ip]
Let me preface my suggestion by saying that I am way out of my league. I'd
never even heard of CGM, WMF, EMF until this post. But, given your two
comments above, I wondered if using pdf2ps, rather than acroread might not
help.
Good luck.
ghcbc
--
To UNSUBSCRIBE, email to [EMAIL PR
On Fri, Oct 01, 2004 at 10:41:22AM -0700, Brian Nelson wrote:
> On Fri, Oct 01, 2004 at 04:30:15PM +0200, Francois Cerbelle wrote:
> > Le Fri, Oct 01, 2004 at 10:02:52AM -0400, Ed Sutherland ecrit :
> > > had to log-out and reboot in order to regain control. Is there a
> > > secure, solid and stabl
On Fri, Sep 10, 2004 at 11:48:31AM +0300, David Baron wrote:
> Anyone using this on Debian?
>
> This is a file-system integrity checker, will detect hacks, intrusions, etc. I
> tried it but seems to find lots of stuff that seem part of the dynamics of
> the ongoing system operation, and attempt
On Thu, Aug 26, 2004 at 05:23:32PM +0200, Jacob Friis Larsen wrote:
> My Company is looking for a mailing-list system that have these features:
>
> - Bounce detection.
> - Easy to translate.
> - Secure.
> - Fast.
>
> What would you recommend?
I haven't enough experience with it to recommend it,
This is pure curiosity. After boot I got the following message in my
mailbox. I was curious as to what maintenance job would be looking in user
netscape caches. I've looked at /etc/cron.daily/standard, the script that
was apparently generated this message, but I don't see where it looks for
anyt
On Sat, Jun 05, 2004 at 03:08:57PM -0300, Guilherme Rocha_Sul Soluções wrote:
>
>
> Hello friends !!!
>
> I need of a command for shutdown the kde and X
>
> Or a command to create a boot disk of debian.
>
>
>
> Because of my desktop are completely desconfigured.
> Not functiuonal!!! Don't
On Fri, May 14, 2004 at 05:59:37PM -0700, [EMAIL PROTECTED] wrote:
> Hi,
>
> Anybody know where I can get some detailed info on the
> characteristics of trojans/viruses that scan for vulnerabilities ?
> Specifically, I'm trying to determine if a pattern of scanned ports I have
> noticed on
On Mon, May 17, 2004 at 01:39:39PM +0200, Jens Simmoleit wrote:
>
> >
> > Hi,
> >
> > Anybody know where I can get some detailed info on the
> > characteristics of trojans/viruses that scan for vulnerabilities ?
> > Specifically, I'm trying to determine if a pattern of scanned ports I have
> >
Hi,
Anybody know where I can get some detailed info on the
characteristics of trojans/viruses that scan for vulnerabilities ?
Specifically, I'm trying to determine if a pattern of scanned ports I have
noticed on my machine is characteristic of any particular
trojan/virus/malicious program
On Tue, May 04, 2004 at 12:58:23PM -0400, [EMAIL PROTECTED] wrote:
>
>
>
>
> I have the kde desktop and a graphical login via the kdm package
> (3.1.4-0woody1). Direct connections with the mouse to the system work fine
> but when a kvm switch is used the mouse typically freezes on the login
>
On Mon, Mar 29, 2004 at 10:43:06PM -0500, Christopher J. Noyes wrote:
> I am trying to resolve the issue I had with the Kernel panic issue
> earlier. I think it had to do with a bad kernel install. I found the
> installed kernel images that I want in /boot. I set up lilo.conf and tried
> to get it
On Sat, Mar 20, 2004 at 02:14:25AM +, Clive Standbridge wrote:
> On Thu 18 Mar 2004 16:53:58 +(-0800), [EMAIL PROTECTED] wrote:
> > On Thu, Mar 18, 2004 at 06:19:43PM +0100, Joachim Fahnenmueller wrote:
> > > Hi ghcbc,
> > >
> > > VARIABLEN
Hi,
I am writing a shell script to process a dir tree looking for
specific types of files, and creating a symbolic name of the found files by
stripping the "/" chars from the path.
Anyone know if I can get the output of
mawk 'gsub("/","",$pathname) {print}'
into another variable or eve
On Tue, Feb 17, 2004 at 10:21:06PM -0800, Paul Johnson wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Wed, Feb 18, 2004 at 12:05:37AM -0500, David Clymer wrote:
> > Its not necessarily the USA either, the impropriety has nothing to do
> > with country (or province) of origin, just
14 matches
Mail list logo