Sponsored Content
Top Forums UNIX for Dummies Questions & Answers mandrake 8.0 experts...how come it won't accept changes to security settings?? Post 7895 by justchillin on Wednesday 3rd of October 2001 01:31:42 AM
Old 10-03-2001
mandrake 8.0 experts...how come it won't accept changes to security settings??

well after a possible hack last week that was a pain in the as* i have reinstalled and i am setting up my security settings before i connect to the internet this time...

problem is that when i try to change the security setting using in the control setting the left panel (where the change is made) turns gray and the mouse pointer turns into a watch and stays like this for 20 minutes plus... i finally gave up and after reopening the security window i seems to be unchanged...

is it supposed to take more than 20 minutes?
its not like i have a slow computer??
how do i raise the security level, is there another way to change it??

thanks
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Clearify what it means under 'WHAT' when hit the 'w'-command

I wonder how I shall read the result below, especially 'what' shown below. The result was shown when I entered 'w'. E.g what is TOP? What is gosh ( what does selmgr mean?)? login@ idle JCPU PCPU what 6:15am 7:04 39 39 TOP 6:34am 6:45 45 45 TOP 6:41am ... (1 Reply)
Discussion started by: Aelgen
1 Replies

2. UNIX for Dummies Questions & Answers

Why won't my script run?

On the following script that I get an error when I try to execute as root: #./mv_log.sh bash: /root/util/mv_log.sh: Permission denied #!/usr/bin datetag=`date --date='1 day ago' +"%b%d%Y"` logname=`find /opt/bea/wlserver6.1/config/*/logs/ -iname 'access.log0*' -mtime -1 -print` mv... (4 Replies)
Discussion started by: darthur
4 Replies

3. UNIX for Dummies Questions & Answers

Here's the fix for the SiS 7012/7018 sound problem in Mandrake 8.2

Edit your /etc/modules.conf file to either remove or comment out the two lines : alias sound-slot-0 snd-card-intel8x0 above snd-card-intel8x0 snd-pcm-oss ...and replace them with the following line: alias sound i810_audio ....viola! After saving and rebooting, now I gots da sound!... (0 Replies)
Discussion started by: DownSouthMoe
0 Replies

4. UNIX for Dummies Questions & Answers

Mandrake Linux Settings

I use Unix at work, and thought that I should finally install it on my computer, just as a play around. Plus I am into programming C and various other languages. I have never used Mandrake linux, and to be honest it was just a freebie that I found that I thought I would give a quick try. I have... (3 Replies)
Discussion started by: SiE
3 Replies

5. UNIX for Dummies Questions & Answers

Backup Exec agent won't start... PLEASE HELP!

Backup Exec Agent won't start.... Question: Has anyone had any previous experience working with Backup exec for Unix? I'm running SCO Openserver 5.0.5 and Backup Exec agent Version 5.01 Revision 5.032 Basically, these are the commands I'm issueing and here is the output. # cd etc # cd... (1 Reply)
Discussion started by: PatMcCoy
1 Replies

6. UNIX Desktop Questions & Answers

SuSE 8.0...I can't get SaX2 to start on Hercules 128 and YaST2 won't set up X either.

I'm trying to set up a school Linux computer and use Samba to link it to Windows NT. Pentium-133 Hercules 8 meg Stingray 128/3D I'm not too familiar with SuSE's config tools (more used to Mandrake) and so am having some trouble configuring X. SaX2 just won't start, even when I use "sax2... (1 Reply)
Discussion started by: HumanBeanDip
1 Replies

7. Windows & DOS: Issues & Discussions

Stanford security experts unveil defenses against ‘phishing’ attacks

It's an online con that is growing fast and stealing tens of millions of dollars. An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking Web site. Such “phishing” attacks exploit a universal weakness in online security: passwords. To read the rest of... (0 Replies)
Discussion started by: ZOverLord
0 Replies

8. UNIX for Advanced & Expert Users

rcp won't accept a destination with spaces...

Hello I'm on Tru64 unix 5.1.a I'm trying to execute rcp command like this rcp testfile "user@host.com:/pub/Sales/Sales Reports" and I'm getting an error message rcp: ambiguous target copy works fine if I just put underscore in the destination directory, like Sales_Reports... ... (3 Replies)
Discussion started by: Trusevich
3 Replies

9. Solaris

Solaris 10 install won't accept IP address

Hi I am trying to debug an issue with an automated install I have set-up. So to start I just ran a simple ok; boot cdrom - install but when it came to the IP address field it would only take the following format 123.123.123.12 and would not let me enter the last digit Anybody got any... (9 Replies)
Discussion started by: eeisken
9 Replies

10. Shell Programming and Scripting

nawk won't accept comma as delimiter

I have a text file delimited by commas, with three fields (no " marks). I want to use awk to create a fourth field which is equal to the line number + field 1 + .txt I've searched this forum and found the following nawk -v OFS=';' '{print $0, FNR}' myFile Which I've amended to change the... (2 Replies)
Discussion started by: b.hamilton
2 Replies
SOCKS_CLIENTS(1)					      General Commands Manual						  SOCKS_CLIENTS(1)

NAME
rfinger - SOCKS client version of finger rftp - SOCKS client version of ftp rtelnet - SOCKS client version of telnet rwhois - SOCKS client version of whois SYNOPSIS
See the man pages on finger(1), ftp(1), telnet(1), whois(1). DESCRIPTION
These programs provide the well-known functionalities to hosts within a firewall. Normally, when a firewall is constructed, IP-accessibil- ity across the firewall is cut off to reduce security risk to hosts within the firewall. As a result, inside hosts can no longer use many of the well-known tools directly to access the resources outside the firewall. These programs restore the convenience of the well-known tools while maintaining the security requirement. Though the programs differ very much from their counterparts in the use of the communication scheme, they should behave almost indistinguishable to the users. Note though that rftp does echo the password as you type it in if you are using anonymous as log-in name. Unlike those of the previous versions, these are "versatile" clients, meaning that they can be used for connections to inside hosts directly and to outside hosts via SOCKS proxy servers. So they can be used as replacements of their traditional counterparts. When any of these programs starts, if the environment variable SOCKS_BANNER is defined, the program prints to stderr its version number and the name or IP address of its default SOCKS proxy server. It then consults the configuration file to determine whether a request should be allowed or denied based on the requesting user, the destination host, and the requested service. For allowable requests, the configuration file also dictates whether direct or proxy connection should be used to the given destination, and optionally the actual SOCKS servers to use for the proxy connection. The program lookps first for the frozen configuration file /etc/socks.fc first. If that's not found, it then looks for the file /etc/socks.conf. If both files are absent, these programs will only try direct connections to the destination hosts, making them behaving like their regular counterparts. You can use environment variable SOCKS_NS to set the nameserver for domainname resolutions. Be sure you use the IP address of the name- server you want to use, not its domainname. If SOCKS_NS doesn't exist, the IP address defined by the symbol SOCKS_DEFAULT_NS at compile time is used if the programs were compiled with that symbol defined. Otherwise the nameservers specified in /etc/resolv.conf are used. All the client programs uses syslog with facility daemon and level notice to log their activities. These log lines usually appear in file /var/adm/messages though that can be changed by modifying /etc/syslog.conf. (See syslogd(8) and syslog.conf(5).) Typical lines look like Apr 11 10:02:23 eon rfinger[631]: connect() from don(don) to abc.com (finger) using sockd at socksserv May 10 08:39:07 eon rftp[603]: connect() directly from blue(blue) to xyz.edu (ftp) May 10 08:39:09 eon rftp[603]: bind() directly from blue(blue) for xyz.edu (ftp) May 18 13:31:19 eon rtelnet[830]: connect() from root(jon) to xyz.edu (telnet) using sockd at sockd2 May 18 14:51:19 eon rtelnet[921]: refused -- connect() from jon(jon) to xyz.edu (telnet) Of the two user-ids appearing in each log line, the first is the effective user-id when the program is invoked, the second (that within the parentheses) is the one used at login. Access control applies to the effective user-ids. SEE ALSO
finger(1), ftp(1), sockd(8), sockd.conf(5), socks.conf(5), telnet(1), whois(1) ENVIRONMENT
SOCKS_SERVER, if defined, specifies the name or IP address of the SOCKS proxy server host to use, overriding the default server compiled into the programs. SOCKS_NS, if defined, specify the IP address of the domain nameserver that should be used for name resolution, overriding both the defini- tion of symbol SOCKS_DEFAULT_NS and the file /etc/resolv.conf. ORIG_FINGER, if defined, specified the (altered) full pathname of the original finger program, which should have been renamed before installing the rfinger as the regular finger. The rfinger program invokes the original finger program to lookup information on local users. Normally this name should be compiled directly into rfinger, avoiding the need for this environment variable. Use ORIG_FINGER only if you want to override what is compiled into rfinger. AUTHOR
David Koblas, koblas@netcom.com Ying-Da Lee, ylee@syl.dl.nec.com May 6, 1996 SOCKS_CLIENTS(1)
All times are GMT -4. The time now is 08:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy