Virtual Networking between Debian and Microsoft Windows systems

2001-09-08 Thread emailaddy
Virtual Networking between Debian and Microsoft Windows systems First of all, I'm not really looking for a detailed HOW-TO on how I could build this system, although if there is such a thing I will gladly read it. I'm mainly seeking discussion on the various methods of implementing this system an

Virtual Networking between Debian and Microsoft Windows systems

2001-09-08 Thread emailaddy
Virtual Networking between Debian and Microsoft Windows systems First of all, I'm not really looking for a detailed HOW-TO on how I could build this system, although if there is such a thing I will gladly read it. I'm mainly seeking discussion on the various methods of implementing this system a

Re: Bash scripting info needed.

2001-09-08 Thread Stefan Srdic
Thor wrote: Hi I'm not sure I understand you correctly, but how about this: ## 0 == LOG ## 1 == DROP ## 2 == LOG & DROP LOGTCP=2; if [ $LOGTCP -eq 0 ]; then #Log forbidden TCP datagrams iptables -A TCP --protocol tcp -m limit --limit 1/minute \ --limit-burst 4 -j LOG --log-level DE

Re: Bash scripting info needed.

2001-09-08 Thread Stefan Srdic
Thor wrote: >Hi > > >>I'm not sure I understand you correctly, but how about this: >> >>## 0 == LOG >>## 1 == DROP >>## 2 == LOG & DROP >>LOGTCP=2; >>if [ $LOGTCP -eq 0 ]; then >>#Log forbidden TCP datagrams >>iptables -A TCP --protocol tcp -m limit --limit 1/minute \ >> --limit-burst

Re: What about doing security updates automatically?

2001-09-08 Thread Bryan Andersen
On the question: What about doing security updates automatically? I don't know about the rest of you, but here is my opinion... As a sysadmin, programmer, jack of to many trades I maintain a number of systems under a number of different operating systems. As such I have to keep track of b

Re: Controlling the network throughput

2001-09-08 Thread Charl Matthee
On Fri Sep 07 2001 at 02:14:05PM +0200 'Marcin Krotkiewski' <[EMAIL PROTECTED]> wrote: > I'm quite aware this post is somewhat off-topic, but I couldn't find a > proper list. Still I hope someone will be able to help me. You should rather try the linux-net list. $ echo subscribe linux-net | m

Controlling the network throughput

2001-09-08 Thread Marcin Krotkiewski
hi, I'm quite aware this post is somewhat off-topic, but I couldn't find a proper list. Still I hope someone will be able to help me. And here is the problem... How can I divide my network throughput between the users (not necessarily evenly)? I would like to limit the maximum speed with which s

Re: What about doing security updates automatically?

2001-09-08 Thread Bryan Andersen
On the question: What about doing security updates automatically? I don't know about the rest of you, but here is my opinion... As a sysadmin, programmer, jack of to many trades I maintain a number of systems under a number of different operating systems. As such I have to keep track of

Re: Controlling the network throughput

2001-09-08 Thread Charl Matthee
On Fri Sep 07 2001 at 02:14:05PM +0200 'Marcin Krotkiewski' <[EMAIL PROTECTED]> wrote: > I'm quite aware this post is somewhat off-topic, but I couldn't find a > proper list. Still I hope someone will be able to help me. You should rather try the linux-net list. $ echo subscribe linux-net | m

Controlling the network throughput

2001-09-08 Thread Marcin Krotkiewski
hi, I'm quite aware this post is somewhat off-topic, but I couldn't find a proper list. Still I hope someone will be able to help me. And here is the problem... How can I divide my network throughput between the users (not necessarily evenly)? I would like to limit the maximum speed with which s

Re: Bash scripting info needed.

2001-09-08 Thread Thor
Hi > I'm not sure I understand you correctly, but how about this: > > ## 0 == LOG > ## 1 == DROP > ## 2 == LOG & DROP > LOGTCP=2; > if [ $LOGTCP -eq 0 ]; then > #Log forbidden TCP datagrams > iptables -A TCP --protocol tcp -m limit --limit 1/minute \ > --limit-burst 4 -j LOG --log-le

RE: Bash scripting info needed.

2001-09-08 Thread James Morton
I'm not sure I understand you correctly, but how about this: ## 0 == LOG ## 1 == DROP ## 2 == LOG & DROP LOGTCP=2; if [ $LOGTCP -eq 0 ]; then #Log forbidden TCP datagrams iptables -A TCP --protocol tcp -m limit --limit 1/minute \ --limit-burst 4 -j LOG --log-level DEBUG --log-prefix '

Re: Bash scripting info needed.

2001-09-08 Thread Thor
Hi > I'm not sure I understand you correctly, but how about this: > > ## 0 == LOG > ## 1 == DROP > ## 2 == LOG & DROP > LOGTCP=2; > if [ $LOGTCP -eq 0 ]; then > #Log forbidden TCP datagrams > iptables -A TCP --protocol tcp -m limit --limit 1/minute \ > --limit-burst 4 -j LOG --log-l

Bash scripting info needed.

2001-09-08 Thread Stefan Srdic
Hi, Once again I've re-written my firewall script. Only this time I've attempted to make use of a few loops and if statements to make my script prettier. I have no formal education in programming at all!! Please be patient with me :-D For reference I have been using some of the well writte

RE: Bash scripting info needed.

2001-09-08 Thread James Morton
I'm not sure I understand you correctly, but how about this: ## 0 == LOG ## 1 == DROP ## 2 == LOG & DROP LOGTCP=2; if [ $LOGTCP -eq 0 ]; then #Log forbidden TCP datagrams iptables -A TCP --protocol tcp -m limit --limit 1/minute \ --limit-burst 4 -j LOG --log-level DEBUG --log-prefix