Dazed_75 wrote:
>> Again, if there are no spaces in the file names, you might do something
>> like:
>>
>> newfile=mynewfile
>> oldfile=myoldfile
>> rm $newfile
>> while read cmd arg1 arg2 rest_of_line; do
>> if [ -z "$rest_of_line" ] && [ ! -z "$arg2" ]; then
>> echo "$cmd $arg2 $arg1" >>$myn
>
> Again, if there are no spaces in the file names, you might do something
> like:
>
> newfile=mynewfile
> oldfile=myoldfile
> rm $newfile
> while read cmd arg1 arg2 rest_of_line; do
> if [ -z "$rest_of_line" ] && [ ! -z "$arg2" ]; then
> echo "$cmd $arg2 $arg1" >>$mynewfile
> else
> e
mysqldump isn't a hot backup, it causes locks table and/or row (i cant
remember off hand which). There is a myisamhotbackup or something like that
for MyISAM tables (why the hell would you use MyISAM?), but for a real table
you need the innodb hot backup thing that is commercial, and not cheap.
Al
Greenplum.com?
Obnosis.com BlackBerry Message
-Original Message-
From: Joshua Zeidner <[EMAIL PROTECTED]>
Date: Wed, 3 Dec 2008 21:58:24
To:
Subject: PostgreSQL vs. MySQL, was: MySQL premium services?
you know I do see many of the advantages with Postgres, but the information
is pa
You make an important point about spoofing IP addresses.
A not so common tactic to mess with port sentry/etc is to DOS you from your
upstream providers IP address via spoofing.
The effect is that it gets black holed and prevents any traffic into the
box!
JD
On Thu, Dec 4, 2008 at 7:23 AM, Lisa Ka
Complain to their upstream provider.
I usually use nslookup/dig, traceroute, and whois to figure out who that is.
On Thu, Dec 4, 2008 at 8:43 AM, keith smith <[EMAIL PROTECTED]> wrote:
>
> Hi Joshua,
>
> I was hoping to find a place I could report these attempted exploits.
> Something like the sp
On Dec 4, 2008, at 9:00 AM, Matt Graham wrote:
From: Alex Dean <[EMAIL PROTECTED]>
On Dec 3, 2008, at 3:16 PM, [EMAIL PROTECTED] wrote:
Back then when I researched the issue (about a year or so ago), you
had to take the server down to get a consistent backup with the
tools
provided by MySQ
From: Alex Dean <[EMAIL PROTECTED]>
> On Dec 3, 2008, at 3:16 PM, [EMAIL PROTECTED] wrote:
>> Back then when I researched the issue (about a year or so ago), you
>> had to take the server down to get a consistent backup with the tools
>> provided by MySQL. I haven't updated my research since...
Hi Joshua,
I was hoping to find a place I could report these attempted exploits.
Something like the spam email RBL's. If it does not exist, I wonder why.
I do appreciate everyones input on how to secure our server and our code.
Keith Smith
--- On Wed, 12/3/08, J
On Dec 3, 2008, at 3:16 PM, [EMAIL PROTECTED] wrote:
Back then when I researched the issue (about a year or so ago), you
had to
take the server down to get a consistent backup with the tools
provided by
MySQL.
I haven't updated my research since...
ET
Setting up a replication slave just f
The full log example, httpd.conf and index.php (php.ini [and optionally
my.cnf]) would have to be evaluated to determine unequivicably what is
happening, what is at risk, and whether it's worth dropping to a rewrite or
iptable deny.It's really easy to get silly with denials just because of log
moin moin,
there will be no devel meeting tonight. Next devel meeting is in February.
The east side meeting next Thursday is our annual end of year party.
We encourage bringing family and friends. This is a social event with no
presentations.
We will have some giveaways including some new Free
12 matches
Mail list logo