At 07:27 AM 5/21/01 +0200, Robert Waldner wrote:
>On Mon, 21 May 2001 13:46:14 +1000, Jeremy Lunn writes:
>>I know this isn't Debian specific. But I'm just wondering if it's fine
>>to route routable IP addresses over non-routable IP addresess.
>
>Yes, although many would consider it bad practice
At 08:00 AM 5/22/01 +0200, Robert Waldner wrote:
>
>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>We should probably clarify "non-routable" by saying "non-publicly routable".
>
>Well, we could also say RFC1918, couldn´t we ;-?
LOL
>- DNS,
far as I can see there's more than
enough left for decades to come.
At 09:28 PM 6/1/01 +0200, Marc Haber wrote:
>On Tue, 22 May 2001 08:00:01 +0200, Robert Waldner
><[EMAIL PROTECTED]> wrote:
>>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>>We should pr
I'm sorry, but ROFLMAO!!!
At 05:18 PM 6/3/01 +0200, Przemyslaw Wegrzyn wrote:
>
>
>On Sat, 2 Jun 2001, Craig Sanders wrote:
>
>> On Wed, May 30, 2001 at 09:41:54PM +0200, Przemyslaw Wegrzyn wrote:
>> > Anyway, my problem seems to be hardware:
>> >
>> > czajnik@earth:~$ more /proc/misc
>> > Segme
A while back, AT&T had a publicly accessible router for doing route lookups
and stuff like that. It supposedly knew about the whole world. The special
thing about this router was that you didn't need a user name or password to
log on with. It just gave you the IOS prompt. I haven't been on thi
Revisiting traceroute.org, I see that they have a whole list of route
servers. :)
At 01:09 PM 6/27/01 +0200, Russell Coker wrote:
>Here's a machine that used to provide such a service, not sure if it
>still does:
>
>route-views.oregon-ix.net
---==---
___/``\___
My first choice is also what the other Chris said, use a large LART on the
offending [computer|user]. You can use smart switches to base the ip on
pre-authorized MAC addresses. That way you are effectivly shaping based on
MAC address. But in true hacker form, even that can be overcome. Some
(m
One possible way to defeat this would be to use those metal "security
chains" that they use to keep people from carrying off computers. Use a
very short one, about 2" long. Affix one side to the computer case, and the
other to the ethernet cable. Now, even this can be overcome if the crafty
hac
That is a function of the bios. Some support it, some don't. Either your
bios's don't support it (my suspicion) or shutdown isn't sending the signal.
'man shutdown' might have some useful insight. I'ld also call the
motherboard manufacturer to make sure they support self power off. Also
check
I know that One Net makes Linux based firewalls. Called "Incinerator".
They're at www.one.net.
At 08:32 AM 7/12/01 +0200, TooManySecrets wrote:
>Hi.
>
>Excuse me this off topic, but my boss want (only for political budgets)
>prices of commercial hardware firewall's. I only use Linux for make t
I think you're on the wrong list. This list is for the discussion of the
Debian distribution of Linux for ISP's. Why are you running super expensive
Windows 2000 when you could be using the much more flexible and robust, not
to mention FREE, Debian? If you could tell us what you're trying to do
Larry, that's a good solution but it was a little cryptic on the
explanation. Let me expound some for Ann's benefit.
Ann, what we're talking about is using the console on the router to do all
administration, and *never* telneting to it. But physically going to all
the routers and setting up a l
I found a reference to it in a zsh changelog. It appears to be a C
directive but as to why it's showing up in weblogs... maybe bad code? :)
Here's the URL:
http://www.bme.jhu.edu/resources/whitaker/doc/zsh-doc-3.1.6dev22/Documentati
on/ChangeLog
And the excerpt:
2000-01-19 Peter Stephenson <
The WS FTP thingy you're refering to is for going through proxies. Some
folks just don't know the difference between firewalls and proxies. :) To
do this just set up port forwarding on the firewall. Use ipchains or
something and only allow ftp connections from your known boxes to pass
through.
Are you also permitting the ftp-data port to go through? Ftp is 21, and I
sorta forget the number for ftp-data. :)
At 10:32 PM 8/28/01 +, Martin WHEELER wrote:
>230 User logged in, access restrictions apply.
>Remote system type is UNIX.
>Using binary mode to transfer files.
>ftp> pwd
>257 "
I think it's probably too late for that. The only way to be 100% about your
"disinfected" system is to fdisk it and rebuild from scratch. You can save
your config files and data files, if you're sure they too haven't been
altered. But say somebody relaxed an obscure security setting in some
con
There are proprietary Microsoft login schemes that they might be using.
I'ld call them up and ask. If you can't connect then they are not PPP
compliant. If it's asking for any domain information that would be a
tipoff. You can always try sniffing the login sequence. Try sniffing from
both Linu
The best way would be to block it at your router with an access list.
Blocking it at the box is ok too but that takes a little bit of your
resources. And you have to do it on each box on your network you want
protected. The router block will protect your entire network in one fell
swoop and cost
So right now everything is on the / partition? Then what you want to do is
blow away that huge unused partition and make partitions for atleast /tmp
/var /home. /usr if you want plus the swap. You need to size out how much
room each of those dir trees is going to need. Then take the box offlin
You should be able to tell if it cares about robots.txt by looking in the
logs to see if it's downloading /robots.txt. If it is then something like:
User-agent: LinkWalker
Disallow: /
will keep it off your site. If it doesn't, then iptables will keep it away.
Robots info:
http://www.global-posi
Bwahahaha!! Man, that is low. Advertising to sysadmins through the access
logs Sheesh. But now that you mention 7-24, I think I recognize that.
I think they are a spam marketing outfit.
At 02:31 PM 1/7/02 -0800, Nathan Strom wrote:
>Personally, I think this is a rogue organization -- ther
Purtroppo nè Netscape nè lo IE è molto stabile. Opera è Mozilla sono altri
quei unici di che sappia. Potete spegnere sempre appena il Javascript. :)
Forse il vostro sistema e instabile.
At 07:37 PM 1/8/02 +0100, [EMAIL PROTECTED] wrote:
>cosa usate voi per navigare in internet senza problemi ?
Well, the rationale behind this is as you touched on, preventing spoofed
address attacks. A paranoid lookup essentially verifies that the connecting
system is a known legit host. In effect you're using your DNS system as
another level of authentication. Say somebody wants to covertly log on or
At 10:01 PM 1/10/02 -0600, Nathan E Norman wrote:
>Congratulations ... you just set up your DNS incorrectly. Every PTR
>entry should resolve to a _unique_ name, and that name should resolve
>to a _unique_ IP. That doesn't mean you can't have additional A
>records doing load balancing.
To give
At 04:22 AM 1/11/02 +0100, martin f krafft wrote:
>a bogus IP won't even make it past OSI layer 4 on debian... rp_filter...
There are ways of doing it such that the box has NO WAY of knowing that the
traffic is spoofed. Granted, that is hard to do. Even paranoid lookups can
be overcome. But it
At 06:01 AM 1/11/02 +0100, martin f krafft wrote:
>okay, why libwrap then?
Once the network is compromised, it makes no difference what's on the box.
If done properly, the compromised network is indistinguishable from the
uncompromised network. That box is totally on it's own. :)
>/29, althoug
Actually, they would. Because the "e" in Re: is in lower case! :P
At 05:14 PM 1/23/02 -0700, [EMAIL PROTECTED] wrote:
>Of course, I just realized that anyone with that filter in place wouldn't be
>receiving this mail B-)
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
0100
FYI, no one bother decoding this, it's not a photo, actually a
program/trojan. Malicious no doubt...
At 10:24 PM 1/27/02 -0800, [EMAIL PROTECTED] wrote:
>Hello!
>
>My party... It was absolutely amazing!
>I have attached my web page with new photos!
>If you can please make color prints of my phot
Never touched IIS, but you never know. If you uploaded the file in text
mode, IIS could be translating the 's into 's.
At 07:05 PM 3/14/02 -0700, Kevin wrote:
>I'm uploading from Linux to an IIS FTP. After the file is sent, if I
>check the byte count on the remote side and the byte count on the
Sure, any media format can be streamed over Apache. The secret is the use
of meta files. The "streaming" is a function accomplished by the client,
not the server. All the so called streaming protocols out there are just
glorified TCP/UDP data transfers with some bells and whistles thrown in. I
LOL dude! :) If u think I was calling anyone a thief u read something that
I didn't type. The idea of what is thievery or allowed use rests solely in
the mind of his customers. In this arena whatever *they* say goes. Forgive
me if I used overly colloquial meanings of steal and thief. :)
At 08
At 09:29 AM 3/19/02 +0100, Emile van Bergen wrote:
>> In this arena whatever *they* say goes.
>
>Not when we're talking about what's criminal and what's not.
Yes, that's true, but is irrelevant for his situation. His web hosts are
coming to him saying "we want X". Whatever X is, whether that's
Hey guys. I've been trying to setup samba to be a print server to Windows
clients. However I keep running into error messages and there doesn't seem
to be any place in the documentation to find out what the various errors
mean. I tried LPRng and CUPS but get basically the same thing. I've got
Like do you want to replace something in the html files, or alter their
names systematically somehow...
At 02:33 PM 7/10/02 +0200, Craig wrote:
>Hi Guys
>
>I need to do an extended find and replace for a few
>.htm files spanning a couple of subdirectories to
>change some things.
>
>Anyone have a
The "nomail" option was mentioned. I'm not familiar with that, could
someone explain how to use it? I assume it means that you are still a
member of the list but you are not in the redistibution list.
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
0100
--
To UNSUBSCRIBE
I never got a password when I signed up, which was years upon years ago.
And what is the URL? Are we even running mailman??
At 07:34 AM 7/12/02 -0400, Joe Block wrote:
>Go to the administration web page, enter your email address and the
>password you got sent when you joined the list, and you
I instantly reported him to [EMAIL PROTECTED] His account should be deleted
shortly. Mail with no stamp or return adress goes to the dead letter office
where it is opened in an attempt to find out who sent it. It is then
returned if possible, otherwise it goes to /dev/null. What you can do
thou
At 07:28 PM 3/19/00 -0800, t s a d i wrote:
>only sees numeric user ids and gids and not the corresponding name. is
>this because /etc/passwd,group was not found (bec of chrooted ftp to
Yep. For him, /etc does not exist. Stick some symlinks of any critical
files he would need in /home. /home/e
I am fairly certain that Analog can be trained to understand *any* log file
format, including custom ones, like you proposed. I think Analog is the
best or one of the best analyzers out there. The amount of customization
and detail is amazing.
+--
At 12:00 PM 3/29/00 +0200, [EMAIL PROTECTED] wrote:
>Wich one do you recomend for use with apache and separate stats for each
>domain ?
Yeah, Analog is dreamy for stats. Very customizable.
+---+
|-=I T ' S P R I N C I P L E
I think firewalls are overrated. They only do anything if there are some
*unsecured* computers on your network that need protection. It's better to
just lock down every machine, that way you're also protected from internal
attacks. Really, the only thing I think that justifies them is port
block
LOL! Oh, like trying to write to a non-existent memory location? :)
At 09:14 AM 4/6/00 +1000, Neale Banks wrote:
>2) Don't ever tell Linux that it has more memory than is really present -
>it may take time, but Bad Things (or possibly just one fatally Bad Thing)
>*will* happen.
+
At 12:31 AM 4/8/00 +1000, Doug Bean << Mr Bean's Internet >> wrote:
>My timezone is set correctly.
>I just need to sync UTC time with local time.
Set your hardware clock to GMT. Then set your timezone to GMT. Your system
will then be in a +000 offset.
+--
At 10:09 PM 4/7/00 -0600, elyograg wrote:
>have to happen is whatever body gave you the address space would have to
>actually create an entry in their server for each address - yes, 62
>entries, that delegates DNS for those addresses to your DNS server. Either
Actually, your upstream provider
At 04:27 PM 4/5/00 +, [EMAIL PROTECTED] wrote:
>Is there a program or a script which sends a info to the sender that the
email was successfully downloaded from the server by the receiver?
Hmm, I don't think so unless you can hack your POP server. You would have
to modify it so it remembered w
Speaking of the SMC cards, I ran SMC EtherEZ's 10BaseT on ISA and got some
weird behaviour from time to time. When I first set it up, things were
great. Getting 7Mbps ftp transfers. But this began to decline and then
finally flucuate. Before I turned off the network it was varying from 2-4Mbps.
At 10:50 AM 4/9/00 +1000, Doug Bean << Mr Bean's Internet >> wrote:
>UTC) when I set to GMT or any other timezone except UTC. It sort of makes no
>difference what happens I get exim sending
>with the right time or the system is the right time and exim is out by 10.
>If Exim is sending with the righ
At 02:43 PM 4/8/00 -0400, LeighK wrote:
>I don't know if you noticed this, but the transfer problems seemed to be
>one-way, outgoing. Incoming transfers occured at the proper speed, but
>outgoing was extremely slow.
As far as I can remember, it was slow both ways. Uploading to server and
download
At 05:42 PM 4/10/00 +1000, Robert Ruzbacky wrote:
>Apr 9 06:47:39 ns tcp-env[17281]: warning: /etc/hosts.allow, line 11:
can't verify hostname: gethostbyname(114.trusted.net) failed
>Apr 9 06:47:40 ns tcp-env[17281]: refused connect from 209.140.0.114
A lookup:
can't get "114.trusted.net" host e
Yeah, it's pretty much mandatory that the encoded file be encrypted and
signed. I know of programs that will email files TO you. Never heard of
one that YOU could email a file to. But I think it's definately feasible.
A simple pipe to a script should do the trick.
+-
I should also add that there will have to be some kind of time sensitivity
or other uniqueness test. Otherwise some malicious intermediary could
intercept the message and save it for a while and then resubmit it into the
mailstream. The destination would authenticate the message and old data
woul
At 08:04 AM 4/12/00 +0200, Tamas TEVESZ wrote:
> > AFAIK, the hosts.* files only affect daemons run out of inetd, not
stand-alones.
>not true. they are ued by any program which has libwrap support.
But is that enabled by default? Or is modification required. I did some
testing a while back and n
At 06:24 PM 4/14/00 -0500, J. Currey wrote:
>Well supporting gigabit Ethernet for one, and 4 100Mb sub networks
>and logging.
It would take an astonishing amount of traffic to max out the interfaces. I
don't think a PC based system could handle a fraction of what you propose.
I think you need to
Try something with cron and tcpdump. There are numerous ip accounting
programs out there. Look on the Debian package list.
+---+
|-=I T ' S P R I N C I P L E T H A T C O U N T S=- |
|=- -=ALAN KEYES
At 10:10 AM 4/19/00 +0200, Christian Jannesson wrote:
>Whats so speciall about cucipop? I use qpopper and i havent had any
>trouble with it.
It's more secure than other poppers.
+---+
|-=I T ' S P R I N C I P L E T H A T C
Hate to be off topic but I don't know where else to find this out.
Can someone in Romania give me a translation for "alternau". Along with
some semantics characterization? Thanks.
+---+
|-=I T ' S P R I N C I P L E T H A
If I had a zone file that big I'ld chop the domain up into subdomains to
spread out the DNS work. Unless you're talking about hundreds of pages, a
normal text editor should be fine.
At 10:35 PM 5/3/00 +1000, Adam Cassar wrote:
>How are isp's with large zone file entires managing their existing zo
At 01:12 AM 5/7/00 -0700, t s a d i wrote:
>Active Internet connections (w/o servers)
>Proto Recv-Q Send-Q Local Address Foreign Address State
>tcp0 39595 bangus.myphilippine:www ME21-66.i-manila.c:1520
ESTABLISHED
>tcp0201 bangus.myphilippine:www 210.2
Just use "--force-depends". It overrides package dependancies.
At 12:59 PM 5/7/00 -0600, elyograg wrote:
>How hard is it to create "fake" packages? What I'm after is this: A
>package that will "lie" to the system with a "provides: httpd" line or
>"provides: mail-transport-agent" or something
It looks like all you want is just a Linux router. A gateway joins two or
more disimilar networks, I believe. Like ethernet<->token ring or
ATM<->FDDI. Check out the following packages :
zebra
ipchains
There are other ones that I can't think of right now. :) I'm pretty sure
there is a linux r
At 11:36 AM 5/10/00 +0200, Dariush Pietrzak wrote:
>btw, why do you choose mysql? it ain't free, it ain't any good
>try Oracle, Sybase, PostgresSQl,
>they are ok, and Postgres is free
MySQL is faster and I believe easier. I doubt he would need transactions
just to log Web stats.
+
At 09:23 PM 5/11/00 +1000, Craig Sanders wrote:
>it's faster for some things, but i find it really clumsy and difficult
>to work with. postgres' psql is vastly superior to the mysql admin tool
>- and from what i hear, psql is supposed to be even better in the new
>version 7.
I was only considering
At 04:58 AM 5/13/00 +, [EMAIL PROTECTED] wrote:
>computer but i tried to send a .jpg file to my friend recently
>and i relised that it has a jpg.vbx extension. Anyone there knows what
If you have any *.jpg.vbs files on your computer it means you HAVE been
infected by the worm. U
At 10:10 AM 5/12/00 +1000, Craig Sanders wrote:
>i don't see how. apache just sends the log data out to the pipe, it
>doesn't wait for the pipe program to commit the record to the database.
>as far as delaying apache goes, it's probably less of a delay than
>writing it to a text file.
I see what y
At 07:24 PM 5/13/00 -0500, Nathan E Norman wrote:
>So what happens when you're reading the requests database and Apache
>wants to write more data? With MySQL, the table is locked and now you
>just lost data. More often, you want to read data but the writer has
>locked the table. I'd noticed this
The "database" is the table of raw data and an index. Apache can be made to
write its log file in the form of a table, via customlog. Why use a pipe
for something that Apache can do nativly? Unless you want up to the second
SQL-ified stats, just run savelog daily to rotate the logs. Now unleash
At 05:21 PM 5/15/00 -0500, Wayne Sitton wrote:
>the users can log in and access their ftp. Now what I can't seem to get
>done is to get apache to recognize that /~username goes to
>/home/username/html
Change the USERDIR directive in http.conf to point to the new location.
+
At 03:44 PM 5/15/00 -0700, Jeremy C. Reed wrote:
>My config has:
>UserDir public_html
It doesn't have to be public_html. It can be anything you want. Even
/home/username, though I wouldn't suggest that. I used .www. (NCSA tradition :)
>You should also have the mod_userdir in use.
>You may have
At 07:29 PM 5/16/00 -0400, Jeremy Hansen wrote:
>I'm a long time Red Hat user. Basically the company I'm working for is
Sorry about that. :)
>Dpkg vs RPM
RPM is a piece of crap compared to dpkg, and now we have apt (advanced
package tool). It's a handler for dpkg, but it's intelligent. The ki
I have to disagree there. I've found Debian packs to be extremely up to
date, atleast on the security end. And even on routine maintanance, the lag
is not that bad.
At 08:44 PM 5/16/00 -0700, David Lynn wrote:
>I agree - dpkg and apt are great compared to rpm's. However, that's all
>assuming th
The only real difference between stable and unstable is that unstable has up
to date packages. The only thing stable has over unstable is the track
history of "yeah all this stuff has worked together for a LONG time".
At 12:16 AM 5/17/00 -0400, Will Lowe wrote:
>Actually, unstable is usually pret
Sorry, but I was so underwhelmed by rpm's capabilities and my reaction was
so one sidedly negative that I can't describe it any other way. It is what
I typed.
At 02:55 PM 5/17/00 +0200, Wichert Akkerman wrote:
>Previously Chris Wagner wrote:
>> RPM is a piece of crap compared
I used a standard low cost IDE HP Travan tape drive using TR4 cartridges and
it worked fine. Though every once and a while it would complain and I'ld
have to take the tape out an put it back in. For non-insane applications
this would be adequate. A simple tar script run out of cron kept me alive
At 02:11 AM 5/18/00 GMT, Daniel Quinlan wrote:
> system:
> Debian 2.1
> exim 2.05-2
> qpopper 2.3-4
CuCiPOP tells you how many messages were downloaded by default. :) If that
log says 10 messages were pulled, then HE DID download 10 messages. If that
number syncs up with what exim says it de
At 09:55 PM 5/17/00 -0700, Karl M. Hegbloom wrote:
> copy everything from the master drive to the copy, then run the
> appropriate Lilo command to make that copy bootable. You can then
> mount it in another machine and it's ready to go. You have to filter
> some things out when you copy. See bel
At 04:36 PM 5/18/00 +0500, Vlad Harchev wrote:
> I think you can install NIC into machine with data (call it machine A), place
>another machine with large hdd with NIC in it near the source machine A (call
>it machine B), connect them using crosswired UTP, download data to machine B,
A laptop woul
At 09:59 AM 5/19/00 +1000, Craig Sanders wrote:
>i don't know what your laws are like in russia, but here in australia
>you can get hit with a discrimination lawsuit(*) if you don't support
Yeah, I've heard some scary things out of Australia lately. It's like
they're moving toward socialism/commu
If kickstart is a red hat package, you can install it on debian using alien.
Then you can use red hat's kickstart to install debian. :)
At 01:55 PM 5/18/00 -0400, Jeremy Hansen wrote:
>Most of the answers I've been getting on this subject seem like total
>hacks, which may work but really are trick
At 12:48 PM 5/18/00 +0200, Dariush Pietrzak wrote:
>That was the original scheme, but bosses hmmm, after some consultations
>said that we should transfer data on cd-roms with armed guardian.
>so now we've got problems, and deadlines haven't changed
>although we had no idea of those security issues
It's not too hard to find pine*.deb. Use Fast FTP Search.
At 09:54 AM 5/19/00 +0800, Sanjeev \"Ghane\" Gupta wrote:
>Because Univ of Washington doesn't allow modified tarballs to be
>distributed, and you have to modify the tarball's paths to be Debian
>compliant.
+---
At 05:25 PM 5/19/00 +1000, Craig Sanders wrote:
>to yanks, socialism is an evil, dirty word - roughly equivalent
>to satanism. but we understand why you're like that...you've been
>brainwashed with anti-socialist bullshit since you were small children.
Hahah, Satanism, that was a good one. :) But
**(If anyone *really* must reply to this, snip debian-isp)**
Craig sent me a quite funny diatribe. Seems he thinks I'm a "stupid American".
At 10:07 PM 5/23/00 +0200, Russell Coker wrote:
>ROFL. I did research, I watched a TV show! Could you indict America any
>further?
Despite the generally v
At 12:35 PM 5/23/00 +, Sergey A. Ribalchenko wrote:
>> Hahah, Satanism, that was a good one. :) But I still prefer individualism
>> to socialism.^^
>m.b. you missed, did you mean onanism?
Ok, I don't really know what you mean?
+---
Each tty has an options file. The server side and client side ips are
assigned in there.
+---+
|-=I T ' S P R I N C I P L E T H A T C O U N T S=- |
|=- -=ALAN KEYES FOR PRESIDENT=- -=
At 11:17 AM 5/23/00 +0200, I. Forbes wrote:
>Question: Is'nt there a deb package with scripts for creating boot
>disks? I feel I should not be reinventing the wheel.
There is, but I can't remember the name. :)
+---+
|-=I T
Changing mail clients won't make a difference. Just tell him what you
found, that everything went out that came in. Then tell him to look to the
sender, because there's a five nine probability that she's screwing up and
nuking messages.
At 05:02 PM 5/25/00 +1000, Daniel Quinlan wrote:
>after a w
At 10:57 PM 5/25/00 +0200, Russell Coker wrote:
>On Wed, 24 May 2000, Chris Wagner wrote:
>>**(If anyone *really* must reply to this, snip debian-isp)**
^^^
I guess you didn't
At 05:42 AM 5/24/00 +, Sergey A. Ribalchenko wrote:
>> >> Hahah, Satanism, that was a good one. :) But I still prefer individualism
>> >> to socialism.^^
>> >m.b. you missed, did you mean onanism?
>> Ok, I don't really know what you mean?
Hi. Sorry to jump in this thread late. But it looks like your upstream
fried your DNS entries. I'ld strongly recommend you update your InterNIC
records to point to DNS servers that *you* control, not anyone else.
Because as you just found out, when DNS screwups occur, they take a lot of
stuff wi
At 08:32 PM 5/28/00 -0500, Security wrote:
>The finger gateway script came in the cgi scripts with Debian. I just
>changed finger to whois. seems to work well.
I think what he wants is a server that does what InterNIC does. Answer
whois type database queries issued from the whois program. I don'
Hola. What is the official name of the type of connection that the common
network protocols use? It lives somewhere above the tcp layer and below the
app layer but is so obscure that I can't find it. e.g. Telnet, ftp, http,
etc. all establish an x type connection and then transmit their dat
At 10:48 PM 6/16/00 -0500, Sanjeev Gupta wrote:
>Sockets? Butyou would definitely have seen this more than a couple of
>times.
No, not sockets, sockets are way down on the stack. This is the protocol
that says what the octets mean and do. It's the common thread among all the
high level protocol
At 12:24 AM 6/17/00 -0500, Kain wrote:
>What I think you're thinking of is just IP. You probably haven't been seeing
Definately not IP, IP just gets your packets there and back.
>Now, if you actually mean "what octets mean and do", those are actually
defined higher than TCP, and are laid out i
At 12:50 AM 6/19/00 +0200, Russell Coker wrote:
>It is called TCP - Transmission Control Protocol. RFC793.
I'm starting to conclude that it's just called a "tcp connection". But I'm
still reading through the RFC... It was written in 1983 and for whatever
reason it seems to use the term socket a
At 02:25 PM 6/20/00 +0200, Russell Coker wrote:
>They don't use NVT. The TELNET protocol is not running on (for example) a
>web server.
Yeah but the NVT settings have to be negotiated for each side to talk to
each other. If I telnet to an Apache webserver on port 80, my telnet is
going to negoti
I'ld recommend Cucipop due to it's security record. That's what I use.
Just don't look at the source code. :)
At 10:03 PM 6/26/00 +0200, Dariush Pietrzak wrote:
>Hello,
>which packaged with debian pop3d would you people recommend?
> which one do you use?
+---
Ok, ok, I'm late as hell but I had to reply. :) You don't need SCSI unless
you're doing something fancy or insane. Giving Apache more RAM is *vastly*
better than giving it SCSI. The RAM lets you cache everything so the hard
disk becomes not very important for I/O. Max out your motherboard's RAM
At 10:47 AM 7/5/00 +0200, Javier Castillo wrote:
> which list manager do you recommend me?, easy to admin, fast, and of
>course, gnu :))
Who says you can only use GNU software? Don't limit yourself to GNU, use
any software that has a "free" license you find acceptable.
+--
At 08:45 PM 7/5/00 -0400, Allen Ahoffman wrote:
>1. Terminal server for connecting one box to many serial devices such as
> routers, switches, other terminal servers for serial connectivity
>when network is down.
The Comtrol Rocketport board is very nice. You can put up to 128 serial
ports
Sounds like the 2nd NIC isn't fully turned on. Is everything the way it
should be in ifconfig? Have you tried binding any other daemons to the 2nd
NIC? I also think you'll need ip based vhosts in Apache to make it listen
to a 2nd NIC.
The second NIC should be on a different subnet, otherwise ha
1 - 100 of 245 matches
Mail list logo