** Reply to note from John Clarke [EMAIL PROTECTED] Fri, 12 Sep 2003 16:08:09 +1000
No, with virtual_maps. All of my vhosts simply forward mail to other
sites. Each user has at least one other email address which is
thanks, John.
I think I need to go the 'transport table' way, for what I
Hi,
I'm trying to set up apt-proxy, and am getting interminable 'connection refused'
errors. Normally this would be because of incorrectly configured tcp wrappers.
My hosts allow looks pretty much like this:
ALL: .my.network.name
# And for good measure:
apt-proxy: 192.168.0.
And my
This used to work, but somewhere along
the way has gotten broken...
---
Whenever I try to add a windows client
system to my SAMBA domain, I get the error
The following error occurred validating
the name DSTALKER.
This condition may be caused by a DNS
lookup problem. link to page on Microsoft
Hi all,
I've just started getting al these weird spam emails. They contain
no advertising, just a random string of words.
I wonder if this might be revenge for me peppering some of my
webpages (ie http://www.mega-nerd.com/SRC/) with fake email addresses
embedded in HTML comments like so:
$author = Erik de Castro Lopo ;
I've just started getting al these weird spam emails. They contain
no advertising, just a random string of words.
probably an attempt to avoid bayesian mail filters.
marty
--
supine: From the Latin for lying on one's back, to be supine has come to mean
On Fri, 12 Sep 2003 18:27:49 +1000
[EMAIL PROTECTED] (Martin) wrote:
$author = Erik de Castro Lopo ;
I've just started getting al these weird spam emails. They contain
no advertising, just a random string of words.
probably an attempt to avoid bayesian mail filters.
I could
G'day all...
I'm wanting to install Win9x on a second hard drive (for some Windows
only software I'm required to run - sorry, VMs aren't quite cutting it
for me at this level). (The drive is /dev/hdb.)
What recommendations/warnings do people have for doing this?
I've tried doing this before
Date: Fri, 12 Sep 2003 14:30:05
From: Voytek [EMAIL PROTECTED]
how much hardware do you need to run VMW Windoze acceptably ?
Hi Voytek
I was running it happily on a PIII 450 MhZ with 256 Mb Ram. I couldn't
run anything else at the same time though, and I could not play video
in the VMWare
Dear Slugs
I am trying to set up a machine on my network so I can telnet to it.
Question 1) I can telnet to the machine - but I do not seem to be able
to telnet to it and log in as root. Is it not
possible to telnet to a machine as root?
Question 2) Once I have telnetted to a machine I
Paul Davies wrote:
Question 1) I can telnet to the machine - but I do not seem to be able
to telnet to it and log in as root. Is it not
possible to telnet to a machine as root?
This is a REALLY, *REALLY* bad idea.
I can't emphasize how bad this idea is.
(Look at telnet and security, umm, is
** Reply to note from Paul Davies [EMAIL PROTECTED] Fri, 12 Sep 2003 13:27:58 +1000
I am trying to set up a machine on my network so I can telnet to it.
Question 1) I can telnet to the machine - but I do not seem to be able
to telnet to it and log in as root. Is it not
possible to
** Reply to note from Chris Deigan [EMAIL PROTECTED] Fri, 12 Sep 2003 21:10:41 +0800
Otherwise look at X forwarding.
is that like running remote X ?
how much bandwith does one needs for usable remote X/KDE ?
Voytek Eymont
--
SLUG - Sydney Linux User's Group - http://slug.org.au/
More
Paul Davies wrote:
Question 1) I can telnet to the machine - but I do not seem to be
able to telnet to it and log in as root. Is it not
possible to telnet to a machine as root?
I use ssh (and you should) to login to a server I use and I have to
login as admin (or other user) and then use
Voytek Eymont writes:
Otherwise look at X forwarding.
is that like running remote X ?
Basicaly, you can export the display of a program onto another computer.
This is done using the X11 client/server model. So generaly, a cool way
of doing this is to use the -X parameter with ssh (man ssh).
now this is funny.
- Forwarded message from Will Smith
[EMAIL PROTECTED] -
Date: Thu, 11 Sep 2003 10:47:29 -0400 (EDT)
From: Will Smith [EMAIL PROTECTED]
Subject: Open Virus
To: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
I thought others might enjoy this bit of humor:
Will
[EMAIL
how do I pipe into 'convert' to resize an output image from another tool?
I have
tide -l sydney -f p -m g tide.png
and
convert -resize 480x120 tide.png small_tide.png
but I'm not having much success pipeing one into the other
Voytek Eymont
--
SLUG - Sydney Linux User's Group -
Thanks Brad and everyone else who contributed
ssh does allows me to log in as root. When I enable X forwarding I am
also able to run gedit over the network remotely. Now I am happy.
Why though, is it OK to log in as root using ssh and not telnet? Aren't
I just as likely to get my packet
** Reply to note from Paul Davies [EMAIL PROTECTED] Fri, 12 Sep 2003 14:45:20 +1000
Why though, is it OK to log in as root using ssh and not telnet? Aren't
I just as likely to get my packet sniffed (so to speak)?
ssh passwd are encrypted, telent, clear text
I had to actually
Paul Davies wrote:
Why though, is it OK to log in as root using ssh and not telnet?
Aren't I just as likely to get my packet sniffed (so to speak)?
ssh is a secure, encrypted connection to the remote machine
I had to actually install a telnet server. Is ssh some sort of
extension of
Dear All
I have installed woody on my PIII computers. I am
using first cd with the kernel 2.2.10-ide-pci
everything went well including the 8139 can be
detected and the eth0 interfaces can be found, but
when I patch the kernel to kernel 2.4.18. this where
all the problems comes.
the kernel seems
Paul Davies wrote:
ssh does allows me to log in as root. When I enable X forwarding I am
also able to run gedit over the network remotely. Now I am happy.
Login as a normal user and then type: su -
to become root. su = Switch User
See man su for more details.
Also take a look at sudo. If you
pesoy misak wrote:
tried to insmod the modules with insmod
/lib/modules/2.4.18/kernel/drivers/net/8139too.o it
sned me error saying this
./8139too.o: unresolved symbol
mii_ethtool_gset_R37c1efdb
./8139too.o: unresolved symbol
mii_ethtool_sset_R686b69b4
./8139too.o: unresolved symbol
At 12:19 am, Saturday, September 13 2003, Voytek Eymont mumbled:
how do I pipe into 'convert' to resize an output image from another tool?
I have
tide -l sydney -f p -m g tide.png
and
convert -resize 480x120 tide.png small_tide.png
but I'm not having much success pipeing one into the
Voytek Eymont wrote:
** Reply to note from Paul Davies [EMAIL PROTECTED] Fri, 12 Sep 2003 14:45:20 +1000
Why though, is it OK to log in as root using ssh and not telnet? Aren't
I just as likely to get my packet sniffed (so to speak)?
ssh passwd are encrypted, telent, clear text
Try...
pelham pty ltd.
1/100 yarrara rd
po box 382
pennant hills nsw 2120
02 9980 6988
they sell memory for pretty much anything i think.
I'm also not affiliated in any way etc.
Ben
Stuart Guthrie wrote:
I'm looking at adding memory to a Compaq/HP server. It uses ECC PC2100
type but warns me in
25 matches
Mail list logo