we are encountering the following error while
extracting an ISO image from Knoppix CD.somebody
help!!
$ extract_compressed_fs /cdrom/KNOPPIX/KNOPPIX >
/knx/source/first.iso
30369 blocks of size 65536. preamble:
#!/bin/sh
#V2.0 Format
modprobe cloop file=$0 && mount -r -t iso9660
/dev/cloop/
$1 exit $?
Block 0 length 0 => 65536
Uncomp: not enough out room 0
Help!!
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
Hello All
If log in as root (or run a root cron job) and send a content of file lets say xyz.txt by using following command
cat xyz.txt | mail -s "subject" touser(a)gomainname.com
then my message is delivered to destination as showing "root" is the sender. Is there anyone who can suggest me to add
another sender name without logging as that user?
Regards,
Bilal Ahmed
On Friday 31 December 2004 10:19, Vickram Crishna wrote:
> The service group is cybercafe operators.
Afaik a session was held in the past for assemblers and cybercafe owners.
> Most of these outfits use Windows in various flavors - I hesitate
> to call it MS Windows, for the simple reason that most copies are
> in fact pirated and of poor quality (now, now, let's not get ;-)
> nasty everyone, about the quality of the native product).
Sheesh. There goes a chance for some sick jokes ;-).
>
> they have a very easy and genuine excuse for
> harassment - illegal software. The current level of hafta is around
> one month's gross revenue for a small cafe,
How does the cop compute that??
> So what's the solution, and how can we help?
Solution is
1) to use legal software
2) Do not get into a business on which u are clueless
3) Call the cops every time a cybercafe uses pirated stuff. A few hits with the hafta stick is a very good education.
> Most of these businesses are really small, and are quite
> technically unequipped to deal with issues of software and
> hardware.
Yeah nice qualification to run a bussiness whose service is delivered on hardware and software.
Your intentions are laudable, but U cant help. As u stated in the rest of your mail It's not the owner / assembler but the customer who decides what os is on the pc. And given the level of zombieness around it will be sometime before things change, at that point things will resolve themselves.
Availability of distros is not a problem. Availability of skill is only a little more of a problem. However to people who think nothing of piracy, paying money for skill is anthema. Go offer your service to a cybercafewalla and see. In fact offer him your services for free and see.
All the piffle about poor and skill etc is rubbish. They are fully clued in on the piracy issue and have made a conscious decision to gyp someone (oh my heart bleeds for the OTHER CONVICTED PIRATE). It's the cops who have discovered a new avenue for revenue.
I use a knoppix cd when i am in a cyber cafe. Recently in Goa a cybercafe had dual boot machines with RH.
rgds
jtd
Hi would like to know abt this command of red hat linux
grub-md5-crypt
its easy to encrypt the passwd from this command but how to store the encrypted password ,,, And again is it possible to decrypt the passwd
And also do let me know abt 'idecrypt'command is it possible to decrypt the passwd from the password
Also tell me few others algorithams or commands of any flavor that would encrypt the normal text ,,,
regs..
Amit karia
Hi
I've got a kernel panic ... When I boot using a rescue CD and try
fsck /dev/hda3 it says:
Couldn't find ext2 superblock, trying backup blocks...
Superblock has a bad ext3 journal (inode 8)
Clear?
I have tried fsck -b option too ... no joy.. same error. All other partitions,
9 in all are fine... Only /dev/hda3 which is the / partition is reporting
this error. Any way for me to recover this partition?
What will happen if I type 'y' when prompted with 'Clear?' .. Will that loose
any chance I have left in trying to recover the data from this partition?
I suspect the / partition got full ... which may have caused this error to
begin with... More than recovery of data, I'm interested in finding out if
that was the case or not.
Rishi
Hello,
I am trying to setup Intranet mail server. I have successfully implemented
Postfix mail server with SMTP AUTH. Now I want to setup local pop server so
that user can download mail locally. I have two pop server say pop.abc.net
and pop.pcq.net with two users with diffecrt user name and password.
Fectchmail can be used to download mail from remote mail server. Now how to
configure fetchmail to forward mails to local mail server. I know fecthmail
can be run daemon mode. How to run fectchmail at startup time. If I set poll
time for fetchmal for ten seconds and during that if that client, try to
access mail what will happen?
Thank you
Komal
Hello All,
I am new to this group and is a Java Developer (J2EE). Just hanging around
as I sometimes do work on Linux and I like it.
I completely agree with biju. Biju it's good to have such an inspiring
member in the group. Sometimes members are so newbie that they are not able
to put in appropriate search keywords thus getting huge listing in google
which is of no use. In such case we need to help them.
Amish I also agree with you. We do need to keep guys reminding that before
posting simple questions one should try finding solution on their own. This
helps to groom our members to become independent and gradually they can
also start helping other members of group.
Hey guys, I just wanted to know that if the next GLUG meet is at Netcore
(Mumbai) then can I attend the same. My friend Nehal is also working over
there [Hey NEHAL, are you listening? Are you too the member of this group?
:))].
Always glads....
===============================================================
Biju Wrote:
-----------
Dear All,
I know its very irritating when people ask simple
questions.....but from my point of view we should
encourage all types of questions rather that pointing
at google or man.
Its true amish, that individuals do not utilise the
existing information before shooting questions, but
often most of my solutions come from existing replies
on mailing lists all around the world, indexed by
google.
Preassumptions on how the member utilizes the
information or on whether he/she uses it or not is not
worthwhile probing into.
Maybe the enlightened can provide exact links for a
particular topic to reduce the time taken for
searches.
As for the question on Connecting to a Win2k using
sambav3, my suggestion is using LinNeighborhood
http://www.linuxsoft.cz/en/redirect.php?id_download=9855
I personally use it to browse the network..!
bye rgds
biju
===============================================================
This message is for the designated recipient only and may contain
privileged, proprietary, or otherwise private information. If you have
received it in error, please notify the sender immediately and delete the
original. Any other use of the email by you is prohibited.
This message is for the designated recipient only and may contain privileged, proprietary, or otherwise private information. If you have received it in error, please notify the sender immediately and delete the original. Any other use of the email by you is prohibited.
Quoting Srinivasan Krishnan <skrishnan(a)primus.ca>:
> On Wed, 2004-12-29 at 09:57, Philip Tellis wrote:
> > Sometime Today, BIJU KRISHNAN assembled some asciibets to say:
> >
> > > I know its very irritating when people ask simple questions.....but
>
> > > from my point of view we should encourage all types of questions
> >
> > It isn't just irritating, it is an inefficient waste of resources.
> >
> > Give a man a fish and you feed him for a day.
> > Teach him to fish, and he will never go hungry.
> >
> > Encourage the right questions. Don't encourage laziness (except when
>
> > it promotes reusability :).
>
I agree with the whole fishing adage, but that would mean ...U dont need to give a direct reply to a simple Q, but atleast point the guy in the right direction to get his ans...and not totally ignore it all together. After all he might not have the time or bandwidth to go run queries around the place and hence had to turn to this LUG as a last resort.
- Lawrence.
Dear All,
I know its very irritating when people ask simple
questions.....but from my point of view we should
encourage all types of questions rather that pointing
at google or man.
Its true amish, that individuals do not utilise the
existing information before shooting questions, but
often most of my solutions come from existing replies
on mailing lists all around the world, indexed by
google.
Preassumptions on how the member utilizes the
information or on whether he/she uses it or not is not
worthwhile probing into.
Maybe the enlightened can provide exact links for a
particular topic to reduce the time taken for
searches.
As for the question on Connecting to a Win2k using
sambav3, my suggestion is using LinNeighborhood
http://www.linuxsoft.cz/en/redirect.php?id_download=9855
I personally use it to browse the network..!
bye rgds
biju
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
From: "Amit D Karia"
To: linuxers(a)mm.ilug-bom.org.in
Date: 29 Dec 2004 12:19:08 -0000
Subject: [ILUG-BOM] Passwd encryptions
Hi would like to know abt this command of red hat linux
grub-md5-crypt
its easy to encrypt the passwd from this command but how to store the encrypted password ,,, And again is it possible to decrypt the passwd
And also do let me know abt 'idecrypt'command is it possible to decrypt the passwd from the password
Also tell me few others algorithams or commands of any flavor that would encrypt the normal text ,,,
regs..
Hi,
MD5 is not a enryption standard it just provides a "fingerprint" or message digest of a message of arbitrary length. The difficulty of coming up with any message having a given message digest is on the order of 2^128 operations,So basically its a one way encryption but it has a known collision weakness.
idecrypt is used to decrypt encrypted responses from a pidentd server with DES encryption.
grub-md5-crypt is just used to get the fingerprint of the user pass to protect grub modification
there are lots of encryption standards like blowfish ,md4,md5 ,SHA1 ,SHA2 ,DES and Triple DES, Serpent , twofish and famous CRC !!
Hope this clarify.
King
---------------------------------
Do you Yahoo!?
The all-new My Yahoo! � What will yours do?