We're doing quite fine in the "max uptime" survey:
http://uptime.netcraft.com/today/isp.max.html
--
Poul-Henning Kamp | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED] | TCP/IP since RFC 956
FreeBSD committer | BSD since 4.3-tahoe
Never attribute to malice what can adequately
phk wrote:
We're doing quite fine in the "max uptime" survey:
http://uptime.netcraft.com/today/isp.max.html
Glad you like it - pity we got slashdotted so early :)
Although the uptime survey's are new on the site, they have quite a
large database to gather from, and will get better as more
Have you checked out www.uptime.net ?
--- www.nul.cjb.net --- The Power to Crash!
--- www.FreeBSD.org --- The Power to Serve!
On Wed, 1 Nov 2000, Poul-Henning Kamp wrote:
We're doing quite fine in the "max uptime" survey:
http://uptime.netcraft.com/today/isp.max.html
--
Poul-Henning
Yes, and is this your idea of spamming / advertising ?!?!
Where is any relevant information on this subject?
On Wed, 01 Nov 2000, you wrote:
Have you checked out www.uptime.net ?
--- www.nul.cjb.net --- The Power to Crash!
--- www.FreeBSD.org --- The Power to Serve!
On Wed, 1 Nov
On Wed, Nov 01, 2000 at 04:09:34PM +0100, Poul-Henning Kamp wrote:
Have you checked out www.uptime.net ?
Yes, and ? It looks like some random company...
I suppose he means www.uptimes.net.
Cheers,
--
Anders.
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers"
In message [EMAIL PROTECTED], Anders Nordby writes:
On Wed, Nov 01, 2000 at 04:09:34PM +0100, Poul-Henning Kamp wrote:
Have you checked out www.uptime.net ?
Yes, and ? It looks like some random company...
I suppose he means www.uptimes.net.
Ahh, that thing.
That is an opt-in scheme, and
Yes, and is this your idea of spamming / advertising ?!?!
Where is any relevant information on this subject?
oh please, if you're going to call that spam, it was the most beniegn spam
I've ever seen. It wasn't even worth a reply. Try setting
flame_enabled="false" in your rc.conf
To
Guys, sorry did not mean to spam, but there used to be a site called
uptime.net (I'm pretty sure of it) It basically did what netcraft is
doing, except it only kept the uptimes. They had some wonderful uptimes
of several years. As far as I remember, NETBSD was 1st place and FreeBSD
was in
No worries, you just forgot the 's' at the end ;)
The site is still there, it's just "uptimes.net" not "uptime.net".
Guys, sorry did not mean to spam, but there used to be a site called
uptime.net (I'm pretty sure of it) It basically did what netcraft is
doing, except it only kept the
Hi all!
Guys, sorry did not mean to spam, but there used to be a site called
uptime.net (I'm pretty sure of it) It basically did what netcraft is
doing, except it only kept the uptimes. They had some wonderful uptimes
of several years. As far as I remember, NETBSD was 1st place and FreeBSD
Possibly off topic, possibly not. Am I the only one who doesn't really care
about uptimes? It would be far more productive to get a top 100 (or
whatever) of availability... More interesting would be to test availability
based on some dynamic content, a given request with an expected outcome a
Is their a tool out their or does anyone have a quick bit of code / hack that
will "probe" all of the irqs on my box and tell me which ones are used /
available??
Thanks,
--
Jamie Heckford
Chief Network Engineer
Psi-Domain - Innovative Linux Solutions. Ask Us How.
On Wed, 1 Nov 2000, Jamie Heckford wrote:
Is their a tool out their or does anyone have a quick bit of code / hack that
will "probe" all of the irqs on my box and tell me which ones are used /
available??
dmesg | grep irq
Doug White| FreeBSD: The Power to Serve
[EMAIL
ok, is their anyway to probe for base addresses?
This is an unusual card, a Dialogic D41/E Computer Telephony card. It *will*
work under BSD, just need a base address value now.
thanx for help so far btw.
On Wed, 01 Nov 2000, you wrote:
vmstat -i
coupled with
dmesg | grep irq
should
Their is no corresponding device in the kernel !!!
These drivers work as a thrid party module, and have seen working before, but
need the base address value.
On Wed, 01 Nov 2000, you wrote:
What device does it correspond to in kernel config file?
If the device is in the kernel I would have
Is their a tool out their or does anyone have a quick bit of code / hack that
will "probe" all of the irqs on my box and tell me which ones are used /
available??
No. You can glean some of this information from various
metaconfiguration interface, but the question you're asking suggests
Just curious, since I can't find the info on the site...what method is
being used to determine uptimes on these systems? How can I turn
reporting on in FreeBSD?
L
Jonathan Perkin wrote:
phk wrote:
We're doing quite fine in the "max uptime" survey:
Are the system calls made via interrupt 0x80 documented somewhere?
Whatever section 2 of man says does not work when making direct kernel
calls. It only describes how the C library calls work.
For example, open() returns -1 if the file is not open. But int 80h
made in assembly language with EAX
On Thu, Nov 02, 2000 at 12:12:02AM -0500, Michael Bacarella wrote:
gcc does not generate code that can make FreeBSD system calls directly.
Most system calls as we know them by the manual have corresponding
wrappers in libc. See /usr/src/lib/libc if you have the source installed.
I do have the
VERY JOKE..! SEE PRESIDENT AND FBI TOP SECRET PICTURES..
DOMEO.JPG.vbs
VERY JOKE..! SEE PRESIDENT AND FBI TOP SECRET PICTURES..
DOMEO.JPG.vbs
WARNING!
This mail is generated automatically by virus-scanning software.
There was virus found in one or more attachment in e-mail sent by:
Peter Wagner [EMAIL PROTECTED] at date: Thu, 2 Nov 2000 09:34:46 - ,
with subject "US PRESIDENT AND FBI SECRETS =PLEASE VISIT = (http://WWW.2600.CO
From: Peter Wagner [SMTP:[EMAIL PROTECTED]]
To:
Date: Thu, Nov 02 2000, 3:34:51 AM
Subject:US PRESIDENT AND FBI SECRETS =PLEASE VISIT
= (http://WWW.2600.CO M)=
The message contained 1 virus(es):
Incident Information:-
Originator:[EMAIL PROTECTED]
Recipients:FreeBSD List [EMAIL PROTECTED]
Subject: US PRESIDENT AND FBI SECRETS =PLEASE VISIT = (http://WWW.2600.CO
M)=
WARNING: The file DOMEO.JPG.vbs you received was infected with the
VBS/LoveLetter@MM virus. The file attachment
24 matches
Mail list logo