09-23-2008 01:00 PM
Almost every laptop on sale today comes equipped with the Kensington security slot on the side or back, through which you can connect a theft-deterring locked steel cable. The system's down sides are (a) that a would-be thief can damage or destroy your equipment trying to yank the cable out, and (b) that you have to buy the cable separately. As an alternative, the free software utility Adeona won't preemptively deter theft, but it will help you track down your stolen equipment and better the chances of its recovery by police.
Dear all,
I would like to transfer my old laptop documents/files etc to the new laptop without using any external hard disk.
Please let me know if its possible via any way.
Thank in advance,
emily (3 Replies)
I am trying to install VirtualBox on RHEL 5 but I need the 32 bit version for 32 bit Windows. When I run yum I get the following:
sudo yum localinstall /auto/spvtg-it/spvss-migration/Software/VirtualBox-4.3-4.3.2_90405_el6-1.i686.rpm
Loaded plugins: fastestmirror
Setting up Local Package... (13 Replies)
Hello,
This is a programming question as well as a suse question, so let me know if you think I should post this in programming.
I have an application that I compiled under opensuse 12.2 using g77-3.3/g++3.3. The program compiles and runs just fine. I gave the application to a colleague who... (2 Replies)
Hi to all,
I have the problem that a laptops with windows XP cannot startup even in safe mode nor using last good known configuration. I have a Ubuntu 10.10 Live CD and booting from it I can read the Hard Drive.
I need to do a backup the Hard Drive from XP laptop and I want to connect this... (5 Replies)
Hi, i suddenly realized that a directory is deleted unfortunately there are many user have pervilages on this directory
is there a way to track the user who delete this directory
or atleast from now can i enable something so that i can track from now
I think there is way from... (2 Replies)
dear all ,
I m new to shell programming and I need your help.
Actually i want to keep track of all the commands executed in a bash prompt of users ,
very much in same manner as it is displayed when we run "history" command.
now the users are smart enough as they delete their history by... (6 Replies)
Like the topic says, does anyone know if it is possible to check to see when an FTP only user has logged in? Because the shell is /bin/false and they are only using FTP to access the system doing a "finger" or "last" it says they have never logged in.
Is there a way to see when ftp users log in... (1 Reply)
All,
Is there any command or method by which we can track changes in a file in Unix (Something similar to track changes in a word document).
I know there is CVS which is used to store code changes and track changes in the code. But other than CVS any way to find out changes done in a file... (1 Reply)
We just went from HP-UX 10.20 to 11.00.
All the bugs are out, except for a small detail...the old 9-track isn't working.
We receive large amounts of data on reel-to-reel so I kinda need it fixed. In the meantime, I'm trying to see if they can send me a DAT tape instead.
I'm pretty sure the drive... (8 Replies)
GVPE(8) GNU Virtual Private Ethernet GVPE(8)NAME
gvpe - GNU Virtual Private Ethernet Daemon
SYNOPSIS
gvpe [-cDlL] [--config=DIR] [--no-detach] [-l=LEVEL]] [--kill[=SIGNAL]] [--mlock] [--help] [--version] NODENAME [option...]
DESCRIPTION
See the gvpe(5) man page for an introduction to the gvpe suite.
This is the manual page for gvpe, the virtual private ethernet daemon. When started, gvpe will read it's configuration file to determine
the network topology, and other configuration information, assuming the role of node NODENAME
It will then create/connect to the tun/tap device and set up a socket for incoming connections. Then a if-up script will be executed to
further configure the virtual network device. If that succeeds, it will detach from the controlling terminal and continue in the
background, accepting and setting up connections to other gvpe daemons that are part of the same virtual private ethernet.
The optional arguments after the node name have to be of the form:
[I<nodename>.]var=value
If the argument has a prefix of nodename. (i.e. laptop.enable-dns=yes) then it will be parsed after all the config directives for that
node, if not, it is parsed before the first node directive in the config file, and can be used to set global options or default variables.
For example, to start gvpe in the foreground, with log-level info on the node laptop, with TCP enabled and HTTP-Proxy host and Port set,
use this:
gvpe -D -l info laptop
http-proxy-host=10.0.0.18 http-proxy-port=3128
laptop.enable-tcp=yes
OPTIONS -c, --config=DIR
Read configuration options from DIR
-d, --l=LEVEL
Set logging level to LEVEL (one of: noise, trace, debug, info, notice, warn, error, critical).
--help
Display short list of options.
-D, --no-detach
Don't fork and detach but stay in foreground and log messages to stderr in addition to syslog.
-L, --mlock
Lock gvpe into main memory. This will prevent sensitive data like shared private keys to be written to the system swap
files/partitions.
--version
Output version information and exit.
SIGNALS
HUP Closes/resets all connections, resets the retry time and will start connecting again (it will NOT re-read the config file). This is
useful e.g. in a /etc/ppp/if-up script.
TERM
Closes/resets all connections and exits.
USR1
Dump current network status into the syslog (at loglevel notice, so make sure your loglevel allows this).
FILES
/etc/gvpe/gvpe.conf
The configuration file for gvpe.
/etc/gvpe/if-up
Script which is executed as soon as the virtual network device has been allocated. Purpose is to further configure that device.
/etc/gvpe/node-up
Script which is executed whenever a node connects to this node. This can be used for example to run nsupdate.
/etc/gvpe/node-down
Script which is executed whenever a connection to another node is lost. for example to run nsupdate.
/etc/gvpe/pubkey/*
The directory containing the public keys for every node, usually autogenerated by executing gvpectrl --generate-keys.
/var/run/gvpe.pid
The PID of the currently running gvpe is stored in this file.
BUGS
The cryptography in gvpe has not been thoroughly checked by many people yet. Use it at your own risk!
If you find any bugs, report them to gvpe@schmorp.de.
SEE ALSO gvpe(5) for an introduction, gvpe.conf(5), gvpectrl(8).
The GVPE mailing list, at <http://lists.schmorp.de/> or gvpe@lists.schmorp.de.
GVPE comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions; see the
file COPYING for details.
AUTHOR
Marc Lehmann <gvpe@schmorp.de>.
And thanks to many others for their contributions to gvpe, especially the tincd authors, who inspired me to write this program (after
scavenging their source code ;).
2.2 2008-09-01 GVPE(8)