On Wed, 15 Jan 2014, y...@marupa.net wrote:
These "reasons why Linux is not ready for the desktop" lists are so stupid.
The whole question of whether Linux is 'ready for the desktop' is
specious. This statement presumes that everyone has the same desktop
requirements which they demonstratab
On Thu, 24 Jan 2013, Lázaro wrote:
aptitude search sieve|grep mailutils
I realised after I posted that I'd failed to state _why_ I switched to
imapfilter rather than continuing to use one of the myriad of delivery
filtering solutions available.
Over 15-20 years my ideas on how I want to so
On Tue, 22 Jan 2013, David Guntner wrote:
Actually, in all the (many) years I've been using Procmail, I've never
once had it fall through and just discard the message outright. Maybe
that happens if you've got a rule that *would* route to /dev/null and
the errant test above falls through to it?
On Tue, 22 Jan 2013, Erwan David wrote:
I personnaly use imapfilter for such tasks. But it requires some lua
scripting, as it is rather a lua library for accessing and searching imap
accounts than a program.
I've been using imapfilter for about a year after 15+ years of using
fetchmail/procm
On Tue, 22 Jan 2013, David Guntner wrote:
(2) Use a catch-all rule at the end of .procmailrc so that even if mail
falls through it goes somewhere other than /dev/null.
Also mentioned in the manpage I quoted: It doesn't say that the errant
filter error sends to /dev/null, but there's a risk a
On Tue, 22 Jan 2013, David Guntner wrote:
So it might actually be safer to let it hand the mail off to Postfix
(and let *that* handle Procmail) anyway
There are a few options here:
(1) Use maildrop (not to be confused with MailDrop). Like procmail but
safer (apparently). Home site: htt
On Tue, 28 Feb 2012, Davide Mirtillo wrote:
I was also wondering if any of you had opinions regarding Proxmox.
http://pve.proxmox.com/wiki/Main_Page
It seems like a solid solution and it also looks it's gonna be something
that works out of the box by just installing it, which is kinda what i
w
On Thu, 16 Feb 2012, Bilal mk wrote:
I am using xfs filesystem and also did the fsck. DMA is enabled.
Also perfomed xfs defragmentation( xfs_fsr). But still an issue not only rm
-rf but also cp command
Until quite recently XFS was notable for being slow to delete. Others
have noted that this
On Sun, 5 Feb 2012, Andrei Popescu wrote:
On Du, 05 feb 12, 12:30:05, Robert Brockway wrote:
One of the best pieces of business advice I ever received was this:
"Don't sell what you like. Sell what people will buy".
While it may be good business advice isn't it hypocri
On Sat, 4 Feb 2012, Nick Lidakis wrote:
In a nutshell, my wife and I starting a small business in a family
oriented neighborhood. We're serving coffee, espresso and baking fresh
bread and pastry on premises. The shop will be located at the northern
tip of Manhattan in the vicinity of Inwood Hi
On Fri, 6 May 2011, Brian wrote:
A strong password is no less secure in brute force terms than a key so
Oh yes it is. A strong password may take a very long time to brute force,
but that isn't what you said.
Breaking an arbitrarily long key pair is regarded as being
cryptographically infe
On Thu, 5 May 2011, Rob Owens wrote:
I hesitate to mention this, because it will start an argument about
security through obscurity, but you can run your ssh server on a port
other than 22. It really does nothing for security, but it will keep
your firewall logs a lot cleaner because it avoids
On Fri, 10 Dec 2010, shirish शिरीष wrote:
Hi all,
I know it probably is still a long road but want to know when should
one change from testing to stable so that one is living in squeeze and
not go into wheezy.
I use the codenames (lenny, squeeze, etc) in sources.list. This way it
doesn't mat
On Sun, 21 Nov 2010, François TOURDE wrote:
The zombie process don't use any resources in general. No need to reboot
at this point, because nothing is wrong.
Right. I can't see how the OP's process is a zombie as a zombie won't
consume CPU (or any other resource). It exists solely to hand b
On Wed, 3 Nov 2010, Mark Allums wrote:
Not a pattern in the hashes. A pattern in the history.
Hi Mark. That's what I meant. The history is made up of hashes and
possibly additional information.
Cheers,
Rob
--
Email: rob...@timetraveller.org Linux counter ID #16440
IRC: Solver (
On Wed, 3 Nov 2010, Mark Allums wrote:
I know it is the hashes. Everything leaves tracks. It's not the passwords
that might be compromised, it's the privacy. I expect this is an example of
extreme paranoia, but still...
An unrelated example: Incognito mode (AKA, porn mode) of Google Chrom
On Fri, 3 Sep 2010, John A. Sullivan III wrote:
Has anyone experienced this in Debian? Is there a definitive cause and,
more importantly, a real solution? Thanks - John
I had this with an NVidia chipset (don't recall the exact chipset right
now).
I had to add a SWCursor option to prevent cu
On Fri, 18 Jun 2010, Robert S wrote:
I have debian running on a "headless" system. I'd like to back the entire
system up. Its difficult with a bootable disk without a monitor (so
Clonezilla etc are out). I've tried mondoarchive but it usually bails out
before it completes the backup.
Hi Ro
On Thu, 20 May 2010, Mark Allums wrote:
If not, then a live CD will be needed, something like Knoppix, be sure it has
XFS support. Just boot the live CD or DVD, and Bob's your uncle.
I was going to suggest a live cdrom too but remember that Debian has its
own live cdroms. I've been using th
On Mon, 17 May 2010, Miles Fidelman wrote:
Has anybody done this? Any suggestions on where to start - both re. cabling
(USB vs. serial cross-over), and/or software?
Hi Miles. Many of us have done this for years and years. You can go with
a serial console over rj45 (including bios level too
On Mon, 3 May 2010, Boyd Stephen Smith Jr. wrote:
If a full-upgrade (previously known as dist-upgrade) throws errors, the last
thing you should do is reboot. You should *fix the errors*; your system may
not reboot cleanly until they are resolved.
Well said. Rebooting in the middle of a dist-
On Thu, 11 Mar 2010, Tom H wrote:
MS-Windows used to have an undocumented switch "fdisk /mbr" which would
remap the MBR and erase any copy of lilo or grub present. I don't know if
they still have that option.
Undocumented?
Yes, it didn't appear in any of their regular help sources, at least
On Thu, 11 Mar 2010, Carlos Davila wrote:
Yet linux still boots. I am using Lenny and grub. Where is the kernel
actually stored then?
Hi Carlos. This is actually the expected behaviour with lilo. I've seen
it myself many times with lilo.
This is because lilo maps the blocks of the kernel
On Thu, 11 Mar 2010, Robert Brockway wrote:
The filesystem sees no distinction between mounting during boot or mounting
any other time. It does increment the mount count. I even went and
confirmed this on one of my systems. Same situation - ext3 /boot.
Hmm I knew I should have read to the
On Tue, 9 Mar 2010, Clive McBarton wrote:
umount /boot; mount /boot; dd_rescue /dev/sda1 /tmp/boot1;
umount /boot; mount /boot; dd_rescue /dev/sda1 /tmp/boot2;
diff /tmp/boot1 /tmp/boot2
Hi Clive. I've never used diff to compare binary files.
Is the md5sum of the different files the same?
On Tue, 9 Mar 2010, Clive McBarton wrote:
Yes, of course. I mean "md5sum /dev/sda1".
Hi Clive. If you don't mind me asking, why are you doing this? Are you
concerned about corruption or someone (with root) compromising your kernel
image, or perhaps something else?
Also even if /boot was
On Mon, 8 Mar 2010, Ron Johnson wrote:
grub (and maybe lilo) never used to be able to boot from an xfs partition.
Grub can boot from xfs now. Lilo always could. If you install xfs as the
root filesystem on older versions of Debian Stable the installer is smart
enough to realise that Grub w
On Thu, 4 Mar 2010, thib wrote:
OTOH - I haven't studied XFS - but from the little overviews I read about
it, I suppose its allocation groups are a way to scale with this problem
(along with other unrelated advantages like parallelism in multithreaded
environments). What happens if a filesystem
On Thu, 4 Mar 2010, thib wrote:
If restore speed is really that critical, it should still be possible to
generate an image without including the free space - I know virtualization
techs are doing it just fine for most filesystems.
Maybe we misunderstood each other - saw a different problem.
On Sun, 28 Feb 2010, Clive McBarton wrote:
Ignore swap, that's just small stuff, especially with 3GB. You could
have 64GB and it would still be not that important. Put it on any
partition or file you want.
The rule is 1:2 BTW.
Hi Clive. I liked the rest of your post but I did want to make one
On Sun, 28 Feb 2010, thib wrote:
Usually I never ask myself whether I should organize my disks into separate
filesystems or not. I just think "how?" and I go with a cool layout without
thinking back - LVM lets us correct them easily anyway. I should even say
that I believed a single root fil
On Sun, 28 Feb 2010, Stan Hoeppner wrote:
swap 4GB may never need it, but u have plenty of disk
/boot 100MB ext2safe call, even if grub(2) doesn't need a /boot
/ 40GBext2/3 journal may eliminate mandatory check interval
/var up2uext2sequential write/read, jou
On Thu, 21 Jan 2010, Paul E Condon wrote:
"Linux-Complete-Backup-and-Recovery-HOWTO". One of the first things I
noticed about it is that it assumes that you already -have- a daily
backup system in place, and then it makes no attempt to integrate what
it is presenting with that system, or even s
On Fri, 15 Jan 2010, Paul E Condon wrote:
Contrary to tldp advice, I think it is unnecessary to make backups
of /bin or /sbin. These files are readily available from you favorite
I'm very much a fan of backing up the entire system (with limited
exceptions, such as an area set aside for the st
On Thu, 21 Jan 2010, George wrote:
Is it just me or is the GNU Octave on Lenny very slow?
Hi George. Do you mean...
* Slow compared to MATAB?
or
* Slow compared to Octave on another platform?
or
* Slow compared to Octave on etch?
or
* Something else
These days I use Octave like a glo
On Thu, 14 Jan 2010, Adam Hardy wrote:
Just recovered from a kernel-not-loading situation, without any data loss and
happily wondering what I should do now to make sure I don't get the same
adrenalin shot next time it happens.
Hi Adam. Below are the notes from my talk on backups. My opinions
On Thu, 7 Jan 2010, J.H.Kim wrote:
Sometimes ip address is set to 192.168.0.7.
But somtimes ip address is set to 169.254.171.33
which is not set by me, and I don't konw why that address
is set to my ip address.
I want to set my ipaddress 192.168.0.7 always.
Please tell me how to fix that proble
On Fri, 1 Jan 2010, Stan Hoeppner wrote:
Which filesystem is more appropriate for maildir use on a Postfix/Dovecot
system, ext2/3 or xfs? This maildir will be storing mulitple mail folders and
files, some folders containing over 10,000 email files.
I'm a big fan of XFS and have successfully u
On Fri, 1 Jan 2010, Volkan YAZICI wrote:
I strongly agree, even in recent ext4 and nilfs benchmarks, reiserfs is
generally the winner in many different scenarious. Besides, XFS is very
disappointing at power failures and ext2/3 requires huge amounts of
There are reasons for the observed XFS be
On Wed, 25 Nov 2009, John Hasler wrote:
That some organizations ignore the standard and deliberately configure
their servers to give up after a few hours.
I've been seeing less of that. My recent experience is that even
organisations pushing a lot of mail will keep retrying for 24 or 48 hour
On Wed, 25 Nov 2009, Tony Nelson wrote:
My advice is not to have a "secondary" MX, as it is just going to be
the main target of spammers, as secondary MX servers usually don't
receive the care given to primary MX servers. It might well cause a
lot of backscatter spam, as spam accepted during th
On Thu, 5 Mar 2009, Star Liu wrote:
i changed the port my ftp server use, then it starts. it's good, i'm
not so stupid.
Hi Star. I'd recommend against solving the problem that way. Ports are
standardised so they may be found easily by those who needs them.
As others have noted Inetd is th
On Sun, 11 Jan 2009, Dotan Cohen wrote:
On a machine that I have root access to, how can I see who is logged
into the machine? Specifically, I suspect that a malicious entity is
logging on in a compromised account over SSH, even while the account's
user is sitting at the machine and logged in,
On Mon, 22 Dec 2008, Ross Boylan wrote:
I switched to trying to get a 100Mhz Pentium with 64MB of RAM working.
Unfortunately, it can't boot from CD-ROM (maybe something broke--the CD
ROM is still readable, though). Nor does it directly support network
booting. Its disks are basically full; it'
rors in the log.
Maybe I'll try switching to xdm just to see.
It depends on how you have syslog configured. I recommend running a debug
log to catch all the info. You can grep for the following error coming
from kdm_greet:
"Internal error: memory corruption detected"
Cheers,
result of this problem I recently migrated a
bunch of thin client servers to use gdm instead of kdm.
Cheers,
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support: +1-416-669-3073
OpenTrend Solutions Ltd Email: [EMAIL
el
for example) combined with a remote exploit that does not itself grant
root access can equal a remote root exploit. Wham bam, r00ted system.
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support: +1-416-669-3073
OpenTrend Solutions
roduction boxes. Right now none of the production Debian boxes under
my control have any backported packages.
It is the same logic as for servers which run 24/7.
Exactly.
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support:
ers.
You note you are using Debian Testing. Personally I only use Stable in
production environments (with very judicious use of backports). Who knows
what may be broken in Testing at any given time.
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consulta
for this purpose. The latter is no good in the case of a
dead disk but is convenient otherwise.
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support: +1-416-669-3073
OpenTrend Solutions Ltd Email: [EMAIL PROTECTED
way you go (eg, the entire disk is toast).
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support: +1-416-669-3073
OpenTrend Solutions Ltd Email: [EMAIL PROTECTED]
Web:www.opentrend.ne
than the
files), is very rigid and does not allow for anything except a full
backup.
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support: +1-416-669-3073
OpenTrend Solutions Ltd Email: [EMAIL PROTECTED]
ly. If relevant, see
if this helps.
[1] I don't have the model available to me right now.
Rob
--
Robert Brockway B.Sc.Phone: +1-905-821-2327
Senior Technical Consultant Urgent Support: +1-416-669-3073
OpenTrend Solutions Ltd Email: [EMAIL PROTECTE
On Fri, 25 Nov 2005, Maxim Vexler wrote:
On 11/25/05, Robert Brockway <[EMAIL PROTECTED]> wrote:
Anyone wanting to lock the root account (not a good idea IMHO) should
have a root enabled session (sudo, su or whatever) put to the side and
not touched during the procedure. This session
p/foo
$pwd
/tmp/foo
$ls -a
$cd
$cd /tmp/foo
bash: cd: /tmp/foo: No such file or directory
The primary cause of the error the original poster was concerned with is
that the directory is a mount point and I see the original poster
confirmed this was the case.
Cheers,
Rob
--
Robert Bro
X display. There is plenty online on doing this.
serving windows clients, samba.
Personally I use CUPS/IPP even when MS-Windows is involved, I find it is
easier all round.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL
the procedure if it was found that establishing superuser privs was no
longer possible in new sessions.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.Web:www.opentrend.net
We are open
than just libraries). This is a great way to get a handle on useless
packages you may have installed in the past.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.Web:www.opentrend.net
We
n the past. IMHO 12-18 months would be ideal. I really think this
is achievable without increasing the work load on the developers
(something we can't ask).
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend
t show the right freakin version
Because the version is 1.04 not 1.07. Changing the version number to 1.07
when an app is really 1.04 with backported fixes would be bad bad. The
version number can define features, defaults, bugs and behaviour.
Cheers,
Rob
--
Robert Brockway B.Sc.
eans less changes on an update. This is one of the strengths
of the Debian approach.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.Web:www.opentrend.net
We are open 24x365 for technical
allowed to hire US nationals inside US territory.
This is not true regardless of which definition of national is used. Who
can be hired in the US is a more complex issue than who can live there :)
For example, the spouses of TN visa holders cannot work in the US but the
spouses of E-3 visa
distros). This will mitigate the desire of users to use other
distros for more up to date software.
We shall see whether or not this will happen of course :) I certainly
hope the release cycle can be sped up to 12-18 months.
Cheers,
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669
d to make sure dependencies are satisfied.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.Web:www.opentrend.net
We are open 24x7x365 for technical support. Call us in a crisis.
--
To UNSUBSC
verify the iso if it is coming
from an non-Debian source. One option is to check the md5sums from
multiple sources (although they could all be copying the same trojaned
version).
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PRO
during the service start but not present later.
This is problematic as these files may vary from release to release and
across different distros.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.
need to use X in a hurry and kdm is broken, startx will get you out
of trouble. If this works but kdm doesn't then the problem relates to
kdm.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.
On Wed, 27 Jul 2005, Robert Brockway wrote:
> On Wed, 27 Jul 2005, John Graves wrote:
>
> > I am still discovering what I don't know...Among that is why after I
> > deleted a 17GB error log, df does not report that space as usable. Is
> > there some process I ne
is a log file I believe it will be syslogd. In Debian you
can restart syslogd like this:
/etc/init.d/sysklogd restart
Check df afterwards and things should look better.
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECT
extraneous software
is bad on a server and it doesn't get much more extraneous than X.
If they want to access the server graphically what is wrong with starting
a remote display or (better) starting the graphical app over ssh?
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Seni
gt; keep Debian fat and happy.
Hey there's nothing wrong with making donations :)
Rob
--
Robert Brockway B.Sc. Phone: +1-416-669-3073
Senior Technical Consultant Email: [EMAIL PROTECTED]
OpenTrend Solutions Ltd.Web:www.opentrend.net
We are open 24x7x365 for techn
e any Winboxes in their own LAN and
firewall them from the other boxes as much as possible (including the
aforementioned transparent proxy and squid cache :). Then the users of
the non-Win boxes can be less worried about network sniffing, attacks,
etc.
Rob
--
Robert Brockway B.Sc. Phone
e best strategy for an OOM killer will go on forever :)
Rob
--
Robert Brockway B.Sc.
Senior Technical Consultant, OpenTrend Solutions Ltd.
Ph: +1-416-669-3073 Email: [EMAIL PROTECTED] http://www.opentrend.net
OpenTrend Solutions: Reliable, secure solutions to real world problems.
Contributing Me
nsider:
1. The principals of least privilege and security in depth both endorse
restricting the IP if you can.
2. If there is a remote exploit in sshd or something it relies on (like a
library) you can rest easier if you know you've restricted access via
IP.
Rob
--
Robert Br
n this domain etc. what I want
>to ask over here is, 'Is there any systematic approach
Do they mean in the company or in the world? If they mean in the world
they need to check their facts :) I _do_ know that India has a lot of
experienced Linux developers as does every other
/.xsession,
The window manager must be the last thing run in ~/.xsession by
definition. If you background the window manager then the session will
exit as soon as you login. If you don't background the window manager
then nothing after it will run (whether you exec it or not).
Rob
ss[1] I can ssh to
boxes all over the world without so much as entering my passphrase and I'm
doing it securely. Of course you need to keep your session secure if you
are doing this (and I certainly do).
[1] I can't login successful without the passphrase.
Cheers,
Rob
--
Robert
lly nabbing any private keys they see - but in reality
this is not likely. If you think a machine is not safe don't ssh from it.
Cheers,
Rob
--
Robert Brockway B.Sc.
Senior Technical Consultant, OpenTrend Solutions Ltd.
Ph: +1-416-669-3073 Email: [EMAIL PROTECTED] http://www.opentrend.net
ltime console
server would not run any services and would allow access via ssh with PKI
authentication only.
Even if a laptop did not run Linux fulltime it could be booted off Knoppix
(with ssh started) to act as a parttime console server.
Rob
--
Robert Brockway B.Sc.
Senior Technical Consulta
he box via a web
interface. This is useful if you accidentally halt the box. As always,
just be very careful when you are root.
Good luck,
Rob
--
Robert Brockway B.Sc.
Senior Technical Consultant, OpenTrend Solutions Ltd.
Ph: +1-416-669-3073 Email: [EMAIL PROTECTED] http://www.opentr
advice would be
> greatly appreciated.
We've got a bit of info here that may be useful:
http://www.opentrend.net/thinclients.shtml
This is not technical info on setting one up, more like bandwidth used,
questions answered, etc.
Rob
--
Robert Brockway B.Sc.
Senior Technical
it to do).
** Backup before trying this or anything else **
You may wish to take a copy of the filesystem with dd, mount it loopback
and experiment there, if you can afford the space.
Rob
--
Robert Brockway B.Sc.
Senior Technical Consultant, OpenTrend Solutions Ltd.
Phone: +1-416-669-3073 Email
82 matches
Mail list logo