Welcome, Guest
You have to register before you can post on our site.
Forum Statistics
» Members: 5,235
» Latest member: pwcreator
» Forum threads: 4,030
» Forum posts: 16,405
Full Statistics
Online Users
There are currently 193 online users.» 0 Member(s) | 188 Guest(s) Applebot, Baidu, Bing, Google, Yandex
Latest Threads
Wi-Fi works for a few min...
Forum: Network Problems
Last Post: kabifff
2025-12-15, 12:57 AM
» Replies: 0
» Views: 58
How to install Archboot i...
Forum: Network Problems
Last Post: Meup
2025-05-13, 01:41 PM
» Replies: 0
» Views: 3,605
clear logs in smoothwall
Forum: Security and Firewalls
Last Post: amanda63
2024-03-10, 03:27 PM
» Replies: 8
» Views: 113,443
I cannot install RedHat 8...
Forum: Redhat
Last Post: hybrid
2023-11-11, 01:01 PM
» Replies: 1
» Views: 61,326
How things are done, usin...
Forum: Xorg Problems
Last Post: ross
2023-09-04, 09:03 AM
» Replies: 0
» Views: 4,969
Im back.....
Forum: Hello
Last Post: anyweb
2021-01-17, 11:36 AM
» Replies: 1
» Views: 8,642
add mp3 plugin to xmms in...
Forum: Fedora
Last Post: anyweb
2021-01-17, 11:30 AM
» Replies: 11
» Views: 46,041
Configuring VSFTPd Server
Forum: FTP Server
Last Post: Johnbaca
2020-10-14, 10:25 AM
» Replies: 32
» Views: 144,817
Wolf won't play sound!
Forum: Game Problems
Last Post: Guest
2020-10-03, 05:51 PM
» Replies: 1
» Views: 80,101
Using git + python
Forum: How Do I?
Last Post: Clueless puppy
2020-08-21, 04:37 PM
» Replies: 0
» Views: 62,842
How do i uninstall linux?
Posted by: Harrison - 2005-02-17, 06:30 PM - Forum: How Do I?
- Replies (2)
Hey ... i need to uninstall linux from my laptop not bothered if i have to format it all of my work is backed up im using FEDORA CORE 3 anyone got any ideas?
need to get it off so i can put windows on for a couple of weeks got to get a few things done i will then bang it on dual boot...
is it also possible for me to create a dual boot from linux?
Knoppix 3.36
Posted by: the_planarian - 2005-02-17, 06:22 PM - Forum: Knoppix
- Replies (2)
hi!
More frequently (for my work), i use XP because most Macromedia & Adobe developers don't make their products targeted towards linux-based communities (to my knowledge).
In a nutshell, my XP is temporarily "dead".
And (more then ever right now) Knoppix is the bestest thing in the whole wide world. B)
Only problem, is that i'm a complete linux N00B and because of my crazy schedule @ school i'm at a loss for copius time (or brianpower) to ingest mountainloads of linux FAQs & "How to" docs (though i am trying whenever i can!).
1.) How well can i trust Knoppix 3.36 by itself w/o a firewall (or does it have a built-in firewall? o.O)
2.) Is there an open-source firewall in the works or already out there?
3.) Besides just copying over files to my root dir (where i have my recently corpse-ified XP installed & since the data on my drive is still good with copius backups left to do!) how do i install Knoppix onto my system?
4.) Does installing a 2nd OS (i.e. Knoppix) conflict with an already-installed OS? Or am i now forced to resort to creating a partition for it?
5.) If argument = "true" to latter q.4.) , then is there a way to set up an "emergency activation of said "partition" in case of XP breakdown a 2nd, 3rd or 4th time" ? -or does that just happen in hollywood? o_O
6.) Is there decent CD-burning software on the Sourceforge/general open-source market?
7.) Is there a decent 5-in-1 instant messenger for the K! desktop?
8.) How do you extract stuff using "Ark" (for example) if you want to install kmerlin? :(
For now this'll be all... until i can figure out how to either get my XP back or how Knoppix or (more specifically) the "programming Linux commands" process works.. [img]<___base_url___>/uploads/emoticons/default_ph34r.png[/img]
Thanx in advance! :)
-=*+[z']+*=-
problems getting fcp not to ask for password
Posted by: marlenus - 2005-02-17, 04:15 PM - Forum: Remote Access
- Replies (1)
I followed the instructions here on how to set everything up:
[/url] [url=http://www.siliconvalleyccie.com/linux-hn/...tm#_Toc91603056]http://www.siliconvalleyccie.com/linux-hn/...tm#_Toc91603056
However, whenever I fcp I'm still prompted for a password. Here is the debug log file for fcp, I can't see anything obviously wrong in it:
[deployer@stage3 rob_test]$ scp -r -v rules/40/*
buildscript@xxx.yyy.com:rules/40
Executing: program /usr/bin/ssh host xxx.yyy.com, user buildscript, command
scp -v -r -d -t rules/40
OpenSSH_3.5p1, SSH protocols 1.5/2.0, OpenSSL 0x0090701f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to xxx.yyy.com [10.1.1.153] port 22.
debug1: Connection established.
debug1: identity file /home/deployer/.ssh/identity type -1
debug1: identity file /home/deployer/.ssh/id_rsa type 1
debug1: identity file /home/deployer/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version
OpenSSH_3.6.1p2
debug1: match: OpenSSH_3.6.1p2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.5p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 108/256
debug1: bits set: 1631/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'xxx.yyy.com' is known and matches the RSA host key.
debug1: Found key in /home/deployer/.ssh/known_hosts:2
debug1: bits set: 1562/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: next auth method to try is publickey
debug1: try privkey: /home/deployer/.ssh/identity
debug1: try pubkey: /home/deployer/.ssh/id_rsa
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: try pubkey: /home/deployer/.ssh/id_dsa
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: next auth method to try is keyboard-interactive
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: next auth method to try is password
buildscript@xxx.yyy.com's password:
Can't detect my access point
Posted by: cheetahman - 2005-02-17, 02:41 AM - Forum: Wireless
- No Replies
I have a Linksys WPC54G V2 Network Card that can't detect the acess point
OS:Suse Linux 9.1/Windows XP SP2
Router:Linksys WRT54G
Wireless Network Card:WPC54G V2
The software that is running it is Driverloader and the light is on so its detected by Suse
rpm question, src or fc2 ??
Posted by: woppa30 - 2005-02-15, 02:43 PM - Forum: Package Management
- Replies (1)
I hope somebody can help clarify a point.
When looking at a site such as rpmfind I often see a list of rpm's that are for different versions e.g FC2, FC3 etc etc etc. You often see a .src.rpm file as well which, correct me if I am wrong, is the source code, but in a rpm package.
Does this mean that if I download this .src.rpm package and install that with...
rpm -ivh whatever.src.rpm it will install OK ???
I hope somebody can clear this up in my foggy mind.
Best wishes,
David.
Spoofed web address
Posted by: xDamox - 2005-02-14, 05:55 PM - Forum: Security
- No Replies
Hi,
I was doing my daily security checks when I have noticed a vuln in web browser
which allow users to spoof addresses. Every web browser that I know of have
not produced a patch which is priity poor the web browsers vuln to this are:
OmniWeb
Opera
Mozilla / Firefox / Camino
Konqueror
Netscape
Safari
if your using Firefox you have a better chance of avoiding this by installing SpoofStick 1.05
exstention for firefox this can be downloaded from:
SpoofStick
Setting up MySQL the easy and seurce way
Posted by: xDamox - 2005-02-14, 04:26 PM - Forum: LAMP
- No Replies
The most secure way to to configure mysql is to use the script provided by them called:
mysql_secure_installation.
The first function we must conduct is to startup MySQL by issueing the following
command:
Code:
service mysqld start
this command will have now started the MySQL server the next command that will
be issued is:
Code:
sh mysql_secure_installation
This will go through a seris of questions as shown below:
Quote: NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MySQL SERVERS IN PRODUCTION USE! PLEASE READ EACH STEP CAREFULLY!
In order to log into MySQL to secure it, we'll need the current
password for the root user. If you've just installed MySQL, and
you haven't set the root password yet, the password will be blank,
so you should just press enter here.
Enter current password for root (enter for none):
OK, successfully used password, moving on...
Setting the root password ensures that nobody can log into the MySQL
root user without the proper authorisation.
Set root password? [Y/n]y
New password:
Re-enter new password:
Password updated successfully!
Reloading privilege tables..
... Success!
By default, a MySQL installation has an anonymous user, allowing anyone
to log into MySQL without having to have a user account created for
them. This is intended only for testing, and to make the installation
go a bit smoother. You should remove them before moving into a
production environment.
Remove anonymous users? [Y/n] y
... Success!
Normally, root should only be allowed to connect from 'localhost'. This
ensures that someone cannot guess at the root password from the network.
Disallow root login remotely? [Y/n] y
... Success!
By default, MySQL comes with a database named 'test' that anyone can
access. This is also intended only for testing, and should be removed
before moving into a production environment.
Remove test database and access to it? [Y/n] y
- Dropping test database...
... Success!
- Removing privileges on test database...
... Success!
Reloading the privilege tables will ensure that all changes made so far
will take effect immediately.
Reload privilege tables now? [Y/n] y
... Success!
Cleaning up...
All done! If you've completed all of the above steps, your MySQL
installation should now be secure.
Thanks for using MySQL!
Now that the script has finished to have securly configure mysql through the script. B)
Note is a good idea to stop root login remotly.
I have also attached the mysql_secure_installtion file note delete the file
extension when running this scirt as it is a bash script.
mysql_secure_installation.txt
Attached Files
mysql_secure_installation.txt (Size: 6.16 KB / Downloads: 23)