> OK.. I'll bite... being realtively new to Linux..is there some doc you could
> point me to that would in serious detail explain how to accomplish this
The kickstart docs are part of the RHL Customization guide.
http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/custom-guide/
As for gett
On Fri, 2003-07-25 at 20:35, bruce wrote:
> Ed...
>
> Here's the situation... I have access to the boxes.. but they don't have a
> separate monitor/keyboard... I've got ~15-20 servers... I'd rather not take
> the CDs and stand in front of each one change the monitor/keyboard, etc...
> or do a ftp/
>> Works for me.
Still works for me. You might want to re-check your code and take it to
some perl mailinglist.
> here is basically what it boils down to:
>
> bash-2.05b$more create
> #! /usr/bin/suidperl
> -rwsr-sr-x2 root root 531516 Jun 16 20:37
> /usr/bin/suidperl
>
> -rwsr-xr-
> > Red Hat provides a setuid perl in the perl-setuid package. SetUID perl
> > includes its own restrictions and security precautions.
>
> Yeah they sure do, except it doesnt work under any circumstance, no matter
> what I do it says Can't do suid.
Works for me. As mentioned, Perl has a number o
> | The correct answer would've been, rebuild perl with setuid.
>
> No. The correct answer is to stay the hell away from setuid,
> and use sudo which allows fine grained control.
Red Hat provides a setuid perl in the perl-setuid package. SetUID perl
includes its own restrictions and security pr
> Unfortunately it looks like gnuplot will not do what I need.
>
> I am trying to create a bar graph with the x labels being names instead
> of numbers. The output needs to go to a standard graphic format i.e
> png, jpg
I'm no gnuplot expert, but I believe you can do both of those with
gnuplot. (
>
> Here is a portion of my grub.conf file and I am wondering how to make
> the *.img files? (ie: /initrd-2.4.18-18.8.0.img)
The easiest way is with the mkinitrd command. man mkinitrd for details.
If you install or remove a RedHat kernel RPM it should add or remove
associated initrd's.
thor
> Whether or not it's good depends on whether you find it useful. MRTG is
> for traffic graphing, and SAR is for system activity reports. Cron
> itself runs every minute, although cron jobs run when they're scheduled.
I'd recommend running sar even if you don't know what it is. When you do
need it
> Im seeing the following in my apache logs. Can anyone tell me what this
> means?
>
> Dec 9 07:00:00 Mordor CROND[13097]: (root) CMD (/usr/bin/mrtg
> /etc/mrtg/mrtg.cfg)
> Dec 9 07:00:00 Mordor CROND[13098]: (root) CMD (/usr/lib/sa/sa1 1 1)
> Dec 9 07:01:00 Mordor CROND[13101]: (root) CMD (run
> I am new to RED-HAT Linux but I was amazed at this behavior and can't
> find anything on it.
>
> I created some dummy files as/owned by root on my WS with only "r"
> permission bit set for group and world. Then I logged into the same box
> as a dumb test user with no privileges and used "rm" to r
> i've decided to learn some python to do my cgi programming assignment.
> However, when I try to run a basic script on my server, I am prompted
> with a download box from mozilla.
> this is the script:
>
> #!/usr/bin/python
> print "Content-type: text/html\n\n"
> print "Hello world\n"
>
>
> As the topic, how can I add a password in a compressed file, .tar,
> .gz. so I can protect it?
tar c |gzip| gpg -c > archive.tar.gz.gpg
archive --> compress --> encrypt --> output
To de-crypt-compress-archive ...
gpg -d archive.tar.gz.gpg | gzip -d | tar x
thorn
> After looking about for a while I found
> /proc/sys/net/ipv4/ip_local_port_range
> which would appear to allow you to set this range but each time I modify
> the file and reboot the file gets changed back !
You don't need to reboot after changing /proc entries. They should take
effect immediatel
>> been managing enterprise systems for about 20 years, is you should
>> *never* do automated upgrades. You can certainly get automated
I think this depends on context.
If you have a cluster of a hundred nodes, moving from machine to machine
with a stack of RH CDs doing manual upgrades and clic
> I am new to using RH for my business. I have "played" with it since ver
> 4 and finally this year opened a new business and decided to use ver 7.
> So my question is there a way to set up something that will allow
> automated ver upgrades from the web, I heard something about this if you
> belong
> wrong ! With the public key and the root password known,
> and files appropriately configured, the "attacker" won't
> be prompted for a password.
>
> If the root password is known in any senario then "is all over" !
Can you clarify what you mean here?
If you force key
> If you have it set up like A -> B where A is your workstation and B is
> your server so that A has your private key and B has your public key
> what happens if you now want to log into another remote server C (A -> B
> -> C)?
Use agent forwarding. It will forward your key authentication-challe
> > At least if you are using passwords they need to work out the other
> > computer's passwords before they can SSH into them?
>
> Again, only if you create keys that have no passphrase.
Also, if you are using a password to log into a server that's been
compromised, they don't need to work out
On Wednesday 25 September 2002 06:05 pm, Edward Dekkers wrote:
> > SuSE you can select the miror to update from. Do I have to pay for
> > service for this to get reliable?
>
> Yes
>
> OR
>
> You can try using autorpm or apt-get instead.
OR
You can set up your own RedHat Network compatible serve
I believe that support for this chipset only recently made it into the XFree86
CVS tree. You can either build it yourself or wait for XFree86 4.3 which will
probably have it.
thornton
--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redha
If I read this correctly, and making assumptions about your network
topology and system configuration ...
You are doing IPTables logging on your firewall and you are intercepting
a port-unreachable replies from 210.11.68.47 for 204.144.132.162 which
attempted to send a UDP packet to port 62408
On Wed, 2002-09-18 at 12:08, Devon Harding - GTHLA wrote:
> Is there a command line version like up2date?
Yes, 'up2date' :)
up2date will only run in GUI mode if it detects it has a X display and
if the up2date-gnome package is installed.
You can force text mode with the --nox option.
thornton
On Wed, 2002-09-18 at 12:28, Paul DiMarco wrote:
> ...so I assume I need to install those other things first. But that isn't
> my problem, my beef is why don't rpm files have all the libraries included
> in them? Wouldn't that make our lives easier? I am I the only one who
> finds this strange
> Adding a disk driveI'm coming to Linux from a platform where incorporating
> additional storage could be as simple as plugging in the drive and
> configuring it in online as part of any volume set.
> Things don't seem as easy on Linux. I have a RH 7.3 system that was created
> with one disk dri
I'm working with IBM to narrow the problem down. So far it only happens on
SMP machines with ServeRAID and only with specific bit patterns. I haven't
tried RH 7.1 yet, but that is on my list.
thornton
On Wed, 19 Dec 2001, Jon Hoffman wrote:
> I would like to know if this is a problem. I am ge
I have been running into weird database corruption issues on my IBM boxes
using RedHat 7.2 and ServeRAID.
I finally copied the files from one machine to another and did MD5 sums.
If I copy from a non-IBM RAID to a non-IBM RAID the md5sums match, good.
If I copy from a non-IBM RAID to an IBM RA
On Thu, 3 May 2001, John Aldrich wrote:
> Ok..:-) Just checking. :-) There was a dsl machine that sent me about half a
> dozen of these puppies to my desktop machine at work (NO samba! ) For the
> life of me I can't figure out why that machine was even trying to talk to my
> workstation... so I
On Thu, 3 May 2001, John Aldrich wrote:
> Are there any known vulnerabilities in RH 6.2 (if you're not running bind)
> for netbios-ns? I've noticed a rash of "dgram to netbios-ns" in my logfiles
> lately and I"m wondering if it's because of some known vulnerability or
> what I get the usual
On Wed, 2 May 2001, Emmanuel Seyman wrote:
> On Wed, May 02, 2001 at 02:37:43AM -0400, Statux a ecrit:
> >
> > I thought that root logins were the reason why people recommend ssh in
> > the first place. Is there something I don't know? :)
>
> This is just a guess but it must be easier to "steal
On Wed, 2 May 2001, Robert Reyes wrote:
> Can I disable root login on SSH? if so, how can I do it?
With openssh, in the /etc/ssh/sshd_config file, modify the PermitRootLogin
parameter. The values are yes, no, without-password and
forced-commands-only.
Yes and no are obvious.
without-password
On Tue, 1 May 2001, David Talkington wrote:
> >I have yet to see a real case made for using telnet over ssh.
>
> I don't disagree with you at all in principle, but you assume that the
> administrator controls the clients, which in the ISP business, isn't
> true. To provide public services, clea
On Tue, 1 May 2001, Kyle Hargraves wrote:
>
> ..mmm - well of course ssh is more secure than telnet but
> in a secure network (i.e. non public) with a need for telnet
> access to a host by PCs there is an argument for telnet.
I must take strong exception with this idea.
System
On Tue, 1 May 2001, Clarence Donath wrote:
> I just installed RH7.1 selecting no firewall. Network access from the machine
> is fine, but I cannot telnet to it at all. This is the first time I've ever
> installed Linux and have not been able to telnet right away. You would think
> that select
At 06:55 PM 4/20/01 -0600, you wrote:
>Within the last week my mail quit sending out. I get messages saying "No
>route to host". Mail works internally so it does send, it is a routing
>error. When I run a traceroute to an outside address, it does nothing.
>Telnet, ftp, www etc all work fine. I h
More likely, that person is 0wn3d by someone who thinks they are 31337.
They are launching attacks against other machines from a machine they've
comprimised.
You should notify the maintainer of that IP.
thornton
On Tue, 17 Apr 2001, kelsey wrote:
> Chances are, that box is running portwatch
On Mon, 16 Apr 2001, Watt, Tom (CXO) wrote:
> Are the ISO images for 7.1 available for download IDENTICAL to the contents
> that will be on the installation CD's? If not, what is the difference?
Yes and no.
The RH images are the complete images of the freely distributable software
discs. RedH
On Fri, 13 Apr 2001, IS wrote:
> I mean besides the Linux native and swap partition for what reason should I
> make partitions for /boot /home /usr /var etc.
>
> Once you setup the filesystem with all those partions what happens with the
> size of the filesystems when I add a new disk to my RAID
On Wed, 11 Apr 2001, Bryan Fields wrote:
> I don't know what the Canadian Gov says about encryption over amateur radio
> packet, but I know that in the FCC says it is illegal to do it. Of course i
> am assuming this is going to be used over amateur radio.
Openssh uses the openssl libraries, wh
On Wed, 11 Apr 2001, David Brett wrote:
> Does anybody know of a way to allow DNS names with "_" in them? I have a
> number of servers with an underscore in them. It is going to take a lot
> of work to make the change by a large number people.
They aren't RFC compliant.
Your best bet is to u
On Wed, 11 Apr 2001, Ashley M. Kirchner wrote:
> Thornton Prime wrote:
>
> > It should be a compile time kernel option to support ipchains.
>
> The question is - which option? I'm going over the options (again) right
> now, trying to find it.
Select
[*
On Wed, 11 Apr 2001, Ashley M. Kirchner wrote:
> I just realized that I can't run ipchains with kernel 2.4.3 (it says
> it's incompatible). Did I just forget to turn on an option in the
> kernel config, or is ipchains no longer supported in the 2.4.x series?
> (I probably should read up on
With xinetd, you should be able to copy /etc/xinet.d/telnet to
/etc/xinet.d/telnet2 and then copy add a line in /etc/services that says
telnet2 24/tcp
One instance of xinetd should be fine to serve telnet on both ports 23 and
24.
thornton
On Wed, 11 Apr 2001, Mike Chambers wrote:
>
On Wed, 11 Apr 2001, Ted Gervais wrote:
> Yup on the SSH. But I am not sure that SSH will work over Packet Radio.
> Whereas Telnet does. But it is a good thought..
If it uses TCP, then it will work with ssh.
There is a little bit more overhead, so you might see more latency, but
you might be a
On Wed, 11 Apr 2001, Ted Gervais wrote:
> Thanks for the response. I just did a grep to see if xinetd is running.
> Here is what I see:
>
> [root@mach3 init.d]# ps ax | grep xinetd
> 814 ? S 0:00 xinetd -stayalive -reuse -pidfile /var/run/xinetd.pid
>
> Does that look right?
Looks go
On Tue, 10 Apr 2001, Ted Gervais wrote:
>
> So - what am I missing that will allow telnetting to my system. Here is the
> error people see:
>
> [ve1drg@mach3 ve1drg]$ telnet 142.176.139.108
> Trying 142.176.139.108...
> telnet: Unable to connect to remote host: Connection refused
Run "chkconfig
On Tue, 10 Apr 2001, Ted Gervais wrote:
> It seems that RedHat7 comes with no means of people being able to telnet to
> it. I presume one has to download a telnet package to made this possible?
If you install the RedHat with the server option, it will install the
telnet-server package by defau
On Sun, 8 Apr 2001, A. Gent wrote:
> I have a very strange problem: on a RH 6.2 box I can
> not edit the inetd.conf file as root.
> I can not mv, rm or chowm it, either.
lsattr to check the Linux filesystem attributes. If you didn't set those
attributes, someone else probably did to keep you ou
On Wed, 4 Apr 2001, Diogo Saad wrote:
> What kind of encryption is used in the /etc/shadow file ??
MD5
> Is there a function in php that encrypts a string the same way the shadow
> files does?
Probably, though you might be better off exec'ing passwd.
> What I wanna make is a php page that ch
On Mon, 9 Apr 2001, Ward William E DLDN wrote:
> Openssh doesn't work for this properly for various reasons; logging in as
> a different user and su'ing is fine for sysadmin duties, but doesn't work
> for automated logins... so my choice is to modify my config files to
> allow root logins.
Mayb
On Sun, 8 Apr 2001, Lee Johnson wrote:
>
> I'm must admit to tiring of core dumps myself albeit willing to admit it
> might be my current system and how i have it setup..
>
> are there any things to do to avoid this or sytem tweaks ? ...
Core dumps are the sign of a program bug or a mis-matched
On Sun, 8 Apr 2001, Aage J. Skjolingstad wrote:
> You buy any RH and it is full of something that's not working; --it's a
> sh..t ???
It sounds like you've had a bad experience. Rather than complaining and
blaming RedHat, I'd suggest you stand up, take a little responsibility for
your open sour
On Fri, 6 Apr 2001, Jerry Garrison wrote:
> Thanks to all of you for all the suggestions and caveats. I've been told
> that, in this circumstance, ssh is not an option. At least now, maybe I can
> convince people to just leave it the way it is.
Argh.
I've heard the "we can't use ssh" mantra
On Fri, 6 Apr 2001, Thornton Prime wrote:
> There is an O'Reilly book on the subject of SSH, and I can't recommend it
> highly enough, especially for folks just learning to use SSH:
>
> http://www.oreilly.com/catalog/sshtdg/
One of the online chapters has a full desc
On Fri, 6 Apr 2001, Rodolfo J. Paiz wrote:
> At 4/6/01 08:19 AM -0700, you wrote:
> >Replacing password logins with RSA/DSA key logins makes your system hard
> >as nails.
>
> Directions, pointers, hints, gotchas, suggestions, HOWTO's, documentation...?
Your ssh documentation should have full in
On Fri, 6 Apr 2001, Nitebirdz wrote:
> >
> > Red Hat told me that logging in remotely as root had been turned off in RH
> > 6.2 for security reasons. Anyone know where the file is to turn it back on?
>
> I believe it's the /etc/securetty file.
It is also tied to your pam configuration. PAM conf
On Wed, 4 Apr 2001, David Talkington wrote:
> Sure. If I had root on your system and wanted your passwords, it'd be
> a whole lot easier to capture your keystrokes and upload your
> passwords than it would be to upload your shadow file and run a
> cracker on it.
Most bad people will probably d
On Wed, 4 Apr 2001, John Aldrich wrote:
> Speaking of this
> Checking my logs lately, I've been seeing a TON of "print request from [ip]"
Op. Yep. One of the worms also exploits lpr.
> which is usually some remote IP, often in a foreign country. Is this indicative
> of a new exploit? I'm r
On Wed, 4 Apr 2001, [EMAIL PROTECTED] wrote:
> Our firewall is set to deny all inbound connection requests (SYN packets?).
> Am I right in assuming that the worm couldn't get in?
In all these worm cases, yes. It is worth noting that a SYN defense
firewall is not impervious to all types of attac
On Wed, 4 Apr 2001, [EMAIL PROTECTED] wrote:
> Sorry to be a pain, I'm coming in on this discussion half way through. I
> was just wondering, this worm has to be executed to infect, right? It
> relies on social engineering?
No. Worms traditionally exploit known vulnerabilities in network serv
On Tue, 3 Apr 2001, Mike Watson wrote:
> Thanks! I'll look it up. Do you know if procmail is in the O'Reilly
> Sendmail book?
No. The Sendmail tome is devoted solely to the arcana of sendmail.
thornton
___
Redhat-list mailing list
[EMAIL PROTECTE
On Tue, 3 Apr 2001, Mike Watson wrote:
> I'm still a mail novice. Is procmail a part of sendmail? I've gotten by
> safely so far using webmin to config sendmail. I need to educate myself
> more.
It's not part of sendmail, but the default RH sendmail config delivers
through procmail. Procmail
On Tue, 3 Apr 2001, Mike Watson wrote:
> The problem: I have a domain. The registrar provides mail and URL
> forwarding. BUT...all the mail forwarding goes to a single e-mail address.
> When the mail arrives for 4 different users into the same mail spool, can
> Sendmail place the mail into the
On Fri, 30 Mar 2001, Steve Gulick wrote:
> I just got cable hooked up to my office with @home and they are using DCHP
> to assign ip addresses. Is there a wat to bypass this and maintain a static
> ip? I also have @home in my home office and have had a static ip for a few
> years now. It would m
On Wed, 28 Mar 2001, Jerry Human wrote:
> I have just reinstalled RH 7.0 but this time it wouldn't creat a boot
> disk. The old boot disk doesn't work. RH is on /dev/hda4, how can I
> start RH to make a boot disk?
Boot to the CD, or install floppy. At the prompt type linux
root=/dev/hda4. It sh
On Tue, 27 Mar 2001, Sergey V. Golovchenko wrote:
> Is there any way to change permission from read-only to not read-only for root (/)
>partition? i am using redhat 6.1
If your system starts up correctly, it should have mounted read-write. You
can verify this with the mount command.
If it did
On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
> Just read the thread on how to create a new password for root (entering
> single user mode, writing "linux single" at the lilo prompt then typing
> "passwd" etc. ...
>
> How can I prevent this, because this possibility (as convenient it may be
> fo
On Sun, 25 Mar 2001, Liguo Song wrote:
> It is not the right version. The one updated is vim-5.7-8.src.rpm,
> and others. The one at valinux site is vim-5.7-0.6x.src.rpm
>
> I am just wondering whether is violates the GPL is Red Hat fails to
> provide the SRPM for that package.
It would, but vi
On Sat, 24 Mar 2001, Miroslav Skoric wrote:
> 1.) If I am logged on NT machine as an ordinary , I get a content
> of /home/ directory.
This is good, right?
> 2.) If I am logged on NT machine as "administrator", I get not only the
> stuff under /home/ directory, but 'hidden' stuff as well
> (dir
On Fri, 23 Mar 2001, Marcus Ouimet wrote:
> Is it possible to specify multiple owners (not groups, but actual users) to
> a file or directory using chown? Ahy help appreciated. It is not in the
> manual pages so I assuming it can't be done.
No. Not with normal POSIX permissions.
The eas
On Thu, 22 Mar 2001, Mikkel L. Ellertson wrote:
> Keep us posted on how it goes. If you deside to add some diskless
> workstations, you may want to look into the Linux Terminal Server
> project.
You may also want look in the archives of the LVS project. I remember
someone posting there that he
On Wed, 21 Mar 2001, Jeremy Herbison wrote:
> I installed openSSH 2.5.1p2 (compiled from source) on my redhat 6.2 (with
> the updated PAM rpm installed) and it now denies all passwords when i try to
> remote in. I know it is not a problem with the sshd.conf file since i have
> tried pretty much
On Wed, 21 Mar 2001, Chuck Mead wrote:
> Here's what Micro$oft said about the matter themselves:
>
> http://www.microsoft.com/ntserver/web/news/msnw/Hotmail.asp
Ouch. That made my side hurt from laughing too much.
thornton
___
Redhat-list mailing
On 21 Mar 2001, Trond Eivind Glomsrød wrote:
> "jack wallen, jr." <[EMAIL PROTECTED]> writes:
>
> > The site www.hotmail.com is running Microsoft-IIS/5.0 on Windows 2000.
>
> That only say what the front web server is running... the back is
> still running on Solaris, AFAIR.
Microsoft's woes
On Thu, 22 Mar 2001, Andrew So Hing-pong wrote:
> I would like to write a ftp scripting for automation some jobs
> with security. I know someone MUST suggest using scp2 or sftp2etc.
Obligatatory "use scp, stfp, or rsync over ssh" statement.
> But based on the user's requirement, I must usi
Unauthorized means they were rejected, so you are safe for now. You really
should only run portmap if you absolutely need to (it is almost
exclusively used for NFS). If you do run it, I'd recommend you set up a
firewall.
thornton
On Tue, 20 Mar 2001, Steve Lee wrote:
> I dont think this is hap
On Tue, 20 Mar 2001, Thornton Prime wrote:
>
> Another option is thttpd, which should be smaller ... but isn't?
Well, it isn't all that much smaller.
The smallest option would be to set her homepage to a static file on her
machine or on a shared files
On Tue, 20 Mar 2001, fred smith wrote:
> I'd further like to set up her netscrape so its default page is some
> kind of static page on my Linux box, but I haven't a clue how to do it.
> (With the idea that doing that will keep netscape from causing diald to
> bring up the link to the ISp every ti
Please don't ask this on an Apache list.
It is in no way Apache specific. This is normal HTTP/HMTL behavior, and if
you want to override it you have to do some stupid JavaScript tricks. You
might also be able to fix it with some silly CGI or by pre-caching the
image on a previous page, but again
On Mon, 12 Mar 2001 [EMAIL PROTECTED] wrote:
> RedHat sells a number of "bundles", e.g., IBM Small Business Server, Lotus
> Domino Application Sever, HP Open Mail (probably ought to drop that one as
> HP has). All are bundles with RH 6.2 rather than RH 7.0. Is there a
> message here we should
On Wed, 7 Mar 2001, Madison, Ryan wrote:
> Can someone explain how patching relates to RedHat Linux. I have
> seen recent messages about up2date, which from my knowledge seems to upgrade
> just the kernel.
up2date is fully capable of upgrading any rpm installed software.
> W
On Mon, 5 Mar 2001, [EMAIL PROTECTED] wrote:
> Is there any tool around for Linux that reads pdf files ??
Adobe has an acrobat reader for Linux. gv and ggv both work on the
majority of pdf files.
thornton
___
Redhat-list mailing list
[EMAIL PROTEC
On Sat, 3 Mar 2001, Rilindo Foster wrote:
> Feb 27 22:35:35 redhserver rpc.statd[360]: gethostbyname error for
> ^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿b750 8049710 8052c28687
...
> Feb 27 22:38:20 redhserver adduser[3642]: new user: name=sql, uid=0, gid=0,
> home=/bin, shell=/bin/bash
DAN
On Sat, 3 Mar 2001, Marco Shaw wrote:
> I'm curious to hear from people on this list that are Linux sys admins. I'm
> not looking to read your resume, but would love to hear about your work
> history over the last 2 years or so in about 3-5 lines.
For the last 5 years I've been working in posit
On Wed, 28 Feb 2001, Living Dead wrote:
> To put it in another way:
> If I allocate 32Mb of memory in the parent process,
> then I call fork(), the amount of memory needed for
> both parent and child is 64Mb?
The way Linux works, no, each child doesn't make a full copy in memory.
Linux uses a
On Wed, 28 Feb 2001, Michael Ghens wrote:
> modprobe: modprobe: Can't locate module net-pf-10
>
> What module is this for?
ipv6?
thornton
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list
On Fri, 23 Feb 2001, Gustav Schaffter wrote:
> > It's been up continuiously since I upgraded to the 2.4.0 kernel. The
> > notable thing about mine is that there is no UPS and I live in California,
> > and this is my desktop system, that my 5 year old and 3 year old pound on
> > and play games on
On Thu, 22 Feb 2001, Mikkel L. Ellertson wrote:
> On Thu, 22 Feb 2001, Thornton Prime wrote:
>
> >
> > The only legitimate reason for rebooting a Unix system would be for a
> > kernel upgrade.
> >
> > Anything else should and is viewed as a bug in the OS.
The only legitimate reason for rebooting a Unix system would be for a
kernel upgrade.
Anything else should and is viewed as a bug in the OS.
thornton
On Tue, 20 Feb 2001, Mahalakshmi wrote:
>
> here's a problem 'bout unix .
>
> Is there any limitation for UNIX machines that they should be re
On Sat, 17 Feb 2001, SoloCDM wrote:
>
> You've never had a cracker break through the ipchains REJECT?
It is no more possible than it is for them to break through a rule with
DENY.
thornton
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://list
On Sat, 17 Feb 2001, SoloCDM wrote:
> Why the story? Ipchains has reject and from all appearances it allows
> the worm, as it so happened long ago, into the system. Deny doesn't
> seem to entertain any thought of accepting anything. In fact, it
> seems to baffle bad or good systems into not kn
On Fri, 16 Feb 2001, Andrew So Hing-pong wrote:
> Hi Forks,
>
> Anyone knows any freeware which can listed down which
> port is "bind" by which process.
netstat does it.
netstat -altup will give you a nice list.
thornton
___
Redhat-list mailing l
On Tue, 13 Feb 2001, kevin wrote:
> Just a quick question. What's the best way to support file
> sharing over the internet?
>
> I know all about the security nightmares of NFS/SMB/NCP so
> it looks like I'm stuck with ftp. My problem is that my lusers
> have enough problems remembering to insert
On Tue, 13 Feb 2001, Uday Pai wrote:
> Hi all,
> Is there any option to extract a file from a rpm?
Yes ... no ...
rpms store files basically in cpio format. You can use the rpm2cpio
command to convert an rpm to cpio format and then pipe the results through
cpio to extract the file you want.
t
On Fri, 9 Feb 2001, Adahma wrote:
> I have a cable modem connected to my Red Hat 7 box on eth0, and eth1
> connecting to a 5 port hub which I'd like to setup on the 192.168
> private ip's and do masqerading for. Here's my applicable files:
... snip ... (looks fine)
> I do have masqerading rul
On Thu, 8 Feb 2001, eric clover wrote:
> is there anything that will convert a windows doc made with word into some
> kind of linux format? here at work(windows machine) i'd like to be able to
> make a doc and xfer it to home convert it to some linux format and print it
> out on my home(linux) m
On Tue, 6 Feb 2001, David Brett wrote:
> Who should have the permissions. Right now only root has write
> permissions to this directory.
Named typically will run as user 'named' so make sure the directory (and
probably all the files) are read-writeable by named. It probably makes
sense to have
On Tue, 6 Feb 2001, Scott Sharkey wrote:
> Is it just me, or is the kernel-header package in rh7.0 actually a
> 2.4 header, but with a 2.2.16 kernel? I just compiled a module that
> I need, and now it's complaining about the version mismatch. I know
> I can force the module, but why is RedHat
On Mon, 5 Feb 2001, Tom Heibel wrote:
> Which dual head video card are you using? We are trying to get the Matrox
> G450 to work, but have had no luck.
I was using two different Matrox cards.
I think there are still issues with the G450 that are worked out in newer
releases.
thornton
On Sun, 4 Feb 2001, John Aldrich wrote:
> On Sun, 04 Feb 2001, Anthony Capone wrote:
> > The IP for the W2K machine is 205.150.20.254. And I checked it out myself it
> > has the same gateway and netmask...
> >
> Well, you can always cheat and make the netmask
> 255.255.255.0.:-)
Microsoft does
On Sun, 4 Feb 2001, John Aldrich wrote:
> On Sun, 04 Feb 2001, Anthony Capone wrote:
> > Hi Gurus!
> >
> > I have a question! I have a redhat system. When I setup the basic host
> > information ie: IP address, Netmask and Gateway. Then I restart the system.
> > If I try to ping the gateway, I ge
1 - 100 of 192 matches
Mail list logo