you could use a sticky bit on the directory instead.
man chmod and read the second on sticky bit and directories. It might save
you effort.
- Original Message -
From: "Eve Atley" <[EMAIL PROTECTED]>
To:
Sent: Monday, March 28, 2005 4:02 PM
Subject: Simple script to set permissions on
I've been having the hardest time getting a kernel I've compiled to
work. I've compiled kernels at least a dozen times and this is the
first one that has given me any real trouble. I think the issue might
be the scsi hard-drive.
I've compiled in scsi support ( actually in, not as module ), but
This is actually a well written about subject.
>From your description, I would recommend that you use what is called a
token and bucket scheme. Here is a link to some very good information
about advance routing issues, including setting up bandwidth
restrictions.
Chapter 9. Queueing Discipli
Generally speaking, linux relies on its users to not do things unless
they know what they are doing. If you don't believe me try logging in
as root and typing "rm -rf /usr".(in case you don't know, that will
foobar your system and likely force you to re-install from the
beginning)
On Tue, 2004
Wow, if I had made any more grammatical or spelling mistakes in that last
post I would have set some sort of record. I'm still seeing matching rules
dancing before my eyes.
- John
- Original Message -
From: "John T. Williams" <[EMAIL PROTECTED]>
To: <
zewski" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, March 10, 2004 10:34 AM
Subject: Re: Spam from linux-newbie
> At 08:50 AM 3/10/2004 -0500, John T. Williams wrote:
> >You could have a first message approval policy;
> >by this I mean, before I can se
You could have a first message approval policy;
by this I mean, before I can send messages to the listserv, you would have
to approve of my first one.
Sort of like packet filtering, but with e-mails.
- Original Message -
From: "Peter" <[EMAIL PROTECTED]>
To: "Ray Olszewski" <[EMAIL PROTE
O'Reilly publishes a small book called "Essential System Administraion"
for 14.95. This book is about 130 pages long and not too technical. It
explains a lot about security and other admistrative tasks in linux and
unix. I would highly recomend this book to you as it contains pretty
much everyth
What if someone hacks belkin's web server and puts an browser exploit on
the page which causes the computer to be infected with a virus maybe
[EMAIL PROTECTED] DOSing belkin and sco?
This is a clear ethics violation by the rules taught in my Computer
Professionalism class. The Engineers who de
What if someone hacks belkin's web server and puts an browser exploit on
the page which causes the computer to be infected with a virus maybe
[EMAIL PROTECTED] DOSing belkin and sco?
This is a clear ethics violation by the rules taught in my Computer
Professionalism class. The Engineers who de
I've set up a basic firewall using iptables. It allows connections from
a block of ip addresses to port 22, and allows connection back from
established,related. Then everything else gets dropped. Out of
curriousity mostly, I wanted to log everything that gets dropped, but
iptables logs an overwh
I was wondering if there is a good method for logging all attempts to
connect to a port on my computer. Basically, I was looking for
something that logged the port and ip and the destination port of
attempted connections.
I'm running Mandrake 9.1
-
To unsubscribe from this list: send the line
I have been trying to get a dns running in my father's intranet. The
situation is that he gets dsl severs witch is split by a belkin wireless
router. Using bind9, I have successfully configured one of the
computers in the intra net as a dns server, and have manually created
zone files which allow
if you asking how to permanently change your include folder, I have to
admit that I don't actually know. but if you just want it to search a
particular directory at compile time you use the -I option
for instance if I want gcc to look in the /home/mydir/include folder I
would type
gcc file.c -I
rom: "Raghuveer" <[EMAIL PROTECTED]>
To: "John T. Williams" <[EMAIL PROTECTED]>
Cc: "Silambu Chelvan" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Tuesday, September 23, 2003 7:01 AM
Subject: Re: Switching between foreground and background
>
I think part of the problem here might be conceptual.
If I understand what you want, you'd like, on a signal, for your program to
go into the background (still running but no longer blocking the terminal
input/output). On another signal you would like the program to come back to
the foreground.
I
should not have used
- Original Message -
From: "John T. Williams" <[EMAIL PROTECTED]>
To: "John T. Williams" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Wednesday, September 10, 2003 3:15 PM
Subject: Re: About PID...???!!!
> Alright Alrig
for ps to learn how to identify processes that are
currently running.
- Original Message -
From: "John T. Williams" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, September 10, 2003 2:04 PM
Subject: Re: About PID...???!!!
> definitely higher then 2^16,
8 AM
Subject: Re: About PID...???!!!
> At 11:21 AM 9/10/2003 -0400, John T. Williams wrote:
> >They are assigned linearly, however once a pid is used, it is never
reused
> >until the machine reboots.
>
> This is not quite correct. The pid assignment process wraps, I *think* at
> 3
8 AM
Subject: Re: About PID...???!!!
> At 11:21 AM 9/10/2003 -0400, John T. Williams wrote:
> >They are assigned linearly, however once a pid is used, it is never
reused
> >until the machine reboots.
>
> This is not quite correct. The pid assignment process wraps, I *think* at
> 3
They are assigned linearly, however once a pid is used, it is never reused
until the machine reboots.
A pid of 413 means that when that process was fork()'ed there had been 412
other processes already created. But remember every time you type ls, you've
run a process.
413 isn't a large pid at all
Anyone here know where I can find a could set of instructions for setting up
wireless on a linux laptop?
I need do figure out how to:
1. get my wireless card into the database that cardmngr uses, because it
just looks blankly at me when I insert a card and tells me that a hot
switchable card ha
--
From: "John T. Williams" <[EMAIL PROTECTED]>
To: "jude dashiell" <[EMAIL PROTECTED]>; "Eric" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Saturday, August 09, 2003 2:07 AM
Subject: Re: C Programming Mailing list
> I don'
I don't think this is a bad group for that either, its not like we have a
billion messages a day.
- Original Message -
From: "jude dashiell" <[EMAIL PROTECTED]>
To: "Eric" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Saturday, August 09, 2003 12:36 AM
Subject: Re: C Programming Mail
Something like this would do it
--- pythstart.sh --
#!/bin/bash
ps -A | grep -e "[ /]python2.1\>" 1> /dev/null 2> /dev/null
if[ $? != 0]; then
python2.1
fi
-end pythstart.sh---
- Original Message -
From:
Anyone who has CVS admin experience,
I'm trying to figure out how to cause files that are added to a CVS rep
to belong to a particular group. by this I mean, when a user says"
cvs -d:ext:[EMAIL PROTECTED]:/cvsroot/myproject add newname
user is a member of group myproject (though its not his/
anyone know how or where I could get the source code for basic linux
programs like "ls" and or "mkdir" or "rm" ?
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.ht
my father (who I just got to start using linux) asked me how to cause the
mouse buttons to be inverted.
And I had no idea, I've been searching through X-configuration guides and
haven't found anything, does anyone have any ideas?
-
To unsubscribe from this list: send the line "unsubscribe linux-n
if you look up
NAT
masq
and iptables
you'll find all the information you need
A good place to start is
http://www.tldp.org/HOWTO/IP-Masquerade-HOWTO/
Sincerely,
John T. Williams
[EMAIL PROTECTED]
- Original Message -
From: "J S" <[EMAIL PROTECTED]>
To: &
29 matches
Mail list logo