Re: security compromized?? :-(

1998-03-09 Thread scarter
Seif Zadeh Hossein wrote: > Hi there, > I logged into my ISP last night, and start downloading some files. As it > started to take longer than I thought I left it running over night. This > morning after I logged out I checked the `messages' file, and to my > surprise most of it was deleted. Ther

Re: Navigator still crashes

1998-03-08 Thread scarter
George Toft wrote: > I removed ecery trace of Netscape Communicator from my system > by tracing the execution of the installation script ns-install. > > Then I got smart and used the rpm package to install Communicator. > Worked for about 20 minutes, now locks up hard. no Ctrl-Alt-F1, > no Ctrl

Re: Anyone have experience getting this to work?

1998-03-08 Thread scarter
Brian Landers wrote: > Hi all...I've got a Gateway 2000 P6-333 running RedHat 5.0. It has an > internal Travan 4/8GB tape drive that I want to use with BRU to do backups. > The internal bus is IDE (I know that RedHat doesn't SUPPORT IDE tape > drives, but I have a sneaking suspicion someone out t

Re: CHMOD

1998-03-05 Thread scarter
[EMAIL PROTECTED] wrote: > >Basically, the numeric method is a decimal representation of the binary > of the > > It's an octal representation, to be precise. > > DL You are right, of course, but how would that make a difference? -Steve. -- PLEASE read the Red Hat FAQ, Tips, Errata and the

Re: CHMOD

1998-03-05 Thread scarter
LEBLIN JY wrote: > Just if someone has time... > I've checked the man concerning chmod and i'm afraid the numeric method > is not very clear. If someone can just explain in clearer terms. > ( Sorry for my poor English, it makes a long time i haven't practise :-} ) > > Thanks > JY LEBLIN Basic

Re: [AGAIN] Log of DoS Attack

1998-03-05 Thread scarter
Raj Singh wrote: > Hi, > > I had posted this on 27th Feb, 1998 and have got no replies. Trying once > again. > > Does the 2.0.32 Linux kernel (which is patched for teardrop and f00f) log > the attempts for such attacks on the system ? > > If yes, how can the logging be enabled so that the attack