No one explained the way this should really be set up - while your setup
may work for testing, the production setup would be:
- two physically separate networks - one unprotected outside the firewall,
and one protected inside the firewall.
- one card configured with 192.168.0.1 / 255.255.255.0
-
You may get some better answers than this but - it seems to me that, when I
tried this, it turns out that the front page extensions for apache/linux
allowed the use of the special front page programming options, but not the
publishing capability - ie, the ability to automatically post content f
Does anyone else think posting a copyright script (which may or may not
have rights granted to the public elsewhere) inappropriate? Or do we just
believe ALL code should be free? In the '60's, we "liberated" buildings
from the bureaucrats - or (jokingly) food from the grocery store - is this
"
Can you explain how to use a second NIC to avoid having DHCP on the first
NIC (I assume thats what does it) override the hostname?
At 06:36 PM 1/13/01 -0500, Statux wrote:
>If you have a NIC on a private network, you can have it say whatever you
>want. My computer is "circuit" no matter what's
you could use nat32 - at www.nat32.com - not as a proxy server, but as a
router. Its not free, but its pretty cheap.
>At 10:55 AM 1/2/01 +0700, Shanmuga Raj wrote:
>
> >>Does anyone know of a free program for windows that
> >>will allow it to serve as a proxy server for a linux client?
__
Sorry - when I sent this, I thought they had another product that emulated
a disk buffer. But I could not find that on their web site any more.
At 06:26 AM 10/24/00 -0700, Dan Kronstadt wrote:
>At 07:41 AM 10/24/00 -0500, Chad W. Skinner wrote:
>>I am wondering if it is possible to sha
At 07:41 AM 10/24/00 -0500, Chad W. Skinner wrote:
>I am wondering if it is possible to share a disk array on either side of a
>firewall?
Take a look at www.sphd.com. Its not quite what you want, but its an
interesting approach.
Dan Kronstadt
Sunland, Ca
[EMAIL PROTECTED]
A journe
appreciated.
>Mike Huttinger
>
>
>
>___
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list
Dan Kronstadt
Sunland, Ca
[EMAIL PROTECTED]
Oh, what a tangled website we weave when first we practice.
__
w.nat32.com - GREAT product. Works perfectly.
Dan Kronstadt
Sunland, Ca
[EMAIL PROTECTED]
Why is the alphabet in that order? Is it because of that song?
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list
At 07:30 PM 8/23/00 -0700, Gordon Messmer wrote:
>Have someone outside your network try to connect to your web server. It
>will probably work.
To try this from inside your network, go to www.anonymizer.com and enter
the URL.
Dan Kronstadt
Sunland, Ca
[EMAIL PROTECTED]
Why is the alpha
ne into the box, then you can call it,
enter a secret code, and it cuts off power from the PC for a few minutes.
Sorry - I dont remember the manufacturer.
Dan Kronstadt
Sunland, Ca
[EMAIL PROTECTED]
If you got the words it does not mean you got the knowledge.
--
To unsubscribe: mail [
11 matches
Mail list logo