While I do not share this same problem, I think this is an oppurtunity
to learn a little bit about application profiling under Debian,
especially desktop application profiling. When the obvious solutions
fail (such as doing a complete reinstall) I think it would be best to
find out exactly where th
On 5/23/05, Josh Rehman <[EMAIL PROTECTED]> wrote:
On 5/23/05, André Carezia <[EMAIL PROTECTED]> wrote:
No. Look for AllowTcpForwarding in /etc/ssh/sshd_config.
I don't have permission to read that file - I'll contact the sysadmin. Thanks.
Turns out that my hosting service
On 5/23/05, André Carezia <[EMAIL PROTECTED]> wrote:
No. Look for AllowTcpForwarding in /etc/ssh/sshd_config.
I don't have permission to read that file - I'll contact the sysadmin. Thanks.
The ubiquity of spam has been ironically liberating - I no longer make
any attempt to hide my email address. I rely on spam filtering and
enjoy openness.
On 5/23/05, André Carezia <[EMAIL PROTECTED]> wrote:
Josh Rehman wrote:> [...]> Does mod_proxy have some sort of priveledged access to ssh tunnels?> Are you saying that my simple telnet test cannot work ever?Please send your replies to the list.
Of course. Gmail "Reply"
I also tried other ports but without success.-- "It seemed to them that they did little but eat and drink and rest, and walk among the trees; and it was enough."- J.R.R. Tolkien, The Lord of the Rings, "The Mirror of Galadriel"
On 5/22/05, André Carezia <[EMAIL PROTECTED]
> wrote:
ssh -R 8080:localhost:80 [EMAIL PROTECTED]
My apologies, I should have mentioned that that was what I tried. Here is the result:
external>$ telnet localhost 8080
Trying 127.0.0.1...
telnet: connect to address 127.0.0.1: Connection refused
I would like to expose a web server running on a personal laptop
elegantly and securely. This laptop is not always connected at the
same point, so a static IP will not do. I am also familiar with
dynamic dns however my laptop will sometimes be behind firewalls over
which I have no control.
A solut
Andy Firman wrote:
On Fri, Sep 12, 2003 at 01:12:47AM -0700, Jon wrote:
I'm looking to buy a laptop that can easily be set up to run debian
linux. I do not need a high end graphics card, nor is there a real
need for a big screen. Being light weight is not a primary factor,
whereas rugged rel
Mark Annandale wrote:
Hi Guys
I have installed debian (via a Knoppix CD), and overwritten a previous Linux
distro. My /home folder exists from the previous distro and I have added
myself as a user. However I cannot seem to be able to access all my old data
on /home.
Has anyone experienced thi
Thanks all for the good advice. Knoppix was an excellent suggestion,
however it doesn't run on my laptop - not even in "failsafe" or "expert"
mode. "failsafe" gets the farthest. So now I'm trying to fix this problem.
I found http://mezzo.net/~peter/lindellinst.html which indicates "I
installed
I would like to dual boot my machine, and need to exec parted to do
this. However, parted isn't on the Debian 3.0 distro CDs that I have,
and gnu only provides floppy images - and my laptop doesn't have a
floppy drive (nor an IR port...beware, prospective buyers of the Dell
5150!).
A bootable
Stefan Waidele jun. wrote:
Josh Rehman wrote:
Hi,
I was wondering if it is possible to grep through the output of bash
command line completion. If you type "k" and then tab twice, you'll
be asked to show all 398,499 entries on your path, y or n. Hit y and
a big list comes up
Karsten M. Self wrote:
on Thu, Sep 04, 2003 at 12:43:04AM -0700, Josh Rehman ([EMAIL PROTECTED]) wrote:
Hi,
I was wondering if it is possible to grep through the output of bash
command line completion. If you type "k" and then tab twice, you'll be
asked to show all 398,499
Hi,
I was wondering if it is possible to grep through the output of bash
command line completion. If you type "k" and then tab twice, you'll be
asked to show all 398,499 entries on your path, y or n. Hit y and a big
list comes up. Seems like it would be nice to search through that list,
but th
It's interesting, the advisory claims that this can be exploited even
when remote admin is disabled. I tried to break my own router with their
advice, but it didn't work. (Maybe a kind soul has already cracked my
router and updated my firmware for me? :-)
Presumably you can reset the password with
The input chain is for incoming packets. It is unlikely that kazza
clients use a special port - they probably take the first one available,
just like web clients.
If the client does essentially port scanning (to find a good server
port), there is little you can at the iptables level. You will have
Ron/Wigglit wrote:
> But, if you guys screen who you help by theif file-sharing philosophy,
> that's a bit overboard.
...
Hmm. After reading the log file, I became convinced of three things:
1) I was right to stop using IRC 5 years ago, because it is a waste of
time.
2) No-one cares about your 'fi
I've read that FAQ, and have to say I'm unimpressed. As I've stated
before, there are only two routes to control information: control the
container, or control the conduits.
It's really hard to control the container because people are smart, and
generally ornery sons-of-bitches. Containers can (an
Perhaps I gave the wrong impression. I am already a competent Linux
user. I am a programmer by trade, and know a smattering of C, Bash, and
Perl. I use Linux extensively at work, and somewhat at home. My idea was
regarding the *mastery* of Linux, not learning it as a newbie. So far,
I've been expl
g. In particular, setting up a system that is either
actually devoid of tools are has many aspects 'turned off' is a rather
daunting task.)
What do ya think?
Thanks,
Josh Rehman, LGW
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Klaus wrote:
> That should be interesting!
> If that thing ever gets put together and M$ thinks it is illegal I
would
> love to see a court battle over that in an european court. Who in the
> hell are those people that think they can tell me I can't construct a
> marslander out of a ford taurus? O
've been making the font very small as a workaround).
And if it's not asking too much, the ability to rename each session.
Thanks,
Josh Rehman
P.S. It was interesting to read about some of the xterms listed at:
http://packages.debian.org/stable/x11/xfree86-common.html
However there i
the logical fallacy you employ with such
sophomoric glee.
Good day,
Josh Rehman, Linux Guru Wannabe (LGW)
P.S. If any Latin speakers out there could help me come up with a better
name for "argument from technological elitism" that would be great.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
I think the best bet for a stable client is to run a good Windows client
like Trillian under Wine. In fact, Wine seems perfect for this purpose,
since the windows stuff has better protocol support and the API needs
are pretty mild.
> -Original Message-
> From: Rob Weir [mailto:[EMAIL PROT
25 matches
Mail list logo