Hello Mike:
You have an X problem.
Your X is missconfigured and it will not start.
Your message is brief and I am guessing, but you can validate my statement
by looking at your computer booting:
if you see the screen flashing several times, that means that X is
unsuccessfully trying to start
On Thu, Mar 26, 2009 at 4:06 PM, Alan Dayley ala...@consultpros.com wrote:
It's one week till the first Thursday of April. On April 2nd I have a
conflicting event[1] and will not be able to be host at Adtron. I
have not found a coworker available to be substitute host. We'll need
a
This may be a because you're using Compiz. I thought there was a setting
in there for the number of workspaces, but now I don't see it. You can
try setting it directly with gconf-editor. In 8.10, navigate to
/apps/metacity/general and change num_workspaces to whatever you want
and see if that'll
LaCie 500GB external drive. USB, firewire 400, firewire 800, and
eSata interfaces. Extremely quiet. In perfect working order. I
build a backup server, so I no longer need this drive. All original
packaging and cables are included. Drive is currently HFS+
formatted. There is basic
We were contacted by Deru[1] about some maintanance downtime for our
co-located servers. They need to move them to a new rack. This work
is planned to occur sometime between 12:00PM and 5:00PM on Sunday.
Downtime for our servers will be 30-60 minutes some where in that
time. They will alert
Hi,
I am a programmer so my server admin skills are on the basic end. I have been
tasked with managing several LAMP servers running CentOS.
I'm looking for a simple reference that will tell me what logs to look at, how
often to look at them, and what to be looking for.
Thanks in advance for
I installed and tested out Google Openmeetings today. It does work, but
not near as slick as other browser based collaboration tools like WebEx,
MeetingPlace, etc. But those other ones are not free either :) It feels
very beta-ish, and some of the UI is a bit confusing. One of my testers
keith smith wrote:
Hi,
I am a programmer so my server admin skills are on the basic end. I
have been tasked with managing several LAMP servers running CentOS.
I'm looking for a simple reference that will tell me what logs to look
at, how often to look at them, and what to be looking for.
I highly recommend logwatch as well. I particularly love the fact that i can
add regex for my own custom lock checks.
On Fri, Mar 27, 2009 at 1:28 PM, Charles Jones
charles.jo...@ciscolearning.org wrote:
keith smith wrote:
Hi,
I am a programmer so my server admin skills are on the basic
You might just benefit from installing awstats, which will give you a nice log
platform.
Awstats can be a security risk, but in order to really see what's happening,
awstats is great.
Your logs can be heavily configured in many ways, and it's going to depend on
which LAMP platform you built
Yes, I do.
That's all going to be in the new Drupal, but call me.
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
Date: Fri, 27 Mar 2009 11:10:49 -0700
Subject: Re: [PLUG-Devel] Meeting in a week: Where? What?
From: p...@0x1b.com
To:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
One type of malware connects primarily to a chat system such as IRC,
which your ordinary 14-year-old might join for the latest superstar gossip.
and:
Each IRC network
On Mar 27, 2009, at 2:19 PM, Charles Jones wrote:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Find the comment titled It is a Cyber War a war between Linux and
Windows !!??. ROFL!
A lot of people believe that Linux OS and Linux NT is more secure
that
Interesting... How could one detect a trojan through, say, dd-wrt?
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
One type of malware
On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones
charles.jo...@ciscolearning.org wrote:
A participant joining a channel who is not a human is usually a program
called a bot.
[snip]
The others are...? Is IRC accessible to aliens?
--
Thanks and best regards,
Ryan Rix
TamsPalm - The PalmOS
And once agian why Password security and closeing unused ports is your
first line in defense against getting Pwned
Attack vectors are primarily TELNET or SSH that listen on the
device's WAN interface, accepting weak passwords (such as admin).
---
although you would thing that they would shut these options down by
default in anything that is supposed to be used as a security
device... only open when enabled...
heck most base Linux distros are built on that.
On Fri, Mar 27, 2009 at 4:05 PM, Stephen cryptwo...@gmail.com wrote:
And once
maybe... would be an interesting way to snoop on us as a culture...
On Fri, Mar 27, 2009 at 4:03 PM, Ryan Rix phrkonale...@gmail.com wrote:
On Fri, Mar 27, 2009 at 2:19 PM, Charles Jones
charles.jo...@ciscolearning.org wrote:
A participant joining a channel who is not a human is usually a
Log in and run ps and look for rogue processes I guess. Or put a sniffer
upstream of it. Both are things that the casual hay I got a kewl router
from bestbuy user is never going to do.
Maybe there is a market for adding router pen-testing modules to AV
software :-) Although, at least 3
Thanks for all the pointers!
This is a simple setup. One store on one server and an informational site and
a small store on the other. The third is for backups and fail over.
While I have been messing with Linux for over 10 years I feel I'm not quite
there when it comes to managing a
Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009:
http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update
Some parts of this article made me LOL. Like:
One type of malware connects primarily to a chat system such as IRC,
which your ordinary
Well, the sad fact is that _any_ machine will kick over and barf it's guts
under distributed attacks; it just depends on what it does after the green
slime clears..
Also, it really helps if you run one that won't take WRT, or only runs on an
arm, with small memory therefore they aren't too hot
I am reporting abuse from 72.215.225.96 to cox.net; I previously reported abuse
from 71.215.225.107.
Cox has a tap on my equipment; do not access without knowing there will be
consequences.
Continued attempts to encroach my systems from this IP will be dealt with
harshly.
NONE HAVE
Always build your systems with a nice warning:
This server is private property; you have no permission to access.
After catching some fly in your spider trap, grab their addresses for iptables
immediately. If you can't protect your adjacent machines, or are unsure of
everything, turn down
24 matches
Mail list logo