10-03-2001
mandrake 8.0 experts...how come it won't accept changes to security settings??
well after a possible hack last week that was a pain in the as* i have reinstalled and i am setting up my security settings before i connect to the internet this time...
problem is that when i try to change the security setting using in the control setting the left panel (where the change is made) turns gray and the mouse pointer turns into a watch and stays like this for 20 minutes plus... i finally gave up and after reopening the security window i seems to be unchanged...
is it supposed to take more than 20 minutes?
its not like i have a slow computer??
how do i raise the security level, is there another way to change it??
thanks
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I wonder how I shall read the result below, especially 'what'
shown below.
The result was shown when I entered 'w'.
E.g what is TOP? What is gosh ( what does selmgr mean?)?
login@ idle JCPU PCPU what
6:15am 7:04 39 39 TOP
6:34am 6:45 45 45 TOP
6:41am ... (1 Reply)
Discussion started by: Aelgen
1 Replies
2. UNIX for Dummies Questions & Answers
On the following script that I get an error when I try to execute as root:
#./mv_log.sh
bash: /root/util/mv_log.sh: Permission denied
#!/usr/bin
datetag=`date --date='1 day ago' +"%b%d%Y"`
logname=`find /opt/bea/wlserver6.1/config/*/logs/ -iname 'access.log0*' -mtime -1 -print`
mv... (4 Replies)
Discussion started by: darthur
4 Replies
3. UNIX for Dummies Questions & Answers
Edit your /etc/modules.conf file to either remove or comment out the two lines :
alias sound-slot-0 snd-card-intel8x0
above snd-card-intel8x0 snd-pcm-oss
...and replace them with the following line:
alias sound i810_audio
....viola! After saving and rebooting, now I gots da sound!... (0 Replies)
Discussion started by: DownSouthMoe
0 Replies
4. UNIX for Dummies Questions & Answers
I use Unix at work, and thought that I should finally install it on my computer, just as a play around. Plus I am into programming C and various other languages. I have never used Mandrake linux, and to be honest it was just a freebie that I found that I thought I would give a quick try. I have... (3 Replies)
Discussion started by: SiE
3 Replies
5. UNIX for Dummies Questions & Answers
Backup Exec Agent won't start....
Question: Has anyone had any previous experience working with Backup exec for Unix? I'm running SCO Openserver 5.0.5 and Backup Exec agent Version 5.01 Revision 5.032 Basically, these are the commands I'm issueing and here is the output.
# cd etc
# cd... (1 Reply)
Discussion started by: PatMcCoy
1 Replies
6. UNIX Desktop Questions & Answers
I'm trying to set up a school Linux computer and use Samba to link it to Windows NT.
Pentium-133
Hercules 8 meg Stingray 128/3D
I'm not too familiar with SuSE's config tools (more used to Mandrake) and so am having some trouble configuring X. SaX2 just won't start, even when I use "sax2... (1 Reply)
Discussion started by: HumanBeanDip
1 Replies
7. Windows & DOS: Issues & Discussions
It's an online con that is growing fast and stealing tens of millions of dollars.
An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking Web site. Such “phishing” attacks exploit a universal weakness in online security: passwords.
To read the rest of... (0 Replies)
Discussion started by: ZOverLord
0 Replies
8. UNIX for Advanced & Expert Users
Hello
I'm on Tru64 unix 5.1.a
I'm trying to execute rcp command like this
rcp testfile "user@host.com:/pub/Sales/Sales Reports"
and I'm getting an error message
rcp: ambiguous target
copy works fine if I just put underscore in the destination directory, like Sales_Reports...
... (3 Replies)
Discussion started by: Trusevich
3 Replies
9. Solaris
Hi
I am trying to debug an issue with an automated install I have set-up. So to start I just ran a simple
ok; boot cdrom - install
but when it came to the IP address field it would only take the following format 123.123.123.12 and would not let me enter the last digit
Anybody got any... (9 Replies)
Discussion started by: eeisken
9 Replies
10. Shell Programming and Scripting
I have a text file delimited by commas, with three fields (no " marks).
I want to use awk to create a fourth field which is equal to the line number + field 1 + .txt
I've searched this forum and found the following
nawk -v OFS=';' '{print $0, FNR}' myFile
Which I've amended to change the... (2 Replies)
Discussion started by: b.hamilton
2 Replies
LEARN ABOUT MOJAVE
socks_clients
SOCKS_CLIENTS(1) General Commands Manual SOCKS_CLIENTS(1)
NAME
rfinger - SOCKS client version of finger
rftp - SOCKS client version of ftp
rtelnet - SOCKS client version of telnet
rwhois - SOCKS client version of whois
SYNOPSIS
See the man pages on finger(1), ftp(1), telnet(1), whois(1).
DESCRIPTION
These programs provide the well-known functionalities to hosts within a firewall. Normally, when a firewall is constructed, IP-accessibil-
ity across the firewall is cut off to reduce security risk to hosts within the firewall. As a result, inside hosts can no longer use many
of the well-known tools directly to access the resources outside the firewall.
These programs restore the convenience of the well-known tools while maintaining the security requirement. Though the programs differ very
much from their counterparts in the use of the communication scheme, they should behave almost indistinguishable to the users. Note though
that rftp does echo the password as you type it in if you are using anonymous as log-in name. Unlike those of the previous versions, these
are "versatile" clients, meaning that they can be used for connections to inside hosts directly and to outside hosts via SOCKS proxy
servers. So they can be used as replacements of their traditional counterparts.
When any of these programs starts, if the environment variable SOCKS_BANNER is defined, the program prints to stderr its version number and
the name or IP address of its default SOCKS proxy server. It then consults the configuration file to determine whether a request should be
allowed or denied based on the requesting user, the destination host, and the requested service. For allowable requests, the configuration
file also dictates whether direct or proxy connection should be used to the given destination, and optionally the actual SOCKS servers to
use for the proxy connection. The program lookps first for the frozen configuration file /etc/socks.fc first. If that's not found, it then
looks for the file /etc/socks.conf. If both files are absent, these programs will only try direct connections to the destination hosts,
making them behaving like their regular counterparts.
You can use environment variable SOCKS_NS to set the nameserver for domainname resolutions. Be sure you use the IP address of the name-
server you want to use, not its domainname. If SOCKS_NS doesn't exist, the IP address defined by the symbol SOCKS_DEFAULT_NS at compile
time is used if the programs were compiled with that symbol defined. Otherwise the nameservers specified in /etc/resolv.conf are used.
All the client programs uses syslog with facility daemon and level notice to log their activities. These log lines usually appear in file
/var/adm/messages though that can be changed by modifying /etc/syslog.conf. (See syslogd(8) and syslog.conf(5).) Typical lines look like
Apr 11 10:02:23 eon rfinger[631]: connect() from don(don) to abc.com (finger) using sockd at socksserv
May 10 08:39:07 eon rftp[603]: connect() directly from blue(blue) to xyz.edu (ftp)
May 10 08:39:09 eon rftp[603]: bind() directly from blue(blue) for xyz.edu (ftp)
May 18 13:31:19 eon rtelnet[830]: connect() from root(jon) to xyz.edu (telnet) using sockd at sockd2
May 18 14:51:19 eon rtelnet[921]: refused -- connect() from jon(jon) to xyz.edu (telnet)
Of the two user-ids appearing in each log line, the first is the effective user-id when the program is invoked, the second (that within the
parentheses) is the one used at login. Access control applies to the effective user-ids.
SEE ALSO
finger(1), ftp(1), sockd(8), sockd.conf(5), socks.conf(5), telnet(1), whois(1)
ENVIRONMENT
SOCKS_SERVER, if defined, specifies the name or IP address of the SOCKS proxy server host to use, overriding the default server compiled
into the programs.
SOCKS_NS, if defined, specify the IP address of the domain nameserver that should be used for name resolution, overriding both the defini-
tion of symbol SOCKS_DEFAULT_NS and the file /etc/resolv.conf.
ORIG_FINGER, if defined, specified the (altered) full pathname of the original finger program, which should have been renamed before
installing the rfinger as the regular finger. The rfinger program invokes the original finger program to lookup information on local users.
Normally this name should be compiled directly into rfinger, avoiding the need for this environment variable. Use ORIG_FINGER only if you
want to override what is compiled into rfinger.
AUTHOR
David Koblas, koblas@netcom.com
Ying-Da Lee, ylee@syl.dl.nec.com
May 6, 1996 SOCKS_CLIENTS(1)