Chicago Press [EMAIL PROTECTED] -- Unsubscribe? mail -s unsubscribe [EMAIL PROTECTED] /dev/null
Re: [Q] KDE for libc6. motif for libc6
On Fri, 6 Mar 1998, Vladislav Papayan x285 wrote: Hello, does any one know where from I can dowload (if it exists) the latest version of KDE (I think it is Beta 3) that is compiled for libc6? I asked the same question a short time ago and got no answe. But here are a couple of ideas: a) compile it yourself. The package maintainer gave me a bit of a hint that, if one wants to go this route, then it would be helpful to install a package that can be found under 'ftp.debs.fuller.edu:/debs/kde4debian_0.3_all.deb' - this provides Debian files in addition to the standard KDE installation. b) get the libc6 RedHat packages, convert to .deb's and install those. --- Roy Bixler The University of Chicago Press [EMAIL PROTECTED] -- E-mail the word unsubscribe to [EMAIL PROTECTED] TO UNSUBSCRIBE FROM THIS MAILING LIST. Trouble? E-mail to [EMAIL PROTECTED] .
KDE Beta 3, Hamm
Hi: I have the Debian packaging from the hamm directory of KDE Beta 2. I would like to upgrade to Beta 3 because I like the K desktop, but think it has quite a ways to go stability-wise to be useable. Is there any hamm packaging of KDE Beta 3? Can anyone using KDE Beta 3 comment on its stability? (i.e. if it's no better than Beta 2, I'll just forget about this upgrade.) Thanks, Roy Bixler The University of Chicago Press [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
Re: NCPFS seems broken on 2.1 kernels...
On Fri, 13 Feb 1998, Kevin cave wrote: Roy, I can't seem to locate ncpfs-2.1.1.tar.gz anywhere... Try 'ftp://ftp.gwdg.de/pub/linux/misc/ncpfs' Maybe the confusion is that the file end in .tgz instead of .tar.gz ... --- Roy Bixler The University of Chicago Press [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
Re: NCPFS seems broken on 2.1 kernels...
On Thu, 12 Feb 1998, Kevin Cave wrote: I've now tried 2.1.86, and it still has the same problem. I can use slist to see the various Netware servers, but I can't mount the volumes, or send print files to 'em. Yes, this is a problem. The only fix I know of right now is to get the ncpfs-2.1.1.tar.gz file, compile with libc5 and use it. Elroy Paris did some work to get ncpfs-2.0.11 to compile with libc6 and perhaps he knows more about the status of ncpfs-2.1.1? --- Roy Bixler The University of Chicago Press [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
Re: kernel 2.1.68/69
On Tue, 2 Dec 1997, Matthew R. Briggs wrote: Hamish, 2.1.67 had some changes to the installation scripts that broke make-kpkg. I've been watching the lists and I don't think anyone has noticed yet (except you and me). 2.1.68 has all kinds of new signal stuff that don't compile properly at all. 2.1.69 is said to be stable, though I haven't tried it myself. I did get 2.1.67 to compile, though, by avoiding the use of make-kpkg altogether. Here is how it is done: Funny - I was able to get 2.1.69 to compile using make-kpkg. I use the latest hamm version of kernel-package (3.45). Some of the kernel options, like ncpfs and NFS root filesystem, wouldn't compile, but I assume those are problems with the kernel and will be fixed soon. And, despite the signal patches to the sound system, sound configuration is still broken. There is one other odd thing I noticed about 2.1.69: process accounting. It worked perfectly in 2.1.65, but now when the system comes up it says it's not available. I read somewhere that CONFIG_UNIX (Unix domain sockets) option must be turned on and it is - still no dice. Does anyone have ideas or is this another thing broken in the new kernel? --- Roy Bixler [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
www.debian.org question and Re: SSH/X11 vulnerability
First, I was just wondering about the 'www.debian.org' site and what's happening with it. Specifically, the 'Debian Packages' menus seem to be really out of date. I found that to be a very useful resource. Is there relief in sight? Next, here is the reply I saw from the SSH author re the recent 'SSH/X11 vulnerability' posting to this list. It's interesting even if you're not running SSH ... From [EMAIL PROTECTED] Fri Oct 3 07:35:42 1997 Received: from hauki.clinet.fi ([EMAIL PROTECTED] [194.100.0.1]) by hutcs.cs.hut.fi (8.8.5/8.7.3) with ESMTP id HAA13854; Fri, 3 Oct 1997 07:35:41 +0300 (EET DST) Received: (from [EMAIL PROTECTED]) by hauki.clinet.fi (8.8.6/8.8.6) id GAA26994 for ssh-outgoing; Fri, 3 Oct 1997 06:21:49 +0200 (EET) X-Authentication-Warning: hauki.clinet.fi: majordom set sender to [EMAIL PROTECTED] using -f Received: from ssh.fi (ssh.fi [194.100.44.97]) by hauki.clinet.fi (8.8.6/8.8.6) with ESMTP id AAA24254 for ssh@clinet.fi; Fri, 3 Oct 1997 00:18:32 +0200 (EET) Received: from pilari.ssh.fi (pilari.ssh.fi [192.168.2.1]) by ssh.fi (8.8.7/8.8.7/EPIPE-1.12) with ESMTP id BAA07733; Fri, 3 Oct 1997 01:18:03 +0300 (EET DST) Received: (from [EMAIL PROTECTED]) by pilari.ssh.fi (8.8.7/8.8.7/EPIPE-1.10) id BAA08209; Fri, 3 Oct 1997 01:17:55 +0300 (EET DST) Date: Fri, 3 Oct 1997 01:17:55 +0300 (EET DST) Message-Id: [EMAIL PROTECTED] From: Tatu Ylonen [EMAIL PROTECTED] To: [EMAIL PROTECTED], ssh@clinet.fi Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Ulrich Flegel's SSH/X11 vulnerability Organization: SSH Communications Security, Finland Sender: [EMAIL PROTECTED] Precedence: bulk Ulrich Flegel writes: SSH/X11 Vulnerability September 1997 While it is a good thing that people are aware of the issues pointed out by Ulrich Flegel with regard to crossing security boundaries and forwarding ports across them, this is hardly a new issue nor is it really an SSH problem. This and the more general TCP/IP port forwarding issue have been discussed on the SSH mailing list several times over the past two years. The attack is really just saying that if you have a corrupt server, and you forward X11 to it, it can connect to your local X server. This is true and avoidable in every scenario I can think of where your server is allowed to make any X11 connections to your X server. You can only avoid it by not allowing X11 connections from the remote machine at all. It is good that Ulrich has written an exploit to illustrate the problem, but the same exploit works equally well even if you don't use SSH at all (assuming you still want to allow X11 connections). X11 forwarding is definitely not a feature that should be entirely disabled. It is extremely useful for a lot of people. However, disabling it has been made as flexible as it possibly can be for those who do want to disable it. SSH has for a long time provided options to disable X11 forwarding - at compile time - in config files - on command line. From a firewall administrator's standpoint, SSH X11 forwarding or port forwarding does not open any new hole with respect to what users can do (it does make certaing things a bit easier though). If you allow telnet, rlogin, or any other login protocol, any competent programmer can write a program that listens for connections on port 6000 and writes/reads the data to/from stdin/stdout. At the client end, another program telnets/rlogins to the server machine and sends all traffic to/from the local X server. This does not require any special privileges from the user. SSH just makes this easier. But it does not open any new hole there. Yes, there are environments that want to disable X11 forwarding by default. But for a vast majority of users, SSH X11 forwarding provides a major security improvement by not sending the authorization cookie or the X11 packets in the clear. Tatu -- SSH Communications Security http://www.ssh.fi/ F-Secure Internet Security Solutions http://www.datafellows.com/f-secure/ Free Unix SSH http://www.cs.hut.fi/ssh/ Message-ID: [EMAIL PROTECTED] Date: Tue, 30 Sep 1997 21:48:29 +0100 Reply-To: Ulrich Flegel [EMAIL PROTECTED] From: Ulrich Flegel [EMAIL PROTECTED] Organization: None Subject: SSH/X11 vulnerability To: [EMAIL PROTECTED] SSH/X11 Vulnerability September 1997 Systems affected: All systems running Secure Shell (SSH) clients and X11. Description: In a firewalled environment insecure protocols normally are not allowed to cross network boundaries and to enter the protected network environment. SSH is able to relay arbitrary TCP connections, especially X11 traffic
Re: samba security -- more info?
On Tue, 30 Sep 1997, John M. Rulnick wrote: Thank you. Actually, I'm wondering if you could point me to the *source* fixes for samba (assuming it is not just a Debian security problem), since the information is to be passed on to a non-Debian sysadmin. Here is the original announcement: Xref: uchinews comp.os.linux.announce:8694 Path: uchinews!news.spss.com!uunet!in5.uu.net!news2.epix.net!cdc2.cdc.net!ais.net!newsfeed.internetmci.com!141.211.144.13!newsxfer3.itd.umich.edu!news1.best.com!uninett.no!news-stkh.gip.net!news.gsl.net!gip.net!news3.funet.fi!news.funet.fi!news.cs.hut.fi! news.clinet.fi!liw.clinet.fi!not-for-mail From: Andrew Tridgell [EMAIL PROTECTED] Newsgroups: comp.os.linux.announce Subject: SECURITY: Security bugfix for Samba Followup-To: comp.os.linux.misc Date: Fri, 26 Sep 1997 21:58:32 GMT Organization: none Lines: 59 Approved: [EMAIL PROTECTED] (Lars Wirzenius) Message-ID: [EMAIL PROTECTED] Reply-To: [EMAIL PROTECTED] NNTP-Posting-Host: liw.clinet.fi NNTP-Posting-User: liw X-Server-Date: 26 Sep 1997 21:58:45 GMT Old-Date: Fri, 26 Sep 1997 23:40:47 +1000 X-No-Archive: yes X-Auth: PGPMoose V1.1 PGP comp.os.linux.announce iQBVAwUBNCwwFDiesvPHtqnBAQGqGgIAkwndoh2YjjAiVOCDs7bTdnPC0qmTk//L XtLkOqIRjHWZoohH3uA4jaKr3gz//42hFcFF/JyYef4OHx8HFn5bvg== =BLDy -BEGIN PGP SIGNED MESSAGE- Security bugfix for Samba - A security hole in all versions of Samba has been recently discovered. The security hole allows unauthorized remote users to obtain root access on the Samba server. An exploit for this security hole has been posted to the internet so system administrators should assume that this hole is being actively exploited. The exploit for the security hole is very architecture specific and has been only demonstrated to work for Samba servers running on Intel based platforms. The exploit posted to the internet is specific to Intel Linux servers. It would be very difficult to produce an exploit for other architectures but it may be possible. A new release of Samba has now been made that fixes the security hole. The new release is version 1.9.17p2 and is available from ftp://samba.anu.edu.au/pub/samba/samba-1.9.17p2.tar.gz This release also adds a routine which logs a message if anyone attempts to take advantage of the security hole. The message (in the Samba log files) will look like this: ERROR: Invalid password length 999 you're machine may be under attack by a user exploiting an old bug Attack was from IP=aaa.bbb.ccc.ddd where aaa.bbb.ccc.ddd is the IP address of the machine performing the attack. Please report any attacks to the appropriate authority. The Samba Team [EMAIL PROTECTED] - -- This article has been digitally signed by the moderator, using PGP. http://www.iki.fi/liw/lars-public-key.asc has PGP key for validating signature. Send submissions for comp.os.linux.announce to: [EMAIL PROTECTED] PLEASE remember a short description of the software and the LOCATION. This group is archived at http://www.iki.fi/liw/linux/cola.html -BEGIN PGP SIGNATURE- Version: 2.6.3ia Charset: noconv iQCVAwUBNCwwD4QRll5MupLRAQF8TQQA2m+9WqUAVg/BAvc+Flfdjp0EpHUS++Ia wDj3LAkQeyexR7fTncvYevIgXCa7B4ZjA6SlH3pEe3UBV9sH+uAjXg2fIzt5YVvb fFbVnUwLCTFBxCt8sCjTV7QvLLpcO8fP2dWWFGpErY6y/v2boQM5t+JWCI4Ecy0e YIitrcRv5zk= =rcqW -END PGP SIGNATURE- Roy [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
Re: Netscape Communicator 4.01b6 works fine
On Thu, 3 Jul 1997, Oleg Krivosheev wrote: where did you find netscape-beta package installer ? It's gone !!! Unfortunately i purged netscape-beta from my computer before checking is it available or not. You really don't need it now. I just used the 'ns-install' script that came with the Communicator archive. Oh and another point I found which wasn't obvious is, to get SSL connections (i.e. to hhtps: URL's) working, I had to copy the 'moz40p3' file that is installed into Netscape's root directory to my $HOME/.netscape directory. But, after all that, it seems to work pretty well. Roy [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
ncurses3.4
I have a system with the 'hamm' hierarchy packages installed. Several of the packages, including important ones like 'gdb' depend on 'ncurses3.4' but I cannot find this anywhere. I wonder why 'ncurses3.4' is not included in 'hamm'. Any pointers or workarounds anyone? Roy [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .
Re: No automatic PST-PDT time change?
On Tue, 8 Apr 1997, Bob Nielsen wrote: Hmmm, my Debian (rex) shows MDT, but my Red Hat shows (correctly for Arizona) MST. R. H. seems to have a few more configuration choices, including various parts of Indiana. The files don't seem readable, so I don't know what to make of it. If you run 'tzconfig' you will see a lot of choices including all the ones you mention that Redhat has. I also saw the problems people were compaining of where the time did not properly adjust itself on Monday morning, but all the machines I saw this on had the timezone incorrectly configured. Roy [EMAIL PROTECTED]
Re: qmail, was RE: mta suggestions?
On Mon, 30 Dec 1996, Remco van de Meent wrote: At 01:22 PM 12/30/96 -0600, Roy C Bixler wrote: On Mon, 30 Dec 1996, Remco van de Meent wrote: Maybe zmailer is another option? Seems to be very fast also... Yes, this works well, but unfortunately there is no Debian package available for it. Is anyone working on such a thing? I hope so, because I *can* compile it, but I cannot get it to work together with piped things like majordomo. Are you using the latest version (2.99.44 + patch)? If converting your majordomo lists is an option, I find it works with 'smartlist'. The only thing you have to do there is add the list administrator user to the 'zmailer' group (in /etc/group) of trusted users (see the 'trusted.cf' file for the default list). Roy [EMAIL PROTECTED] -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word unsubscribe to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED]
Re: PPP Manual Dial?
On Tue, 20 Aug 1996, Eric Liu wrote: Query: Is there any way I can manually dial in, login, and initiate PPP, then ask 'pppd' to start? Sure - use 'minicom' and then exit with Alt-Q and start up PPP with something like 'pppd :' ... Roy [EMAIL PROTECTED]