Re: Latest shenanigans with rcn
I pay an extra $20/month for what they call a static IP address. It's still served up via dhcp and the address comes from their dynamic address pool, but it doesn't change. The real reason for getting it though is so that they open up incoming 80 and outgoing 25. I'm just curious why you don't just spend the extra $30/month and host a server with Brian Karas' colo? Servers can be fairly cheap now, you'll get a real static IP with control of your reverse DNS, backup power, and a secure location. I just moved my server there and it's working great. No blocked ports, no BS. ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Help with sed script?
H. I'd heard that sed's RE parser is a type known as greedy meaning that every expression matches the longest possible string in the input. I therefore can't understand how after all the leading whitespace has been matched there can be any whitespace left over to match the not-a-hashmark expression, but apparently there is. Anyway, changing that part to be not-a-hashmark-or-whitespace seems to solve the problem: sed -r -e '/^[[:space:]]*[^#[:space:]].*[[:space:]]+xyz[[:space:]]*/{s/^.*$/REWRITTEN/}' My thanks to all for the feedback. ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Help with sed script?
Michael ODonnell writes: H. I'd heard that sed's RE parser is a type known as greedy meaning that every expression matches the longest possible string in the input. I therefore can't understand how after all the leading whitespace has been matched there can be any whitespace left over to match the not-a-hashmark expression, but apparently there is. Anyway, changing that part to be not-a-hashmark-or-whitespace seems to solve the problem: sed -r -e '/^[[:space:]]*[^#[:space:]].*[[:space:]]+xyz[[:space:]]*/{s/^.*$/REWRITTEN/}' Regular expression engines are typically greedy because this goes along with the formalism of what a regular expression is: regular expressions are a a type of grammar accepted by finite state automata (FSA). The regexp engine, which tries to mimic a FSA and also perform useful work, employs a technique called backtracking to accomplish its work. The backtracking process is the thing that seems to be causing you some surprise here: during the backtrack process with your previous regexp, the engine matches a space [ ] with your not a hash mark regexp [^#]. Not all regexp engines are always greedy. Perl's, for example, can be directed to not be greedy. You can do this with the ? operator. For example, /ab*?/. Are you sure that your new regexp does what you want?: echo 'xyz' | \ sed -r -e '/^[[:space:]]*[^#[:space:]].*[[:space:]]+xyz[[:space:]]*/{s/^.*$/REWRITTEN/}' You specify surrounded by whitespace in your original description, but occurs at the beginning of a line might be reasonable too (I don't know what your file looks like...). Regards, --kevin -- GnuPG ID: B280F24E And the madness of the crowd alumni.unh.edu!kdc Is an epileptic fit -- Tom Waits ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Help with sed script?
Are you sure that your new regexp does what you want?: echo 'xyz' | \ sed -r -e '/^[[:space:]]*[^#[:space:]].*[[:space:]]+xyz[[:space:]]*/{s/^.*$/REWRITTEN/}' You specify surrounded by whitespace in your original description, but occurs at the beginning of a line might be reasonable too (I don't know what your file looks like...). One of the config files I'll be working with is /etc/fstab and I'll be keying on the mountpoint field i.e. the second whitespace-delimited token on any line that hasn't been commented out. So far, that RE does appear to be having the desired results, though I'm sure many refinements are possible. BTW, my efforts to accomodate leading whitespace are probably a waste of time, at least when dealing with /etc/fstab. Even though (I think) leading whitespace is technically allowed there, various scripts (at least on our RHAT systems) have been enhanced with code (like the RAID startup logic in /etc/rc.sysinit) that dies horribly when it encounters leading whitespace in /etc/fstab... -( ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
RE: Help with sed script?
This got sent to the wrong address. -- Forwarded message -- From: David J Berube [EMAIL PROTECTED] Date: Sep 6, 2006 9:43 AM Subject: Re: Help with sed script? To: GNHLUG Organization gnhlug-org@mail.gnhlug.org It does, but if it can't find a match, it will backtrack. David Berube Berube Consulting [EMAIL PROTECTED] (603)-485-9622 http://www.berubeconsulting.com/ Michael ODonnell wrote: H. I'd heard that sed's RE parser is a type known as greedy meaning that every expression matches the longest possible string in the input. I therefore can't understand how after all the leading whitespace has been matched there can be any whitespace left over to match the not-a-hashmark expression, but apparently there is. Anyway, changing that part to be not-a-hashmark-or-whitespace seems to solve the problem: sed -r -e '/^[[:space:]]*[^#[:space:]].*[[:space:]]+xyz[[:space:]]*/{s/^.*$/REWRITTEN/}' My thanks to all for the feedback. ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss ___ gnhlug-org mailing list gnhlug-org@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-org ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Nudder spam blocking question :-(
Message from [EMAIL PROTECTED] is below. My friend, let's call him Bob (cuz that's really his name) tried to send me mail and his mail to me was rejected as spam by the comcast server he tried to send it through. The comcast server is the correct server for him to be using. This is a new thing for me. I've never heard of an ISP rejecting mail as spam from a sender before, only filtering received mail. Also, by reading some of the stuff on comcast's (no wait spamcop's) website, they seem to have redefined spam as being Unsolicited Bulk Mail instead of Unsolicited Commercial Email. Anyone have experience dealing with designating *outgoing* mail as spam? ---Message from Bob- H. Looks like messages to frambors are getting blocked by comcast spam filtering. I'll resend from a different account, but I thought you'd like to know. -Original Message- From: Mail Delivery Subsystem [mailto:[EMAIL PROTECTED] Sent: Wednesday, September 06, 2006 1:12 PM To: [EMAIL PROTECTED] Subject: Returned mail: delivery problems encountered A message (from [EMAIL PROTECTED]) was received at 6 Sep 2006 17:12:00+. The following addresses had delivery problems: frambors@syslang.net Permanent Failure: 553_5.3.0_frambors@syslang.net..._Spam_blocked_see:_http://spamcop.net/bl. shtml?206.18.177.54 Delivery last attempted at Wed, 6 Sep 2006 17:12:03 - [ Part 2, Message/DELIVERY-STATUS 370bytes. ] [ Not Shown. Use the V command to view or save this part. ] -- Time flies like the wind. Fruit flies like a banana. Stranger things have .0. happened but none stranger than this. Does your driver's license say Organ ..0 Donor?Black holes are where God divided by zero. Listen to me! We are all- 000 individuals! What if this weren't a hypothetical question? steveo at syslang.net ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: COX blocking own users outbound email
On Sep 3, 2006, at 20:48, Jeff Kinz wrote: In fact officers of a public company could possibly even be sued if they did so, since it would cost money and that could be in conflict with their fiduciary responsibility to their stockholders That's an excuse people use who don't want to do something. :) e.g. Apple isn't going to be sued by their stockholders for using decent switches on their iPods so they don't wear out after a couple months. They could - it would save short-term money - but the long-term costs are higher. You can justify most anything you want to do with long-term benefits. But more to the point, would you support monetizing the ISP's anti-spam market so they're interested? For instance, have a standard ISP account for $34.95 which includes 100 e-mails per day and a $89.95 account which includes 1000 e-mails per day and a $350 account which includes unlimited e-mails and then charge the user $0.05 per e-mail sent over their account limit? This kind of setup would monetize spam for both the zombie's owner and the ISP, in the right direction for both. The guy who's going to lose out is the small-time e-mail newsletter writer who's going to have to get himself a $20/mo account from a server vendor. I can make that trade-off. -Bill - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Tomorrow: DLSLUG Monthly Meeting - September 7th
[please RSVP if you haven't already] *** Dartmouth-Lake Sunapee Linux Users Group http://www.dlslug.org/ *** The next regular monthly meeting of the DLSLUG will be held: Thursday, September 7th, 7-9PM at: Dartmouth College, Carson Hall, Room L01 All are welcome, free of charge. Agenda 7:00 Sign-in, networking 7:15 Introductory remarks 7:20 Joomla! presented by Barrie North, Compass Design Barrie will present Joomla!, a Content Management System (CMS) for building websites and other online applications. Joomla! is an open source solution that is freely available to everybody. Barrie will also present the new version in development, Joomla! 1.5. In the spring of 2005 Barrie started his own Web consultancy company, Compass Design, that specializes in Joomla Web Design. As well as web design he provides web marketing/SEO, usability and standards compliance expertise to his clients. When not working he can be frequently found on the Joomla community boards and have written several tutorial articles for using Joomla. 8:05 AJAX Development with Java and Linux presented by Jeff Dwyer First Jeff will demonstrate a new application he's developing with AJAX technologies and deploying on Linux. Then he'll get under the hood and show you some of the interesting things you can do with Google's new GWT toolkit. We'll then take a look at integrating the GWT into a popular web framework called Spring MVC. Finally, we'll introduce an ORM tool called Hibernate and discuss a couple of issues when using this with the Google Web Toolkit. Jeff is a Dartmouth '02 graduate in Computer Science. He's worked for 4 years as a Java developer architect. Currently he's working on a startup venture in the field of personal knowledge management. 8:50 Roundtable Exchange - where the attendees can make announcements or ask a linux question of the group. Please see the website for links to directions. If any area companies are interested in sponsoring refreshments, please let me know. Please RSVP so we can give a theoretical refreshment sponsor a headcount. - MAILING LISTS There are two primary mailman lists set up for DLSLUG, an Announce list and a Discuss list. Please sign up for the Announce list (moderated, low-volume) to stay apprised of the group's activities and the Discuss list (unmoderated) for group discussion. Links to the mailing lists are on the webpage. Please pass this announcement along to anyone else who may be interested. - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-announce mailing list gnhlug-announce@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-announce ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: Nudder spam blocking question :-(
On 9/6/06, Steven W. Orr [EMAIL PROTECTED] wrote: This is a new thing for me. I've never heard of an ISP rejecting mail as spam from a sender before ... The concept is nothing new, but it is getting a lot more sophisticated. It used to be your provider would just get abuse complaints and then cut your feed; now they're doing more in the way of active monitoring and analysis. Also, by reading some of the stuff on comcast's (no wait spamcop's) website, they seem to have redefined spam as being Unsolicited Bulk Mail instead of Unsolicited Commercial Email. There's no official definition of spam (other than the lunch meat). Some have used UBE, others UCE, others UBE/UCE, others excessive multi-posting, others any message I don't like, etc. IMO, the bulk part is actually more important than the commercial part. If someone wants to take the time to craft a one-of-a-kind, personalized commercial proposal for me, and send it unsolicited, I'm okay with that. But I don't want bulk mail, even if it's just a bunch of dancing hamsters. Anyone have experience dealing with designating *outgoing* mail as spam? As usual: Contact the operator where the block is occurring and asking them what's up. From: Mail Delivery Subsystem [mailto:[EMAIL PROTECTED] The following addresses had delivery problems: frambors@syslang.net Permanent Failure: 553_5.3.0_frambors@syslang.net..._Spam_blocked_see:_http://spamcop.net/bl. shtml?206.18.177.54 Can we assume you're sure that's not your server emitting the 553 (with Comcast simply reporting it)? In any event, that IP address appears to be within Comcast's network, and is not syslang.net, so perhaps your friend got his IP address on a SpamCop RBL somehow. Or maybe he's a DHCP user, and the previous lease owner for that address did the deed. -- Ben ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: COX blocking own users outbound email
On 9/5/06, Ben Scott [EMAIL PROTECTED] wrote: On 9/3/06, Jeff Kinz [EMAIL PROTECTED] wrote: The problem here is that we have a business running part of the public infrastructure.Sadly, human nature being what it is, this never works out for the best. Public infrastructure is defined how, exactly?Serious question.The longer I think about it, the trickier it becomes.I certainlythink that the Internet should be considered *something* more that a bunch of private networks, but how?Just because it sees use by many? Well, so does Wal-Mart, but I wouldn't call it public infrastructure. The only thing 'public' about the infrastructure of the internet is DNS and IP addresses. Everything else is up the the entities and their networks. Another point: History is certainly littered with examples about howlarge businesses abused the public trust.On the other hand, never is a bit strong.Not every such situation is a failure.A goodexample would be package and freight delivery.Many argue thecommercial organizations do a much better job at package delivery thanthe USPS.We see two large organizations (FedEx and UPS), a mid-sized org striving to catch them (DHL), and a multitude of independentoperators.This industry remains a vibrant, healthy commercialecosystem -- an example of capitalism at its best.Why is that, whenthe telecom industry fails so miserably? Becouse the cost of entry and cost per customer is so much higher. Until the day comes when WiFi can be used to deliver widespread and cheap network access, it will remain this way. Once it does happen, holy crap will there be a shakeup. My choice of industry is not an accident.As you note in your ownpost, telecom infrastructure bears a striking resemblance to our highway system, except that the telcos own both the highways *and* thevehicles which travel upon them.Many have put forward the idea thatperhaps we should try and make the telecom industry more like thehighway system, where a government-granted monopoly manages the roads/wires, and the free market competes in the space ofvehicles/service-on-the-wires.The telecom term for this isstructural separation; you can Google for it.My own opinion isthat this has a better chance of working than many other ideas I've seen put forward. The main issue with this idea is that advances in technology would never get rolled out in the interest of cost savings. On the other hand, however, existing infrastructures may now have more research done on providing greater capacilities over existing hardware technologies. The business never chooses to run the infrastructure in the way that is in the best interests of the people it serves. For that case, the usual answer is that the long-term interests of acompany are better served by giving customers what they want, ratherthan taking advantage of them in the short-term. Companies don't look at the long term much anymore. But they seem to be coming around to it now that they've found they can enter NEW markets, such as telephony and television. The supposed choice implied by If you don't like it, go somewhere else. is non existent.That is a problem.Any time you have that situation, you are goingto have problems.Net Neutrality and email blocking are just a few examples in a long list of problems associated with telecommonopolies.Even if we solve those problems with legislation, wewill only end up fighting different battles again tomorrow.As I have stated before, I feel we should go after the cause -- the unhealthytelecom market -- not perpetually treat the symptoms. But the internet only exists in the terms of IP and DNS. How traffic is handled has nothing to do with it. If I decide to block, say, anonymous SIP traffic over port 5060 at a given company, am I now breaking the law by not allowing SIP traffic from external providers in? Thomas
Re: Long-term (hours+) solution for power outage: PBX, lights, and computers
On Aug 31, 2006, at 15:57, Ted Roche wrote: He's working out of leased office space, and a generator or major structural changes are unreasonable. Can you expand on this? Is it because of the typical permanent installation of a generator which they see as a sunk cost? Or is the landlord unwilling to allow them to install one? Because a generator is what they need, and the I need to get to San Francisco for $450 in five hours, but a commercial airliner is unreasonable argument needs some support. I've worked with battery units similar to the link you sent - for the kind of runtime you need and the load you want, a generator is much much cheaper. You're probably looking at a $40K battery unit if the manufacturer is a name brand and isn't lying about the actual runtime and you need another $3-5K worth of electrician work to install it, if you're not going to be running extension cords all over the office. Either that or a nuclear battery like that town in Alaska is using, but then they'd need a nuclear engineer on their team - hey, wait... -Bill - Bill McGonigle, Owner Work: 603.448.4440 BFC Computing, LLC Home: 603.448.1668 [EMAIL PROTECTED] Cell: 603.252.2606 http://www.bfccomputing.com/Page: 603.442.1833 Blog: http://blog.bfccomputing.com/ VCard: http://bfccomputing.com/vcard/bill.vcf ___ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
Re: COX blocking own users outbound email
On 9/3/06, Jeff Kinz [EMAIL PROTECTED] wrote: On Sun, Sep 03, 2006 at 04:02:25PM -0400, Ben Scott wrote: Some view it that way.Others say, Hey, if I'm an operator, I get to be in control of my network.It's not your network, it's mine.If you don't like it, go somewhere else.The problem here is that we have a business running part of the publicinfrastructure.Sadly, human nature being what it is, this never worksout for the best. The business never chooses to run the infrastructure in the way that is in the best interests of the people it serves. In what way is the internet a public infrastructure? If this is the case, I demand to have fiber run to my house in the boondocks of Lyndeborough at the expense of everyone else. :-) The supposed choice implied by If you don't like it, go somewhereelse. is non existent.Its a false choice frame-up. There is no somewhere else to go to get away from this problem.Like most people in the USA I currently have two or fewer choices forhigh speed residential broadband access.Even when including dial upproviders the same restrictions are in effect because of the standards created by the duopoly.They all do this so there is no realchoice. What standards? I didn't know there was a federal mandate on what technologies could be used to transfer IP traffic. What you don't like is that you don't have a network connection that you can do whatever you wish with. Good news. You can buy one. Unfortionatly, at a much greater cost then you currently pay. It's not your network, it's mine.Yup - Our information highway is a toll road. for now. And thats the problemThe infrastructure material/physical assets areowned by the wrong entity. The tail is wagging the dog.They paid for them. They BUILT them. But.. They aren't theirs? They are somehow.. Yours? Why do you think the cable/phone duopoly HATES Muni-Wi-Fi projects somuch? :-)They could lose their monopoly! *nod* And the best part? They can't really do a lick about it. You want to do it, go buy the above mentioned internet connection, and go house. They can't stop you. On the other hand, using your logic.. It'll be mine. After all, you have an internet connection, and the internet is a public infrastructure, right? With real competition each year a company can lose the business. If theyhaven't done a good job or tried to milk it for too much money.For the very first time in history the phone company would actually havea direct business reason to do a good job at a low price instead of apremium price. Again, feel free. Go house. It's a free country. :-) The point of the original context was that history has shown, manytimes, that if you let a small group of people get persecuted for unfair reasons, you are enabling the persecutors to do it to whomever theywant for any reason and get away with it. ... Blocking port 25 is NOT persecution. That's your landlord not allowing his/her customers use of the rear lawn becouse too many times it's bee destroyed by dogs. Stopping illegal behavior is Censorship ?I'm talking about illegal behavior, and enforcing the restriction of that behavior.Not, as has already been done by some ISP's, restrictingtheir customers access to websites whose politics are in opposition tothe ISP's politics. (Rogers Cable, Canada IIRC) Have they ever refused to allow DNS names to resolve to these sites? No. Whomever you use to provide your service decides to resrict their customers. Good for them. Even better for the ISP's they turn to. Damned that free country environment. I mean, MV communications would have been GOLDEN years ago if they could have told everyone else to goto hell, they have the market cornered in NH. Of course, we also wouldn't have DSL, cable, or fiber options as many due now, simply becouse they where a smaller company. (Disclaimer, I LIKE MV, I know mallet is on the list, it's simply an example of a company who was one of the first to come in and provide ISP services on a larger scale in NH, that's all) I disagree. No system is ever perfect, but, again taking theroad/highway system as an example you can achieve a specific level ofproper behavior if you are willing to do so. If you break the rulesseverely enough on the road you will eventually get caught and get a ticket, do that enough times and you lose your driving privileges. Yes. And that pothole in your vision of the Internet that's causing you 50% packet loss will be fixed within the next few months. Promise. Hope it doesn't ruin your computers shocks, tho... It's a tough situation to be in.Vast amounts of spam originate from all over the place.Presently, in many cases, this spam originates from compromised machines, which together are operated by the vast majority of Internet users.Do you suggest we IDP everybody?Nope - an effective solution to zombied systems is easy to implement and very very precise.My log files identify thousands of unique IP's attempting to attack mysystem thru various means. These attack vectors are easily