Andrew Sackville-West wrote:
On Tue, Oct 30, 2007 at 05:09:50PM +0100, Erik Persson wrote:
Hello!
I have a server which is running 2 different virtual hosts (vserver), let's
call them S for the server, A and B for the virtual hosts A and B.
S, A and B have different ip-addresses (say s.
Hello!
I have a server which is running 2 different virtual hosts (vserver),
let's call them S for the server, A and B for the virtual hosts A and B.
S, A and B have different ip-addresses (say s.s.s.s, a.a.a.a and b.b.b.b).
Since the server isn't really forwarding anything I haven't used the
Hello,
I'm trying to figure out how to verify the files installed from a
package by apt-get, ie I have installed a package A and want to verify
that the files installed from the package are correct at some later
time. Thus some process could have changed some of the files after I
installed th
Andrew Sackville-West wrote:
On Fri, Jul 27, 2007 at 04:49:41AM +0200, Erik Persson wrote:
Andrew Sackville-West wrote:
On Thu, Jul 26, 2007 at 10:52:07PM +0200, Erik Persson wrote:
Anyhow, the basic fact that there is fewer security alerts in Konq makes
this a more secure browser, whether
Ron Johnson wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/26/07 15:52, Erik Persson wrote:
Douglas Allan Tutty wrote:
It seems that the mozilla-derived browsers have security issues
requiring updates far more frequently than other browsers like Konqueror
or links2.
I'm cu
Andrew Sackville-West wrote:
On Thu, Jul 26, 2007 at 10:52:07PM +0200, Erik Persson wrote:
Anyhow, the basic fact that there is fewer security alerts in Konq makes
this a more secure browser, whether this maybe is because only of a smaller
user base or not.
I'm sorry, and i hate to
Douglas Allan Tutty wrote:
It seems that the mozilla-derived browsers have security issues
requiring updates far more frequently than other browsers like Konqueror
or links2.
I'm curious as to why this is. Does anyone have any ideas?
I'm on dialup and switched to Konq for this very reason b
Martin Marcher wrote:
Hello,
Say I want 10.200.10.50 to look like it came from 192.0.2.11 how do I do
that?
I have not read all you have written, but will not:
iptables -I PREROUTING -t nat -s 10.200.10.50 ! -d 192.0.2.8/29 -j SNAT
--to-source 192.0.2.11
do the trick?
By the way, if the
I need php 4.4 for sarge but i can't find it.
Does anyone know where to get it?
It doesn't *seem* to be at backports!
php 5 will not do, neither will php 4.3!!
Thanks!
Erik
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Grok Mogger wrote:
I've often seen this touted as a good security measure and I've always
wondered why. I can think of a few possibilities, but I really don't
know. Could someone please explain it to me?
Thanks,
- GM
1. When a hacker tries to attack a site he (or she) has to guess 2
separ
Hello!
I have a server running sarge.
Now I want to install another computer with debian sarge and the same
packages as the first one.
How do I do this the easiest way?
That is, how do I generate a list of installed packages from the runing
server that I can use in an automatic way to install
Scott Reese wrote:
Erik Persson wrote:
[snip]
Greetings Erik:
From your description, it sounds like you have multiple subnets on the
same physical network (a multihomed server). While isc dhcpd can be set
up to handle this situation, it won't do what you want it to do. (from
the man
CK on 192.168.5.209 to
00:0f:ea:b3:ec:cc via 192.168.11.254
Regards,
Erik Persson.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Kevin Coyner wrote:
On Sun, Sep 17, 2006 at 11:39:25AM +0200, Erik Persson wrote..
I'm running sarge. I've installed tinyproxy in a vserver. I don't
want it to run all the time though, so I stop it when I'm done
using it. There are S-links to /etc/init.d/tinyproxy
ponsible.
Anyone who can shed some light over this matter?
Maybe I could remove the startup links from the rc-dirs, but I'm really
curious about what starts it anyway, so it is more a question about
*why* than a question about "do this to solve it".
Regards,
Erik Persson.
--
To UN
Erik Persson wrote:
I have heard some people saying it is possible to run linux as a
gb-router on pc-hardware and some have actually tested it, but it would
be very nice to hear from some more people who have tried it!
Nothing beats the real world.
Is there anyone on the debian-user list who
Alan Chandler wrote:
On Saturday 26 August 2006 15:45, Erik Persson wrote:
I can't answer your question directly, but I can give you a point in the
ground.
I run a debian (was sarge - just updated to etch) server with two 100Mb
ethernet cards in to act as a router/firewall AND web s
Any problems?
Anything special to think about?
What throughput is it possible to reach?
How have you solved any problems?
How is throughput affected by packet filtering?
Best regards,
/erik persson
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble?
Hello!
I have a tar-file cantaining a large number of files. Some of the files
in the tar-file have my national character in the filename. I guess the
filenames are stored in iso-latin1 in the tar-file, but I don't know.
The tar-file extracts nicely on debian.
Anyway, I want to extract the fil
Roberto C. Sanchez wrote:
On Fri, Aug 11, 2006 at 04:49:06PM -0500, Ron Johnson wrote:
MySQL does data validation:
http://dev.mysql.com/tech-resources/articles/mysql-data-integrity.html
I guess you're a little behind the curve ;)
Giving the client the ability to *disable* integrity checking is
Derek Martin wrote:
On Sat, Jun 24, 2006 at 12:58:42AM +0200, Erik Persson wrote:
I tried with klogd -c 0 but the messages just kept on coming. It seems
that the minimal allowed log level for kernel messages was set to 4 on
the router and klogd -c 0 thus didn't change the kernel log level
Wayne Topa wrote:
Erik Persson([EMAIL PROTECTED]) is reported to have said:
Hey!
I'm running a debian sarge as a router for a network, and I'm using
iptables. I need to log certain stuff from iptables, and I thus have
rules like:
${PROG} -A FORWARD -i eth1 -o eth0 -p tcp --dp
Cameron Hutchison wrote:
Erik Persson wrote:
I'm running a debian sarge as a router for a network, and I'm using
iptables. I need to log certain stuff from iptables, and I thus have
rules like:
${PROG} -A FORWARD -i eth1 -o eth0 -p tcp --dport 135 -m limit
--limit 1/s -j LOG --
r than just removing the log
rules from iptables?
/Erik Persson.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Ed wrote:
I need to redirect an X application on a Debian box to run on another
system running cygwin X.
I managed to start X on the cygwin machine.
I telneted to the remote Debian box.
Now I want to invoke an application and have it displayed on my cygwin
X (client?)
On the debian box I know I
/13342/./7C87619D19.0F598/winmail.dat:
Input/Output error
May 19 17:25:18 mail MailScanner[13342]: ProcessClamAVOutput:
unrecognised line
"/var/spool/MailScanner/incoming/13342/./7C87619D19.0F598/wi
nmail.dat: Input/Output error". Please contact the authors!
Thank you!
/Erik Persson
Steve Lamb wrote:
Erik Persson wrote:
As stated earlier, the BSD-licence requires, among other things, that:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the
Steve Lamb wrote:
Christopher Nelson wrote:
My biggest problem with BSD-style licenses is that someone can take your
work, use it, and then restrict other's access to their improvements.
So the GPL restricts their freedom to do just that. That has been my main
point from the onset. It is
Tony Heal wrote:
I have a file named 'custom' in /etc/cron.d and the first line in this file
is MAILTO=/dev/null.
I have a file that is run every minute that tests permissions on a file and
emails me it they have changed. This script is to troubleshoot another
problem.
* * * * * root /u
29 matches
Mail list logo