Hello Mike:
You have an X problem.
Your X is missconfigured and it will not start.
Your message is brief and I am guessing, but you can validate my statement
by looking at your computer booting:
if you see the screen "flashing" several times, that means that X is
unsuccessfully trying to start
On Thu, Mar 26, 2009 at 4:06 PM, Alan Dayley wrote:
> It's one week till the first Thursday of April. On April 2nd I have a
> conflicting event[1] and will not be able to be host at Adtron. I
> have not found a coworker available to be substitute host. We'll need
> a different location for the
This may be a because you're using Compiz. I thought there was a setting
in there for the number of workspaces, but now I don't see it. You can
try setting it directly with gconf-editor. In 8.10, navigate to
/apps/metacity/general and change "num_workspaces" to whatever you want
and see if that'll
LaCie 500GB external drive. USB, firewire 400, firewire 800, and
eSata interfaces. Extremely quiet. In perfect working order. I
build a backup server, so I no longer need this drive. All original
packaging and cables are included. Drive is currently HFS+
formatted. There is basic bac
We were contacted by Deru[1] about some maintanance downtime for our
co-located servers. They need to move them to a new rack. This work
is planned to occur sometime between 12:00PM and 5:00PM on Sunday.
Downtime for our servers will be 30-60 minutes some where in that
time. They will alert agai
Hi,
I am a programmer so my server admin skills are on the basic end. I have been
tasked with managing several LAMP servers running CentOS.
I'm looking for a simple reference that will tell me what logs to look at, how
often to look at them, and what to be looking for.
Thanks in advance for
I installed and tested out Google Openmeetings today. It does work, but
not near as slick as other browser based collaboration tools like WebEx,
MeetingPlace, etc. But those other ones are not free either :) It feels
very beta-ish, and some of the UI is a bit confusing. One of my testers
immed
keith smith wrote:
Hi,
I am a programmer so my server admin skills are on the basic end. I
have been tasked with managing several LAMP servers running CentOS.
I'm looking for a simple reference that will tell me what logs to look
at, how often to look at them, and what to be looking for.
I highly recommend logwatch as well. I particularly love the fact that i can
add regex for my own custom lock checks.
On Fri, Mar 27, 2009 at 1:28 PM, Charles Jones <
charles.jo...@ciscolearning.org> wrote:
> keith smith wrote:
>
>
> Hi,
>
> I am a programmer so my server admin skills are on the
You might just benefit from installing awstats, which will give you a nice log
platform.
Awstats can be a security risk, but in order to really see what's happening,
awstats is great.
Your logs can be heavily configured in many ways, and it's going to depend on
which LAMP platform you built a
Yes, I do.
That's all going to be in the new Drupal, but call me.
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
> Date: Fri, 27 Mar 2009 11:10:49 -0700
> Subject: Re: [PLUG-Devel] Meeting in a week: Where? What?
> From: p...@0x1b.com
> To: plug-d
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
"One type of malware connects primarily to a chat system such as IRC,
which your ordinary 14-year-old might join for the latest superstar gossip."
and:
"Each IRC network
On Mar 27, 2009, at 2:19 PM, Charles Jones wrote:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Find the comment titled "It is a Cyber War a war between Linux and
Windows !!??". ROFL!
"A lot of people believe that Linux OS and Linux NT is more secure
tha
Interesting... How could one detect a trojan through, say, dd-wrt?
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
> http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
>
> Some parts of this article made me LOL. Like:
>
> "One type of malware c
On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones <
charles.jo...@ciscolearning.org> wrote:
> "A participant joining a channel who is not a human is usually a program
> called a bot.
>
[snip]
The others are...? Is IRC accessible to aliens?
--
Thanks and best regards,
Ryan Rix
TamsPalm - The PalmO
And once agian why Password security and closeing unused ports is your
first line in defense against getting Pwned
"Attack vectors are primarily TELNET or SSH that listen on the
device's WAN interface, accepting weak passwords (such as admin)."
---
P
although you would thing that they would shut these options down by
default in anything that is supposed to be used as a security
device... only open when enabled...
heck most base Linux distros are built on that.
On Fri, Mar 27, 2009 at 4:05 PM, Stephen wrote:
> And once agian why Password secu
maybe... would be an interesting way to snoop on us as a culture...
On Fri, Mar 27, 2009 at 4:03 PM, Ryan Rix wrote:
>
>
> On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones
> wrote:
>>
>> "A participant joining a channel who is not a human is usually a program
>> called a bot.
>
> [snip]
>
> The ot
Log in and run ps and look for rogue processes I guess. Or put a sniffer
upstream of it. Both are things that the casual "hay I got a kewl router
from bestbuy" user is never going to do.
Maybe there is a market for adding router pen-testing modules to AV
software :-) Although, at least 3 diffe
Thanks for all the pointers!
This is a simple setup. One store on one server and an informational site and
a small store on the other. The third is for backups and fail over.
While I have been messing with Linux for over 10 years I feel I'm not quite
there when it comes to "managing" a serv
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
> http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
>
> Some parts of this article made me LOL. Like:
>
> "One type of malware connects primarily to a chat system such as IRC,
> which your ordina
Well, the sad fact is that _any_ machine will kick over and barf it's guts
under distributed attacks; it just depends on what it does after the green
slime clears..
Also, it really helps if you run one that won't take WRT, or only runs on an
arm, with small memory therefore they aren't too hot
I am reporting abuse from 72.215.225.96 to cox.net; I previously reported abuse
from 71.215.225.107.
Cox has a tap on my equipment; do not access without knowing there will be
consequences.
Continued attempts to encroach my systems from this IP will be dealt with
harshly.
NONE HAVE PERMISSION
Always build your systems with a nice warning:
This server is private property; you have no permission to access.
After catching some fly in your spider trap, grab their addresses for iptables
immediately. If you can't protect your adjacent machines, or are unsure of
everything, turn down your
24 matches
Mail list logo