On Mon, Sep 10, 2001 at 01:34:17PM +0100, Ricardo B wrote:
> "Your theory is nuts! But not enough to be true!" (Niels Bohr)
We are all agreed that your theory is crazy. The question which
divides us is whether it is crazy enough to have a chance of being
correct. My own feeling is that it is not
On Mon, Sep 10, 2001 at 01:34:17PM +0100, Ricardo B wrote:
> "Your theory is nuts! But not enough to be true!" (Niels Bohr)
We are all agreed that your theory is crazy. The question which
divides us is whether it is crazy enough to have a chance of being
correct. My own feeling is that it is no
On Sat, 8 Sep 2001, Stefan Srdic wrote:
>
> Are there any books on bash scripting that any of you would recomemd? I
> have browsed through the Advanced BASH scrypting HOW-TO over at
> Linuxdoc, but I'd rather have something on paper.
>
Just a thought: Why don't you get the original SGML/PS/PD
On Sat, 8 Sep 2001, Stefan Srdic wrote:
>
> Are there any books on bash scripting that any of you would recomemd? I
> have browsed through the Advanced BASH scrypting HOW-TO over at
> Linuxdoc, but I'd rather have something on paper.
>
Just a thought: Why don't you get the original SGML/PS/P
Thor wrote:
Hi
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DE
Thor wrote:
>Hi
>
>
>>I'm not sure I understand you correctly, but how about this:
>>
>>## 0 == LOG
>>## 1 == DROP
>>## 2 == LOG & DROP
>>LOGTCP=2;
>>if [ $LOGTCP -eq 0 ]; then
>>#Log forbidden TCP datagrams
>>iptables -A TCP --protocol tcp -m limit --limit 1/minute \
>> --limit-burst
Hi
> I'm not sure I understand you correctly, but how about this:
>
> ## 0 == LOG
> ## 1 == DROP
> ## 2 == LOG & DROP
> LOGTCP=2;
> if [ $LOGTCP -eq 0 ]; then
> #Log forbidden TCP datagrams
> iptables -A TCP --protocol tcp -m limit --limit 1/minute \
> --limit-burst 4 -j LOG --log-le
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DEBUG --log-prefix '
Hi
> I'm not sure I understand you correctly, but how about this:
>
> ## 0 == LOG
> ## 1 == DROP
> ## 2 == LOG & DROP
> LOGTCP=2;
> if [ $LOGTCP -eq 0 ]; then
> #Log forbidden TCP datagrams
> iptables -A TCP --protocol tcp -m limit --limit 1/minute \
> --limit-burst 4 -j LOG --log-l
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DEBUG --log-prefix
10 matches
Mail list logo