iated =)
Cheers, Chris.
___ __ _
/ __// / ,__(_)_ | Chris Wilson <[EMAIL PROTECTED]> | Phone: 01223 503 190 |
/ (_ / ,\/ _/ /_ \ | Tech Director - Caliday Project | RITC (Cambridge) Ltd |
\ _//_/_/_//_/___/ | Unix Systems & Network Engineer | Cambridge CB5 8LA UK |
I have this same robot on my site. Can i Block this
robot using .htaccess files..???
Chris
http://www.truefootball.com
http://www.worldofjerseys.com
I have this same robot on my site. Can i Block this
robot using .htaccess files..???
Chris
http://www.truefootball.com
http://www.worldofjerseys.com
iated =)
Cheers, Chris.
___ __ _
/ __// / ,__(_)_ | Chris Wilson <[EMAIL PROTECTED]> | Phone: 01223 503 190 |
/ (_ / ,\/ _/ /_ \ | Tech Director - Caliday Project | RITC (Cambridge) Ltd |
\ _//_/_/_//_/___/ | Unix Systems & Network Engineer | Cambridge CB5 8LA UK |
--
To UNS
At 07:27 AM 5/21/01 +0200, Robert Waldner wrote:
>On Mon, 21 May 2001 13:46:14 +1000, Jeremy Lunn writes:
>>I know this isn't Debian specific. But I'm just wondering if it's fine
>>to route routable IP addresses over non-routable IP addresess.
>
>Yes, although many would consider it bad practice
At 08:00 AM 5/22/01 +0200, Robert Waldner wrote:
>
>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>We should probably clarify "non-routable" by saying "non-publicly routable".
>
>Well, we could also say RFC1918, couldn´t we ;-?
LOL
>- DNS,
far as I can see there's more than
enough left for decades to come.
At 09:28 PM 6/1/01 +0200, Marc Haber wrote:
>On Tue, 22 May 2001 08:00:01 +0200, Robert Waldner
><[EMAIL PROTECTED]> wrote:
>>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>>We should pr
I'm sorry, but ROFLMAO!!!
At 05:18 PM 6/3/01 +0200, Przemyslaw Wegrzyn wrote:
>
>
>On Sat, 2 Jun 2001, Craig Sanders wrote:
>
>> On Wed, May 30, 2001 at 09:41:54PM +0200, Przemyslaw Wegrzyn wrote:
>> > Anyway, my problem seems to be hardware:
>> >
>> > czajnik@earth:~$ more /proc/misc
>> > Segme
A while back, AT&T had a publicly accessible router for doing route lookups
and stuff like that. It supposedly knew about the whole world. The special
thing about this router was that you didn't need a user name or password to
log on with. It just gave you the IOS prompt. I haven't been on thi
Revisiting traceroute.org, I see that they have a whole list of route
servers. :)
At 01:09 PM 6/27/01 +0200, Russell Coker wrote:
>Here's a machine that used to provide such a service, not sure if it
>still does:
>
>route-views.oregon-ix.net
---==---
___/``\___
If the nodes in question are plugged into a switch with managment
capabilities then you could set the security of the port to only allow
legal mac/ip address's. It depends on the switch.
You could go to the person and whack them on the head. Which might be the
easiest.
Chris
At 06:
My first choice is also what the other Chris said, use a large LART on the
offending [computer|user]. You can use smart switches to base the ip on
pre-authorized MAC addresses. That way you are effectivly shaping based on
MAC address. But in true hacker form, even that can be overcome. Some
One possible way to defeat this would be to use those metal "security
chains" that they use to keep people from carrying off computers. Use a
very short one, about 2" long. Affix one side to the computer case, and the
other to the ethernet cable. Now, even this can be overcome if the crafty
hac
That is a function of the bios. Some support it, some don't. Either your
bios's don't support it (my suspicion) or shutdown isn't sending the signal.
'man shutdown' might have some useful insight. I'ld also call the
motherboard manufacturer to make sure they support self power off. Also
check
I know that One Net makes Linux based firewalls. Called "Incinerator".
They're at www.one.net.
At 08:32 AM 7/12/01 +0200, TooManySecrets wrote:
>Hi.
>
>Excuse me this off topic, but my boss want (only for political budgets)
>prices of commercial hardware firewall's. I only use Linux for make t
I think you're on the wrong list. This list is for the discussion of the
Debian distribution of Linux for ISP's. Why are you running super expensive
Windows 2000 when you could be using the much more flexible and robust, not
to mention FREE, Debian? If you could tell us what you're trying to do
Larry, that's a good solution but it was a little cryptic on the
explanation. Let me expound some for Ann's benefit.
Ann, what we're talking about is using the console on the router to do all
administration, and *never* telneting to it. But physically going to all
the routers and setting up a l
I found a reference to it in a zsh changelog. It appears to be a C
directive but as to why it's showing up in weblogs... maybe bad code? :)
Here's the URL:
http://www.bme.jhu.edu/resources/whitaker/doc/zsh-doc-3.1.6dev22/Documentati
on/ChangeLog
And the excerpt:
2000-01-19 Peter Stephenson <
The WS FTP thingy you're refering to is for going through proxies. Some
folks just don't know the difference between firewalls and proxies. :) To
do this just set up port forwarding on the firewall. Use ipchains or
something and only allow ftp connections from your known boxes to pass
through.
Are you also permitting the ftp-data port to go through? Ftp is 21, and I
sorta forget the number for ftp-data. :)
At 10:32 PM 8/28/01 +, Martin WHEELER wrote:
>230 User logged in, access restrictions apply.
>Remote system type is UNIX.
>Using binary mode to transfer files.
>ftp> pwd
>257 "
I think it's probably too late for that. The only way to be 100% about your
"disinfected" system is to fdisk it and rebuild from scratch. You can save
your config files and data files, if you're sure they too haven't been
altered. But say somebody relaxed an obscure security setting in some
con
There are proprietary Microsoft login schemes that they might be using.
I'ld call them up and ask. If you can't connect then they are not PPP
compliant. If it's asking for any domain information that would be a
tipoff. You can always try sniffing the login sequence. Try sniffing from
both Linu
testing/non-US main non-free
this seemed to break a lot of things though...i am trying to upgrade a
potato system to host web sites
thanks in advance,
-chris zubrzycki
==
==
Remember: it's a "Microsoft virus"
The best way would be to block it at your router with an access list.
Blocking it at the box is ok too but that takes a little bit of your
resources. And you have to do it on each box on your network you want
protected. The router block will protect your entire network in one fell
swoop and cost
So right now everything is on the / partition? Then what you want to do is
blow away that huge unused partition and make partitions for atleast /tmp
/var /home. /usr if you want plus the swap. You need to size out how much
room each of those dir trees is going to need. Then take the box offlin
roadband connection with a debian box as firewall and
NAT who
might give me some advice for fee.
Very best all: this is an excellent list for a debian supporting amateur to lurk on!
Chris
Chris Evans <[EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
Rampton Hospital; Associate R&
ies; practice, research,
teaching and consultancy.
Chris Evans & Jo-anne Carlyle
http://psyctc.org/ Email: [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
You should be able to tell if it cares about robots.txt by looking in the
logs to see if it's downloading /robots.txt. If it is then something like:
User-agent: LinkWalker
Disallow: /
will keep it off your site. If it doesn't, then iptables will keep it away.
Robots info:
http://www.global-posi
I have a customer who wants to host his own email server, and he wants
to have long email addresses, like .@domain.com ,
and map it to a local name that is less than 8 chars. What is the best
email server to do this kind of mapping?
-chris zubrzycki
Bwahahaha!! Man, that is low. Advertising to sysadmins through the access
logs Sheesh. But now that you mention 7-24, I think I recognize that.
I think they are a spam marketing outfit.
At 02:31 PM 1/7/02 -0800, Nathan Strom wrote:
>Personally, I think this is a rogue organization -- ther
Purtroppo nè Netscape nè lo IE è molto stabile. Opera è Mozilla sono altri
quei unici di che sappia. Potete spegnere sempre appena il Javascript. :)
Forse il vostro sistema e instabile.
At 07:37 PM 1/8/02 +0100, [EMAIL PROTECTED] wrote:
>cosa usate voi per navigare in internet senza problemi ?
Well, the rationale behind this is as you touched on, preventing spoofed
address attacks. A paranoid lookup essentially verifies that the connecting
system is a known legit host. In effect you're using your DNS system as
another level of authentication. Say somebody wants to covertly log on or
At 10:01 PM 1/10/02 -0600, Nathan E Norman wrote:
>Congratulations ... you just set up your DNS incorrectly. Every PTR
>entry should resolve to a _unique_ name, and that name should resolve
>to a _unique_ IP. That doesn't mean you can't have additional A
>records doing load balancing.
To give
At 04:22 AM 1/11/02 +0100, martin f krafft wrote:
>a bogus IP won't even make it past OSI layer 4 on debian... rp_filter...
There are ways of doing it such that the box has NO WAY of knowing that the
traffic is spoofed. Granted, that is hard to do. Even paranoid lookups can
be overcome. But it
At 06:01 AM 1/11/02 +0100, martin f krafft wrote:
>okay, why libwrap then?
Once the network is compromised, it makes no difference what's on the box.
If done properly, the compromised network is indistinguishable from the
uncompromised network. That box is totally on it's own. :)
>/29, althoug
Actually, they would. Because the "e" in Re: is in lower case! :P
At 05:14 PM 1/23/02 -0700, [EMAIL PROTECTED] wrote:
>Of course, I just realized that anyone with that filter in place wouldn't be
>receiving this mail B-)
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
0100
FYI, no one bother decoding this, it's not a photo, actually a
program/trojan. Malicious no doubt...
At 10:24 PM 1/27/02 -0800, [EMAIL PROTECTED] wrote:
>Hello!
>
>My party... It was absolutely amazing!
>I have attached my web page with new photos!
>If you can please make color prints of my phot
> really unsubscribe from a list where i don't want to get anymore mails
> from.
The problem with this rationale is that most people don't bother trying to
unsubscribe, since the unsubscribe
instructions are usually just a method of verifying valid addresses.
Chris Hilts
[
Good evening everyone. I have a question for the group: Has anyone ever
installed debian on a sun cobalt qube 3 server appliance? I am just
wondering if there are any problems i should be aware of. (the standard
os is a modified redhat).
thanks for the help
-Chris Zubrzycki
Echo Internet
i need at least a firmware
update to use 2.4 series kernels, and it looks like I will have to use
ext2 at least for my root and boot partitions, but with hope I can use
XFS for everything else. I'll post my results in case anyone is
been searching the web, but not found much good information.
thanks for the help.
-chris zubrzycki
==
Security Is A Series Of Well-Defined Steps...
chmod -R 0 / ; and smile :)
--
To UNSUBSCRIBE, email to [EMAIL PROT
.
>
> Thank's Josep
>
Hi.
Yes it is, I'm using the courier-pop, courier-imap and sqwebmail debian
packages myself. Note that you need to switch to maildirs(if you aren't
using it already) to use courier.
--
-o) # Mvh.
/ \ # Chris Qvigstad
_\_v # [EMAIL PROT
bably need to set up you smtp to deliver to maildirs.
--
-o) # Mvh.
/ \ # Chris Qvigstad
_\_v # [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
postfix under potato.
I'd like to do antiviral filtering but budget is low. Any
recommendations?
TIA,
Chris
--
Chris Evans <[EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
Rampton Hospital; Associate R&D Director,
Tavistock & Portman NHS Trust;
Hon. SL Institute o
Never touched IIS, but you never know. If you uploaded the file in text
mode, IIS could be translating the 's into 's.
At 07:05 PM 3/14/02 -0700, Kevin wrote:
>I'm uploading from Linux to an IIS FTP. After the file is sent, if I
>check the byte count on the remote side and the byte count on the
have it both ways).
well, with xfs, I believe you can. It seems that you dont have to worry
*too* much about non-gracefull (graceless?) reboots. The journaling
filesystems are quite nice in that regard.
- -chris zubrzycki
- - --
PGP public key: http://homepage.mac.com/beren/publickey.txt
ID: 0xA2A
all spam I get to abuse.net and spamcop.net as I want the
anonymity I think they given my reports. Now I'm not sure of the
best way to report something like the above. What do other people
do?
TIA,
Chris
--
Chris Evans <[EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
R
I hate asking this, but I thought that this would be the fastest
way to get the answer.
I may be setting up a mail server for a factory. From what little
I know so far, it will be for all a mail server for all five hundred
employees. (one in each location) so they can check work
related email. I
At 01:12 PM 3/18/02, you wrote:
> > > 1 What is the max user limit that woody + exim will support
> >
> > It's WAY above 500. :-)
> >
>
>It also seriously depends on what the hardware is. I think a 486/33 might
>have a bit of trouble coping with 500 (or lets say 200-300) simultaneous
>and concurr
't had any experience with
them. Hmm.. looks like I asked the right question in the right place after all.
Thanks
Chris
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
e Inet-Access people about it, but I had already
decided to use Woody and Exim (due to money and familiarity with Debian)
and didn't want a bunch of replies saying MTA X is better.
I figured that this list would be less biased, and I wouldn't get as many
flames.
Thanks for the help every
Sure, any media format can be streamed over Apache. The secret is the use
of meta files. The "streaming" is a function accomplished by the client,
not the server. All the so called streaming protocols out there are just
glorified TCP/UDP data transfers with some bells and whistles thrown in. I
LOL dude! :) If u think I was calling anyone a thief u read something that
I didn't type. The idea of what is thievery or allowed use rests solely in
the mind of his customers. In this arena whatever *they* say goes. Forgive
me if I used overly colloquial meanings of steal and thief. :)
At 08
At 09:29 AM 3/19/02 +0100, Emile van Bergen wrote:
>> In this arena whatever *they* say goes.
>
>Not when we're talking about what's criminal and what's not.
Yes, that's true, but is irrelevant for his situation. His web hosts are
coming to him saying "we want X". Whatever X is, whether that's
things for me.
Anyone any advice?
TIA,
Chris
PSYCTC: Psychotherapy, Psychology, Psychiatry, Counselling
and Therapeutic Communities; practice, research,
teaching and consultancy.
Chris Evans & Jo-anne Carlyle
http://psyctc.org/ Email: [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAI
On 21 Mar 2002 at 13:41, Joerg Wendland wrote:
> On Thu, Mar 21, 2002 at 08:51:49AM -0000, Chris Evans wrote:
> > unix 1 [ ] STREAM CONNECTED 1123334 /dev/log
>
> Look at the protocol, it has nothing to do with the network, it is connected
> thr
Hey guys. I've been trying to setup samba to be a print server to Windows
clients. However I keep running into error messages and there doesn't seem
to be any place in the documentation to find out what the various errors
mean. I tried LPRng and CUPS but get basically the same thing. I've got
se.net/spamcop that one can send the traces of such attempts to so
that the sending IPs get reported and rbled if the volume goes up
enough. Seems to me that if a lot of us who use postfix, even
without all the other MTAs, were to use such a thing it would become
a damn good rbl.
Am I wrong?
Like do you want to replace something in the html files, or alter their
names systematically somehow...
At 02:33 PM 7/10/02 +0200, Craig wrote:
>Hi Guys
>
>I need to do an extended find and replace for a few
>.htm files spanning a couple of subdirectories to
>change some things.
>
>Anyone have a
The "nomail" option was mentioned. I'm not familiar with that, could
someone explain how to use it? I assume it means that you are still a
member of the list but you are not in the redistibution list.
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
0100
--
To UNSUBSCRIBE
I never got a password when I signed up, which was years upon years ago.
And what is the URL? Are we even running mailman??
At 07:34 AM 7/12/02 -0400, Joe Block wrote:
>Go to the administration web page, enter your email address and the
>password you got sent when you joined the list, and you
later.
Thanks for the help,
-chris zubrzycki
- --
PGP public key: http://homepage.mac.com/beren/publickey.txt
ID: 0xA2ABC070
Fingerprint: 26B0 BA6B A409 FA83 42B3 1688 FBF9 8232 A2AB C070
Unix _IS_ user friendly... It's just sele
-php-source .phps
Should do the trick.
--
Chris Hilts
[EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
I instantly reported him to [EMAIL PROTECTED] His account should be deleted
shortly. Mail with no stamp or return adress goes to the dead letter office
where it is opened in an attempt to find out who sent it. It is then
returned if possible, otherwise it goes to /dev/null. What you can do
thou
At 07:28 PM 3/19/00 -0800, t s a d i wrote:
>only sees numeric user ids and gids and not the corresponding name. is
>this because /etc/passwd,group was not found (bec of chrooted ftp to
Yep. For him, /etc does not exist. Stick some symlinks of any critical
files he would need in /home. /home/e
I am fairly certain that Analog can be trained to understand *any* log file
format, including custom ones, like you proposed. I think Analog is the
best or one of the best analyzers out there. The amount of customization
and detail is amazing.
+--
At 12:00 PM 3/29/00 +0200, [EMAIL PROTECTED] wrote:
>Wich one do you recomend for use with apache and separate stats for each
>domain ?
Yeah, Analog is dreamy for stats. Very customizable.
+---+
|-=I T ' S P R I N C I P L E
I think firewalls are overrated. They only do anything if there are some
*unsecured* computers on your network that need protection. It's better to
just lock down every machine, that way you're also protected from internal
attacks. Really, the only thing I think that justifies them is port
block
LOL! Oh, like trying to write to a non-existent memory location? :)
At 09:14 AM 4/6/00 +1000, Neale Banks wrote:
>2) Don't ever tell Linux that it has more memory than is really present -
>it may take time, but Bad Things (or possibly just one fatally Bad Thing)
>*will* happen.
+
At 12:31 AM 4/8/00 +1000, Doug Bean << Mr Bean's Internet >> wrote:
>My timezone is set correctly.
>I just need to sync UTC time with local time.
Set your hardware clock to GMT. Then set your timezone to GMT. Your system
will then be in a +000 offset.
+--
At 10:09 PM 4/7/00 -0600, elyograg wrote:
>have to happen is whatever body gave you the address space would have to
>actually create an entry in their server for each address - yes, 62
>entries, that delegates DNS for those addresses to your DNS server. Either
Actually, your upstream provider
At 04:27 PM 4/5/00 +, [EMAIL PROTECTED] wrote:
>Is there a program or a script which sends a info to the sender that the
email was successfully downloaded from the server by the receiver?
Hmm, I don't think so unless you can hack your POP server. You would have
to modify it so it remembered w
Speaking of the SMC cards, I ran SMC EtherEZ's 10BaseT on ISA and got some
weird behaviour from time to time. When I first set it up, things were
great. Getting 7Mbps ftp transfers. But this began to decline and then
finally flucuate. Before I turned off the network it was varying from 2-4Mbps.
At 10:50 AM 4/9/00 +1000, Doug Bean << Mr Bean's Internet >> wrote:
>UTC) when I set to GMT or any other timezone except UTC. It sort of makes no
>difference what happens I get exim sending
>with the right time or the system is the right time and exim is out by 10.
>If Exim is sending with the righ
At 02:43 PM 4/8/00 -0400, LeighK wrote:
>I don't know if you noticed this, but the transfer problems seemed to be
>one-way, outgoing. Incoming transfers occured at the proper speed, but
>outgoing was extremely slow.
As far as I can remember, it was slow both ways. Uploading to server and
download
At 05:42 PM 4/10/00 +1000, Robert Ruzbacky wrote:
>Apr 9 06:47:39 ns tcp-env[17281]: warning: /etc/hosts.allow, line 11:
can't verify hostname: gethostbyname(114.trusted.net) failed
>Apr 9 06:47:40 ns tcp-env[17281]: refused connect from 209.140.0.114
A lookup:
can't get "114.trusted.net" host e
Yeah, it's pretty much mandatory that the encoded file be encrypted and
signed. I know of programs that will email files TO you. Never heard of
one that YOU could email a file to. But I think it's definately feasible.
A simple pipe to a script should do the trick.
+-
I should also add that there will have to be some kind of time sensitivity
or other uniqueness test. Otherwise some malicious intermediary could
intercept the message and save it for a while and then resubmit it into the
mailstream. The destination would authenticate the message and old data
woul
At 08:04 AM 4/12/00 +0200, Tamas TEVESZ wrote:
> > AFAIK, the hosts.* files only affect daemons run out of inetd, not
stand-alones.
>not true. they are ued by any program which has libwrap support.
But is that enabled by default? Or is modification required. I did some
testing a while back and n
At 06:24 PM 4/14/00 -0500, J. Currey wrote:
>Well supporting gigabit Ethernet for one, and 4 100Mb sub networks
>and logging.
It would take an astonishing amount of traffic to max out the interfaces. I
don't think a PC based system could handle a fraction of what you propose.
I think you need to
Try something with cron and tcpdump. There are numerous ip accounting
programs out there. Look on the Debian package list.
+---+
|-=I T ' S P R I N C I P L E T H A T C O U N T S=- |
|=- -=ALAN KEYES
At 10:10 AM 4/19/00 +0200, Christian Jannesson wrote:
>Whats so speciall about cucipop? I use qpopper and i havent had any
>trouble with it.
It's more secure than other poppers.
+---+
|-=I T ' S P R I N C I P L E T H A T C
Hate to be off topic but I don't know where else to find this out.
Can someone in Romania give me a translation for "alternau". Along with
some semantics characterization? Thanks.
+---+
|-=I T ' S P R I N C I P L E T H A
vent kill from trying to kill a non-existant
(or entirely new, but that's unlikely) process. The "ps aux" pipeline,
including the grep, will have finished before "kill -9" starts, since
kill needs the output for its command line args.
Neat trick though. I'll have to remember that.
- Chris
If I had a zone file that big I'ld chop the domain up into subdomains to
spread out the DNS work. Unless you're talking about hundreds of pages, a
normal text editor should be fine.
At 10:35 PM 5/3/00 +1000, Adam Cassar wrote:
>How are isp's with large zone file entires managing their existing zo
At 01:12 AM 5/7/00 -0700, t s a d i wrote:
>Active Internet connections (w/o servers)
>Proto Recv-Q Send-Q Local Address Foreign Address State
>tcp0 39595 bangus.myphilippine:www ME21-66.i-manila.c:1520
ESTABLISHED
>tcp0201 bangus.myphilippine:www 210.2
Just use "--force-depends". It overrides package dependancies.
At 12:59 PM 5/7/00 -0600, elyograg wrote:
>How hard is it to create "fake" packages? What I'm after is this: A
>package that will "lie" to the system with a "provides: httpd" line or
>"provides: mail-transport-agent" or something
It looks like all you want is just a Linux router. A gateway joins two or
more disimilar networks, I believe. Like ethernet<->token ring or
ATM<->FDDI. Check out the following packages :
zebra
ipchains
There are other ones that I can't think of right now. :) I'm pretty sure
there is a linux r
At 11:36 AM 5/10/00 +0200, Dariush Pietrzak wrote:
>btw, why do you choose mysql? it ain't free, it ain't any good
>try Oracle, Sybase, PostgresSQl,
>they are ok, and Postgres is free
MySQL is faster and I believe easier. I doubt he would need transactions
just to log Web stats.
+
At 09:23 PM 5/11/00 +1000, Craig Sanders wrote:
>it's faster for some things, but i find it really clumsy and difficult
>to work with. postgres' psql is vastly superior to the mysql admin tool
>- and from what i hear, psql is supposed to be even better in the new
>version 7.
I was only considering
At 04:58 AM 5/13/00 +, [EMAIL PROTECTED] wrote:
>computer but i tried to send a .jpg file to my friend recently
>and i relised that it has a jpg.vbx extension. Anyone there knows what
If you have any *.jpg.vbs files on your computer it means you HAVE been
infected by the worm. U
At 10:10 AM 5/12/00 +1000, Craig Sanders wrote:
>i don't see how. apache just sends the log data out to the pipe, it
>doesn't wait for the pipe program to commit the record to the database.
>as far as delaying apache goes, it's probably less of a delay than
>writing it to a text file.
I see what y
At 07:24 PM 5/13/00 -0500, Nathan E Norman wrote:
>So what happens when you're reading the requests database and Apache
>wants to write more data? With MySQL, the table is locked and now you
>just lost data. More often, you want to read data but the writer has
>locked the table. I'd noticed this
The "database" is the table of raw data and an index. Apache can be made to
write its log file in the form of a table, via customlog. Why use a pipe
for something that Apache can do nativly? Unless you want up to the second
SQL-ified stats, just run savelog daily to rotate the logs. Now unleash
At 05:21 PM 5/15/00 -0500, Wayne Sitton wrote:
>the users can log in and access their ftp. Now what I can't seem to get
>done is to get apache to recognize that /~username goes to
>/home/username/html
Change the USERDIR directive in http.conf to point to the new location.
+
At 03:44 PM 5/15/00 -0700, Jeremy C. Reed wrote:
>My config has:
>UserDir public_html
It doesn't have to be public_html. It can be anything you want. Even
/home/username, though I wouldn't suggest that. I used .www. (NCSA tradition :)
>You should also have the mod_userdir in use.
>You may have
At 07:29 PM 5/16/00 -0400, Jeremy Hansen wrote:
>I'm a long time Red Hat user. Basically the company I'm working for is
Sorry about that. :)
>Dpkg vs RPM
RPM is a piece of crap compared to dpkg, and now we have apt (advanced
package tool). It's a handler for dpkg, but it's intelligent. The ki
I have to disagree there. I've found Debian packs to be extremely up to
date, atleast on the security end. And even on routine maintanance, the lag
is not that bad.
At 08:44 PM 5/16/00 -0700, David Lynn wrote:
>I agree - dpkg and apt are great compared to rpm's. However, that's all
>assuming th
The only real difference between stable and unstable is that unstable has up
to date packages. The only thing stable has over unstable is the track
history of "yeah all this stuff has worked together for a LONG time".
At 12:16 AM 5/17/00 -0400, Will Lowe wrote:
>Actually, unstable is usually pret
Sorry, but I was so underwhelmed by rpm's capabilities and my reaction was
so one sidedly negative that I can't describe it any other way. It is what
I typed.
At 02:55 PM 5/17/00 +0200, Wichert Akkerman wrote:
>Previously Chris Wagner wrote:
>> RPM is a piece of crap compared
1 - 100 of 346 matches
Mail list logo