logging iptables to a separate file (solution)

2003-06-29 Thread Joe Lazaro
On Tue, Jun 24, 2003 at 09:26:32AM -0400, Robert L. Harris wrote: Looking at the docs for iptables you can specify log Level (auth, crit, etc) but I don't see a way of specifying a facility such as local1. I'd like to put all my iptables output logs into a specific file I can dig through

Re: reconfigure broken network? (kinda urgent)

2003-06-23 Thread Joe Lazaro
On Sun, Jun 22, 2003 at 11:42:57PM -0400, Matt Price wrote: Hi everyone, In an effort to change form a dynamic to a staticIP configuration, I seem to have partially broken my network setup. Here's what I did: -- added an extra line to /etc/hosts: 192.16.8.2.199 matts-mac localhost I

Re: Good Open Source Web Development software

2003-06-10 Thread Joe Lazaro
On Tue, Jun 10, 2003 at 02:10:45AM -0400, lists1 wrote: On Monday 09 June 2003 14:03, Kevin Griffis wrote: I would like to eventually do all my web development on my Linux laptop and ditch FrontPage altogether. I am planning to build a site on a LAMP machine and was wondering what Open

Re: Speeding up debian ... ?

2003-06-07 Thread Joe Lazaro
On Sat, Jun 07, 2003 at 10:41:04AM -0500, Ron Johnson wrote: If the computer is doing nothing at night anyway, where is the waste in having it compile source code like XFree, glibc, SSL, ssh, and image manipulation s/w? if the computer is doing nothing at night, why not power it off and save

Re: unable to compile a kernel

2003-06-06 Thread Joe Lazaro
On Thu, Jun 05, 2003 at 05:27:50PM +0200, martin f krafft wrote: i just tried to compile the kernel.org 2.4.20 kernel, but it bailed I heard from #debian on irc.freenode.net that gcc 3.3 is unable to compile kernels. Here is what the bot says: apt i guess 2.4bug is look at

Re: How to know if a machine was hacked?

2003-06-05 Thread Joe Lazaro
On Thu, Jun 05, 2003 at 06:09:07AM +0100, Damir Dezeljin wrote: Hi. Is there any way to find out if a certain Debian Woody machine was hacked? Regards, Dezo CERT has some good information about this: http://www.cert.org/tech_tips/intruder_detection_checklist.html