Search:

Type: Posts; User: deadpaperplate; Keyword(s):

Search: Search took 0.04 seconds.

  1. Replies
    8
    Views
    6,663

    I like it cause I have multiple monitors speakers...

    I like it cause I have multiple monitors speakers and other stuff crowding my desk, the new Imac could fit nicely in a corner, and the screen sit to the side.
    Though I do have to agree, it is pricy...
  2. Replies
    14
    Views
    19,621

    services

    ok, time for my 2 cents, hope I'm not off topic here, but you had mentioned trying to find info on the services.

    Since you are running RH 7.1 you don't have to bother with /etc/services to disable...
  3. Replies
    9
    Views
    7,203

    you can never trust a biased magazine

    As everyone else pointed out the article is false in its statments of IIS being superior in stability and security, I could go into the details but I think thats already been covered. My main beef...
  4. Replies
    18
    Views
    12,345

    Actually I have a copy of XP home, and the remote...

    Actually I have a copy of XP home, and the remote assistance function was turned ON by default. . . ooops.

    And as far as my opinion goes on all this, I honestly I belive that Microsoft's OS's are...
  5. Replies
    33
    Views
    26,819

    If you left the file system as FAT32 when you...

    If you left the file system as FAT32 when you upgraded to XP, then that is probibly 99.9% of your problems. XP is essentially win2k with windowblinds, and a bit of 98 code (they brough back...
  6. Replies
    17
    Views
    10,699

    If you get to the logon prompt, then telnet...

    If you get to the logon prompt, then telnet services are running fine.

    The reason you can't login as root, is because telnet does not alow that.(there is no way to change this, that I know of)...
  7. Replies
    2
    Views
    6,119

    Well, windows systems recognize wireless cards...

    Well, windows systems recognize wireless cards just like any other NIC. So do linux systems, except that they are started differnetly, and run off of different scripts.
    I figure as long as the card...
  8. Replies
    2
    Views
    6,119

    bypassing an access list

    I have an 802.11b wireless network setup here, with access point and a few clients, that I am using for testing. My objective is to find as many ways to break into it as I can.
    with 802.11 there...
  9. Replies
    57
    Views
    45,636

    Nearly everyone I have talked to about winXP said...

    Nearly everyone I have talked to about winXP said the same thing.
    Its great, and never crashes.

    This reminds me of when win2K came out, everyone said the same thing about it.
    Then 4 months...
  10. Replies
    13
    Views
    30,922

    actually Terr you are half right. both spellings...

    actually Terr you are half right.
    both spellings are valid, just depends on personal preference. nybble is more of a tech slang spelling of it, but they are both commonly used.

    bite-->byte, ...
  11. Replies
    13
    Views
    30,922

    Mmmmmm. . . subnetting. . verynice. I liked...

    Mmmmmm. . . subnetting. . verynice.

    I liked the way you handled the binary explanation Terr, very good.
    Any time someone asks me about subnetting I like to tell them its much easier to understand...
  12. Replies
    15
    Views
    12,261

    iptables docs

    cybermike_dk,

    There are actually several howtos for iptables.
    do a search in google for:
    advanced routing howto
    iptables howto
    packet filtering howto

    of course this requires a net...
  13. Replies
    11
    Views
    9,444

    oops

    that last

    chkconfig --level

    should have been

    chkconfig --list
  14. Replies
    11
    Views
    9,444

    switch the runtime

    Kapper, you are obviously in runtime 5 (X), you would be better off in runtime 3 (console).
    edit the file /etc/inittab
    the first uncommented line should be
    id:5:initdefault:

    change the 5 to a...
  15. Replies
    6
    Views
    7,740

    Of course you can alway delete the log file, then...

    Of course you can alway delete the log file, then recreate it as a symbolic link to /dev/null. of course the admin will wonder why the log is always empty, and a simple ls -l will tell you its...
  16. Replies
    2
    Views
    6,636

    its an ISDN voice box/answering machine package...

    its an ISDN voice box/answering machine package for linux

    I think if you take a look at those 2 entries, (one for michael, and one for nicole right?) you will notice the # at the start of the...
  17. Replies
    10
    Views
    9,532

    Realy they are all the same thing, the only...

    Realy they are all the same thing, the only difference is what packages are installed, the type of init system, and distro specific tools (ie RH linuxconf).
    Most would go for something like RH when...
  18. Replies
    48
    Views
    31,363

    screen lock in X

    Actually the screen lock in X is only good for security if your box is in run level 5.
    If its in run level 3, then you can use Ctrl + Alt + Backspace to kill X, and land at the command prompt...
Results 1 to 18 of 18