I am trying to get NTP to broadcast the time on my local subnet. I have
the ntp.conf uncommented in the proper place. I put 192.168.1.255 as my
sub-net but I am not sure. I have a cable modem>Linksys 4 port
router>my computer. My computer's IP address is 192.168.1.100 and my
router is 192.1
[EMAIL PROTECTED] wrote:
I am trying to get NTP to broadcast the time on my local subnet. I have
the ntp.conf uncommented in the proper place. I put 192.168.1.255 as my
sub-net but I am not sure. I have a cable modem>Linksys 4 port
router>my computer. My computer's IP address is 192.168.1.100
Jamie Thompson wrote:
Hey.
I've been trying to get the printer working on my parent's PC, which is
now actually using their Debian install now that their XP install has
died and I'm in no hurry to reinstall it. ;)
Interesting issue though, namely, the printer device and cups.
Basically, I h
Jamie Thompson wrote:
Nathaniel Homier wrote:
Is the printer known to work in Debian?
Not directly, but it's a Canon IP4200, which has Linux drivers (abet
RPMs which
I've found repackaged (old) by a kind Japanese fellow, though I'm just
using the Canon RPMs and alien for
Gnome-panel, will it be 2.22 or 2.20 when Lenny is released.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
So I aptitude ssh and set it up according to this document:
http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s5.1
I get authentication failures. I am using Etch completely updated on my
home computer and was using the Ubuntu 8.04 live CD at my mothers house.
co
Rafael Fontenelle wrote:
2008/4/25, Nathaniel Homier <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>>:
So I aptitude ssh and set it up according to this document:
http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s5.1
I get authentication
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to access
(son) from my mothers computer (we will call it mom). I have setup the
ssh server on (son) to use key based authentication. Now the question
is, do I run
Alan Chandler wrote:
Jochen Schulz wrote:
Nathaniel Homier:
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to access
(son) from my mothers computer (we will call it mom). I have setup the
ssh server on (son) to
H.S. wrote:
Nathaniel Homier wrote:
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to
access (son) from my mothers computer (we will call it mom). I have
setup the
Here is what I do (I use this method to
Sudev Barar wrote:
2008/6/10 Nathaniel Homier <[EMAIL PROTECTED]>:
The nicknames are a good idea. I can pretend that I am on the Nostromo when
I am using mother. :)
;-)
It would be good idea to re-jig configuration file at son to allow
only key based authentication. This way even ssh
Sudev Barar wrote:
2008/6/10 Nathaniel Homier <[EMAIL PROTECTED]>:
Yep, I got my key based auth working great now. I also took the time to
disable all other auth. Did "/etc/init.d/ssh restart" and checked again and
all is well. I carry my public and private key on my thu
Sudev Barar wrote:
2008/6/10 Nathaniel Homier <[EMAIL PROTECTED]>:
all is well. I carry my public and private key on my thumb drive and the
private key is protected with a passphrase.
Whoops .. do not carry your private key around. No. Keep it somewhere
only you can access and rsik of l
Tzafrir Cohen wrote:
On Tue, Jun 10, 2008 at 02:00:49AM -0600, Nathaniel Homier wrote:
I have the private key backed up on a desktop computer. The pass phrase
was generated with a high quality pseudo-random number generator using
20 characters consisting of letters, numbers and symbols. The
Jochen Schulz wrote:
Nathaniel Homier:
Sudev Barar wrote:
Yes, but if you are carrying private key in your pen drive and you
loose it or some one copies it your total security is compromised
howsoever strong encryption algorithm was used to generate the key
pair.
I was under the impression
Tzafrir Cohen wrote:
On Tue, Jun 10, 2008 at 11:30:40AM +0200, Jochen Schulz wrote:
Nathaniel Homier:
Sudev Barar wrote:
Yes, but if you are carrying private key in your pen drive and you
loose it or some one copies it your total security is compromised
howsoever strong encryption algorithm
[EMAIL PROTECTED] wrote:
Tzafrir Cohen wrote:
On Tue, Jun 10, 2008 at 11:30:40AM +0200, Jochen Schulz wrote:
Nathaniel Homier:
Sudev Barar wrote:
Yes, but if you are carrying private key in your pen drive and you
loose it or some one copies it your total security is compromised
howsoever
Hi, I used to use Azureus on Windows and liked it allot. Of course I
use Debian now and would like to set up a .torrent client. However I no
longer have any desire to use Java hence Azureus is out of the question.
Does anybody know of an replacement that is as good as Azureus. I
have some t
I have decided to use both qtorrent and bittornado. What ports do you
use for port triggering. I am thinking that the out going is different
from 6881-6999. Also can torrent work while still being stealthed
meaning no icmp ping or otherwise. I would like to know if I need to be
pingable. I
I managed to educate myself on how to port trigger on my Linksys router
and make it work with bittornado. So please ignore my earlier question
about port triggering and the ports that bittornado & qtorrent use I
found them. Thanks any way.
Lesson learned, try educating yourself first before
Hi, I am trying to install the mplayer codecs all package and the readme
says to install them to these locations. However I can not find these
directories on my system. I have 3.1r0 with the desktop package. Does
Debian create these directories by default or do I have to create them
myself t
21 matches
Mail list logo