Re: [ilugd] Red Hat 9.0

2003-05-29 Thread Nitin Chandra
Ok guyswearing special prepared undi for flame
WAR .rrr...
First it is working cuz i am writing from that
machin  :X)

secondlyjhoot bole aap logo ko kauwa kaate 
it is working on my comp ha

Thirdly Gimp work...have work on itthis install
itself
i also use Open office 1.0
have also installed j2sdk

so for RAM yes it is 128 MB RAM + 32 Mb so will
clarify here ...at boot time it shows 163... KB will
note it properly and mail u offline.

yes i use NEC 17 inch MultiSync70 Monitor wont be
able to type with out a keyboard and yes mouse
works...
Hope u haven't forgoton i am using RH8.0.
jhoootteri too [EMAIL PROTECTED] all in good fun

Nitin Chandra

--- amit soni [EMAIL PROTECTED] wrote:
   .and for your information  and at the
 risk of
   repeating my self for some i have a P-I 120
 mhz ,
   with a 1mb Sis graphic card ... 168MB SDRAM, on
 a 4.3
   GB hdd .etc n RH8.0 Linux.
 
  am really curious to know, does an application
 like openoffice work under
 the
  p1, with that amount of ram, at a comfortable
 speed?
 
  have you tried gimp?
 
  what about browsing in multiple windows?
 
  point is, if it works fine, that's something i'd
 like to publicise.
 
 The more important point is. Do you use this
 computer as your primary
 desktop computer ?
 Even I have a 486 DX/2 overdrive 66Mhz computer and
 I can install redhat 9.0
 on it. but then its there in the store room with my
 20 year old oven and a
 few burnt transformers. This is no claim then.
 
 BTW does this PC have a monitor ? or a keyboard ? or
 are u just using it as
 a firewall or something ?
 
 and how come you have 168MB RAM ?
 128 + 32= 160 ?
 128 + 16= 144 ?
 128 + 32 + 8 =168 ? there is no 8MB sdram.
 
 Yeh nitin jhoot bol raha hai.
 
 
 
 
 
 ___
 ilugd mailing list
 [EMAIL PROTECTED]
 http://frodo.hserus.net/mailman/listinfo/ilugd


__
Do you Yahoo!?
Yahoo! Calendar - Free online calendar with sync to Outlook(TM).
http://calendar.yahoo.com

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] Take on Gates, Kalam tells Indian techies

2003-05-29 Thread Raj Mathur
[Cross-posted]

Take on Gates, Kalam tells Indian techies

TIMES NEWS NETWORK[ WEDNESDAY, MAY 28, 2003 11:31:30 PM ]

PUNE: A few months after a disagreement with Microsoft CEO Bill Gates
on the issue of software security, President A P J Abdul Kalam on
Wednesday called on Indian IT professionals to specialise in open
source software rather than relying on proprietary solutions.

Full story at:
http://timesofindia.indiatimes.com/cms.dll/html/uncomp/articleshow?msid=47797903
(URL may wrap)

-- Raju
-- 
Raj Mathur[EMAIL PROTECTED]  http://kandalaya.org/
   GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
  It is the mind that moves

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] three strikes in one day against m$

2003-05-29 Thread amit soni
 steve ballmer sold over $1.2 billion (that's about 6000 crore rupees!)
 worth of his microsoft shares between may 21 and 23, ostensibly to
 diversify. is his faith in m$ waning? 

Or probably Iraqi oil is more lucerative an option.



___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] (no subject)

2003-05-29 Thread nikhilbhargav_nsit
hello friends,


 


I have joined this group recently. I  want to  know if any person is working on 
porting linux on mpc 826X target or similar one. My work is also linux centric and 
involves porting of kernel on motorola mpc 826X target arch.


 


bye,


nikhil bhargava
Get Your Private, Free E-mail from Indiatimes at  http://email.indiatimes.com
Buy The Best In BOOKS at http://www.bestsellers.indiatimes.com
Bid for Air Tickets @ Re.1 on Air Sahara Flights. Just log on to 
http://airsahara.indiatimes.com and Bid Now !
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] (fwd) [SECURITY] [ANNOUNCE] Apache 2.0.46 released

2003-05-29 Thread Raj Mathur
[Please upgrade if you use Apache 2.0.x on any platform -- Raju]

This is an RFC 1153 digest.
(1 message)
--

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=X-UNKNOWN
Content-Transfer-Encoding: 8BIT
Message-ID: [EMAIL PROTECTED]
From: Apache HTTP Server Project [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: [Full-Disclosure] [SECURITY] [ANNOUNCE] Apache 2.0.46 released
Date: Wed, 28 May 2003 12:29:03 -0400 (EDT)



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


   Apache 2.0.46 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the ninth public release of the Apache 2.0
   HTTP Server.  This Announcement notes the significant changes in
   2.0.46 as compared to 2.0.45.


   This version of Apache is principally a security and bug fix release.
   A summary of the bug fixes is given at the end of this document.
   Of particular note is that 2.0.46 addresses two security
   vulnerabilities:

   Apache 2.0 versions 2.0.37 through 2.0.45 can be caused to crash in
   certain circumstances.  This can be triggered remotely through mod_dav
   and possibly other mechanisms.  The crash was originally reported by
   David Endler [EMAIL PROTECTED] and was researched and fixed by
   Joe Orton [EMAIL PROTECTED].  Specific details and an analysis of the
   crash will be published Friday, May 30.  No more specific information
   is disclosed at this time, but all Apache 2.0 users are encouraged to
   upgrade now.
   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245]

   Apache 2.0 versions 2.0.40 through 2.0.45 on Unix platforms were
   vulnerable to a denial-of-service attack on the basic authentication
   module, which was reported by John Hughes [EMAIL PROTECTED].
   A bug in the configuration scripts caused the apr_password_validate()
   function to be thread-unsafe on platforms with crypt_r(), including
   AIX and Linux.  All versions of Apache 2.0 have this thread-safety
   problem on platforms with no crypt_r() and no thread-safe crypt(),
   such as Mac OS X and possibly others.  When using a threaded MPM (which
   is not the default on these platforms), this allows remote attackers
   to create a denial of service which causes valid usernames and
   passwords for Basic Authentication to fail until Apache is restarted.
   We do not believe this bug could allow unauthorized users to gain
   access to protected resources.
   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0189]

   The Apache Software Foundation would like to thank David Endler
   and John Hughes for the responsible reporting of these issues.


   This release is compatible with modules compiled for 2.0.42 and later
   versions.  We consider this release to be the best version of Apache
   available and encourage users of all prior versions to upgrade.

   Apache 2.0.46 is available for download from

 http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.0 file, linked from the above page, for
   a full list of changes.

   Apache 2.0 offers numerous enhancements, improvements, and performance
   boosts over the 1.3 codebase.  For an overview of new features introduced
   after 1.3 please see

 http://httpd.apache.org/docs-2.0/new_features_2_0.html

   When upgrading or installing this version of Apache, please keep
   in mind the following:

   If you intend to use Apache with one of the threaded MPMs, you must
   ensure that the modules (and the libraries they depend on) that you
   will be using are thread-safe.  Please contact the vendors of these
   modules to obtain this information.


   Apache 2.0.46 Major changes

   Security vulnerabilities closed since Apache 2.0.45

*) SECURITY [CAN-2003-0245]: Fixed a bug that could be triggered
   remotely through mod_dav and possibly other mechanisms, causing
   an Apache child process to crash.  The crash was first reported
   by David Endler [EMAIL PROTECTED] and was researched and
   fixed by Joe Orton [EMAIL PROTECTED].  Details will be released
   on 30 May 2003.

*) SECURITY [CAN-2003-0189]: Fixed a denial-of-service vulnerability
   affecting basic authentication on Unix platforms related to
   thread-safety in apr_password_validate().  The problem was reported
   by John Hughes [EMAIL PROTECTED]


   Bugs fixed and features added since Apache 2.0.45

*) Fix for mod_dav.  Call the 'can_be_activity' callback, if provided,
   when a MKACTIVITY request comes in.
   [Ben Collins-Sussman [EMAIL PROTECTED]]

*) Perform run-time query in apxs for apr and apr-util's includes.
   [Justin Erenkrantz]

*) run libtool from the apr install directory (in case that is different
   from the apache install directory) [Jeff Trawick]

*) configure.in: