On Mon, 20 May 2002, Jon Hall [EMAIL PROTECTED] wrote:
Well, we can assume that it is after the actual wedding (since the
groom is in the presence of the bride in her full regalia), but
before they actually left for the honeymoon.
Hmmm, my computer is probably the last thing that I would be
Hi,
Out of this thread Bill Freeman and I got onto a side discussion of the
compression efficiency of gzip(1) vs blocksize. This led to an
experiment to take the first 2MB of /usr/doc/HOWTO/* and /bin/* and see
how well that blob compresses when broken up into blocks where each block
is gzip
On Thu, 02 May 2002, [EMAIL PROTECTED] wrote:
How much does each /dev/null cost? Is there a limit to how much one can hold?
Btw, I forgot to mention, if you *really* want to save money and time,
it is most efficient to use /dev/null for your back up device. Even
though it's a device
On Thu, 2 May 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
GNU tar does this. Seriously. If checks to see if the target device is
/dev/null, and if so, skips some of the I/O operations. I discovered this
when I wanted to exercise a disk, so I tried tar'ing it up to /dev/null, and
what
Is it possible to cat an Exchange/Outlook mailbox from a unix shell?
I thinking of something simple for remote quick-and-dirty viewing
reading of email that exists in an Exchange environment. We have
WinVNC and that works fine, but it is not always operative.
I'm thinking along the lines of
On Wed, 1 May 2002, mike ledoux [EMAIL PROTECTED] wrote:
I downloaded a source package that I need to compile statically so I
can move the binary to another machine which does not have all the
necessary packages. How do I do that?
The package comes with the standard gnu autoconf
On Mon, 22 Apr 2002, Tom Buskey [EMAIL PROTECTED] wrote:
As I said in not so many words, modern shells have it built in. I don't
consider Bourne a modern shell.
I believe Jerry is saying some of the newer implementations of /bin/sh
have [ as a builtin. For example, [ has been a builtin on
On Sun, 21 Apr 2002, Paul Iadonisi [EMAIL PROTECTED] wrote:
On Sun, Apr 21, 2002 at 01:56:47AM -0400, Derek D. Martin wrote:
Oh, boy! I think you may have just stirred a hornets nest. I, for one,
agree with your essay 100%.
I, for one, don't believe even 1% of it.
Didn't we already
On Thu, 18 Apr 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
On 18 Apr 2002, at 10:36am, Cole Tuininga wrote:
I definitely agree with Ben wrt this being a handy debugging tool. The
reason I said the above is that (at least, in my experience) turning on
the support for console on serial
On Wed, 17 Apr 2002, Thomas M. Albright [EMAIL PROTECTED] wrote:
The dates are stored as mm/dd/. When the Payment Due date is equal
to today + 90 days (IOW: 90 days before the due date) I want to send out
an email containing an invoice to Contact email.
Most of that I can figure out
On 09 Apr 2002 09:37:52, Mark Komarinski [EMAIL PROTECTED] wrote:
OO doesn't want to take over the desktop like 5.2 did. That's the
biggest thing. On the down side, there is some functionality missing,
most notably the database access and much of the clipart. I don't
need either, so it
On Fri, 5 Apr 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
Karl Runge is on the right track. X is very senstive to latency. The
bandwidth requirements can actually be fairly minor for simple constructs
(e.g., a GNU Emacs window), but a high-latency link will kill you.
Yes, and I wanted
On Fri, 05 Apr 2002, John Abreau [EMAIL PROTECTED] wrote:
Well, one option is run exmh in a VNC session which can then be
connected to. One of the exmh-users members mentioned he does this.
I believe there's a way to run VNC over ssh.
VNC? Ugh. Doesn't that just ship around a big
On 23 Mar 2002 20:12:20, Kenneth E. Lussier [EMAIL PROTECTED] wrote:
Also, I have little doubt that, with some sweat, Gimp could be made to do
most anything up to and including your dishes. Someday, I'll actually
-learn- the darn application.
The GIMP can do all sorts of things to
On Thu, 21 Mar 2002, mike ledoux [EMAIL PROTECTED] wrote:
On Thu, Mar 21, 2002 at 05:50:01PM -0800, Karl J. Runge wrote:
True, but couldn't the user construct a procmail line that would force
the issue for the user's mailer?
:0 Hfw
* ^[EMAIL PROTECTED]
| formail -I From: [EMAIL
On Thu, 21 Mar 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
You misunderstand. procmail filters mail as it comes *in* to a system.
It has nothing to do with the address we *reply* to. That is ultimately
controlled by the user sending the mail. Myself, I make it a habit to check
and
On Mon, 18 Mar 2002, Jerry Feldman [EMAIL PROTECTED] wrote:
That's just a bump on the log. Microsoft will encounter more competition
and may lose some market share to Linux and BSD, but I don't think that
their dominance of the industry will be diminished short of a major anti-
trust
On Mon, 18 Mar 2002, [EMAIL PROTECTED] wrote:
Mark,
It appears that ATT has finally done away with the 'mediaone.net'
domain, and now, e-mails to the GNHLUG list are bouncing to any
'@mediaone.net' address.
Could also do a s/mediaone.net/attbi.com/ in the list file.
This is the change
On Mon, 18 Mar 2002, Bayard Coolidge USG [EMAIL PROTECTED] wrote:
Karl J. Runge [EMAIL PROTECTED]
said:
Could also do a s/mediaone.net/attbi.com/ in the list file.
This is the change that ATT Broadband Internet (attbi) did.
NO!! There was NOT necessarily a 1:1 change made - there were
On Sun, 17 Mar 2002, [EMAIL PROTECTED] (Michael O'Donnell) wrote:
...
W83877F (EMACS) Watchdog Timer(NEW)
WTF?!? Hardware to watch if EMACS is using too much RAM, CPU, or is
otherwise causing the machine to run hot? :-)
Call me chicken little, but I am getting worried about the looming
Apache/PHP vulnerability out there:
http://news.com.com/2100-1001-850752.html?tag=cd_mh
http://security.e-matters.de/advisories/012002.html
http://www.cert.org/advisories/CA-2002-05.html
If you have a
On Tue, 5 Mar 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
My understanding is that this hole does not lead directly to privilege
elevation. In other words, it might lead to compromise of the nobody
account or similar, but not full root access (like CodeRed). Am I correct
here?
I
This compiles, I think the mystery *mystery you had is not good to
have an identifier name also be that of a type. I changed mystery
to mystery_VAR below. (not sure it is doing what you want, though).
struct mysteryStruct {
struct mysteryStruct *next;
int dontCare;
Since we can't convince you GPG guyz :-)
.procmailrc:
:0 Bf
* -BEGIN PGP
| pgp_clean
pgp_clean:
#!/bin/sh -- # A comment mentioning perl
eval 'exec perl -S $0 ${1+$@}'
if 0;
while () { $msg .= $_ }
$msg =~ s/-BEGIN PGP SIGNED(.|\n)*?Hash:.*\n\n//;
$msg =~ s/-BEGIN PGP
On Tue, 12 Feb 2002, Bill Sconce [EMAIL PROTECTED] wrote:
Truly so. And the man pages have no index;
Not a full index, but man -k keyword (aka apropos(1)) and whatis(1)
are fairly useful for this. No?
The gnu special: man -K keyword is slow (at least on my old HW) but I
guess technically
On Mon, 11 Feb 2002, [EMAIL PROTECTED] (Michael O'Donnell) wrote:
It appears that this approach does not work:
Password:
su: Authentication failure
Sorry.
Well, have him paste this into /etc/shadow in the password slot:
haystack[105] perl -e 'print crypt(foo, sa), \n'
sa8ufSVwLUHVU
Hi,
Some of you may remember the talk I did last Nov. at the MELBA meeting.
The basic idea is that one uses ssh to connect to work, say, and redirect
a bunch of ports (login shells, X window apps, webserver, etc) to yield
a poor man's VPN between the two points.
For a couple of weeks I'll need
Yes, I use VNC a good deal for certain tasks in my current telecommuting
(via cable modem) and will definitely be using it under my upcoming dialup
situation.
However, I think doing a full day of work at = 33 Kb/s thru VNC will
prove too frustrating and tedious (even with something like
I noticed my domainname would not resolve for most of the day and I got
got a whole bunch of mailer-daemon messages. I apologize to all who
received similar errors due to problems with my domain.
Have we had any discussion on the list on the policy of where errors
should be directed? We seem
On Sun, 10 Feb 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
The problem is a political one, not a technical one. The situation is not
going to change. Yes, that is too bad.
:-(
Errors-To is non-standard and depreciated. The proper solution is to
set the SMTP envelope FROM address
Miguel gave a long response to his Mono/.NET stuff that is at:
http://mail.gnome.org/archives/gnome-hackers/2002-February/msg00031.html
After reading that I stumbled on this The Hacks of our lives humorous
post (e.g. The Days of our lives) that I found to be hilarious
(if a bit crude):
On Mon, 04 Feb 2002, Paul Lussier [EMAIL PROTECTED] wrote:
Derek D. Martin said:
LANG=en_US
LC_COLLATE=C
export LANG LC_COLLATE
Couldn't you just:
export LANG=C
That's not as portable as what Derek wrote.
*
To
On Mon, 04 Feb 2002, Paul Lussier [EMAIL PROTECTED] wrote:
That's not as portable as what Derek wrote.
That may be so, but unless you're outside the US, or non-English
speaking, how much would that matter? I've always had LANG=C, and
I've never needed to change anything.
Sorry, I
Userfriendly has an amusing view of the AOL / Redhat buyout rumor:
http://www.userfriendly.org/cartoons/archives/02jan/xuf003850.gif
This view actually correlates with my initial take: no way is there a
significant market of ordinary people ready for what we call Linux
(or anything close
Have you looked in the defaults/pref directory? I see:
% pwd
.../mozilla0.9.1/defaults/pref
% ls
all.js editor.js mailnews.jsunix.js
config.js initpref.jssecurity-prefs.js xpinstall.js
What happens if you change things in those files?
On Fri, 11 Jan 2002, zeroK [EMAIL PROTECTED] wrote:
Using Linux Kernel 2.2.19 Ext2 [Slackware 8.0], I notice that
after making major changes or after a *crash* [due to numerous
power outages here], at startup filesystem check I will get a
(3% non-contiguous) message [percentages vary, but
On Tue, 8 Jan 2002, Benjamin Scott [EMAIL PROTECTED] wrote:
Great, now instead of a debate over which language is best, we're having a
debate over whether or not we're having a debate over which language is
best. ;-)
Well, both languages allow recursion... (as in recursive descent into
On Thu, 3 Jan 2002, Brian Chabot [EMAIL PROTECTED] wrote:
Is there an easy way to tee the $HISTFILE to more than one location?
What I want is a mirror of .bash_history stored elsewhere in case the
It's probably not be the best way to proceed, but I have an LD_PRELOAD
hack that tees writing
I believe we are seeing the same problem. My wife has this
cronjob set up to run every two hours:
20 */2 * * *fetchmail -d 600 m1x $HOME/.fetchmail.err 21
m1x is her mediaone alias in ~/.fetchmailrc
Every week or so (sometimes more frequent) the fetchmail process will
get hung somehow
On Thu, 27 Dec 2001, Paul Iadonisi wrote:
So instead of revoking the key that was sitting in the key server
databases, I submitted a second key. And you guessed it -- because I
hadn't really used the key, I've forgotten the passphrase. As a result,
I can't revoke the key.
It may be
FWIW, One thing I have found useful for personal SPAM filtering is to
have procmail deliver the spam Hits go to a separate spam folder.
Then each night a cronjob perl script runs over this folder looking for
any new entries. It gathers up all of the new From and Subject
lines and sends them to
RFC's aside, wouldn't it be great if it were *illegal* to send spam w/o
some sort of header(s):
X-Unsolicited-Bulk-Mail: ...
and they could only remove that header if you replied back somehow
saying yeah, it's ok to send me more of your crap.
One could imagine even more structure in the
On Sat, 22 Dec 2001, Ed Robitaille [EMAIL PROTECTED] wrote:
I am a trustee for our local town library. We share the library
with the local elementry school. Our computer that we use
is ano-name running W$ 95. As You can imagine, we suffer from
crashes, setting changes, file deletions,
THANKS! (I assume that's you Bruce...) style and diction, I couldn't
remember the latter one.
I'll install them and write a perl script to download and filter all of
Ben's posts right away :-)
On Tue, 18 Dec 2001, [EMAIL PROTECTED] wrote:
Yes. I remember it. I believe it was part of
On Tue, 18 Dec 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
On Tue, 18 Dec 2001, Michael O'Donnell wrote:
... and can peak English ...
Well, we can certainly see why you'd want to outsource... ;- ;-
LOL! I guess my spell chqeue dew knot
Has anybody done this? Is it as simple as I am thinking it is?
To get a modest sized partiton (500MB) to play around with some things I
want to glue together the hda1 hda2 and hda3 partitions of my /dev/hda:
[root@haystack runge]# fdisk -l /dev/hda
Disk /dev/hda: 255 heads, 63 sectors, 1582
On Mon, 10 Dec 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
The biggest issue with 802.11b is security; it is basically non-existence.
Flaws in the implementation of the algorithms render even the so-called
strong or 128-bit encryption worthless. I recommend treating 802.11b
networks as
I don't use xinetd, but I am used to nowait in inetd.conf for tcp
services. Maybe try wait = no ?
On Sat, 8 Dec 2001, Jeff Macdonald [EMAIL PROTECTED] wrote:
Hi,
Anybody runnig their own program out of xinetd? I can't get event simple
stuff to work like ls:
service unlisted
{
type
Kenny,
That sounds pretty good.
What is their stated policy on having your machine be a hackerz' scanbox?
ATT Broadband seems to have a two strikes and you're out policy.
I.e. if it happens twice that a hacker breaks into your machine and
uses to scan other machines or DDOS, you lose your
Is the syntax actually -s any/0? What happens if you remove -s any/0
completely (that should be the same as matching anything, right?)
On Tue, 04 Dec 2001, Joseph L. Hill [EMAIL PROTECTED] wrote:
Hi,
I added the following rule to ipchains.sh on a RH 7.2 server but I still
can't ssh into
I think we (former MediaOne customers) are OK; I believe this is
because M1 had all of the infrastructure in place before ATT bought
it, i.e. networks and servers (dns, dhcp, smtp, pop, etc..), and that
was kept. We were offered to go thru the Excite@Home Portal, but I'd
gather most on the list
Some newbie questions if you don't mind...
If you are running ext3 (or xfs) on a, say, 20GB partition, and you
pull the power plug out and then back in, how much longer is the
boot process over that of a clean boot?
Also, suppose, as an expt, I was untarring a big 100MB tarball when I
pulled
*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*
in 1995 no less.
Sorry for the noise,
Karl
On Fri, 30 Nov 2001, [EMAIL PROTECTED] (Karl J. Runge) wrote:
*
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body
On Tue, 13 Nov 2001, mike ledoux [EMAIL PROTECTED] wrote:
Wow. I've been wanting to do this for years, and couldn't figure out
how.
Good! I hope it works. I feel there are a lot of untapped jewels in
the accessx and other /usr/X11R6/lib/X11/xkb/compat functions of the X
server, I just
On Fri, 16 Nov 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
Well, when you only have 5 different video cards and a dozen monitors,
support is easy. We PC folks have things a bit harder. Of course, we can
buy 10 PCs for what one Sun costs :-)
Please let me know where I can pick up
Hi Paul,
Could you give more detail on what you are trying to do?
It sounds like you are trying to write a program or script that
is portable across the various distros (or, how dated of me, multiple
Unixes). That sort of portability is a GoodThing!
Anyway, from your listing of the /etc/
I don't know how to do exactly this, but I do know how to map Keystrokes
to Button clicks using the MouseKeys functionality:
---
#!/bin/sh
# From X11 MouseKeys feature, see /usr/X11R6/lib/X11/xkb/compat/mousekeys
echo Press
On Tue, 13 Nov 2001, Paul Lussier [EMAIL PROTECTED] wrote:
...
Thanks Karl, I'm going to remap my keyboard now so I never need to
use a mouse again :)
Good, glad you're happy!
Downside: once you enable mousekeys via the Pointer_EnableKeys mapping
(Home in the example) it seems to time
FWIW, here is a LUG that at least tries (tried?) to broadcast its
meetings via multicast. I'm not saying it is easy, but at least it can
be done, even on this small a scale.
I agree the chances of multicast being used by the unwashed masses
seems to be pretty slim, oh well.
On Wed, 7 Nov 2001, Ken Ambrose [EMAIL PROTECTED] wrote:
...
policy violation), is VPN via SSH. Honest-to-goodness VPN, that is, no
pansy port-redirection.
Wot!? Only a pantywaist would tunnel PPP thru ssh! Real-men (and Real-women,
e.g. my wife :-) build their own VPN's with ssh and a
On Thu, 8 Nov 2001, Joshua S. Freeman [EMAIL PROTECTED] wrote:
is there any place you can point newbies to that discusses the
subtleties of port redirection on Linux?
(or any other OS, for that matter)
These may be a good start. Port redirection is a method used in all of
them, you may
On Mon, 05 Nov 2001, Rodent of Unusual Size [EMAIL PROTECTED] wrote:
Thanks! Something persistent and generic would be great;
at this point, I'll take any stort in a prom, and that
sounds like a good one.
Okey, I'm askin'. The thing that stumps me [most] is
making/keeping the
On Sun, 04 Nov 2001, Rodent of Unusual Size [EMAIL PROTECTED] wrote:
I really don't have a lot of time or energy to devote to
figuring out and debugging this crap; I need a cookbook.
Does anyone have any idea how I can tell either Sawfish
or Enlightenment -- or some other easy option -- that
On Sat, 03 Nov 2001, Paul Lussier [EMAIL PROTECTED] wrote:
I agree that bzip2 is great, however, isn't there some instance where
gzip works and bzip2 doesn't? I seem to remember something about
bzip2 doesn't work well with streaming I/O due to it's block-based
design.
I don't know what
Why don't you guys try bzip2(1). The b stands for block compression,
and so can recover from bad blocks. bzip2recover evidently aids in
this. Also, bzip2 compression seems to be about 10-20% better than
gzip... (e.g. the linux .bz2 kernel src tarballs)
On Sat, 3 Nov 2001, Benjamin Scott
On Fri, 2 Nov 2001, Ken Ambrose [EMAIL PROTECTED] wrote:
Oh: speaking of sentimental FTP sites, we've got some x-DEC-ies on this
list -- whatever happened to ftp://gatekeeper.dec.com? It's still there,
Speaking of sentimental FTP sites that are close to the GNH area how
about
Doesn't sound weird to me... www.kernel.org
Here's a weird question. Where does one go to get a set of kernel sources ?
I'm looking for something distribution neutral. I've done it once but can't
figure out where I got it.
On Sun, 28 Oct 2001, Derek D. Martin [EMAIL PROTECTED] wrote:
On Sun, Oct 28, 2001 at 08:58:21AM -0500, Ron Peterson wrote:
NFSv2 and v3 are both insecure. If the client computer is on my desktop,
I can reinstall Linux, give myself root, and then connect as any user I
want.
...
If you
Hi,
I just slurped up some D-Link 802.11b wireless lan cards (DWL-650) at
Best Buy for $69 (after rebate) per PCMCIA card. This is to upgrade my
2 Mb/s wlan to 11 Mb/s, I hope it goes smoothly...
I see at: http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/ there
seem to be several Linux
On Tue, 23 Oct 2001, Derek D. Martin [EMAIL PROTECTED] wrote:
Yes!
# ifdown ethX
# ifup ethX
Where X is the ethernet interface number, i.e. eth0.
This works for Red Hat, not sure about others. It may depend also on
the client you use to get your IP. RH uses pump by default, but
Have a look at realpath(3). I think it is close to what you want.
It is a C interface, so you'd have to write a tiny C program to
call it if you want to access it from scripts, etc.
Perl may also have access to realpath thru a module, so it could
be embedded in a script that way. I haven't
I might be missing what you are referring to... but what is wrong with
just unplugging them and turning the computer back on?
My firewall box is a 486 with no keyboard, mouse, or monitor (it has an
old video card, I haven't tried removing the video card yet: I'm
curious what happens!!!). Once
On Thu, 18 Oct 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
I don't believe this is possible. to use other Cable modem IP's
Some people seem to think it is. I wouldn't know -- I can't get cable
Internet! :-(
Anyone out there on my ATT cable modem subnet: 24.147.88.0 - 24.147.95.255
On Tue, 16 Oct 2001, Ken Ambrose [EMAIL PROTECTED] wrote:
It does -- most certainly. I've been in *DOS*, doing *NOTHING*, and the
fans come on on my Sony. Beats the hell out of me what's going on. Boot
to Linux, and, after the initial kernel load and boot, the fan's off
within 20
On Wed, 17 Oct 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
stealth mode firewalls, etc and when you think you have found an
unused IP address, there could be, and likely is, somebody using it.
The fact that this is even possible is yet another reason why cable
Internet, while nice and
Actually, the amusing part, to me, was that mainstream operating
systems often lack critical security features that could enforce the
confidentiality and integrity of network communications. I wonder
what mainstream OS's they might be talking about :-)
Nice try, but I imagine they mean
Most people don't know it, but NT stood for New Terminology ;-)
No need for people to be melancholy since this Rename and Claim
spirit is alive and well at M$...
On Thu, 4 Oct 2001, Mark Fearer [EMAIL PROTECTED] wrote:
Subject: Microsoft retires Windows NT
On Thu, 04 Oct 2001, Rodent of Unusual Size [EMAIL PROTECTED] wrote:
I *really* detest seamful upgrades..
Me too. That and laziness is why all of my machines here at home run RH 5.2 :-
Nobody seems to agree with me, but IMHO I feel problems like what you
described are one of if not the
Is it someone's desktop or is it just a remote server / compile box?
FWIW, my armchair theory is that the VM mis-management is seen most
obviously for a desktop box, with say lots of piggish interactive apps
running. E.g. takes 30 secs to de-iconify a netscape window.
I may be wrong, since
Do we mean rocks or simply does not suck?
I have not followed the kernel development mailing list for a very
long time... Does anyone know why the linux kernel often seems to lurch
back and forth with respect to VM/memory management?
I remember a terrible sequence of kernels late in 2.1.x
On Tue, 25 Sep 2001, Charles C. Bennett, Jr. [EMAIL PROTECTED] wrote:
Check this out - a Fair Use lawsuit in play.
http://dailynews.yahoo.com/h/ap/20010919/tc/cd_suit_1.html
Does anyone know what happens if you put one of these SunnComm protected
CD's in a Linux box? Given that the CD's
On Tue, 25 Sep 2001, Rich C [EMAIL PROTECTED] wrote:
My guess is they've dinked around with the multisession format of the CD.
Don't forget, the average dumb CD player has to find the audio tracks in
the normal way. It's the computer that can't. So they probably formatted it
as a
On Tue, 25 Sep 2001, Stephen Ingham [EMAIL PROTECTED] wrote:
I am trying to set up a time server on an isolated network (No Internet =
Access) that the clients can use 'rdate' to synchronize their system =
times.
Question: What time server program should I use? (I haven't been able =
to
On Fri, 21 Sep 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
On Thu, 20 Sep 2001, Karl J. Runge wrote:
Consider what happen would if an execute arbitrary commands exploit in
Apache httpd popped up.
Then attackers would be able to execute arbitrary commands as the nobody
user, which has
On Thu, 20 Sep 2001, Jerry Feldman [EMAIL PROTECTED] wrote:
We should not gloat over Microsoft's security lapses. While there are
many many security holes in Windows and related products, the sheer
number of installed product makes them by far a prime target. As the
Linux (and BSD) market
One thing to do in this case is to telnet in from the other machine,
become root and run a command like:
# switchto 2
which should switch you to VC #2. Hopefully that will give you a live
keyboard.
If the keyboard was working but the output missing (I've found running
some games can do
Not that one should (that is, for optimal effect upon lawmakers) admit
association with or act like RMS, but his Right to Read fictional
piece seems to be getting less fictional as the years go by...
http://www.gnu.org/philosophy/right-to-read.html
On Sat, 08 Sep 2001, Jerry Feldman [EMAIL PROTECTED] wrote:
My department is having a party tonight.
Then you all should party like it's 9 :)
It's good timing for a rollover party here in the East: Sat evening.
With more notice maybe we could have scheduled a Martha's get-together
People like me w/o lives are invited to a party tomorrow night at:
Sat Sep 8 21:46:40 EDT 2001
when Unix time will rolls from 9 to 10.
As good a reason to have a party as any other ;-)
Cheers,
Karl
% date +%s -d 'Sat Sep 8 21:46:39 EDT 2001'
9
% date +%s -d
On Fri, 7 Sep 2001, Benjamin Scott [EMAIL PROTECTED] wrote:
From this article:
http://www.cfo.com/printarticle/1,4580,0|83|AD|4818,00.html
It [Linux] actually has been mildly frustrating that so many people are
unwilling to pay us for service and support because the damn thing never
On Mon, 3 Sep 2001, Jerry Eckert [EMAIL PROTECTED] wrote:
During the past two weeks I've received several messages from Derek Martin
(posted to the list) which have been unreadable in MS Outlook 98. In each
case the message flag was set, and I get the error Can't open this item. A
follow-up
Looking into this a bit more I went to the http://www.rodos.net/outlook/
I believe someone on the list pointed us too.
As an aside, I see there a pointer to a link to a M$ page that has this
gem of an FAQ about Outlook, mail readers and virii:
Will the virus impact my Macintosh if I am using
On Tue, 28 Aug 2001, Joseph L. Hill [EMAIL PROTECTED] wrote:
This is good for a laugh;
Microsoft decided to dropped support for the plug-ins -- additional
software that lets users play music, watch videos or perform other
tasks -- in favor of Microsoft technology called ActiveX. Microsoft
It's OK to use private IP addresses in creating a bridge and other
sorts of junctions, correct?
I'm not saying this what mod saw is a bridge, but remember how
traceroute works: it sends UDP packets but sets the total number of
hops (TTL) so that it won't get there to the destination, then it
On Thu, 9 Aug 2001, Rich Cloutier [EMAIL PROTECTED] wrote:
I don't remember with whom, but we were discussing whether this was possible
a while back. I of course was wrong. Here is the proof:
http://www.sophos.com/virusinfo/analyses/vbspeachypdfa.html
Yes, but it requires the full Acrobat
On Fri, 3 Aug 2001, James R. Van Zandt [EMAIL PROTECTED] wrote:
...
I read that the original worm used a fixed seed to generate its
random addresses, but that later varients used a random seed.
Ah, that would explain what I am seeing better. Thanks!
Anyway, just when I thought my analysis
Perhaps use the pthread_mutex* functions? In particular use
pthread_mutex_trylock in polling? (perhaps in a select or usleep loop.. yuck.)
Just a quick thought, haven't thought it through...
Karl
**
To unsubscribe from this list, send
On 18 Jul 2001 23:48:57, [EMAIL PROTECTED] (Kevin D. Clark) wrote:
Also, I assume that a hidden javascript in a cookie attack is somehow
based on trusted zones for a browser (e.g. local html is trusted to
run programs, etc). I believe IE has these... does Netscape on Unix?
IIRC, for
On Wed, 18 Jul 2001, Lowell Bruce McCulley [EMAIL PROTECTED] wrote:
Aha, this may explain some of the occasional glitches and netscape lockups I've been
encountering once in a while. Hmm, now I have a
better idea of where to start looking for the culprits. THANKS!
Do you really think so? Do
1 - 100 of 300 matches
Mail list logo