2007/4/7-10 [Computer/SW/Unix] UID:46230 Activity:nil | 4/7 Dear VMWare users. I just want to post this because I spent an
entire day trying to find out why my Ubuntu 2.6.18 has a serious
time drift problem on host WinXP Pro. The problem is that even
when you run vmware-tools and sync the time between your VM and
your host, there is still a delay-- vmware-tools syncs every once
in a while, and since my VM is so slow it doesn't catch up and
...
|
2003/7/24 [Computer/SW/Unix] UID:29129 Activity:nil | 7/24 Related to the recent LANMANAGER password attacks:
Vulnerabilities in Win2k kerberos authentication.
http://www.hut.fi/~autikkan/kerberos -John
\_ I've decided it doesn't matter anymore. If you run windows you
just have to assume the whole thing is broken top to bottom and
the rest is just details.
...
|
2003/2/16-17 [Computer/SW/OS/OsX] UID:27431 Activity:kinda low | 2/15 I have three computers at home, all running some *nix (2 OS X + linux
if this matters). I would like them to have the same basic system
config. and user accounts for members of my family and friends. How
do I automate this? I know this is a very basic sys admin job but
I am just a home user and do want to spend too much time learning or
doing things to become a home sys admin of sort or buying extra
...
|
2002/7/2-4 [Computer/SW/Unix] UID:25268 Activity:very high | 7/2 Does it make sense to run NFS without NIS/NIS+? I've heard that file
permissions won't work if you're running NFS w/o NIS.
\_ nfs can run perfectly fine w/o NIS... thers not dependancy
either way.. the file perm shit is dumb and wrong or you badly
misunderstood... blah why do i post in the motd? -shac
\_ It's good that you post on the motd. Not the dumbass posters
...
|
2002/2/22 [Computer/SW/Security, Computer/SW/Unix] UID:23943 Activity:very high | 2/21 My moronic boss asked me to write a batch file to auomate a telnet
session and one requirement is it should not ask user for the
password. How do I kindly tell him that he is an idiot?
\_ setup ssh with passwordless public key or host-based authentication,
symlink telnet to ssh and let him believe that the users are using
telnet ;p
...
|
2000/7/28-29 [Computer/SW/Security] UID:18808 Activity:kinda low | 7/28 What are the security implications of using a network time server?
\_ If someone nasty can control your clock precisely it may make it
easier for them to guess the values that will be generated by
psuedo-random algorithms seeded with the current time. If those
are used to form keys or such, security may be weakened. However,
many security protocols, such as Kerberos & NIS+, require computers
...
|
2000/2/11-13 [Computer/SW/Languages/C_Cplusplus, Computer/SW/OS/FreeBSD] UID:17493 Activity:high | 2/11 Responce to C, C++, new grad, love for comp sci, love for $$$, 1 word:
\_ The smart ones learn to spell or run a spell checker.
\_ And how to count words.
The dumb and greedy ones work in the industry
\_ think C++, Bell Labs.
\_ C++ is a perfect example of industry stupidity.
...
|
2000/1/30-2/1 [Computer/SW/OS/FreeBSD] UID:17375 Activity:nil | 1/30 Let's say I want to run an IMAP server from my BSD box at home, but
I want something like SSL, Kerberos (or ???) for better security.
Any suggestions/tips on what software to choose? What is easier to
set up or better to use? Thanks.
\_ Use UW IMAP server and sslwrap or stunnel. All of the parts are
in ports, you just have to put them together. --dbushong
...
|
1999/1/6-7 [Computer/SW/Unix] UID:15179 Activity:high | 1/5 Where can I grab kerberos for an irix machine?
\_ this question shows a lack of conceptual understanding.
\_ Then pray tell, oh enlightened one, where did I
stray from my path?
\_ where you decided what you need instead of telling us
what you're trying to accomplish
...
|
1998/12/19-20 [Computer/SW/Unix] UID:15129 Activity:moderate | 12/18 in an .rhosts file how do you give access to your account for
multiple computers on the same subdomain (like all the computers
that end with http://cs.berkeley.edu without having the specifiy every
computer in soda hall)
\_ Don't be stupid. This is painfully wrong. Do not do this.
Use ssh and setup an authorized keys file.
...
|
1998/9/23-24 [Computer/SW/Security] UID:14655 Activity:high | 9/22 Any chance of getting ssh2 installed? not clobber ssh1, but just
have ssh2 available so that we might be able to access other
systems, pretty please? I'll do it if you gimme the root passwd!
\_ You don't need to be root. Just compile it in your home directory
and delete the source tree once you'r done. The README tells you
how to do it. Or better, put it in some shared directory so
...
|
|