search for: _three_

Displaying 6 results from an estimated 6 matches for "_three_".

2003 Jan 14
3
Shorewall-1.3.13
...T rule. Here are three rules from my previous rules file: DNAT net dmz:206.124.146.177 tcp smtp - 206.124.146.178 DNAT net dmz:206.124.146.177 tcp smtp - 206.124.146.179 ACCEPT net dmz:206.124.146.177 tcp www,smtp,ftp,... These three rules ended up generating _three_ copies of ACCEPT net dmz:206.124.146.177 tcp smtp By writing the rules this way, I end up with only one copy of the ACCEPT rule. DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.178 DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.179 ACCEPT...
2014 Mar 14
2
Changing the Reply-To: option for the list
On Mar 14, 2014 3:41 PM, "Ady" <ady-sf at hotmail.com> wrote: > > > > Hi all, > > > > A few years ago, at popular request, I changed the default of the list > > to have a Reply-To: pointing at the list. I personally find it very > > annoying, and I would like to change the default back. > > > > Would people object to trying it? >
2014 Mar 15
0
Changing the Reply-To: option for the list
...nd users/mailers still > emailing me directly rather than the list. FWIW: I'm voting _for_ this change. So do _not change_ the Reply-To: header. See http://www.unicom.com/pw/reply-to-harmful.html for motivation. That webpage is over a decade old, so it lacks that good e-mail programms have _three_ reply-buttons: "Reply", "Reply to all" and "Reply to List". Most likely we will encounter posters who aren't aware of a "Reply to List" button, but hey, we can tell them about it. And while making the change, please remove the footer line 'Please...
2002 Dec 05
7
New in CVS
The ''firewall'' script currently in the /Shorewall CVS project: a) Is approximately 15% faster starting/restarting on my configuration -- please report your experiences with it. b) Reloads Traffic Control/Shaping as part of "shorewall refresh" c) Turns off the shell trace after an error has occured (except when the command being traced is "stop" or
2005 Apr 14
9
MAC Validation and related problem that is killing me...
Hi there... I want to use MAC validation for strict computer access rules to our server and LAN. I do not want any computer have ANY kind of access (neither LAN or Internet access, not even get an IP from the dhcp server, or being able to connect to anything manually configuring the IP settings) unless its MAC is on the list. Our server has two interfaces (eth0 & eth1) and 2 zones (net and
2013 May 31
62
cpuidle and un-eoid interrupts at the local apic
Recently our automated testing system has caught a curious assertion while testing Xen 4.1.5 on a HaswellDT system. (XEN) Assertion ''(sp == 0) || (peoi[sp-1].vector < vector)'' failed at irq.c:1030 (XEN) ----[ Xen-4.1.5 x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<ffff82c48016b2b4>] do_IRQ+0x514/0x750 (XEN) RFLAGS: 0000000000010093 CONTEXT: