Re: why all are thinking in that way only?

2008-07-01 Thread g

Parshwa Murdia wrote:

as i said, my intent was not to offend you, nor was my intent to offend poc,
craig, or any one else on this list. and, if i have done so, i do apologize.

my intent of joining this list was to learn more about linux and fedora.

both poc and craig have helped in my learning and i look forward to learn
more from them and many others on this list and other list that i receive.

when i see a post and i can help, i do try. if there has been a reply to
answer of post, i do not.

there is far too much degrading of others on this list, as on others.


--

tc,hago.

g
.

in a free world without fences, who needs gates.

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list


Re: why all are thinking in that way only?

2008-06-30 Thread max

Parshwa Murdia wrote:

hi,
when i asked for the keylogger in my system, why people thought of illegal
activities only? it is MINE system and for use only in my system, i am
asking and further more, like one must have knowledge of viruses and then
only he can create an antivirus, similarly it is for the knowledge of
keylogger to prevent the thefts
parshwa


If you want to know how to find keyloggers then you might want to look 
at how programs like chkrootkit and rkhunter function. As for installing 
one, well you'd go about that just like you would any other program. 
There is nothing special about a virus or keylogger, they are programs 
just like open office or vi. That is why anti-virus programs rely 
heavily on updates, it is very difficult to tell one program from 
another, if there was some magic flag  that went up when a program was 
malicious there wouldn't be a virus problem. They use heuristics as well 
to try and determine if a program is malicious but programs flagged by 
heuristics are just as likely to be benign as malicious. The best 
solution is to strictly control what is allowed to execute on the 
system. How many programs do you really use on a regular basis?


--
Fortune favors the BOLD

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list


Re: why all are thinking in that way only?

2008-06-30 Thread Steven Stern

max wrote:

Parshwa Murdia wrote:

hi,
when i asked for the keylogger in my system, why people thought of 
illegal

activities only? it is MINE system and for use only in my system, i am
asking and further more, like one must have knowledge of viruses and then
only he can create an antivirus, similarly it is for the knowledge of
keylogger to prevent the thefts
parshwa


If you want to know how to find keyloggers then you might want to look 
at how programs like chkrootkit and rkhunter function. As for installing 
one, well you'd go about that just like you would any other program. 
There is nothing special about a virus or keylogger, they are programs 
just like open office or vi. That is why anti-virus programs rely 
heavily on updates, it is very difficult to tell one program from 
another, if there was some magic flag  that went up when a program was 
malicious there wouldn't be a virus problem. They use heuristics as well 
to try and determine if a program is malicious but programs flagged by 
heuristics are just as likely to be benign as malicious. The best 
solution is to strictly control what is allowed to execute on the 
system. How many programs do you really use on a regular basis?




Back to the OP, Google finds an number of keyloggers

http://www.google.com/search?q=linux+keylogger

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list


Re: why all are thinking in that way only?

2008-06-30 Thread Les

On Mon, 2008-06-30 at 12:03 -0400, max wrote:
 Parshwa Murdia wrote:
  hi,
  when i asked for the keylogger in my system, why people thought of illegal
  activities only? it is MINE system and for use only in my system, i am
  asking and further more, like one must have knowledge of viruses and then
  only he can create an antivirus, similarly it is for the knowledge of
  keylogger to prevent the thefts
  parshwa
  
  
 If you want to know how to find keyloggers then you might want to look 
 at how programs like chkrootkit and rkhunter function. As for installing 
 one, well you'd go about that just like you would any other program. 
 There is nothing special about a virus or keylogger, they are programs 
 just like open office or vi. That is why anti-virus programs rely 
 heavily on updates, it is very difficult to tell one program from 
 another, if there was some magic flag  that went up when a program was 
 malicious there wouldn't be a virus problem. They use heuristics as well 
 to try and determine if a program is malicious but programs flagged by 
 heuristics are just as likely to be benign as malicious. The best 
 solution is to strictly control what is allowed to execute on the 
 system. How many programs do you really use on a regular basis?
 
 -- 
 Fortune favors the BOLD
 
I wouldn't say that programs marked by heuristics are just as likely to
be good.  The quality of the heuristics continually improve, and are
much better than that.  Typically heuristics are applied to programs and
program errors that remain after other methods have considerably
narrowed the list.  I suspect that their accuracy greatly exceeds 95%
these days due to the order of application, and that is improved even
more by some background software applied after the heuristic ID.

Please don't overstate the case.  It is hard enough to get people to run
antivirus now.

REgards,
Les H

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list


Re: why all are thinking in that way only?

2008-06-30 Thread max

Les wrote:

On Mon, 2008-06-30 at 12:03 -0400, max wrote:

Parshwa Murdia wrote:

hi,
when i asked for the keylogger in my system, why people thought of illegal
activities only? it is MINE system and for use only in my system, i am
asking and further more, like one must have knowledge of viruses and then
only he can create an antivirus, similarly it is for the knowledge of
keylogger to prevent the thefts
parshwa


If you want to know how to find keyloggers then you might want to look 
at how programs like chkrootkit and rkhunter function. As for installing 
one, well you'd go about that just like you would any other program. 
There is nothing special about a virus or keylogger, they are programs 
just like open office or vi. That is why anti-virus programs rely 
heavily on updates, it is very difficult to tell one program from 
another, if there was some magic flag  that went up when a program was 
malicious there wouldn't be a virus problem. They use heuristics as well 
to try and determine if a program is malicious but programs flagged by 
heuristics are just as likely to be benign as malicious. The best 
solution is to strictly control what is allowed to execute on the 
system. How many programs do you really use on a regular basis?


--
Fortune favors the BOLD


I wouldn't say that programs marked by heuristics are just as likely to
be good.  The quality of the heuristics continually improve, and are
much better than that.  Typically heuristics are applied to programs and
program errors that remain after other methods have considerably
narrowed the list.  I suspect that their accuracy greatly exceeds 95%
these days due to the order of application, and that is improved even
more by some background software applied after the heuristic ID.

Please don't overstate the case.  It is hard enough to get people to run
antivirus now.

REgards,
Les H

If heuristics were 95% accurate we wouldn't have a virus problem at all 
and they wouldn't need constant updates. Antivirus is certainly a useful 
part of any comprehensive defense strategy but, its been my experience, 
too many people rely on antivirus and firewall software alone. The 
majority of users are under the impression that running antivirus and 
firewall software means they are safe. I can assure you that is not the 
case. They think if they avoid porn sites they are safe. Sorry just not 
true. Surf favorite social networking site long enough, download some 
free music , visit a web page with ads on it, download some more 
free screen savers your going to catch something sooner or later. I've 
spent plenty of time cleaning viruses and their ilk from infected 
computers, even when you run all the different scanners you can find, 
sometimes the computer keeps getting reinfected on reboot. There are 
small scripts that run and check for a files existence, if they find it 
, done , if not then they fetch a fresh copy or even better some 
viruses disable the antivirus program altogether. These programs are 
often broken up so as to avoid detection and work in tandem, executing 
and then calling/downloading the next script in line. The number one 
recommendation is wipe and reinstall. Most security software is a scam 
that keeps you hooked, 20 bucks or more a year, for updates. If this 
security software is so good then how come the number of viruses, 
spyware, trojans, etc keeps growing? Where are those 95% accurate 
heuristics? You'd think with security software that  good the virus 
writers would have given up by now. No, anti-virus is a useful but 
severely limited tool. Of course then there is the notion that if you 
run Linux you are safe, harder to infect?sure but 100% safe? think you 
don't have to worry? Google around for weakness of DAC. The sooner 
people learn that strict control of running programs is the only way to 
go the better off we will all be. One program to keep track of literally 
hundreds of thousands of malicious bits of code, brilliant strategy I 
gotta say, its a wonder its not working better. Since civilized 
discussions about security are beyond this list I will drop it right 
here. Email me off list if you want to continue this conversation, I am 
perfectly willing to be corrected and or educated on any point.


--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list


Re: why all are thinking in that way only?

2008-06-30 Thread Parshwa Murdia
linux boxes in the local cybercafe in india is not there, 99% of cyber cafe
are using windows only. even people don't know anything what's there in the
cyber cafe, they have the habbit of saying anything in vain!!

On Mon, Jun 30, 2008 at 8:57 PM, [EMAIL PROTECTED] wrote:

 Send fedora-list mailing list submissions to
fedora-list@redhat.com

 To subscribe or unsubscribe via the World Wide Web, visit
https://www.redhat.com/mailman/listinfo/fedora-list
 or, via email, send a message with subject or body 'help' to
[EMAIL PROTECTED]

 You can reach the person managing the list at
[EMAIL PROTECTED]

 When replying, please edit your Subject line so it is more specific
 than Re: Contents of fedora-list digest...


 Today's Topics:

   1. Re: A way to use wine to run eprom updates for DVD drives? (stan)
   2. re: F9 NFS install fails (Gianluca Cecchi)
   3. Re: Mirror bandwidth and user redirection (Patrick O'Callaghan)
   4. Re: Xfce xfburn missing? (Wong Kwok-hon)
   5. Re: Xfce xfburn missing? (Rahul Sundaram)
   6. PPTP VPN ([EMAIL PROTECTED])
   7. Re: Regarding the keylogger in the linux fedora systems
  (Kevin Martin)
   8. Re: F9 NFS install fails (Tim)
   9. Re: Selinux and awstats (Claude Jones)
  10. Re: Online resizing NTFS  ext3 (Axel Thimm)
  11. Re: ifdown. is it really down? (Bruno Wolff III)
  12. Re: Dependency resolution failed (Bruno Wolff III)
  13. Re: Mirror bandwidth and user redirection (Ed Greshko)
  14. Re: Hardware browser?? (Beartooth)
  15. Dual Athlon cpu (Mike Chambers)
  16. Re: png2txt - (Paul Smith)
  17. Re: why all are thinking in that way only? (Bruno Wolff III)


 --

 Message: 1
 Date: Mon, 30 Jun 2008 06:19:23 -0700
 From: stan [EMAIL PROTECTED]
 Subject: Re: A way to use wine to run eprom updates for DVD drives?
 To: For users of Fedora fedora-list@redhat.com
 Message-ID: [EMAIL PROTECTED]
 Content-Type: text/plain; charset=ISO-8859-1; format=flowed

 Roberto Malinverni wrote:
  -Messaggio originale-
  Date: Sun, 29 Jun 2008 15:09:15 -0700
  From: stan [EMAIL PROTECTED]
  Subject: A way to use wine to run eprom updates for DVD drives?
 
  Hi,
 
  The subject says it all.  Is there a way to use wine to
  update the BIOS
  on DVD drives (and other devices)?  When I tried it, it just hung the
  process.
 
  Or another way, without using Windows (I don't have any MS OS)?
 
 
  It depends on the brand of your drives: NEC/OPTIARC can be flashed
 natively
  in Linux
  thanks to binflash (it can use both exe and bin files).
 
 Don't have NEC.
  In other cases, you have to use something like a Windows live cd (I
 don't
  remember the link, but you need a copy of the XP install CD anyway) or a
  good old DOS floppy boot disk.
  Roberto.
 
 That's what I thought, but wanted to check.  :-(

 Thanks.



 --

 Message: 2
 Date: Mon, 30 Jun 2008 15:20:03 +0200
 From: Gianluca Cecchi [EMAIL PROTECTED]
 Subject: re: F9 NFS install fails
 To: fedora-list@redhat.com
 Message-ID:
[EMAIL PROTECTED]
 Content-Type: text/plain; charset=utf-8

 I successfully installed some days ago f9 x86_64 this way on a laptop:
 - on F9 x86 server I have f9_x86_64.iso file and mount it as a loop
 device; then I export the mounted path via nfs
 - on laptop I install f9_x86_64 via nfs.

 Note that in my case I used an usb key as boot device for the laptop.
 For doing that I had to use the diskboot.img from f8 and then
 overwrite kernel and initrd with what provided in boot.iso of f9.
 I also had to delete the splash image because the new files didn't fit
 on the size of the f8 media.
 But the installation went fine.

 I don't know if you can boot from usb, though

 Gianluca
 -- next part --
 An HTML attachment was scrubbed...
 URL:
 https://www.redhat.com/archives/fedora-list/attachments/20080630/2c124101/attachment.html

 --

 Message: 3
 Date: Mon, 30 Jun 2008 08:51:40 -0430
 From: Patrick O'Callaghan [EMAIL PROTECTED]
 Subject: Re: Mirror bandwidth and user redirection
 To: fedora-list@redhat.com
 Message-ID: [EMAIL PROTECTED]
 Content-Type: text/plain

 On Sun, 2008-06-29 at 23:46 -0500, Matt Domsch wrote:
  The basic selection algorithm for choosing
  the order in which to return mirrors to clients remains the same:
  prefer same netblocks, internet2 in same country if on internet2, same
  country, same continent, then global, in that order.

 That's totally logical, but it's wrong for some cases. Here in Venezuela
 there is much better bandwidth to the US than to anywhere else in South
 America, so the same continent rule is not going to work for us. I
 suspect the same is true for some other SA countries.

 Also, for the relatively few people on Internet2 it's always better than
 Internet1, at least here. I mean Internet2 to anywhere is better than
 Internet1 to the same city.

 poc

Re: why all are thinking in that way only?

2008-06-30 Thread Ed Greshko

Parshwa Murdia wrote:
linux boxes in the local cybercafe in india is not there, 99% of cyber 
cafe are using windows only. even people don't know anything what's 
there in the cyber cafe, they have the habbit of saying anything in vain!!


You seem to have included the entire text of a digest in your message...and 
you seem to have top posted.  Both are considered no-nos on most mailing 
lists.


--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list


Re: why all are thinking in that way only?

2008-06-30 Thread Parshwa Murdia
dear g,

**
g:

as i mentioned to you before, tech support list are a strange bunch.

some trusting, some not. i apologize for not going into more detail. :o)

just like i think your new 'subject:' is ok because it is a strange subject
for a list like this.

***
u are not going into the details, so please don't apologize because nobody
is saying u to go into the details, this mail was only for those who have
already let me know about the keyloggers.
subject was not strange but as i was new to the list, some fellow let me
know that the subject should be the same.

***
g:

others will look just to see what you are up to now.

others may have passed over it thinking that they were not interested
because
they just are not interested.

some, no reflection to 'poc', will think as he did. which may have brought
response. others not, because to them, it is a dead subject.

*

people on the list are very good and it is an educational list, i have
learned too much and got the doubts cleared.

*

g:

from response so far, you are getting a good response and at least, so far,
no one is telling you how 'stupid' or 'dumb' you are for even asking. no
reflection to 'craig' or his 'beavus' and 'butthead'.

***

one person can say according to his own feelings and knowledge, so actually
your words : 'stupid' and 'dumb' have shown the level of your own stupidity
and dumbness.

***

g:

all in all, it does help to chose your 'subject:' as best you can. let it
sit for a while and if no response, think of a way to change it to have
more meaning.

**

u always (since i know u) act as a useless mentor who because your
suggestions are non-technical in nature.

*

g:

in reading your post, as is evident from above line, you have trouble in
grasping 'proper' english. this is not a put down, just an understanding
of why you are going to run into problems from time to time.

***

u are the only person in the world if u are not facing any problem, and also
the first person of this kind.

**

g:

as a suggestion for a 'subject:' line format,

'subject: [distribution, version] [hardware | program | operation]
[problem]'

then in body of post give more detail.

when thru, run a spell checker.

have heart. in time you will get 'hang of it' just as you are doing in
communicating in english.

perseverance.

hth. [i hope this helps you]

and no, my 'oops' and google was not by accident.

***

as already said, ur majority of the responses are non-technical in nature.
those who understood the problem, have let known the issue.

at the last but not the least, as you have been suggesting me (without i
asked), so i would also join a list for learning english much better and i
would thank to you for the suggestions.

regards,
parshwa
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list

why all are thinking in that way only?

2008-06-29 Thread Parshwa Murdia
hi,
when i asked for the keylogger in my system, why people thought of illegal
activities only? it is MINE system and for use only in my system, i am
asking and further more, like one must have knowledge of viruses and then
only he can create an antivirus, similarly it is for the knowledge of
keylogger to prevent the thefts
parshwa
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list