Re: Google Earth for Linux beta is available
Shlomo Solomon [EMAIL PROTECTED] writes: The subject says it all - this program is really fantastic. Try looking at the pedestrians crossing the street in New York or look for your street in Israel (they don't have super-high resolution for our part of the world). http://earth.google.com/download-earth.html Call me paranoid, but I believe they really are out there to get me. I downloaded GoogleEarthLinux.bin and ran it as a normal user. It popped up a license agreement that I read, and considered really fishy and unclear. It is quite unclear to me what information I will allow Google to collect, use, and disseminate outside of Israel and outside of Google. It is not clear to me whether agreeing to the license is considered signing for services, creating a Google account (which I don't have and don't intend to have), and what privacy implications this entails. Yes, I read Google's privacy policy, and it is not clear to me which parts apply and which don't. I suspect that all parts apply. It is clear to me that I am agreeing to let Google automatically install updates on my computer as they see fit, and that while I can terminate the agreement and uninstall the program (I don't know how easy it is) significant parts of the agreement will still be in force even after termination. Has anyone actually studied the agreement and *really* understood its implications? Google is not a company I would trust implicitly, and I feel extra paranoid. -- Oleg Goldshmidt | [EMAIL PROTECTED] | http://www.goldshmidt.org = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Google Earth for Linux beta is available
Quoth Oleg Goldshmidt: Call me paranoid, but I believe they really are out there to get me. They are. They, in this case, being they - the faceless and largely anonymous forces of both evil and good, not to mention several forces in between and a few at an angle. [snip running GEL] implications? Google is not a company I would trust implicitly, and I feel extra paranoid. Is there a company (or, to take matters to an extreme, a state) that you DO trust implicitly? Or, as the case may be, EXplicitly. Would you trust Microsoft? Adobe? CA? IBM? Lenovo? Eplication? Sun Microsystems? Yahoo? Which? Would you trust, again implicitly or explicitly, Israel? USA? Russia? Uganda? Pakistan? Palestine? South Africa? Mexico? Brasil? Togo? Australia? Canada? If you trust any one entity, I suggest you read up on nacht und nebel and its application by various states. Read up on such illustrious people as Yechiel Horev, Lavrenti Beriya, Ernst Kaltenbrunner who all had a hand in development of the NuN system. As for the specific question of GEL - if you want, play with it a bit from a jail filesystem (which is what I did) and if you like it (which I did not) - obliterate it. M -- ---MAV Marc A. Volovic [EMAIL PROTECTED] Swiftouch, LTD +972-544-676764 = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
RE: Writing I/O intercepting driver in Linux
Michael Sternberg wrote: We have to write driver that intercept all I/O to disk and notifies user-mode application with following data: block length and device number. What is a proper way to implement it: to write a block driver above disk layer or to implement a file system filter ? If we'll implement a file system filter could we miss some direct I/O to the disk ? What kind of I/O could we miss ? There were propositions to use kprobe, systemtap and /proc/sys/vm/block_dump.. Unfortunately (as far as I know) those are features of 2.6.xx kernels. We have to write for RHEL 3 which uses 2.4.xx kernel :( and of course we're not allowed to apply our patches to kernel, have to use the RH standard one.. = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: 32-bit chroot environement for amd64
Avraham Rosenberg wrote: packages only. Anyway, I went immediately for it and for transfig. I was less lucky with octave2.9: Package octave2.9 is not available, but is referred to by another package. This may mean that the package is missing, has been obsoleted, or is only available from another source E: Package octave2.9 has no installation candidate Hmm... Seems that the amd64 version is only available for unstable (which is the flavor I use)... http://packages.debian.org/cgi-bin/search_packages.pl?keywords=octave2.9searchon=namessubword=1version=allrelease=all If you really need it, you could add unstable to your sources.list (just make sure to put Apt::Default-Release testing; in your apt.conf if you wish to avoid a wholesale upgrade to sid). The 64-bit octave2.1 does work with the 32-bit xv without problems. I still intend to try and build the 64-bit xv version, but this is not urgent matter. As for submitting it to debian, I am affraid that xv's licence is not politically corect enough for them. I prefer it, nevertheless, to Indeed - seems that it's a personal use only license (distributing binaries is illegal, even if you buy the site license), so even in non-free it would be illegal. However, I'm sure an automatic installer in contrib (like the ones for Java or MS truetype fonts) would be appreciated. But, of course, let's not put the cart before the horse - we must have a working compilation first... Amit = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Google Earth for Linux beta is available
Quoting Marc A. Volovic, from the post of Mon, 19 Jun: implications? Google is not a company I would trust implicitly, and I feel extra paranoid. Is there a company (or, to take matters to an extreme, a state) that you DO trust implicitly? Or, as the case may be, EXplicitly. Would you trust well put. I would not trust implicitly any one person or even scientific factoids I didn't test myself. then again, I have little trust of my own self. I never give me the root password, sudo is just fine. But this is the future, should I quote? You have NO privacy, get over it! -- Always there for you Ira Abramov http://ira.abramov.org/email/ = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Google Earth for Linux beta is available
Quoting Tal Peer, from the post of Mon, 19 Jun: Last time I looked into it, I understood the common belief is that they are stored in moshav Zakariya (Bet Shemesh area), under the grocery store or something this is getting a bit of topic, but wouldn't you agree it would make little to no sense to store it all in one place? Some is in the Galilee aimed at Syria and Iraq, I'm sure... and not for shooting, just as a scare tactic. Israel knows that Syria knows, and want them to know. -- Purged voter Ira Abramov http://ira.abramov.org/email/ = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Preventing email spoofing
Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? Is there any written script that does so? __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote: Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? Is there any written script that does so? This is NOT a good way. Many mailing lists and other sources (e.g. small offices sending their mail through their ISP) will bounce. Even your email - from: [EMAIL PROTECTED] - had come from [EMAIL PROTECTED] Remember - all the headers (except the last Received:, created by your computer) may be forged. Ehud. -- Ehud Karni Tel: +972-3-7966-561 /\ Mivtach - Simon Fax: +972-3-7966-667 \ / ASCII Ribbon Campaign Insurance agencies (USA) voice mail and X Against HTML Mail http://www.mvs.co.il FAX: 1-815-5509341 / \ GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
RE: Preventing email spoofing
This shouldn't be that easy. For example, I send my mails through my ISP outgoing mail server while my From: field is always set to my gmail account. Regards, Gregory. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of E Leibovich Sent: Monday, June 19, 2006 2:44 PM To: linux-il Subject: Preventing email spoofing Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? Is there any written script that does so? __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED] To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
--=-RbnXbV2+yK88GJ6KFsTs Content-Type: text/plain Content-Transfer-Encoding: 7bit On Mon, 2006-06-19 at 04:44 -0700, E Leibovich wrote: Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? You might want to read up on SPF. -- Oded ::.. If you're in a war, instead of throwing a hand grenade at the enemy, throw one of those small pumpkins. Maybe it'll make everyone think how stupid war is, and while they are thinking, you can throw a real grenade at them. -- Deep Thoughts by Jack Handey --=-RbnXbV2+yK88GJ6KFsTs Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 7bit !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 TRANSITIONAL//EN HTML HEAD META HTTP-EQUIV=Content-Type CONTENT=text/html; CHARSET=UTF-8 META NAME=GENERATOR CONTENT=GtkHTML/3.10.1 /HEAD BODY On Mon, 2006-06-19 at 04:44 -0700, E Leibovich wrote: BLOCKQUOTE TYPE=CITE PRE FONT COLOR=#00Is there any automated tool to bounce email not from/FONT FONT COLOR=#00the original server? That is, is there a tool that/FONT FONT COLOR=#00bounces back emails claiming they're from hostA (their/FONT FONT COLOR=#00from:[EMAIL PROTECTED]) however they're really from hostB/FONT FONT COLOR=#00(that is, recieved: from hostB...)./FONT FONT COLOR=#00This seems a good way to prevent many spam messages/FONT FONT COLOR=#00that claim to originate from your server./FONT FONT COLOR=#00Is it a good idea?/FONT /PRE /BLOCKQUOTE BR You might want to read up on SPF.BR BR TABLE CELLSPACING=0 CELLPADDING=0 WIDTH=100% TR TD -- PRE Oded /PRE ::..BR quot;If you're in a war, instead of throwing a hand grenade at the enemy, throw one of those small pumpkins. Maybe it'll make everyone think how stupid war is, and whilenbsp;nbsp;they are thinking, you can throw a real grenade at them.quot;BR nbsp;nbsp;nbsp;nbsp;-- Deep Thoughts by Jack HandeyBR BR /TD /TR /TABLE /BODY /HTML --=-RbnXbV2+yK88GJ6KFsTs-- = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Subversion-friendly Shell hacking?
I am now reading about Subversion. Turns out that in order to get Subversion to properly manage and keep track of history of files even when they are copied or renamed, one should use 'svn copy' instead of 'cp' and 'svn move' instead of 'mv'. I wonder whether shells (such as bash) have a facility to do directory-dependent aliasing. For example, when your pwd is a directory checked out from a svn repository (could be identified as having .svn subdirectory or declared as such in .bash_profile), then your 'cp' becomes alias to a script which processes cp's arguments and issues the appropriate 'svn copy' command/s. --- Omer -- You haven't made an impact on the world before you caused a Debian release to be named after Snufkin. My own blog is at http://tddpirate.livejournal.com/ My opinions, as expressed in this E-mail message, are mine alone. They do not represent the official policy of any organization with which I may be affiliated in any way. WARNING TO SPAMMERS: at http://www.zak.co.il/spamwarning.html = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
That's very true, I haven't thought of that. Thanks. Any smarter idea? Maybe I can filter emails coming from my host email address and then make sure they're not recieved: from unknown source (spammers has the habbit of including your hostname in the from: field, so that you'll whitelist them) On 6/19/06, Ehud Karni [EMAIL PROTECTED] wrote: On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote: Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? Is there any written script that does so? This is NOT a good way. Many mailing lists and other sources (e.g. small offices sending their mail through their ISP) will bounce. Even your email - from: [EMAIL PROTECTED] - had come from [EMAIL PROTECTED] Remember - all the headers (except the last Received:, created by your computer) may be forged. Ehud. -- Ehud Karni Tel: +972-3-7966-561 /\ Mivtach - Simon Fax: +972-3-7966-667 \ / ASCII Ribbon Campaign Insurance agencies (USA) voice mail and X Against HTML Mail http://www.mvs.co.il FAX: 1-815-5509341 / \ GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
The thought-work was already done for you. As Oded said, read about Sender Policy Framework (SPF). Using a mail server with SPF is about all you can do; it ain't good news, but trust the smart people who thought SPF up there isn't a better option. Elazar Leibovich wrote: That's very true, I haven't thought of that. Thanks. Any smarter idea? Maybe I can filter emails coming from my host email address and then make sure they're not recieved: from unknown source (spammers has the habbit of including your hostname in the from: field, so that you'll whitelist them) On 6/19/06, Ehud Karni [EMAIL PROTECTED] wrote: On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote: Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? Is there any written script that does so? This is NOT a good way. Many mailing lists and other sources (e.g. small offices sending their mail through their ISP) will bounce. Even your email - from: [EMAIL PROTECTED] - had come from [EMAIL PROTECTED] Remember - all the headers (except the last Received:, created by your computer) may be forged. Ehud. -- Ehud Karni Tel: +972-3-7966-561 /\ Mivtach - Simon Fax: +972-3-7966-667 \ / ASCII Ribbon Campaign Insurance agencies (USA) voice mail and X Against HTML Mail http://www.mvs.co.il FAX: 1-815-5509341 / \ GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED] = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Subversion-friendly Shell hacking?
Omer Zak wrote: I am now reading about Subversion. Turns out that in order to get Subversion to properly manage and keep track of history of files even when they are copied or renamed, one should use 'svn copy' instead of 'cp' and 'svn move' instead of 'mv'. I wonder whether shells (such as bash) have a facility to do directory-dependent aliasing. For example, when your pwd is a directory checked out from a svn repository (could be identified as having .svn subdirectory or declared as such in .bash_profile), then your 'cp' becomes alias to a script which processes cp's arguments and issues the appropriate 'svn copy' command/s. --- Omer I don't think you can really do that with a simple alias. What you can do is create a shell function called mv that will check if the file is in a subversion directory and do svn move on it. The function will override the call to mv and you'll need to call the real mv with /bin/mv. This will require some work since you need to have 'mv a b' and 'svn x/y/z/a b' and also handle the case when some files are in a subversion controlled directory but are not version controlled (just temp files of generated files). This seems like quite a bit more work than just learning to do svn move IMO. Baruch = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
Thanks! That's about the tool I've needed. But do you have experience with it? Does it has many (any) false positives? Will it reject many valid clients? On 6/19/06, Ilya Konstantinov [EMAIL PROTECTED] wrote: The thought-work was already done for you. As Oded said, read about Sender Policy Framework (SPF). Using a mail server with SPF is about all you can do; it ain't good news, but trust the smart people who thought SPF up there isn't a better option. Elazar Leibovich wrote: That's very true, I haven't thought of that. Thanks. Any smarter idea? Maybe I can filter emails coming from my host email address and then make sure they're not recieved: from unknown source (spammers has the habbit of including your hostname in the from: field, so that you'll whitelist them) On 6/19/06, Ehud Karni [EMAIL PROTECTED] wrote: On Mon, 19 Jun 2006 04:44:25 -0700 (PDT), E Leibovich wrote: Is there any automated tool to bounce email not from the original server? That is, is there a tool that bounces back emails claiming they're from hostA (their from:[EMAIL PROTECTED]) however they're really from hostB (that is, recieved: from hostB...). This seems a good way to prevent many spam messages that claim to originate from your server. Is it a good idea? Is there any written script that does so? This is NOT a good way. Many mailing lists and other sources (e.g. small offices sending their mail through their ISP) will bounce. Even your email - from: [EMAIL PROTECTED] - had come from [EMAIL PROTECTED] Remember - all the headers (except the last Received:, created by your computer) may be forged. Ehud. -- Ehud Karni Tel: +972-3-7966-561 /\ Mivtach - Simon Fax: +972-3-7966-667 \ / ASCII Ribbon Campaign Insurance agencies (USA) voice mail and X Against HTML Mail http://www.mvs.co.il FAX: 1-815-5509341 / \ GnuPG: 98EA398D http://www.keyserver.net/Better Safe Than Sorry = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED] = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: 32-bit chroot environement for amd64
On Mon, Jun 19, 2006 at 10:43:56AM +0300, Amit Aronovitch wrote: Avraham Rosenberg wrote: Hmm... Seems that the amd64 version is only available for unstable (which is the flavor I use)... http://packages.debian.org/cgi-bin/search_packages.pl?keywords=octave2.9searchon=namessubword=1version=allrelease=all If you really need it, you could add unstable to your sources.list (just make sure to put Apt::Default-Release testing; in your apt.conf if you wish to avoid a wholesale upgrade to sid). But, of course, let's not put the cart before the horse - we must have a working compilation first... Amit Hi Amit, 1-I do have the unstable sources. But they only allow me to install specific programs, using the -t unstable option, as my preferences file only lists stable and testing packages. For the time being I won't install the unstable octave, as it is a big package with lots of dependencies and would practically mean going over to unstable, which I am still reluctant to do. The big advantage of a build from sources is that it erects a separate subsystem in /usr/local, which is easily thrown away if it affects too much the stability of the syatem. 2-Another possibility which does not take much more disk space (and with nowadays' big disks, who cares anyway ?), is to install a separate unstable distribution, just for that. I tried to do it, but, during the bootstrap of the 32-bit chroot system, I received a cannot download the base configuration package message. I retried a couple of days later with the same result. Did you have a similar experience? I used the same mirror (http://debian.inode.at/debian-amd64/debianat) which allowed me to build the first 64-bit system. 3-I did not know about the possibility of tweaking the apt.conf that you mentioned. Where can I read about that ? I only know about pinning (I was never able to guess what numbers should I write to get the desired result) and the way I mentioned before. Cheers, Avraham = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
Elazar Leibovich wrote: Thanks! That's about the tool I've needed. But do you have experience with it? Does it has many (any) false positives? Will it reject many valid clients? SPF is not about guesswork and false positives. For one, it requires the active participation of every domain you wish to be safe about. Since that's probably less than 1% of the domains in today's Internet, you cannot just refuse mail from domains which don't participate in the SPF game. The only thing sensible to do right now, is to refuse messages which fail the SPF test for the domain they *claim* to come from; everything else should be considered neutral. The result? You'd be still left with as much scams coming from random info domains, but when it comes to some high-profile domains which already deployed SPF (microsoft.com, ebay.com, gmail.com, hotmail.com...), you'd filter out all scams pretending to be them. Note that SPF is not something reserved for high-profile domains. Every Nigerian scam domain can deploy SPF and then it'll be verifiable fair and square. So, no easy way of killing off all those Nigerian scams? You betcha there isn't. = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Subversion-friendly Shell hacking?
On Mon, Jun 19, 2006, Baruch Even wrote about Re: Subversion-friendly Shell hacking?: Turns out that in order to get Subversion to properly manage and keep track of history of files even when they are copied or renamed, one should use 'svn copy' instead of 'cp' and 'svn move' instead of 'mv'. I wonder whether shells (such as bash) have a facility to do directory-dependent aliasing. For example, when your pwd is a directory checked out from a svn repository (could be identified as having .svn subdirectory or declared as such in .bash_profile), then your 'cp' becomes alias to a script which processes cp's arguments and issues the appropriate 'svn copy' command/s. ... What you can do is create a shell function called mv that will check if the file is in a subversion directory and do svn move on it. The function will override the call to mv and you'll need to call the real mv with /bin/mv. Another possible trick is to change cd itself to a function (or, in zsh, create a new chpwd), and after each directory change, re-alias the cp and mv commands. -- Nadav Har'El| Monday, Jun 19 2006, 24 Sivan 5766 [EMAIL PROTECTED] |- Phone +972-523-790466, ICQ 13349191 |How to become immortal: Read this http://nadav.harel.org.il |signature tomorrow and follow its advice. = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Subversion-friendly Shell hacking?
On Mon, 2006-06-19 at 23:57 +0300, Nadav Har'El wrote: On Mon, Jun 19, 2006, Baruch Even wrote about Re: Subversion-friendly Shell hacking?: What you can do is create a shell function called mv that will check if the file is in a subversion directory and do svn move on it. The function will override the call to mv and you'll need to call the real mv with /bin/mv. Another possible trick is to change cd itself to a function (or, in zsh, create a new chpwd), and after each directory change, re-alias the cp and mv commands. I like this idea. The 'cp' and 'mv' commands would retain their efficiency. In bash, it should be possible to set PROMPT_COMMAND so that it'll also invoke a re-aliasing script. --- Omer -- You haven't made an impact on the world before you caused a Debian release to be named after Snufkin. My own blog is at http://tddpirate.livejournal.com/ My opinions, as expressed in this E-mail message, are mine alone. They do not represent the official policy of any organization with which I may be affiliated in any way. WARNING TO SPAMMERS: at http://www.zak.co.il/spamwarning.html = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Preventing email spoofing
On 6/19/06, Ilya Konstantinov [EMAIL PROTECTED] wrote: Note that SPF is not something reserved for high-profile domains. Every Nigerian scam domain can deploy SPF and then it'll be verifiable fair and square. So, no easy way of killing off all those Nigerian scams? You betcha there isn't. That's because SPF is not intended to solve the spam problem, it's intended to solve the domain masquarading problem. It's basically an authentication method where you trust a trusted 3rd party (the DNS server) to tell you which hosts are allowed to send mail on behalf of the domain that you're querying about. For example, my SPF record is: arik.baratz.org.43200 IN TXT v=spf1 include:aspmx.googlemail.com ~all This means that I trust aspmx.googlemail.com to tell which hosts are allowed to send email on my behalf. Google's SPF record is: aspmx.googlemail.com. 7200IN TXT v=spf1 redirect=_spf.google.com and _spf.google.com.274 IN TXT v=spf1 ip4:216.239.56.0/23 ip4:64.233.160.0/19 ip4:66.249.80.0/20 ip4:72.14.192.0/18 ?all so these are the addresses that can send email for my domain. The immediate benefit from SPF is that it prevents joe-jobs, some spammer using your domain to send spam from. The future benefit when it is widely deployed would be black-list of domains that have sent spam. Since you can't forge your domain, you'd have to send spam from a domain you own, therefore you'd have to keep on buying domains as the existing ones get into the blacklist. -- Arik = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: Subversion-friendly Shell hacking?
On 20/06/06, Omer Zak [EMAIL PROTECTED] wrote: On Mon, 2006-06-19 at 23:57 +0300, Nadav Har'El wrote: On Mon, Jun 19, 2006, Baruch Even wrote about Re: Subversion-friendly Shell hacking?: What you can do is create a shell function called mv that will check if the file is in a subversion directory and do svn move on it. The function will override the call to mv and you'll need to call the real mv with /bin/mv. Another possible trick is to change cd itself to a function (or, in zsh, create a new chpwd), and after each directory change, re-alias the cp and mv commands. I like this idea. The 'cp' and 'mv' commands would retain their efficiency. I don't like the idea - it assumes that you always touch only files in your current directory. Baruch's suggestion sounds much more general to me. Efficiency differences are negligible here. BTW - regardless of the aliasing mechanism you adopt - how are you going to handle files which are copied/moved between an SVN directory and a non-SVN one? --Amos -- (a grizzly) can tear through a tree like a Jewish mother through self-esteem. - The Simpsons = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
(no subject)
Hi all, I am looking for an elegant solution to my internet connecivity. I use actcom and connect with a script. What I want is some fine tuning. I would like the script to run. When my computer reboots (which isn't often, its Linux after all) When my connection dies (this is the most important since I often access my home computer from work) I was given a script to use with cron, but I never found that it worked for me, but I could be something I am doing wrong. I would prefer a more elegent approach which checks to see if I am connected, the way I do manually ie ifconfig and pinging a known address. If the connection is down then run the connect script. Any ideas would be most helpful. I will paste the various scripts I have at the end of this email. Thanks, Aaron - [EMAIL PROTECTED]:/usr/sbin# cat ptstart #!/bin/sh # Put your connection startup commands here VPN=172.26.255.198 USER=[EMAIL PROTECTED] MTU=1350 CABLEGW=`route -n | grep ^0.0.0.0 | awk '{ print $1 }'` cat /etc/ppp/resolv.conf /etc/resolv.conf route del default #route add 172.26.255.198 gw $CABLEGW route add 172.26.255.198 gw 172.25.96.1 PPTP=`which pptp` $PPTP $VPN user $USER defaultroute noauth mtu $MTU exit 0 [EMAIL PROTECTED]:/usr/sbin# --- [EMAIL PROTECTED]:/usr/sbin# cat ptstop #!/bin/bash #Put your connection stop commands here killall pptp exit 0 /etc/init.d/networking restart [EMAIL PROTECTED]:/usr/sbin# - [EMAIL PROTECTED]:/usr/sbin# cat ptcron #!/bin/sh TESTHOST=198.133.219.25 #Host to ping-test: cisco.com STOPSCRIPT=/usr/sbin/ptstop #Script to stop a connection STARTSCRIPT=/usr/sbin/ptstart #Script to start a connection #Make sure we don't have 2 instances on this script running at once [ -e /var/run/ptcron.pid ] exit 0 touch /var/run/ptcron.pid # The actual connectivity testing is right here PING=`which ping` if $PING -c 3 -n $TESTHOST /dev/null; then exit 0 rm -f /var/run/ptcron.pid fi echo -e Link is dead, reloading $STOPSCRIPT # wait a little while to let the pppd processes to shut down sleep 2 $STARTSCRIPT rm -f /var/run/ptcron.pid exit 0 [EMAIL PROTECTED]:/usr/sbin# -- :) = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
RE: (no subject)
There was smth called ppp-watch once. Personally, I use ip.up and ip.down scripts called by ppp when connection goes up or down to notice this events and check if the connection down was intentional. If it is not - a script is being run that attempts to re-connect each 5 minutes until successful. Regards, Gregory. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Tuesday, June 20, 2006 8:13 AM To: linux-il@linux.org.il Subject: (no subject) Hi all, I am looking for an elegant solution to my internet connecivity. I use actcom and connect with a script. What I want is some fine tuning. I would like the script to run. When my computer reboots (which isn't often, its Linux after all) When my connection dies (this is the most important since I often access my home computer from work) I was given a script to use with cron, but I never found that it worked for me, but I could be something I am doing wrong. I would prefer a more elegent approach which checks to see if I am connected, the way I do manually ie ifconfig and pinging a known address. If the connection is down then run the connect script. Any ideas would be most helpful. I will paste the various scripts I have at the end of this email. Thanks, Aaron - [EMAIL PROTECTED]:/usr/sbin# cat ptstart #!/bin/sh # Put your connection startup commands here VPN=172.26.255.198 USER=[EMAIL PROTECTED] MTU=1350 CABLEGW=`route -n | grep ^0.0.0.0 | awk '{ print $1 }'` cat /etc/ppp/resolv.conf /etc/resolv.conf route del default #route add 172.26.255.198 gw $CABLEGW route add 172.26.255.198 gw 172.25.96.1 PPTP=`which pptp` $PPTP $VPN user $USER defaultroute noauth mtu $MTU exit 0 [EMAIL PROTECTED]:/usr/sbin# --- [EMAIL PROTECTED]:/usr/sbin# cat ptstop #!/bin/bash #Put your connection stop commands here killall pptp exit 0 /etc/init.d/networking restart [EMAIL PROTECTED]:/usr/sbin# - [EMAIL PROTECTED]:/usr/sbin# cat ptcron #!/bin/sh TESTHOST=198.133.219.25 #Host to ping-test: cisco.com STOPSCRIPT=/usr/sbin/ptstop #Script to stop a connection STARTSCRIPT=/usr/sbin/ptstart #Script to start a connection #Make sure we don't have 2 instances on this script running at once [ -e /var/run/ptcron.pid ] exit 0 touch /var/run/ptcron.pid # The actual connectivity testing is right here PING=`which ping` if $PING -c 3 -n $TESTHOST /dev/null; then exit 0 rm -f /var/run/ptcron.pid fi echo -e Link is dead, reloading $STOPSCRIPT # wait a little while to let the pppd processes to shut down sleep 2 $STARTSCRIPT rm -f /var/run/ptcron.pid exit 0 [EMAIL PROTECTED]:/usr/sbin# -- :) = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED] To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: (no subject)
On Tue, Jun 20, 2006 at 08:12:57AM +0300, [EMAIL PROTECTED] wrote: I am looking for an elegant solution to my internet connecivity. I use a script called cablecheck. It runs every minute and if there is no PPP connection, it runs a script called cablestart. --- #!/bin/bash X=`ifconfig ppp0 2/dev/null` if [ $X == ] ; then /usr/local/bin/cablestart fi --- The relevant parts of cablestart are: --- #!/bin/bash CPS=`ps -ax | grep cablestart | grep -cv grep ` echo cps is $CPS if [ 2 == $CPS ] ; then echo ok starting cable connection else echo cablestart is already running. exit fi PS=`ps -ax | grep dhclient | grep eth1 | awk {print \\$1}` if [ != $PS ] ; then echo killing dhcp client for eth1 psid $PS kill -KILL $PS else echo no dhcp client running for eth1 (good) fi PS=`ps -ax | grep cable.netvision.net.il | grep pptp-linux | awk {print \\$1}` if [ != $PS ] ; then echo killing pptp client for netvision psid $PS kill -KILL $PS else echo no pptp client running for netvision (good) fi echo shutting down eth1 /sbin/ifdown eth1 echo restarting eth1 /sbin/ifup eth1 --- It's probably sloppy code, but it works. It check to make sure there is not already a cablestart running and if there is none, starts one. Geoff. -- Geoffrey S. Mendelson, Jerusalem, Israel [EMAIL PROTECTED] N3OWJ/4X1GM IL Voice: (07)-7424-1667 IL Fax: 972-2-648-1443 U.S. Voice: 1-215-821-1838 Visit my 'blog at http://geoffstechno.livejournal.com/ = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]
Re: (no subject)
Thanks that is what I was looking for, Aaron Quoting Geoffrey S. Mendelson [EMAIL PROTECTED]: On Tue, Jun 20, 2006 at 08:12:57AM +0300, [EMAIL PROTECTED] wrote: I am looking for an elegant solution to my internet connecivity. I use a script called cablecheck. It runs every minute and if there is no PPP connection, it runs a script called cablestart. --- #!/bin/bash X=`ifconfig ppp0 2/dev/null` if [ $X == ] ; then /usr/local/bin/cablestart fi --- The relevant parts of cablestart are: --- #!/bin/bash CPS=`ps -ax | grep cablestart | grep -cv grep ` echo cps is $CPS if [ 2 == $CPS ] ; then echo ok starting cable connection else echo cablestart is already running. exit fi PS=`ps -ax | grep dhclient | grep eth1 | awk {print \\$1}` if [ != $PS ] ; then echo killing dhcp client for eth1 psid $PS kill -KILL $PS else echo no dhcp client running for eth1 (good) fi PS=`ps -ax | grep cable.netvision.net.il | grep pptp-linux | awk {print \\$1}` if [ != $PS ] ; then echo killing pptp client for netvision psid $PS kill -KILL $PS else echo no pptp client running for netvision (good) fi echo shutting down eth1 /sbin/ifdown eth1 echo restarting eth1 /sbin/ifup eth1 --- It's probably sloppy code, but it works. It check to make sure there is not already a cablestart running and if there is none, starts one. Geoff. -- Geoffrey S. Mendelson, Jerusalem, Israel [EMAIL PROTECTED] N3OWJ/4X1GM IL Voice: (07)-7424-1667 IL Fax: 972-2-648-1443 U.S. Voice: 1-215-821-1838 Visit my 'blog at http://geoffstechno.livejournal.com/ = To unsubscribe, send mail to [EMAIL PROTECTED] with the word unsubscribe in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]