Re: [techtalk] mail format (was re: ftp for non users)

1999-11-29 Thread Chris J/#6



> This is hardly technical...but...it borders on rule-boundedness to me.
> But still not that close to be unbearable. So either I mistimed
> majordomo or it didn't go thru. So I am still here. And I will probably
> always be leftie anti-authoritarian me. Same as you will be you. I spent
> too much time in the underground publishing universe for everything to
> be pretty and perfect.. And yeah I pop off...So I want it rest and hope
> it all calms down.
> 
> Thanks and have Fun,
> Sends Steve

Hmm...I'm pretty anti-authoritarian, but you always know who the boss is - 
would you go against what your boss said (be it an underground mag or 
otherwise? There are limits to everything that is done, no matter what it 
is...know the limits.

> 
> P.S. Obligatory technical comment... Shell accounts should be the
> default perhaps with lots of  -i
> protection. and  I want to run traceroute and ping when I need to do so.
> I worry that things are getting too snarlsome  and un-needed
> restrictions are being applied. It could be just me.
> 

ping and traceroute I have seen disabled due to security holes (buffer 
overruns causing root access to those that know how). If a security hole is 
known. Quick fix: remove the SUID bit - long term fix...get a version that 
isn't broken. When I was at Uni, the admin's disabled the suid bit on "ps" 
due to a buffer overrun hole...meant ps -ef did naff all but show your own 
processes.

Shell accounts are huge security holes: I've worked in both camps: as an 
administrator, you don't want you're users causing you hassle, so you limit 
what they do. As a user, you try and circumvent all root's restrictions. It's 
fun having running battles with admins... :) Computer Services at Uni ended 
up leaving me alone after deciding I was mostly harmless ... :)

Chris...
ps, apologies if I've covered anything already said...I've only just got 
round to carrying myself from grrltalk over to both issues & techtalk :)


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Re: meta-stuff

1999-11-30 Thread Chris J/#6


> > But since this is techtalk, and since we seem to be discussing
> > etiquette, is there any real reason why Reply-To is set to the
> > list? There's an article detailing reasons why it can be a bad
> > idea at http://www.unicom.com/pw/reply-to-harmful.html 
> 
> I have read the article at that link a couple of times now, and in the
> early days of LinuxChix I made the decision to leave the reply-to to the
> list because there were only a few of us here, and conversations kept
> drifting off the list into the nether-regions that are "offlist".
> 

One thing I will note: the group reply the author of the page mentions in 
Elm, will group reply, yes. But it usually ends up giving the original author 
two copies (one direct, the other from the list). I've been on some lists 
where people weren't overly happy by this. One list in particular had most of 
the users keep posting reminders ("I'm on the list - no need to cc me").

I can get around the problem with my mailer (I use exmh 2.0.2) - I'll work 
out how to add a third option to look at the headers and potentially use the 
"Sender:" header, if I know I can trust it. It's not what the header is there 
for, I know, but if it minimises duplicates, I'll use it.

Most (all?) other mail programs will have Elm's behaviour. I myself do find 
it annoying...if you do a group reply to a reply that someone sent you where 
you were Cc'd from the list, then you'll get a duplicate of your own mail 
back on your machine (the list, and your Cc). Manually editing the headers is 
then the way to fix it.

There is no perfect solution though - it's one or the other. I'm raising this 
as a point of interest. I'll go along with whatever the final decision is 
though without a problem :)

Chris...

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] HTML (and CDROM question)

1999-12-01 Thread Chris J/#6


Umm...blinking?

I see no blink...and I've ran "less" of the email to make sure my mail 
program ain't masking it out...

Chris...

> Okay I've had it.  This last email is blinking all over my console.
> 
> I'm outta here.
> 


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] X Display

1999-12-09 Thread Chris J/#6


> 
> I use XDM on my system. When I login and try to "su - localuser" in
> a xterm, I get the following message:
> 
> /dev/ttypc: Operation not permitted
> 

The 2nd part of your question seems to be answered by later mails - this 
first part however hasn't - but do not be alarmed, it's safe enough and can 
be ignored. It's caused simply because you're doing an su. When you logged in 
initially say, for example, as user "mary", the ownership if that terminal, 
ttypc, was set to mary.

When you su, the routines attempt to chown(2) the terminal to the user you 
have su'd to. As this is tried after su has setuid(2)'d down to the new user. 
Hence 'Operation not permitted'. The only time the chown(2) would work is if 
you su'd to root.

It's nothing to be worry you - the only commands it will affect are ones like 
'mesg', which will refuse to work. (mesg toggles the group write (sometimes 
the world write as well) permissions on the terminal device so you can 
recieve or refuse write(1)'s or talk(1)'s.

At least, that's as I understand it (it happens on Solaris 2.6 as well -- 
couldn't work it out -- this is what I finally decided it was :) It may be 
more than chown(2) - eg, ioctl's, chmod's or whatever - it's simply because 
it's changed user before it attempts to manipulate the terminal device).

I can't replciate the problem on my machine (Kernel 2.2.12; SuSE 6.2), so 
can't strace it to prove this. *If* I get the time at work (doubtful, yet 
possible), I can run su through truss on the Solaris boxes to confirm/deny 
this.

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Code Snippit - Nifty.

1999-12-09 Thread Chris J/#6


I'm slowly decoding this - it's actually not too bad. It shows the power (and 
potential complexity) of the ?: operator. It's also showing recursion of 
main(). It's also showing main() to have non-standard arguments (ie, instead 
of:
main (int argc, char **argv, char **envp)
it uses:
main (int t, int _, char *a)

Where t, _, and a I haven't (yet) worked out precisely what they do :) 't' 
and '_' control the decoding of the message string, where 'a' is a pointer 
into them message string. On initialisation, t = 1 (it is essentially argc, 
and a program with no parameters has argc set to 1).

The only left to work out, really, is the encryption of the string. Got a few 
clues from observation, but rest I need to work out :)

Chris...

> Completely benign, with fun output. Ouch at the obfuscation. Courtesy
> of my kid brother.
> 
> -Ian
> 
> #include 
> int main(int t,int _,char *a)
> {return!0 main(-86, 0, a+1 )+a)):1,t<_?main(t+1, _, a ):3,main ( -94, -27+t, a
> )&&t == 2 ?_<13 ?main ( 2, _+1, "%s %d %d\n" ):9:16:t<0?t<-72?main(_,
> t,"@n'+,#'/*{}w+/w#cdnr/+,{}r/*de}+,/*{*+,/w{%+,/w#q#n+,/#{l,+,/n{n+\
> ,/+#n+,/#;#q#n+,/+k#;*+,/'r :'d*'3,}{w+K w'K:'+}e#';dq#'l q#'+d'K#!/\
> +k#;q#'r}eKK#}w'r}eKK{nl]'/#;#q#n'){)#}w'){){nl]'/+#n';d}rw' i;# ){n\
> l]!/n{n#'; r{#w'r nc{nl]'/#{l,+'K {rw' iK{;[{nl]'/w#q#\
> n'wk nw' iwk{KK{nl]!/w{%'l##w#' i; :{nl]'/*{q#'ld;r'}{nlwb!/*de}'c \
> ;;{nl'-{}rw]'/+,}##'*}#nc,',#nw]'/+kd'+e}+;\
> #'rdq#w! nr'/ ') }+}{rl#'{n' ')# }'+}##(!!/")
> :t<-50?_==*a ?putchar(a[31]):main(-65,_,a+1):main((*a == '/')+t,_,a\
> +1 ):0 i@bK'(q)-[w]*%n+r3#l,{}:\nuwloca-O;m .vpbks,fxntdCeghiry"),a+1);}
> 
> 
> --
>  wow, this is kinda nifty. the Win98 protocol stack is like a chinese puzzle, 
>twist and turn in the right places, and it pops right off.
>-Seen on EFNet IRC
> 
> 
> 
> 
> [EMAIL PROTECTED]   http://www.linuxchix.org
> 

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Re: X Display

1999-12-09 Thread Chris J/#6


> 
> The second problem is a little bit trickier. Although, the "xhost + name"
> helped, the problem was with the DISPLAY number. I was using VNC server which
> had a different display number. Once the SUed user exported the DISPLAY
> number of VNC, then the user could start any X application.
> 
> Thanks again for all the help.
> 
> Subba Rao
> [EMAIL PROTECTED]
> http://pws.prserv.net/truemax/
> 
>  => Time is relative. Here is a new way to look at time. <=
> http://www.smcinnovations.com
> 
> 
> [EMAIL PROTECTED]   http://www.linuxchix.org
> 


Yep - biff would cause the problem -- biff toggles the execute bit on the 
terminal, and uses it as a flag. If you've su'd, then chown will fail :) Well 
spotted ... forgot about biff... :)

Chris...
-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Code Snippit - Nifty.

1999-12-10 Thread Chris J/#6


I got bored...there's nothing much to do in this neck of the woods :) Seemed 
like a good idea at the time, and anyhow - I've got a cold so I'm not 
thinking straight...[1] :)

Chris...
[1] and pigs might fly :)


Ian wrote...
> 
> *points* GEEK!
> 
> :)
> 

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Broad techtalk question...Image processing and Digital Cameras

1999-12-10 Thread Chris J/#6


Well, using gphoto (www.gphoto.org), I can use my digi camera quite happily 
(Olympus Camedia C420L). With a little wrapper and patience, you cn turn your 
digi camera into a webcam as well using gphoto :)

Chris...

> 
> 
> Has anyone interfaced any sort of digital camera to linux. Are there pre-written 
>drivers written, or is
> that a write your own sort of thing. Any info would be appreciated, or experiences. 
>Either using the
> serial or the USB port.
> 
> Thanks,
> Have Fun,
> Sends Steve
> 
> 
> 
> 
> [EMAIL PROTECTED]   http://www.linuxchix.org
> 

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Code Snippit - Nifty.

1999-12-10 Thread Chris J/#6


The Wiretap gopher (which I need to dig the address out for - used to me 
wiretap.spies.com, but it moved...can't remember where to though) has (or 
used to, last time I looked - two or more years ago!) a whole bunch of 
obsifucated (sp!) C code in relation to compettions years ago.

If anyones interewsted, I'll see if I can dig out where it [wiretap] is now :)

Chris...


> Yeah and I think there is an obsfucated C code contest somewhere 
> he could enter it into. Along with the n ways to do a+b in C. :)
> 
> 
> Have Fun,
> Sends Steve
> 

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] DVD-ROM on Linux?

1999-12-14 Thread Chris J/#6


> Hello,
> 
> I was wondering if Linux has support drivers for DVD CD-ROM. I have the DVD-ROM,
> but cannot use it for anything else other than data CDs and music CDs.
> 
> Thank you in advance.
> 
> Subba Rao
> [EMAIL PROTECTED]
> http://pws.prserv.net/truemax/


Check www.kernel.dk - I seem to recall some patches to add DVD ioctl()'s to 
the kernel. Would check myself, but I'm reading this offline :)

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] winmodem sound driver

1999-12-14 Thread Chris J/#6


> A real waste of processor cycles?? How so?? you make it sound as if 
> running a driver for a winmodem is not a good thing to do, could you
> please explain?
> 

As Kelly has said, many winmodem's don't have a DSP...if you've not seen the 
maths for DSP, then you're lucky :) DSP can get *very* scary and very 
involved. For modem work it isn't too bad, but it's still a fair chunk. Most 
DSP on computers is done through FFT's (fast fourier transforms) - which 
essentially is how to do Fourier Transforms with matrices.

Off-loading the DSP onto the CPU probably isn't a good thing - I defeinately 
wouldn't want to do it on anything that is a critical system, especially 
time-critical - though it is perfectly feasiable to do it.

For Winnmodem's on Linux though, some information can be found at 
www.linmodem.org

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] winmodem sound driver

1999-12-14 Thread Chris J/#6


> ewww, this really does sound bad, So you're saying I'd be better off to slap in 
>an old USR 28800, than i would be to install a driver for my 56k winmodem?
> 

Not really...a 56k modem is better anyday :) But there may be slight 
performance loss on the machine. Of how much, I don't know, as I've never 
used a winmodem, but I wouldn't imagine it'd be huge (else winmodem's 
wouldn't have took off in the first place).

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] POP mail

1999-12-15 Thread Chris J/#6



> 
> I don't know exactly how it works, but secure pop provides for a secure
> mechanism of transmitting these data items, and possibly the content of
> the mail comming back to you.
> 

I'm not sure if there is a totally encrypted POP session, but usernames and 
passwords can be hidden using APOP. APOP is a replacement for user/pass 
authentication and works as follows.

When you connect to the POP server, it will reply with a unique identier as 
follows:

$ telnet pophost 110
Connected to pophost
Escape character is '^]'.
+OK random text <2297.945296254@pophost>

That long string between the <> is essentially the session key. Broken down 
it is 'pid.timestamp@hostname'. The POP client, if it has been told to use 
APOP, will take this key, create an MD5 hash of the password (known as the 
'secret', rather than password) and sends to the server a line along the 
lines of:

APOP sixie A3E44624C100D7b835C7DEA24B

The POP server knows the session key it sent, and, after the arrival of the 
APOP command, can create the same MD5 hash locally. If the hashes match, then 
authentication is accepted, else it's a big no, and the authentication has to 
start again.

After successful authentication however, its normal POP, with RCPT, LIST, 
DELE and the rest - all unencrypted (so a snooper can still read all your 
email).

You may need to check with your service provider wheather APOP is supported. 
Even though you have the <> indentifier may not be a gurantee - sometimes a 
seperate database needs to be kept, as /etc/passwd cannot be used 
(/etc/passwd and /etc/shadow contain one way encoded passwords - to generate 
the MD5 hash, you need plaintext passwords. You can't get (realistically) the 
plaintext from /etc/passwd, unless you feel like a potential 1 month wait to 
login as Crack is ran against your password).

Chris...

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] Converting PMMail files to Maildir or mbox format

1999-12-21 Thread Chris J/#6


For Maildir (assuming you have a Maildir setup), just rename all the files 
.. and put them in Maildir/new. You may be able to get 
away with making up ;  you can make up;  is just you're 
machine name. So a good script may be:

#!/bin/sh
timestamp=945801478
for i in *.MSG
do
timestamp=`expr $timestamp + 1`
mv $i $timestamp.$$.`hostname`
done
## Script end

For mbox, its more tricky. Essentially you just concatenate all the files 
together, but you need to make sure:
1. There is a blank line between each message
2. The first line of each message reads: "From  ",
eg: From [EMAIL PROTECTED] Tue Dec 21 18:40:44 1999
this is *independant* of the From: header.

A small script may be able to do this by stripping the information out of the 
Date: and From: headers. I could write one, but I'm going to leave that as an 
exercise for the reader :) Not certain, but I think the date part of the From 
line is fussy about the format, so best keep the format shown in the example 
above.

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



Re: [techtalk] POP mail security

2000-01-06 Thread Chris J/#6


Try looking up about APOP authentication. Not all POP servers support it 
though, and I don't know what mail client support for APOP is like, but I 
think fetchmail is quite happy with it. APOP takes your username and 
password, and creates and md5 hash of the password and a timestamp returned 
by the pop server, and sends the hash over the wire. The password is never 
sent plain.

Chris...

> 
> All my users use fetchmail to get mail from my ISP's POP server.
> For lack of resources, I cannot put a pop server on my box.
> 
> What is the best way to protect my users passwords from being sniffed?
> Can a user use an encrypted tunnel to send the userid and password to
> the pop server?
> 
> Any pointers and experiences appreciated.
> 
> Thank you in advance.
> 
> Subba Rao
> [EMAIL PROTECTED]
> http://pws.prserv.net/truemax/
> 
>  => Time is relative. Here is a new way to look at time. <=
> http://www.smcinnovations.com
> 
> 
> [EMAIL PROTECTED]   http://www.linuxchix.org
> 

-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




[EMAIL PROTECTED]   http://www.linuxchix.org



[techtalk] cak-handed mouse in X ?

2000-04-01 Thread Chris J/#6


Okay...still no joy with this after some searching through manpages and 
howto's...does anyone have an idea how to change a right handed mouse to a 
left handed mouse? (ie, reverse the left and right mosue buttons)...recently 
been able to reorganise my desk and move the mouse to my left hand (which is 
where I prefer it ... it causes less discomfort).

Windows has this nice little "reverse mouse buttons" check box...damned if I 
can find owt in the XF86Config man page, the XF86Setup program, or doing a 
zgrep through the howto's I have.

If there is no way, I may just grab the source and hack a mod in (not what I 
really want to do, but if it comes to it, I'll probably do so).

Thanks :)

Chris...



-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



[techtalk] cak-handed mice: resolved!

2000-04-01 Thread Chris J/#6


It's a case of RTFM... :) Found the answer in the FAQ...it says to plonk:

xmodmap -e "pointer = 3 2 1"

in .xsession/.xinitrc (or type at a prompt)...and yep, it works :)

woohoo :)

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



[techtalk] Wine & CD-Roms ...

2000-04-25 Thread Chris J/#6


Okay - I've got to "head meets wall" stage with this - I have a copy of 
Microsoft Autoroute '98 ... I don't know if its known much outside the UK - 
it's essentially a route planning program when your driving. Microsoft bought 
the rights for Autoroute from the company that originally made it...anyhow, 
that's by the by.

What i'm tryting to do is get it to run under Wine. Now, I can install it 
with wine, no problem , follow the familier wizard through quite happily. The 
main problem I have is that it requires the CD in order to run.

Herein is the problem: CD in, mounted, accessible (I just installed from it), 
yet when it runs it cannot find it. I dunno if its looking for anything 
"special" (low-level hardware stuff, sector checking?), but the program ain't 
for having it - keeps saying "it's not there!". Similarly, its nowt to do 
with the fact it was installed from linux. Originally it was installed from 
Windows and gave the same problem (so I wondered if a reinstall would sort 
out potential "registry" problems). Anyhow...either way, it doesn't work. :(

In a similar vien someone on another linux list is having similar problems 
with the Encyclopedia Brittanica CD... :-/

Has anyone had success running something under wine that also requires the CD 
to run ?

Thanks,

Chris...



-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: [techtalk] Really lame question

2000-05-05 Thread Chris J/#6


> 
> Hi, grrls ;-)
> 
> I have a really _basic_ and lame question!
> I need to lauch two programs, and they need 
> to behave like this;
> 
> * start program 1
> * start program 2
> * use program 2
> * exit program 2 manually
> * program 1 should exit automatically
> 

#!/bin/sh
program1 &
prog=$!
program2
kill $prog

Should do the job :) The $! returns the pid of the last process started, 
which is often handy when combined with 'wait' or 'kill' :)

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: [techtalk] help with sorting text in a file

2000-05-13 Thread Chris J/#6


Gene wrote:
>
> Try this ...
>
> cat file | grep 'QAA' | sed s/^.*QAA/QAA/ | sed s/:.*$//
>
> That's paraphrased, and I know there is a shorter way of doing it,
> but that should get the job done.  Basically, it gets all the lines
> with QAA in them, then removes the text either side of the
> QAAn code.  The "cat file" can be replaced with the actual
> output command, if the output is being filtered direct.
>

A shorter way would be:
grep 'QAA' file | sed -e 's/^.*QAA/QAA/ -e s/:.*$//

But to cut it even more,
grep 'QAA' file | sed 's/^.*\(QAA[0-9]*\):.*$/\1/'

As mentioned below by Gene though, cut and awk will to the job just as
admirably :) What the sed is doing is seeking for all patterns containing QAA
followed by a bunch of numbers. As the pattern for this  'QAA[0-9]*' has been
surrounded by parathensis (which have been escaped), sed assigns any match a
place number. As it's the first place holder (actually, the only one in this
RE), it's given the number 1. This is referenced in the replace string as \1.
The '^.*' and ':.*$' portions of the RE are there for completeness to make
sure the entire line is covered.

But cut (ie "grep 'QAA' file | cut -d: -f4"), as mentioned by Gene below, is
probably a nicer way (its certainly less expensive in terms of CPU load).

One final way - potentially overkill, but I'll show it here anyhow, is to use
the shells own functions to split the string and do the job of 'cut',
vis-a-vis this shell script:

#!/bin/sh
IFS=':'
grep 'QAA' $1 | while read date min sec id junk
do
echo $id
done

This technique is very useful if you want to parse a file into seperate
compenents (eg a config file) without the need for huge chunks of 'cut',
'sed', or 'awk' as the line is split into variables at the start of each loop
*by the shell*.

note in all these cases, I've avoided using 'cat' as it's a wasted resource
if your piping it straight into another command. Unless you concatenate
files, cat can be replaced either by:
command args file
or
command args < file

Just my 2p :)

Chris...


Gene continued to write:
>
> You can do just about any filtering with grep, sed, and regular
> expressions.
>
> Cut will work also, and probably produces a shorter line.  You can
> also replace the 2 sed's with an 'awk', if you know awk syntax ...
>
> grep 'QAA' file | awk '{FS=":"; print $NF-1}'
>
> Also paraphrased, since I'm not near Linux/UNIX at the moment.
>
> Gene Dolgner
>
>


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: [techtalk] yet another solaris question ...

2000-07-07 Thread Chris J/#6


> Hi chix!
> 
> While we're discussing the passwd file, i have a problem.  I didn't
> really know another way to set my PATH automatically other than
> appending it to my shell line in my passwd file, like this:
> 
> jellhead:x:100:1::/export/home/jellhead:/usr/local/bin/tcsh;setenv
> PATH /usr/sbin:/usr/bin:/usr/local/bin:/usr/ccs/bin
> 
> This worked for me in linux in the past, but my Solaris Sparc server
> doesn't like it (i can't log in as jellhead anymore).  Does anyone
> know a good alternative?  I've considered a few other things, but i'm
> a little intimidated by this funky Solaris box ...

Wibble ... not seen this before -- bad practice :)

Okay... you need to modify any of:
/etc/profile- Global settings for ksh, sh (and bash?)
/etc/csh.cshrc  - Global settings for csh, tcsh
$HOME/.profile  - User settings for ksh, sh
$HOME/.cshrc- User settings for csh, tcsh

Now -- as you're using tcsh, take your pick of .cshrc or /etc/cshrc ... the 
line you want to do would be:
setenv PATH ${PATH}:/new/path/here:/another/new/path/here:/and/so/on

basically, each path is seperated by a colon. The first reference to ${PATH} 
ensures any existing path remains. If you want to set it from scratch, feel 
free to ignore it :)

> 
> # begin horror story
> Last time i made changes to my passwd file on this server, i decided i
> was really, really tired of using sh, so i decided to set my SHELL in
> the passwd file to /usr/local/bin/tcsh.  Unfortunately i mistyped the
> path, and it was after i *saved the file and logged off* and tried to
> log back in using my new settings that i discovered NO ONE HAS ROOT
> ACCESS TO THE THING ANYMORE!!  We had to go over to the rack (this is
> a Sun Netra1) and boot the thing off the CD to fix it.  Luckily the
> sysadmins involved (i'm not the sysadmin, i'm the webmaster) didn't
> give me *too* hard of a time :-)
> # end horror story
> 

One hint -- in general, changing the shell for root is a bad thing...some 
Unixes don't like it, as some tools assume the root shell will be /bin/sh 
(cron is one example). Now, you didn't say which shell you were changing, but 
it sounds like the root shell.

If you want to use another shell as root, either start it manually when you 
log in, or in /.profile get that to start your preferred shell...eg,

exec /bin/ksh

Using exec will force the shell to replace the currently executing shell in 
userspace, so you don't need to type exit twice to logout :) It leaves 
/etc/passwd alone and is then kinder to fussy apps.

Also place any shells used as login shells in /etc/shells...this ensures 
things like ftpd don't complain. :)

Chris... :)


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: [techtalk] Hello from a Newbie!

2000-07-07 Thread Chris J/#6


 
> Now for my Query
> 
> I would like to restrict telnet access to my computer to only a few IP
> addresses.  In order to do this I edited the hosts.deny fill with ALL:ALL,
> and the hosts.allow file with the IP adresses which I wanted to allow
> access.  Unfortunately this doesn't seem to work.   Is there another way
> to restrict access?   If there is how do I do it?
> 

Part of me is still suprised hosts.deny is still in existance -- most (all?) 
linux dists these days ship with TCP wrappers that support extra options (man 
host_options(5)).

These options make hosts.deny redundant and mean you have only one file to 
manage ... :)

So, in your case, you could have:

ALL: : ALLOW
ALL: : ALLOW
ALL: ALL: DENY

in hosts.allow, and delete hosts.deny. you can even have login banners put on 
screen (see the "banners" keyword). I tend to use this as the last rule in 
hosts.allow:

ALL:ALL:rfc931 10: banners /etc/access/denied: spawn 
(/etc/access/bin/deny_log %a %h %u %d &): DENY

Which, for every service on every incoming address (unless an earlier rule 
matched it), it attempts an ident lookup (10 second timeout), displays a 
banner that says summat like "access denied", and spawns a trap door shell 
script that mails me before denying access.

Very powerful additions... :)

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: [techtalk] yet another solaris question ...

2000-07-08 Thread Chris J/#6


Magni wrote:
> An alternative to start another shell when logging in, is to make an
> alternative root-user, feks. roottsch with tcsh as shell. This means you
> have to keep an eye on logins from two users (I presume you keep an eye
> on when and from where root is logging in..), but the advantage is that
> advantage is also that you may want to run shell commands from a central
> server on all your boxes of different OS and since different OS tends to
> have different root shells the command will often fail if root on remote
> box has fex. csh as shell. So making a rootbash on all the servers and
> then send the commands to this user may be nice.
> (Of course this isn't really necessary for normal "home computer users",
> but it's really nice in an environment with 4+ OSes.)

As an addenum to this :) If you do this, you may, if it suits your 
environment, give root a locked password ... this won't cause any problems 
for people logging in as root because you've set up rootbash, roottcsh or 
whatever. Okay, you still need to keep an eye for root logins, but to a 
lesser extent. *BUT* if you do see a root login, it's probably an indication 
someone has broken into your box...so it could work as a vague security alert 
:)

Chris...




-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



[techtalk] Network i/f bonding ... EQL ?

2000-07-12 Thread Chris J/#6


Hiya,

At work, we have this nice shiny 4-port network card (Phobos P430), which 
*does* come with drivers, but damned if I can get them working (a mix of 
undefined symbols and wrong kernel versions - build for 2.2.5 uni-processor, 
and we have a 2.2.14 2-proc SMP system). So I've given up trying to get the 
damn thing working (which means we lose funky channel-bonding functionality).

However Phobos have provided a generic tulip driver, which does work, but we 
now have eth1 through to eth4. (eth0 is yet another network card which we can 
ignore for the time being).

Now is it possible to bond eth1 through eth4 together and hide them on a 
single IP address to give essentially a 400MBps backbone. This is hooking 
into a cisco switch, so there shouldn't be any problems with that side of 
things (according yo our network bod).

I've looked at the EQL driver, but that's written for serial lines. Does 
anyone know if it'd work on normal ethernet interfaces? Failing that, is 
there any way that the four lines can be bonded together to create a single 
logical network interface?

This is tonights web-trawl...but any other information would be welcome :)

Thanks,

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



[techtalk] Ethernet bonding [Resolved]

2000-07-12 Thread Chris J/#6


Okay - a few minutes searching with google (gotta live that search engine) 
found a patch bonding-0.2.tar.gz which looks like it'll do the job quite 
nicely. If anyone is interested, http://pdsf.nersc.gov/linux/

It also looks like its standard in 2.2.15 and higher.

Chris...



-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



[techtalk] Netscape - Illegal Instruction

2000-07-16 Thread Chris J/#6


Hiya,

On a friends machine, Netscape (various versions of 4.x have been used) 
always crashes with an Illegal Instruction...and a core dump. It happened on 
with SuSE 6.1, so lasy night, he blew it away and stuck RedHat 6.2 on - and 
its still crashing with illegal instruction whenever the netscape window is 
focused. At the moment we can't get past the license aggreement page  
move mouse into window - "Illegal Instruction (core dumped)". This happens 
when using either WindowMaker (built after the installation) or Enlightenment 
(Gnome - supplied by RedHat).

It also looks as if WPrefs, from WindowMaker (currently 0.62.1  - but other 
versions failed as well) also Illegal Intructions...and earlier, whilst 
building WindowMaker, cc1 [egcs-2.91.66] received an Illegal Instruction when 
trying to build one particular file (which didn't happen after a reboot and a 
reconfig almost from start). EGCS hasn't caused any other problems though - 
qmail, windowmaker libs have all been fine now.

Answers on a postcard?

Thanks,

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "(it is) crucial that we learn the difference / [EMAIL PROTECTED]  \
   / between Sex and Gender. Therein lies the key  /   \ 
  / to our freedom" -- LB / www.nccnet.co.uk/~sixie \ 




___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: Not using Netscape (was Re: [techtalk] Re: SMP on Linux (lock ups))

2000-10-04 Thread Chris J/#6


> The new builds of Mozilla are getting very good.  I've switched to it as my
> standard browser now.  Check out a new nightly build.  It also has a full
> featured IMAP mail client.
> 
> Jason

I've found Mozilla to run dog slow on my machine (P200MMX; 64MB RAM) ... has 
its speed improved in the newer builds?

Chris...






-- 
@}-,'--  Chris Johnson --'-{@
/ "If not for me then, do it for yourself.  /   [EMAIL PROTECTED]\
   / If not for me, then do it for the world"  /  www.nccnet.co.uk/~sixie  \ 
  /  -- Stevie Nicks  / \



___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: Not using Netscape (was Re: [techtalk] Re: SMP on Linux (lock ups))

2000-10-05 Thread Chris J/#6



> Depends what 'slow' you mean. We have just graduated from a 28.8k modem
> to cablemodem (woo!). So everything on the net seems incredibly fast now!
> (Except sourceforge, but that's now usable rather than impossible.) 
> It now takes me a few minutes to download a nightly mozilla instead of
> a few hours (I jest not) so I have been doing so.
> 

The sort of slow I had was slow response and general sluggishness of the UI. 
However having last night downloaded the nightly build, I'm quite pleseantly 
suprised ... it's actually running at a usable speed... :)

Maybe there is hope for Mozilla after all ... (I'd come close to writing it 
off due to its UI performance issues).

Chris...


-- 
@}-,'--  Chris Johnson --'-{@
/ "If not for me then, do it for yourself.  /   [EMAIL PROTECTED]\
   / If not for me, then do it for the world"  /  www.nccnet.co.uk/~sixie  \ 
  /  -- Stevie Nicks  / \



___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk