On Thu, 08 Jan 2009 06:55:51 -0500, you wrote:
>> The new algorithm handles concave corners
>
>And here I am, halfway through writing the next installment
>of Adventures in Filleting, explaining how to lay an arc
>into a concave corner to avoid gouging. I am crushed, I
>tell you, -crushed- by t
Realistic? Chances are exactly 100%. Looking at my linux firewall I see
tons of scans on all kinds of ports every day so chances are they will
scan your system in less than an day if not in few hours or minutes.
I'm not saying you won't get scanned. The point is that very, very few
hacker
Hi All
I am starting to feel little sorry that I started this thread.
I would like to personally thank Eric for writing this interface to EMC,
and the work he has put into it. He has said he was "wanting to create
a simple network interface" - has he achieved this? Yes he has, because
when ev
Remember, emcrsh is using a Telnet compatible interface but it isn't a
Telnet shell like rsh for example. Something like emcrsh isn't going to
allow anyone to execute code on your machine or read your user or root
passwords.
If you have a port open then a hacker can try accessing it. The worst
Hi Leslie,
Leslie Newell wrote:
> Let's be realistic about this. What are the chances of a hacker randomly
> scanning IP addresses and ports on the web and finding a running emcrsh
Realistic? Chances are exactly 100%. Looking at my linux firewall I see
tons of scans on all kinds of ports every
On Sunday 11 January 2009, Stephen Wille Padnos wrote:
>Rafael Skodlar wrote:
>>[snip]
>>
>>It's safer to use more secure methods for communicating between the
>>systems on the network from the beginning rather than trying to fix it
>>later. You newer know when next newbie will put your code on the
Rafael Skodlar wrote:
>[snip]
>
>It's safer to use more secure methods for communicating between the
>systems on the network from the beginning rather than trying to fix it
>later. You newer know when next newbie will put your code on the system
>and then bad things might happen. Just my experienc
On Sun, 2009-01-11 at 19:28 +, Leslie Newell wrote:
> Let's be realistic about this. What are the chances of a hacker randomly
> scanning IP addresses and ports on the web and finding a running emcrsh
> session? Even if one did, what is the likelihood of him then recognizing
> the connectio
Tom wrote:
> Jon Elson writes:
>
>
>> Oh oh! ...
>>
>> The Excellon drive may have had one motor pole grounded, and that may be
>> tied to frame ground. Certainly not a great scheme, but they all seem
>> to use 3-wire cables. I know my motor is completely floating, but that
>> doesn't nec
Eric,
Eric H. Johnson wrote:
> Rafael,
>
> As the author of that particular interface, my main objectives were:
>
> 1> As simple a network interface as possible.
>
> 2> An interface that does not change with each version of EMC.
>
> I don't see how it could be much simpler than this. All one h
Let's be realistic about this. What are the chances of a hacker randomly
scanning IP addresses and ports on the web and finding a running emcrsh
session? Even if one did, what is the likelihood of him then recognizing
the connection and trying to take over your machine? I'd say you have
probab
Thanks, Eric, for your gentle reply.
I shouldn't write email late at night. I woke up this morning and
realized the latency-test script probably doesn't involve the port
anyway, leaving me open to a "Kent, you ignorant slut" response.
Instead, you provided good additional info.
I wouldn't have
Rafael,
As the author of that particular interface, my main objectives were:
1> As simple a network interface as possible.
2> An interface that does not change with each version of EMC.
I don't see how it could be much simpler than this. All one has to do to
work out an interface is to put "loa
Eric H. Johnson wrote:
> Les,
>
> The passwords are passed as plain text, so a determined hacker would not
> have much difficulty sniffing out the passwords. One option for increasing
> security over the Internet is to run the telnet session over an ssh
> connection. That way all transactions will
Les,
The passwords are passed as plain text, so a determined hacker would not
have much difficulty sniffing out the passwords. One option for increasing
security over the Internet is to run the telnet session over an ssh
connection. That way all transactions will be encrypted and it adds an
additi
On Sun, Jan 11, 2009 at 10:37:12AM +, paul_c wrote:
> On Sunday 11 January 2009, Chris Radek wrote:
> > ?Please send a patch that makes it build without warnings
> > ?You can send it to emc-developers or to me personally.
>
> Restore my CVS access, and you won't need to mess with "patches".
On Sun, 2009-01-11 at 08:42 -0600, sam sokolik wrote:
> He came - he saw - he made hostmot2 a reality.
> EMC is now even more flexible. (hard to believe - I know)
I'm with Sam! Sebastian would be a good board member!
Thanks,
Matt
sam sokolik wrote:
> He came - he saw - he made hostmot2 a reality.
>
> EMC is now even more flexable. (hard to believe - I know)
Thanks! :-)
But i decline. I intend to keep working on emc2 in my little way, but I
do not wish to participate in the BoD at this time.
--
Sebastian Kuzminsky
He came - he saw - he made hostmot2 a reality.
EMC is now even more flexable. (hard to believe - I know)
sam
--
Check out the new SourceForge.net Marketplace.
It is the best place to buy or sell services for
just about an
Hi Peter
Thanks for the test and report. I tend to favor any but Intel. I've
had fairly good results with C3, C7, and almost any AMD. The point we
should take from your test is to try it.
There is a "used" computer store that I occasionally visit looking for
bargain boxes. I carry a Live C
On Sun, 2009-01-11 at 09:05 +, Tom wrote:
> I did not hook the 4th ground lead to the vfd gnd, my bad :-(
Someone once said, "We learn from experience, if at all." Those hookup
drawings in the first pages of the VFD's manual that shows a proper star
or single point ground to each VFD are ther
>Ideally, you should only ever have one process writing to a buffer, and one
>process reading (as per the NIST RCS handbook). For multiple processes
>reading or writing to a single buffer, it would be better if a
>secondary "channel" was spawned for each additional connection - This would
>require
I suppose you sent a ssh public key as described here:
http://wiki.linuxcnc.org/cgi-bin/emcinfo.pl?DeveloperAccess
Regards,
Alex
- Original Message -
From: "paul_c"
To: "Enhanced Machine Controller (EMC)"
Sent: Sunday, January 11, 2009 12:37 PM
Subject: Re: [Emc-users] New cutter compe
Les,
That's security by obscurity, and hasn't really worked well
for a good many years. There are port scan and port mapping tools
out there that can read all the ports on your machine in a heartbeat,
and know which ones are open, which ones are closed, and what process
is behind eac
On Sunday 11 January 2009, AKSYS Tech Pty Ltd wrote:
> Just a quick update. I did as paul_c suggested and removed the queue
> type from the *.nml file. This seems to have fixed my issue, and I now
> seem to have error reporting coming back into my micro. I can see where
> Alex is coming from and
On Sunday 11 January 2009, Chris Radek wrote:
> Please send a patch that makes it build without warnings
> You can send it to emc-developers or to me personally.
Restore my CVS access, and you won't need to mess with "patches".
---
One good security measure is to change the port number. First the hacker
has to find your port then they have to crack the password (obviously
don't use the standard password). Of course that assumes you want to
connect remotely over the internet (why???). Otherwise just block the
port on your
Jon Elson writes:
> Oh oh! ...
>
> The Excellon drive may have had one motor pole grounded, and that may be
> tied to frame ground. Certainly not a great scheme, but they all seem
> to use 3-wire cables. I know my motor is completely floating, but that
> doesn't necessarily apply to any ot
28 matches
Mail list logo