You can try running fsck and badblocks to attempt to fix the errors. But
I've never had luck with either of those tools on a drive that was dieing.
If the errors remain, there's a 99% probability the drive is bad.
At 11:54 PM 7/10/00 -0400, JoeCool wrote:
>Hi,
>
>I'm getting some Input/Output err
Heheh, there is NO WAY in HELL I would run wdc on an ext2 partition. :)
At 09:59 PM 7/11/00 -0600, John Gonzalez/netMDC admin wrote:
>Depending on the mfgr of the drive, you should be able to boot off a
>floppy and run a utility to 'check' the drive for errors.
>
>WD has this and requires some use
WD is bad, they're a bad bad company. Anyone who has a WD drive in their
server should take it out and THROW IT AWAY. I don't trust wdc as far as I
can decompile it. On any file system.
At 10:39 PM 7/11/00 -0600, John Gonzalez/netMDC admin wrote:
>
>Huh? Western Digitals drive test utility will
At 11:27 PM 7/11/00 -0600, [EMAIL PROTECTED] wrote:
>How does one decompile a hard drive? With a hammer?
Wdc is a diagnostic program that "fixes" your WD drive.
>I could be wrong, but I highly recommend Western Digital EIDE drives.
I've had nothing but bad (truly horrible - 100% data loss) exper
The default precompiled kernels come with IDE support.
At 12:02 PM 7/13/00 +1200, Daniel Free wrote:
>Yes debian does, well actualy thats not strictly true.
+---+
| -=H E L L - J U S T D O N ' T V O T E F O R G O R E=- |
At 09:55 PM 7/12/00 +0200, =?iso-8859-1?Q?=C1ts?= Attila wrote:
>Then how could I upload files? Should I create a user with
>rights to specific directories?
Yes. Ftp'ing as root is a bad bad thing. Create an admin account that has
access to ONLY the areas you want to ftp files to.
+---
At 02:59 AM 7/13/00 +0200, Tamas TEVESZ wrote:
>have my hpt366 working with any of the default precompiled kernels
>please.
I don't understand this sentence.
>he was referring to _udma66_ drives and controllers.
Um, he wrote:
>does Debian or any Linux support ATA-66 disks? If yes,
>do I need any
At 01:44 PM 7/14/00 -0700, Kevin wrote:
>When our customers dial-in, and they run winipcfg in 98 it shows that
>their subnet is 255.0.0.0. Recently a customer complained that this
>was degrading their performance. I've tried some other isps to see
>what happens on theirs and its about 50/50 with
Just use group permissions. Put each user in their own group. Take away
world access. chmod w-rwx *
At 03:11 PM 7/18/00 -0500, John F. Davis wrote:
>hello
>
>How do you limit the area which a user can go with ftp?
>i.e, when user ftp's to my server, how do I keep him in
>his portion of the file
Blow away the partition and recreate it. If that doesn't work, try to
format it as ext2 to see if there is a disk defect. You'll then be able to
run fsck. Badblocks might also give you some useful info.
At 05:01 PM 8/1/00 -0700, Kevin wrote:
> swap_free: swap-space map bad (entry 011d1000)
>
Interesting. Have you ever had a problem with people spoofing MAC addresses
to get IP's? How does your system react if more than one host presents a
request for an IP if that MAC has already been assigned an IP? Seems like
if they're going to the trouble to give you the MAC address you might as
At 10:51 AM 9/5/00 -0500, [EMAIL PROTECTED] wrote:
>sites of users that I have on the machine (i.e- ~debian-isp). I was
>wondering how they are finding out which users that I have on the machine
>and was wondering if I could be running services that pose a security
>problem. I only have the followi
At 11:33 AM 9/13/00 -0600, Nathan wrote:
>What ping of death attacks?
>
>The only ones I have heard of, were fixed with kernel patches seriously
>quick after they came out.
Maybe he means ping floods? Pings of death usually will crash a box after a
few packets hit it. As you said Debian is good
They seem to work ok for me in Windows, with IE and Netscape. Haven't tried
it under unix.
At 09:54 PM 2/27/01 -0300, [EMAIL PROTECTED] wrote:
>
>Hi there
>
>The Fck iexplorer do not to work properly with the .pac files for me.
>
>When the pac file tell the browser to connect directly fo
So, what happened to sendmail? How did it earn it's fall from grace? When
I got into it, sendmail was it. I've never looked closely at the mail
system since.
---==---
___/``\___
0100
Marc, flames to /dev/nul please.
At 12:25 PM 4/9/01 +0200, Marc Haber wrote:
>195.179.172.30 looks like a backbone router of ISION Internet in
>Hamburg, as you could have found out yourself by doing a reverse DNS
>lookup. That router is trying to tell you that a packet your machine
>has sent out w
At 04:56 PM 4/5/01 +0200, Alson van der Meulen wrote:
>I don't think transproxy will handle such a load quite well, but you
>can try and find out :)
You might want to try a hardware based balancer. Something like Local Director.
---==---
___/``\___
0100
Another way to accomplish that would be a Cisco router set to trunking.
Evenly dividing the traffic flow to two servers.
At 10:15 PM 4/11/01 -0400, Chris Wagner wrote:
>At 04:56 PM 4/5/01 +0200, Alson van der Meulen wrote:
>>I don't think transproxy will handle such a load quite
The better way is to block it at the router. Once you figure it out,
blocking subnets is trivial and much more resource effective than having
your firewall do it. Read your router's documention about ACL's, access
control lists.
At 08:37 AM 4/16/01 -0400, Peter Billson wrote:
> You need to *qu
But why does that occur?
At 12:27 PM 4/24/01 -0700, Mike Fedyk wrote:
>On Tue, Apr 24, 2001 at 10:43:42AM -0400, Haim Dimermanas wrote:
>>
>> > My problem is the following : the master sends NOTIFY request to the
>> > slaves for that zone every 8 seconds (sometimes 10 sec, sometimes 4
>> > sec)
At 06:48 PM 4/30/01 -0400, [EMAIL PROTECTED] wrote:
>Ok. I'm the original poster and what i want is:
>
>Mails with a NULL sender with an invalid recipient get bounced to the
>email address of any Header that happen to exists.
>
>And if the recipient doesn't exists and there is no way to bounce then
At 07:27 AM 5/21/01 +0200, Robert Waldner wrote:
>On Mon, 21 May 2001 13:46:14 +1000, Jeremy Lunn writes:
>>I know this isn't Debian specific. But I'm just wondering if it's fine
>>to route routable IP addresses over non-routable IP addresess.
>
>Yes, although many would consider it bad practice (
At 08:00 AM 5/22/01 +0200, Robert Waldner wrote:
>
>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>We should probably clarify "non-routable" by saying "non-publicly routable".
>
>Well, we could also say RFC1918, couldn´t we ;-?
LOL
>- DNS,
far as I can see there's more than
enough left for decades to come.
At 09:28 PM 6/1/01 +0200, Marc Haber wrote:
>On Tue, 22 May 2001 08:00:01 +0200, Robert Waldner
><[EMAIL PROTECTED]> wrote:
>>On Tue, 22 May 2001 01:26:56 EDT, Chris Wagner writes:
>>>We should pr
I'm sorry, but ROFLMAO!!!
At 05:18 PM 6/3/01 +0200, Przemyslaw Wegrzyn wrote:
>
>
>On Sat, 2 Jun 2001, Craig Sanders wrote:
>
>> On Wed, May 30, 2001 at 09:41:54PM +0200, Przemyslaw Wegrzyn wrote:
>> > Anyway, my problem seems to be hardware:
>> >
>> > [EMAIL PROTECTED]:~$ more /proc/misc
>> > Se
A while back, AT&T had a publicly accessible router for doing route lookups
and stuff like that. It supposedly knew about the whole world. The special
thing about this router was that you didn't need a user name or password to
log on with. It just gave you the IOS prompt. I haven't been on this
Revisiting traceroute.org, I see that they have a whole list of route
servers. :)
At 01:09 PM 6/27/01 +0200, Russell Coker wrote:
>Here's a machine that used to provide such a service, not sure if it
>still does:
>
>route-views.oregon-ix.net
---==---
___/``\___
My first choice is also what the other Chris said, use a large LART on the
offending [computer|user]. You can use smart switches to base the ip on
pre-authorized MAC addresses. That way you are effectivly shaping based on
MAC address. But in true hacker form, even that can be overcome. Some
(mo
One possible way to defeat this would be to use those metal "security
chains" that they use to keep people from carrying off computers. Use a
very short one, about 2" long. Affix one side to the computer case, and the
other to the ethernet cable. Now, even this can be overcome if the crafty
hack
That is a function of the bios. Some support it, some don't. Either your
bios's don't support it (my suspicion) or shutdown isn't sending the signal.
'man shutdown' might have some useful insight. I'ld also call the
motherboard manufacturer to make sure they support self power off. Also
check t
The best way would be to block it at your router with an access list.
Blocking it at the box is ok too but that takes a little bit of your
resources. And you have to do it on each box on your network you want
protected. The router block will protect your entire network in one fell
swoop and cost
You should be able to tell if it cares about robots.txt by looking in the
logs to see if it's downloading /robots.txt. If it is then something like:
User-agent: LinkWalker
Disallow: /
will keep it off your site. If it doesn't, then iptables will keep it away.
Robots info:
http://www.global-posit
Bwahahaha!! Man, that is low. Advertising to sysadmins through the access
logs Sheesh. But now that you mention 7-24, I think I recognize that.
I think they are a spam marketing outfit.
At 02:31 PM 1/7/02 -0800, Nathan Strom wrote:
>Personally, I think this is a rogue organization -- there
Purtroppo nè Netscape nè lo IE è molto stabile. Opera è Mozilla sono altri
quei unici di che sappia. Potete spegnere sempre appena il Javascript. :)
Forse il vostro sistema e instabile.
At 07:37 PM 1/8/02 +0100, [EMAIL PROTECTED] wrote:
>cosa usate voi per navigare in internet senza problemi ? (
Well, the rationale behind this is as you touched on, preventing spoofed
address attacks. A paranoid lookup essentially verifies that the connecting
system is a known legit host. In effect you're using your DNS system as
another level of authentication. Say somebody wants to covertly log on or
a
At 10:01 PM 1/10/02 -0600, Nathan E Norman wrote:
>Congratulations ... you just set up your DNS incorrectly. Every PTR
>entry should resolve to a _unique_ name, and that name should resolve
>to a _unique_ IP. That doesn't mean you can't have additional A
>records doing load balancing.
To give a
At 04:22 AM 1/11/02 +0100, martin f krafft wrote:
>a bogus IP won't even make it past OSI layer 4 on debian... rp_filter...
There are ways of doing it such that the box has NO WAY of knowing that the
traffic is spoofed. Granted, that is hard to do. Even paranoid lookups can
be overcome. But it'
At 06:01 AM 1/11/02 +0100, martin f krafft wrote:
>okay, why libwrap then?
Once the network is compromised, it makes no difference what's on the box.
If done properly, the compromised network is indistinguishable from the
uncompromised network. That box is totally on it's own. :)
>/29, although
You can make 3 predefined directories for each customer that they can't
delete. One htdocs, logs, and "stuff" or something, for them to put all the
non web accessible stuff in.
Another thing you can do is create a wrapper script for the Apache startup
that checks for the existence of all the esse
Like do you want to replace something in the html files, or alter their
names systematically somehow...
At 02:33 PM 7/10/02 +0200, Craig wrote:
>Hi Guys
>
>I need to do an extended find and replace for a few
>.htm files spanning a couple of subdirectories to
>change some things.
>
>Anyone have a q
The "nomail" option was mentioned. I'm not familiar with that, could
someone explain how to use it? I assume it means that you are still a
member of the list but you are not in the redistibution list.
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
0100
--
To UNSUBSCRIBE,
I never got a password when I signed up, which was years upon years ago.
And what is the URL? Are we even running mailman??
At 07:34 AM 7/12/02 -0400, Joe Block wrote:
>Go to the administration web page, enter your email address and the
>password you got sent when you joined the list, and you c
Occasionally subscriber bounce messages get reflected back to the entire list.
At 06:46 PM 7/25/02 -0400, Jeremy May wrote:
>i got this when mailing debian-testing@lists.debian.org
>
>
>
>
>No such user: [EMAIL PROTECTED]
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
"...ne cede
I think I hear the need for a mySQL enabled mailbox system/mail reader. ;-)
At 01:27 AM 8/3/02 +0100, Phillip Baker wrote:
>Yes, but having a long wait when opening your folder a couple of times a
>year
>because you've been away on vacation is another thing entirely to willingly
>subjecting yours
Actually this is a very common problem. Either mysql doesn't know about a
user called "debian-sys-maint" or it doesn't have localhost permission.
Mysql has it's own user db independant of the system. You'll need to go
into mysql command prompt as root and do a GRANT to create debian-sys-maint
and
But does a PTR record exist? The double reverse lookup should succeed so
long as there is a valid A <-> PTR pair. Regardless of whether it was
launched into from another A or CNAME or IP. Unless I'm way off base here,
it goes presented name -> IP lookup -> PTR lookup -> IP lookup. If the two
IP
Ah yes, that's right I remember now. This is exactly the kind of situation
as to why you shouldn't use CNAME's for MX names or for any official machine
name for that matter. CNAME's are just for human convenience, a host should
never try to pass itself off by one. Screws up the double reverse lo
I can tell you why the purge worked. It destroyed your corrupted MySQL user
database. :)
At 04:42 PM 7/08/03 -0600, David Wilk wrote:
>Howdy all, just wanted to say what worked. Dominik's suggestion to
>'purge' the mysql packages with apt-get did the trick. One final
>reinstall had everything w
At 01:34 PM 8/18/03 +0200, Petrisor Marian wrote:
>So I have to setup a proxy on my PC that I will go through rather than
going directly through my ISP's proxy?
>
>I mean the net will be like:
>
>PC - MYProxy - ISP's Proxy - Internet ?
Yeah. But I don't think I fully understand how this serpentin
You just can't connect or the daemon doesn't run at all? Is the process
running? What does the access/error log say? Did you create a mysql user
with network privledges?
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
"...ne cede males"
0100
--
To UNSUBSCRIBE, email to
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
"...ne cede males"
0100
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Do you mean that you want to send a backup (i.e. tarball) to the remote
storage or do you mean that you want to keep a live synchronized copy
(rsync) on the remote storage? The former is easier and will probably give
u everything u want. I don't really see any need for an rsync unless you
want so
I can tell you some stuff about that right now. CGI.pm is just a quick and
dirty module that will save on some typing in your perl script. Emphasis on
some. If you're doing anything more than basic html tags it quickly becomes
not worth it anymore. Writing tag attributes takes up more time and
Heheh, nah no flamewar. Everything you said was strictly speaking true.
But at this stage style sheets are like giving a random person off the
street a loaded gun. Style sheets can be used to great effect but just be
sure u truly know what ur doing. And do testing testing testing. A good
regimi
Ah, "together". Well there's nothing that I know of that would cause a
problem simply by virtue of them being used together. CGI.pm is nothing
more than html shorthand so that can't really interfere with anything else,
unless there's some bug that spits out bad code. They're pretty much self
con
Speaking of templates have you considered PHP? I would consider that the
ultimate template system and the ultimate customization vehicle. Instead of
relying on unreliable client side interpretation of style sheets and
javascript you have a controllable environment on the server side. Think
about
While flaming off topic posts is appropriate, flaming religion is not. By
posting ur own rant u are now guilty of the same off topic violation as the
original poster. It is clear from the tone of your post that you've been
chomping at the bit for a while to write such a religion based rant. You
At 12:37 AM 2/5/04 +1100, [EMAIL PROTECTED] wrote:
>On Wed, 4 Feb 2004 23:43, "brinderpurwaha" <[EMAIL PROTECTED]> wrote:
>> on the chat room whenever i try to access mine or someone else profiles i
>> get a screen saying this user is not avaible on this url. this is always
>> occuring on every occ
Can you tell some more about the hard drive/ controller/ driver setup? My
first guess is a driver or cacheing issue. What is the commonality between
the 1-way and 2-way systems? Do you have a host that u've *not* seen this on.
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
".
Hmm, that's a sticky widget. Have you tried any other HD benchmarks and
gotten similar results? I think we need that to narrow it down to either a
Bonnie or hardware issue. It could be that some of ur disks are preparing
to die. I have seen that before, a disk that's getting flaky will do
stran
Well I'ld call that divine sanction for Debian if there ever was one! We
should put that one on the flyer!
At 06:57 PM 3/24/04 +1100, Tarragon Allen wrote:
>On Wed, 24 Mar 2004 06:36 pm, Comcast Mail wrote:
>> well... I am confused...I typed "Jesus help me live" & got a website..
>> I only
I have to concur that we finally have to make this a restricted access list.
It's not that big a deal for a newb to have to sign up to ask their
question. However, remember that will do no good for the virus spam that can
come from subscribed people's accounts.
--
REMEMBER THE WORLD TRADE CENTE
14MB per session? I haven't admined email for a while so I may be out of
touch, but it seems like that server should be able to process gigantic
volumes of mail. Not just "a lot" or even "really a lot". What mail setup
is it running? Throttling connections is the right way to go though.
Spoolin
At 04:56 PM 5/29/04 +1000, [EMAIL PROTECTED] wrote:
> There's plans to do so. We've been stopped from doing this as
>we'd need a different configuration file on spamassassin for every
>list, and that represents a lot of duplicated work.
I don't think looking at a language header will do any
An auto-responder has no way of knowing who or what emailed it. How can u
blame him for some spammer emailing it using ur address as a source? It
seems like the only recourse is to try to find out who or what was using ur
address and blow that person off the net.
At 02:52 PM 6/16/04 +1000, [EMAI
The only thing I will grant is that it should only respond once to each
email address. Responding repeatedly to the same person is useless and
potentially annoying. With all due respect Russell should've suggested that
from the get go instead of the bland "quit" message. ;)
At 11:58 PM 6/15/04
That indicates an unquoted string, apparently on line 184. That buglet has
apparently been fixed; or u can look in the file urself and fix the quotes.
At 06:10 PM 6/17/04 +0200, =?iso-8859-1?q?Carlos=20L.M.?= wrote:
>Bareword "DB_AUTO_COMMIT" not allowed while "strict
>subs" in use at /usr/sbin/p
The only problem with tripwire is that u have to set up the snapshot file on
write protected media to have true security. If somebody hacks ur box they
can just reupdate tripwire themselves and u'll be none the wiser. This can
be an administrative hassle to update the snapshot and move it to some
At 06:55 PM 8/9/04 -0600, Nate Duehr wrote:
>Tripwire bills itself as a defensive tool, but if tripwire alerts are
>going off, it's FAR too late. Better to keep untrusted people out in
>the first place. Most people spend the majority of their security
>efforts on that first.
Yes. Tripwire et
At 03:35 PM 9/6/04 +0200, Adrian 'Dagurashibanipal' von Bidder wrote:
>For writing, RAID5 tends to be noticeably slower than RAID1, especially for
>writes smaller than stripe size, because a write actually is a
>read-recompute-write cycle.
If ur looking for a fast RAID product that's reasonabl
At 08:07 PM 9/7/04 +0800, Jason Lim wrote:
>> "Currently only supports Windows XP, 2000, & 2003
>I'm guessing since it is completely OS transparent it should work... not
>that I have used it.
>
>I have been wondering about the merits of using OS-transparent RAID
>solutions as that would allow eas
I would say that RAID 5 is probably overkill for a mail queue. Unless ur
mail queue is running hundreds of gigabytes and overloading a single disk, a
normal single hard drive is sufficient. Based on ur graph it looks like ur
queue is under half a gig. If you want redundancy for the mail queue the
Ah, ok that changes everything. "mailboxes" ;)
At 12:30 AM 11/11/04 +0100, Marcin Owsiany wrote:
>> If u still need RAID 5 then I would make the stripe size equal to
>> average file size / number of data disks up to no more than 32KB stripe.
>
>Since avg file size would be something around 2500
Oh yeah ur right. :) The file system itself is written in the stripes and
stripe boundaries don't have to correspond to cluster boundaries although I
think this would be advantageous. 1 cluster -> 1 stripe would be the
optimum speed configuration I think.
--
To UNSUBSCRIBE, email to [EMA
No, that would be fine, as long as u had an index for the commonly accessed
columns. You would need millions of rows to see a performance hit even on a
slow system.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
You can also do it by mounting the share with samba as part of the regular
file system. Then it's just another directory under the document root (or
alias). If u ask me this is safer than using smbwebclient because I
wouldn't trust giving random people free reign into the NT environment. As
an a
Sure it's feasible, I've done it. Actually these are all good reasons *to*
do it this way. U retain more control over who can see what. Call me
paranoid. Not knocking smbwebclient, this is just more locked-down.
At 09:50 AM 12/27/04 +0100, Leonardo Boselli wrote:
>This is not feasible for th
At 12:44 PM 2/26/00 -0700, Nate Duehr wrote:
>You don't have to have your own IP space from ARIN to have another ISP
>route your /24. BGP handles this fine. Just negotiate with the second
I know that can be done but what is the minimum block size ISP's will route?
I've heard of some nationals no
At 11:00 AM 3/1/00 -0800, Sis wrote:
> Maybe i'm being really naive. Maybe my estimate of the size of the
>project is crazy? Maybe this is more of an invasion of privacy then i can
>think of? Any thoughts on this?
Heh, not nearly as big as the [EMAIL PROTECTED] thing or the RC5 cracking
progra
At 01:44 PM 3/2/00 +0100, Michael Koehne wrote:
> The most drastic method is "mudslicking" providers of foreign countries.
> IMHO mudslicking is the most effective method to counter SPAM.
This something you do NOT want to be on the wrong side of. IMHO spam is not
a serious enough offense to war
At 11:08 AM 3/2/00 +0200, I. Forbes wrote:
>To give you an idea of the scope of the problem we have received
>about eleven thousand bounces with the same forged address over
>the last month. All of the Spam was launced from AOL, and relayed
>using a whole list of open relays - many in Eastern E
At 08:14 PM 3/6/00 -0800, t s a d i wrote:
> Mar 7 12:00:52 bangus in.qpopper[994]: connect from 208.232.225.113
>someone help me on what should i do so that i will know what was the
>username of that someone who connectec to the pop3 service ?
The popper program you use decides what to write t
Do you have AUTOPPP enabled for mgetty?
At 11:13 PM 3/5/00 -0500, Chuck Peters wrote:
+---+
|-=I T ' S P R I N C I P L E T H A T C O U N T S=- |
|=- -=ALAN KEYES FOR PRESIDENT=- -=|
|
At 02:20 AM 3/7/00 -0800, t s a d i wrote:
>is, is it OK if the DNS server registered on InterNic as authoricative
>is not a master but just a slave w/c depends on its data from an
>external/different DNS server ?
As long as the servers listed by InterNIC give out correct DNS info, it
shouldn't ma
Ahh, the wonderful mgetty/ppp/pam interoperability issue revisted.
Unfortunately, the only way to get these programs to work together is
through some kludging and hacking. Trial and error. Good luck. Hopefully
in soon to be released versions they will work properly out of the box.
Does anybody k
What precisely is the TTL when it comes to pings? And what do you mean by
"open DNS"?
At 01:24 AM 3/9/00 +0100, Paul van Empelen wrote:
>I think you're right that it is their end. The TTL is very low, so they
>probably screwed up something. I did some pinging as well. Glad that
>they left their
At 08:33 PM 3/9/00 +0100, Paul van Empelen wrote:
>Ping will show you the TTL of the returning icmp packet. I can't tell you
>exactly what the TTL does on the iron where the ping packet will bounce.
So each host implements it's own time-to-live for it's ICMP packets? I take
it that's the maximum
At 11:41 PM 3/9/00 +0100, Paul van Empelen wrote:
>Time to live has nothing to do with time, although the name suggests it.
>It is a hop count. You start at e.g. 255. On the next hop the IP packet
>will have a ttl of 254 and so on.
So it's really a max hops limit. How did it get a name like TTL??
At 08:52 PM 3/10/00 GMT, [EMAIL PROTECTED] wrote:
>Directory /home/mydavao.com/www/cgi-bin/
>AllowOverride None
>Options ExecCGI FollowSymLinks
>
I believe that should start off as . Don't remember if the dir
should be inside or outside the <>'s.
You should also make the
Actually this is a very common problem. Either mysql doesn't know about a
user called "debian-sys-maint" or it doesn't have localhost permission.
Mysql has it's own user db independant of the system. You'll need to go
into mysql command prompt as root and do a GRANT to create debian-sys-maint
and
But does a PTR record exist? The double reverse lookup should succeed so
long as there is a valid A <-> PTR pair. Regardless of whether it was
launched into from another A or CNAME or IP. Unless I'm way off base here,
it goes presented name -> IP lookup -> PTR lookup -> IP lookup. If the two
IP
Ah yes, that's right I remember now. This is exactly the kind of situation
as to why you shouldn't use CNAME's for MX names or for any official machine
name for that matter. CNAME's are just for human convenience, a host should
never try to pass itself off by one. Screws up the double reverse lo
I can tell you why the purge worked. It destroyed your corrupted MySQL user
database. :)
At 04:42 PM 7/08/03 -0600, David Wilk wrote:
>Howdy all, just wanted to say what worked. Dominik's suggestion to
>'purge' the mysql packages with apt-get did the trick. One final
>reinstall had everything w
--
REMEMBER THE WORLD TRADE CENTER ---=< WTC 911 >=--
"...ne cede males"
0100
Do you mean that you want to send a backup (i.e. tarball) to the remote
storage or do you mean that you want to keep a live synchronized copy
(rsync) on the remote storage? The former is easier and will probably give
u everything u want. I don't really see any need for an rsync unless you
want so
I can tell you some stuff about that right now. CGI.pm is just a quick and
dirty module that will save on some typing in your perl script. Emphasis on
some. If you're doing anything more than basic html tags it quickly becomes
not worth it anymore. Writing tag attributes takes up more time and
Heheh, nah no flamewar. Everything you said was strictly speaking true.
But at this stage style sheets are like giving a random person off the
street a loaded gun. Style sheets can be used to great effect but just be
sure u truly know what ur doing. And do testing testing testing. A good
regimi
Ah, "together". Well there's nothing that I know of that would cause a
problem simply by virtue of them being used together. CGI.pm is nothing
more than html shorthand so that can't really interfere with anything else,
unless there's some bug that spits out bad code. They're pretty much self
con
Speaking of templates have you considered PHP? I would consider that the
ultimate template system and the ultimate customization vehicle. Instead of
relying on unreliable client side interpretation of style sheets and
javascript you have a controllable environment on the server side. Think
about
While flaming off topic posts is appropriate, flaming religion is not. By
posting ur own rant u are now guilty of the same off topic violation as the
original poster. It is clear from the tone of your post that you've been
chomping at the bit for a while to write such a religion based rant. You
101 - 200 of 245 matches
Mail list logo