On Mon, Sep 10, 2001 at 01:34:17PM +0100, Ricardo B wrote:
> "Your theory is nuts! But not enough to be true!" (Niels Bohr)
We are all agreed that your theory is crazy. The question which
divides us is whether it is crazy enough to have a chance of being
correct. My own feeling is that it is not
On Mon, Sep 10, 2001 at 01:34:17PM +0100, Ricardo B wrote:
> "Your theory is nuts! But not enough to be true!" (Niels Bohr)
We are all agreed that your theory is crazy. The question which
divides us is whether it is crazy enough to have a chance of being
correct. My own feeling is that it is no
On Sat, 8 Sep 2001, Stefan Srdic wrote:
>
> Are there any books on bash scripting that any of you would recomemd? I
> have browsed through the Advanced BASH scrypting HOW-TO over at
> Linuxdoc, but I'd rather have something on paper.
>
Just a thought: Why don't you get the original SGML/PS/PD
On Sat, 8 Sep 2001, Stefan Srdic wrote:
>
> Are there any books on bash scripting that any of you would recomemd? I
> have browsed through the Advanced BASH scrypting HOW-TO over at
> Linuxdoc, but I'd rather have something on paper.
>
Just a thought: Why don't you get the original SGML/PS/P
Thor wrote:
Hi
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DE
Thor wrote:
>Hi
>
>
>>I'm not sure I understand you correctly, but how about this:
>>
>>## 0 == LOG
>>## 1 == DROP
>>## 2 == LOG & DROP
>>LOGTCP=2;
>>if [ $LOGTCP -eq 0 ]; then
>>#Log forbidden TCP datagrams
>>iptables -A TCP --protocol tcp -m limit --limit 1/minute \
>> --limit-burst
--
;---+---;
bye |
bye |hor
>
> - James
>
> -Original Message-----
> From: Stefan Srdic [mailto:[EMAIL PROTECTED]
> Sent: Friday, September 07, 2001 8:55 AM
> To: debian-security@lists.debian.org
> Subject: Bash scripting info needed.
>
>
> Hi,
>
> Once agai
y, September 07, 2001 8:55 AM
To: debian-security@lists.debian.org
Subject: Bash scripting info needed.
Hi,
Once again I've re-written my firewall script. Only this time I've
attempted to make use of a few loops and if statements to make my script
prettier. I have no formal educ
-
;---+---;
bye |
bye |hor
>
> - James
>
> -Original Message-----
> From: Stefan Srdic [mailto:[EMAIL PROTECTED]]
> Sent: Friday, September 07, 2001 8:55 AM
> To: [EMAIL PROTECTED]
> Subject: Bash scripting info needed.
>
>
> Hi,
>
> Once again I
Hi,
Once again I've re-written my firewall script. Only this time I've
attempted to make use of a few loops and if statements to make my script
prettier. I have no formal education in programming at all!! Please be
patient with me :-D For reference I have been using some of the well
writte
iday, September 07, 2001 8:55 AM
To: [EMAIL PROTECTED]
Subject: Bash scripting info needed.
Hi,
Once again I've re-written my firewall script. Only this time I've
attempted to make use of a few loops and if statements to make my script
prettier. I have no formal education in program
Hi,
Once again I've re-written my firewall script. Only this time I've
attempted to make use of a few loops and if statements to make my script
prettier. I have no formal education in programming at all!! Please be
patient with me :-D For reference I have been using some of the well
writt
12 matches
Mail list logo