I used a standard low cost IDE HP Travan tape drive using TR4 cartridges and
it worked fine. Though every once and a while it would complain and I'ld
have to take the tape out an put it back in. For non-insane applications
this would be adequate. A simple tar script run out of cron kept me alive
At 02:11 AM 5/18/00 GMT, Daniel Quinlan wrote:
> system:
> Debian 2.1
> exim 2.05-2
> qpopper 2.3-4
CuCiPOP tells you how many messages were downloaded by default. :) If that
log says 10 messages were pulled, then HE DID download 10 messages. If that
number syncs up with what exim says it de
At 09:55 PM 5/17/00 -0700, Karl M. Hegbloom wrote:
> copy everything from the master drive to the copy, then run the
> appropriate Lilo command to make that copy bootable. You can then
> mount it in another machine and it's ready to go. You have to filter
> some things out when you copy. See bel
At 04:36 PM 5/18/00 +0500, Vlad Harchev wrote:
> I think you can install NIC into machine with data (call it machine A), place
>another machine with large hdd with NIC in it near the source machine A (call
>it machine B), connect them using crosswired UTP, download data to machine B,
A laptop woul
At 09:59 AM 5/19/00 +1000, Craig Sanders wrote:
>i don't know what your laws are like in russia, but here in australia
>you can get hit with a discrimination lawsuit(*) if you don't support
Yeah, I've heard some scary things out of Australia lately. It's like
they're moving toward socialism/commu
If kickstart is a red hat package, you can install it on debian using alien.
Then you can use red hat's kickstart to install debian. :)
At 01:55 PM 5/18/00 -0400, Jeremy Hansen wrote:
>Most of the answers I've been getting on this subject seem like total
>hacks, which may work but really are trick
At 12:48 PM 5/18/00 +0200, Dariush Pietrzak wrote:
>That was the original scheme, but bosses hmmm, after some consultations
>said that we should transfer data on cd-roms with armed guardian.
>so now we've got problems, and deadlines haven't changed
>although we had no idea of those security issues
It's not too hard to find pine*.deb. Use Fast FTP Search.
At 09:54 AM 5/19/00 +0800, Sanjeev \"Ghane\" Gupta wrote:
>Because Univ of Washington doesn't allow modified tarballs to be
>distributed, and you have to modify the tarball's paths to be Debian
>compliant.
+---
At 05:25 PM 5/19/00 +1000, Craig Sanders wrote:
>to yanks, socialism is an evil, dirty word - roughly equivalent
>to satanism. but we understand why you're like that...you've been
>brainwashed with anti-socialist bullshit since you were small children.
Hahah, Satanism, that was a good one. :) But
**(If anyone *really* must reply to this, snip debian-isp)**
Craig sent me a quite funny diatribe. Seems he thinks I'm a "stupid American".
At 10:07 PM 5/23/00 +0200, Russell Coker wrote:
>ROFL. I did research, I watched a TV show! Could you indict America any
>further?
Despite the generally v
At 12:35 PM 5/23/00 +, Sergey A. Ribalchenko wrote:
>> Hahah, Satanism, that was a good one. :) But I still prefer individualism
>> to socialism.^^
>m.b. you missed, did you mean onanism?
Ok, I don't really know what you mean?
+---
Each tty has an options file. The server side and client side ips are
assigned in there.
+---+
|-=I T ' S P R I N C I P L E T H A T C O U N T S=- |
|=- -=ALAN KEYES FOR PRESIDENT=- -=
At 11:17 AM 5/23/00 +0200, I. Forbes wrote:
>Question: Is'nt there a deb package with scripts for creating boot
>disks? I feel I should not be reinventing the wheel.
There is, but I can't remember the name. :)
+---+
|-=I T
Changing mail clients won't make a difference. Just tell him what you
found, that everything went out that came in. Then tell him to look to the
sender, because there's a five nine probability that she's screwing up and
nuking messages.
At 05:02 PM 5/25/00 +1000, Daniel Quinlan wrote:
>after a w
At 10:57 PM 5/25/00 +0200, Russell Coker wrote:
>On Wed, 24 May 2000, Chris Wagner wrote:
>>**(If anyone *really* must reply to this, snip debian-isp)**
^^^
I guess you didn't
At 05:42 AM 5/24/00 +, Sergey A. Ribalchenko wrote:
>> >> Hahah, Satanism, that was a good one. :) But I still prefer individualism
>> >> to socialism.^^
>> >m.b. you missed, did you mean onanism?
>> Ok, I don't really know what you mean?
Hi. Sorry to jump in this thread late. But it looks like your upstream
fried your DNS entries. I'ld strongly recommend you update your InterNIC
records to point to DNS servers that *you* control, not anyone else.
Because as you just found out, when DNS screwups occur, they take a lot of
stuff wi
At 08:32 PM 5/28/00 -0500, Security wrote:
>The finger gateway script came in the cgi scripts with Debian. I just
>changed finger to whois. seems to work well.
I think what he wants is a server that does what InterNIC does. Answer
whois type database queries issued from the whois program. I don'
$2 < @ $3 > $4
$: <$1> $2 <
@ $3 > $4
$: <$1> $2 <
@ $3 > $4
# check unqualified user in access database
R $* $: $1
R<$+> $*$#error $@ 5.7.1 $: $1 error from access db
Anyone see w
Hola. What is the official name of the type of connection that the common
network protocols use? It lives somewhere above the tcp layer and below the
app layer but is so obscure that I can't find it. e.g. Telnet, ftp, http,
etc. all establish an x type connection and then transmit their dat
At 10:48 PM 6/16/00 -0500, Sanjeev Gupta wrote:
>Sockets? Butyou would definitely have seen this more than a couple of
>times.
No, not sockets, sockets are way down on the stack. This is the protocol
that says what the octets mean and do. It's the common thread among all the
high level protocol
early like to have cracked this before I go. Can anyone spare a
bit of time for a few Emails to help me? I would be eternally
grateful!
TIA,
Chris
Chris Evans <[EMAIL PROTECTED] or [EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
Rampton Hospital; Associate R&D Director,
would help me work out why I
can't get this right! All I can offer in return is eternal gratitude!
TIA,
Chris
Chris Evans <[EMAIL PROTECTED] or [EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
Rampton Hospital; Associate R&D Director,
Tavistock & Portman NHS Tru
At 12:24 AM 6/17/00 -0500, Kain wrote:
>What I think you're thinking of is just IP. You probably haven't been seeing
Definately not IP, IP just gets your packets there and back.
>Now, if you actually mean "what octets mean and do", those are actually
defined higher than TCP, and are laid out i
At 12:50 AM 6/19/00 +0200, Russell Coker wrote:
>It is called TCP - Transmission Control Protocol. RFC793.
I'm starting to conclude that it's just called a "tcp connection". But I'm
still reading through the RFC... It was written in 1983 and for whatever
reason it seems to use the term socket a
At 02:25 PM 6/20/00 +0200, Russell Coker wrote:
>They don't use NVT. The TELNET protocol is not running on (for example) a
>web server.
Yeah but the NVT settings have to be negotiated for each side to talk to
each other. If I telnet to an Apache webserver on port 80, my telnet is
going to negoti
I'ld recommend Cucipop due to it's security record. That's what I use.
Just don't look at the source code. :)
At 10:03 PM 6/26/00 +0200, Dariush Pietrzak wrote:
>Hello,
>which packaged with debian pop3d would you people recommend?
> which one do you use?
+---
Ok, ok, I'm late as hell but I had to reply. :) You don't need SCSI unless
you're doing something fancy or insane. Giving Apache more RAM is *vastly*
better than giving it SCSI. The RAM lets you cache everything so the hard
disk becomes not very important for I/O. Max out your motherboard's RAM
At 10:47 AM 7/5/00 +0200, Javier Castillo wrote:
> which list manager do you recommend me?, easy to admin, fast, and of
>course, gnu :))
Who says you can only use GNU software? Don't limit yourself to GNU, use
any software that has a "free" license you find acceptable.
+--
At 08:45 PM 7/5/00 -0400, Allen Ahoffman wrote:
>1. Terminal server for connecting one box to many serial devices such as
> routers, switches, other terminal servers for serial connectivity
>when network is down.
The Comtrol Rocketport board is very nice. You can put up to 128 serial
ports
Sounds like the 2nd NIC isn't fully turned on. Is everything the way it
should be in ifconfig? Have you tried binding any other daemons to the 2nd
NIC? I also think you'll need ip based vhosts in Apache to make it listen
to a 2nd NIC.
The second NIC should be on a different subnet, otherwise ha
at mailman may have some
specific things but I forget (a) what they were, (b) whether that's
still true!
Cheers,
Chris
Chris Evans <[EMAIL PROTECTED] or [EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
Rampton Hospital; Associate R&D Director,
Tavistock &
You can try running fsck and badblocks to attempt to fix the errors. But
I've never had luck with either of those tools on a drive that was dieing.
If the errors remain, there's a 99% probability the drive is bad.
At 11:54 PM 7/10/00 -0400, JoeCool wrote:
>Hi,
>
>I'm getting some Input/Output err
Heheh, there is NO WAY in HELL I would run wdc on an ext2 partition. :)
At 09:59 PM 7/11/00 -0600, John Gonzalez/netMDC admin wrote:
>Depending on the mfgr of the drive, you should be able to boot off a
>floppy and run a utility to 'check' the drive for errors.
>
>WD has this and requires some use
WD is bad, they're a bad bad company. Anyone who has a WD drive in their
server should take it out and THROW IT AWAY. I don't trust wdc as far as I
can decompile it. On any file system.
At 10:39 PM 7/11/00 -0600, John Gonzalez/netMDC admin wrote:
>
>Huh? Western Digitals drive test utility will
At 11:27 PM 7/11/00 -0600, [EMAIL PROTECTED] wrote:
>How does one decompile a hard drive? With a hammer?
Wdc is a diagnostic program that "fixes" your WD drive.
>I could be wrong, but I highly recommend Western Digital EIDE drives.
I've had nothing but bad (truly horrible - 100% data loss) exper
The default precompiled kernels come with IDE support.
At 12:02 PM 7/13/00 +1200, Daniel Free wrote:
>Yes debian does, well actualy thats not strictly true.
+---+
| -=H E L L - J U S T D O N ' T V O T E F O R G O R E=- |
At 09:55 PM 7/12/00 +0200, =?iso-8859-1?Q?=C1ts?= Attila wrote:
>Then how could I upload files? Should I create a user with
>rights to specific directories?
Yes. Ftp'ing as root is a bad bad thing. Create an admin account that has
access to ONLY the areas you want to ftp files to.
+---
At 02:59 AM 7/13/00 +0200, Tamas TEVESZ wrote:
>have my hpt366 working with any of the default precompiled kernels
>please.
I don't understand this sentence.
>he was referring to _udma66_ drives and controllers.
Um, he wrote:
>does Debian or any Linux support ATA-66 disks? If yes,
>do I need any
At 01:44 PM 7/14/00 -0700, Kevin wrote:
>When our customers dial-in, and they run winipcfg in 98 it shows that
>their subnet is 255.0.0.0. Recently a customer complained that this
>was degrading their performance. I've tried some other isps to see
>what happens on theirs and its about 50/50 with
Just use group permissions. Put each user in their own group. Take away
world access. chmod w-rwx *
At 03:11 PM 7/18/00 -0500, John F. Davis wrote:
>hello
>
>How do you limit the area which a user can go with ftp?
>i.e, when user ftp's to my server, how do I keep him in
>his portion of the file
Blow away the partition and recreate it. If that doesn't work, try to
format it as ext2 to see if there is a disk defect. You'll then be able to
run fsck. Badblocks might also give you some useful info.
At 05:01 PM 8/1/00 -0700, Kevin wrote:
> swap_free: swap-space map bad (entry 011d1000)
>
istar list
messages)
I'm running 8.9.1a on Debian hamm (yes, I am going to upgrade but
not for a few more weeks).
I'm copying this to the list-support list in case anyone there
recognises this, apologies for cross-posting.
TIA,
Chris
Chris Evans <[EMAIL PROTECTED] or [EMAIL PROTE
Interesting. Have you ever had a problem with people spoofing MAC addresses
to get IP's? How does your system react if more than one host presents a
request for an IP if that MAC has already been assigned an IP? Seems like
if they're going to the trouble to give you the MAC address you might as
At 10:51 AM 9/5/00 -0500, [EMAIL PROTECTED] wrote:
>sites of users that I have on the machine (i.e- ~debian-isp). I was
>wondering how they are finding out which users that I have on the machine
>and was wondering if I could be running services that pose a security
>problem. I only have the followi
At 11:33 AM 9/13/00 -0600, Nathan wrote:
>What ping of death attacks?
>
>The only ones I have heard of, were fixed with kernel patches seriously
>quick after they came out.
Maybe he means ping floods? Pings of death usually will crash a box after a
few packets hit it. As you said Debian is good
that would help with the
troubleshooting of speed/reliability tradeoffs and how to set them for
(M$) V90 and downwards? I feel sure there must be some good
documents on the WWW about this.
TIA,
Chris
Chris Evans <[EMAIL PROTECTED] or [EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy
They seem to work ok for me in Windows, with IE and Netscape. Haven't tried
it under unix.
At 09:54 PM 2/27/01 -0300, [EMAIL PROTECTED] wrote:
>
>Hi there
>
>The Fck iexplorer do not to work properly with the .pac files for me.
>
>When the pac file tell the browser to connect directly fo
So, what happened to sendmail? How did it earn it's fall from grace? When
I got into it, sendmail was it. I've never looked closely at the mail
system since.
---==---
___/``\___
0100
Marc, flames to /dev/nul please.
At 12:25 PM 4/9/01 +0200, Marc Haber wrote:
>195.179.172.30 looks like a backbone router of ISION Internet in
>Hamburg, as you could have found out yourself by doing a reverse DNS
>lookup. That router is trying to tell you that a packet your machine
>has sent out w
At 04:56 PM 4/5/01 +0200, Alson van der Meulen wrote:
>I don't think transproxy will handle such a load quite well, but you
>can try and find out :)
You might want to try a hardware based balancer. Something like Local Director.
---==---
___/``\___
0100
Another way to accomplish that would be a Cisco router set to trunking.
Evenly dividing the traffic flow to two servers.
At 10:15 PM 4/11/01 -0400, Chris Wagner wrote:
>At 04:56 PM 4/5/01 +0200, Alson van der Meulen wrote:
>>I don't think transproxy will handle such a load quite
The better way is to block it at the router. Once you figure it out,
blocking subnets is trivial and much more resource effective than having
your firewall do it. Read your router's documention about ACL's, access
control lists.
At 08:37 AM 4/16/01 -0400, Peter Billson wrote:
> You need to *qu
But why does that occur?
At 12:27 PM 4/24/01 -0700, Mike Fedyk wrote:
>On Tue, Apr 24, 2001 at 10:43:42AM -0400, Haim Dimermanas wrote:
>>
>> > My problem is the following : the master sends NOTIFY request to the
>> > slaves for that zone every 8 seconds (sometimes 10 sec, sometimes 4
>> > sec)
At 06:48 PM 4/30/01 -0400, [EMAIL PROTECTED] wrote:
>Ok. I'm the original poster and what i want is:
>
>Mails with a NULL sender with an invalid recipient get bounced to the
>email address of any Header that happen to exists.
>
>And if the recipient doesn't exists and there is no way to bounce then
At 07:27 AM 5/21/01 +0200, Robert Waldner wrote:
>On Mon, 21 May 2001 13:46:14 +1000, Jeremy Lunn writes:
>>I know this isn't Debian specific. But I'm just wondering if it's fine
>>to route routable IP addresses over non-routable IP addresess.
>
>Yes, although many would consider it bad practice (
At 08:00 AM 5/22/01 +0200, Robert Waldner wrote:
>
>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>We should probably clarify "non-routable" by saying "non-publicly routable".
>
>Well, we could also say RFC1918, couldn´t we ;-?
LOL
>- DNS,
far as I can see there's more than
enough left for decades to come.
At 09:28 PM 6/1/01 +0200, Marc Haber wrote:
>On Tue, 22 May 2001 08:00:01 +0200, Robert Waldner
><[EMAIL PROTECTED]> wrote:
>>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>>We should pr
I'm sorry, but ROFLMAO!!!
At 05:18 PM 6/3/01 +0200, Przemyslaw Wegrzyn wrote:
>
>
>On Sat, 2 Jun 2001, Craig Sanders wrote:
>
>> On Wed, May 30, 2001 at 09:41:54PM +0200, Przemyslaw Wegrzyn wrote:
>> > Anyway, my problem seems to be hardware:
>> >
>> > [EMAIL PROTECTED]:~$ more /proc/misc
>> > Se
A while back, AT&T had a publicly accessible router for doing route lookups
and stuff like that. It supposedly knew about the whole world. The special
thing about this router was that you didn't need a user name or password to
log on with. It just gave you the IOS prompt. I haven't been on this
Revisiting traceroute.org, I see that they have a whole list of route
servers. :)
At 01:09 PM 6/27/01 +0200, Russell Coker wrote:
>Here's a machine that used to provide such a service, not sure if it
>still does:
>
>route-views.oregon-ix.net
---==---
___/``\___
If the nodes in question are plugged into a switch with managment
capabilities then you could set the security of the port to only allow
legal mac/ip address's. It depends on the switch.
You could go to the person and whack them on the head. Which might be the
easiest.
Chris
At 06:12
My first choice is also what the other Chris said, use a large LART on the
offending [computer|user]. You can use smart switches to base the ip on
pre-authorized MAC addresses. That way you are effectivly shaping based on
MAC address. But in true hacker form, even that can be overcome. Some
One possible way to defeat this would be to use those metal "security
chains" that they use to keep people from carrying off computers. Use a
very short one, about 2" long. Affix one side to the computer case, and the
other to the ethernet cable. Now, even this can be overcome if the crafty
hack
That is a function of the bios. Some support it, some don't. Either your
bios's don't support it (my suspicion) or shutdown isn't sending the signal.
'man shutdown' might have some useful insight. I'ld also call the
motherboard manufacturer to make sure they support self power off. Also
check t
testing/non-US main non-free
this seemed to break a lot of things though...i am trying to upgrade a
potato system to host web sites
thanks in advance,
-chris zubrzycki
==
==
Remember: it's a "Microsoft virus"
. It has worked wonderfully well, it can even
back up to or from machines over the network. there are 2 licenses,
personal and commercial. it is also extremely easy, which is a plus.
just my 2¢
-chris zubrzycki
Security Is A Series Of Well-Defined
The best way would be to block it at your router with an access list.
Blocking it at the box is ok too but that takes a little bit of your
resources. And you have to do it on each box on your network you want
protected. The router block will protect your entire network in one fell
swoop and cost
roadband connection with a debian box as
firewall and NAT who
might give me some advice for fee.
Very best all: this is an excellent list for a debian supporting amateur to
lurk on!
Chris
Chris Evans <[EMAIL PROTECTED]>
Consultant Psychiatrist in Psychotherapy,
Rampton Hospital; Associate R&
ies; practice, research,
teaching and consultancy.
Chris Evans & Jo-anne Carlyle
http://psyctc.org/ Email: [EMAIL PROTECTED]
You should be able to tell if it cares about robots.txt by looking in the
logs to see if it's downloading /robots.txt. If it is then something like:
User-agent: LinkWalker
Disallow: /
will keep it off your site. If it doesn't, then iptables will keep it away.
Robots info:
http://www.global-posit
I have a customer who wants to host his own email server, and he wants
to have long email addresses, like .@domain.com ,
and map it to a local name that is less than 8 chars. What is the best
email server to do this kind of mapping?
-chris zubrzycki
Bwahahaha!! Man, that is low. Advertising to sysadmins through the access
logs Sheesh. But now that you mention 7-24, I think I recognize that.
I think they are a spam marketing outfit.
At 02:31 PM 1/7/02 -0800, Nathan Strom wrote:
>Personally, I think this is a rogue organization -- there
Purtroppo nè Netscape nè lo IE è molto stabile. Opera è Mozilla sono altri
quei unici di che sappia. Potete spegnere sempre appena il Javascript. :)
Forse il vostro sistema e instabile.
At 07:37 PM 1/8/02 +0100, [EMAIL PROTECTED] wrote:
>cosa usate voi per navigare in internet senza problemi ? (
Well, the rationale behind this is as you touched on, preventing spoofed
address attacks. A paranoid lookup essentially verifies that the connecting
system is a known legit host. In effect you're using your DNS system as
another level of authentication. Say somebody wants to covertly log on or
a
At 10:01 PM 1/10/02 -0600, Nathan E Norman wrote:
>Congratulations ... you just set up your DNS incorrectly. Every PTR
>entry should resolve to a _unique_ name, and that name should resolve
>to a _unique_ IP. That doesn't mean you can't have additional A
>records doing load balancing.
To give a
At 04:22 AM 1/11/02 +0100, martin f krafft wrote:
>a bogus IP won't even make it past OSI layer 4 on debian... rp_filter...
There are ways of doing it such that the box has NO WAY of knowing that the
traffic is spoofed. Granted, that is hard to do. Even paranoid lookups can
be overcome. But it'
At 06:01 AM 1/11/02 +0100, martin f krafft wrote:
>okay, why libwrap then?
Once the network is compromised, it makes no difference what's on the box.
If done properly, the compromised network is indistinguishable from the
uncompromised network. That box is totally on it's own. :)
>/29, although
series kernels, and it looks like I will have to use
ext2 at least for my root and boot partitions, but with hope I can use
XFS for everything else. I'll post my results in case anyone is
interested.
--Chris Zubr
nformation.
thanks for the help.
-chris zubrzycki
==
Security Is A Series Of Well-Defined Steps...
chmod -R 0 / ; and smile :)
.
>
> Thank's Josep
>
Hi.
Yes it is, I'm using the courier-pop, courier-imap and sqwebmail debian
packages myself. Note that you need to switch to maildirs(if you aren't
using it already) to use courier.
--
-o) # Mvh.
/ \ # Chris Qvigstad
_\_v # [EMAIL PROTECTED]
bably need to set up you smtp to deliver to maildirs.
--
-o) # Mvh.
/ \ # Chris Qvigstad
_\_v # [EMAIL PROTECTED]
You can make 3 predefined directories for each customer that they can't
delete. One htdocs, logs, and "stuff" or something, for them to put all the
non web accessible stuff in.
Another thing you can do is create a wrapper script for the Apache startup
that checks for the existence of all the esse
Like do you want to replace something in the html files, or alter their
names systematically somehow...
At 02:33 PM 7/10/02 +0200, Craig wrote:
>Hi Guys
>
>I need to do an extended find and replace for a few
>.htm files spanning a couple of subdirectories to
>change some things.
>
>Anyone have a q
The "nomail" option was mentioned. I'm not familiar with that, could
someone explain how to use it? I assume it means that you are still a
member of the list but you are not in the redistibution list.
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
0100
--
To UNSUBSCRIBE,
I never got a password when I signed up, which was years upon years ago.
And what is the URL? Are we even running mailman??
At 07:34 AM 7/12/02 -0400, Joe Block wrote:
>Go to the administration web page, enter your email address and the
>password you got sent when you joined the list, and you c
later.
Thanks for the help,
-chris zubrzycki
- --
PGP public key: http://homepage.mac.com/beren/publickey.txt
ID: 0xA2ABC070
Fingerprint: 26B0 BA6B A409 FA83 42B3 1688 FBF9 8232 A2AB C070
Unix _IS_ user friendly... It's just selective
Occasionally subscriber bounce messages get reflected back to the entire list.
At 06:46 PM 7/25/02 -0400, Jeremy May wrote:
>i got this when mailing debian-testing@lists.debian.org
>
>
>
>
>No such user: [EMAIL PROTECTED]
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
"...ne cede
, and a
special server. http://safetp.cs.berkeley.edu for more details. Other
than that, use scp. Unfortunately, most options will involve some
effort/difficulty on the client end.
- Chris
PS: When I did some fairly primitive benchmarking, the SSL/TLS
encryption slowed the transfers to about 1/3 of the rate of straight FTP.
I think I hear the need for a mySQL enabled mailbox system/mail reader. ;-)
At 01:27 AM 8/3/02 +0100, Phillip Baker wrote:
>Yes, but having a long wait when opening your folder a couple of times a
>year
>because you've been away on vacation is another thing entirely to willingly
>subjecting yours
filtered up. Nothing gives me what I thought I could have which
was a simple addition of a few lines to master.cf and main.cf to get
spamassin or spamc/d called as filters like the rav daemon.
I'm an amateur at this really and hundreds of experts must have done
this? Anyone sen
them or deal with the problems that they and other MUAs
cause, so here I am asking a little OT but hoping people will point me
to things I can try.
TIA,
Chris
PSYCTC: PSYchotherapy,PSYchology,PSychiatry, Counselling
and Therapeutic Communities; practice, research,
teaching and consultancy.
I need to provide email access for 13,000 to 14,000 K12
students. Last school year we used Microsoft Exchange with extremely
tight quotas. There are currently ~5500 mailboxes. We had no idea what
the utilization was going to be, teachers normally don't pick up new
services too quickly an
Actually this is a very common problem. Either mysql doesn't know about a
user called "debian-sys-maint" or it doesn't have localhost permission.
Mysql has it's own user db independant of the system. You'll need to go
into mysql command prompt as root and do a GRANT to create debian-sys-maint
and
hing or just aol & netscape for now. I
will take relaying out if things settle down.
Anyone willing to offer, please contact me off list:
[EMAIL PROTECTED]
TIA,
Chris
PSYCTC: Psychotherapy, Psychology, Psychiatry, Counselling
and Therapeutic Communities; practice, research,
teachi
But does a PTR record exist? The double reverse lookup should succeed so
long as there is a valid A <-> PTR pair. Regardless of whether it was
launched into from another A or CNAME or IP. Unless I'm way off base here,
it goes presented name -> IP lookup -> PTR lookup -> IP lookup. If the two
IP
to get onto the ISP
about again. This is mad. I'm all in favour of clamping down on spam
but this is cutting the Internet down to a very two class system as
you say.
Chris
PSYCTC: PSYchotherapy,PSYchology,PSychiatry, Counselling
and Therapeutic Communities; practice, research,
teach
Ah yes, that's right I remember now. This is exactly the kind of situation
as to why you shouldn't use CNAME's for MX names or for any official machine
name for that matter. CNAME's are just for human convenience, a host should
never try to pass itself off by one. Screws up the double reverse lo
I can tell you why the purge worked. It destroyed your corrupted MySQL user
database. :)
At 04:42 PM 7/08/03 -0600, David Wilk wrote:
>Howdy all, just wanted to say what worked. Dominik's suggestion to
>'purge' the mysql packages with apt-get did the trick. One final
>reinstall had everything w
At 01:34 PM 8/18/03 +0200, Petrisor Marian wrote:
>So I have to setup a proxy on my PC that I will go through rather than
going directly through my ISP's proxy?
>
>I mean the net will be like:
>
>PC - MYProxy - ISP's Proxy - Internet ?
Yeah. But I don't think I fully understand how this serpentin
101 - 200 of 346 matches
Mail list logo