Displaying 7 results from an estimated 7 matches for "cesspool".
2007 Apr 16
1
sendmail smrsh symlinks not working against php scripts
Hello.
I am trying to forward the e-mails received to one address towards a php
script.
I am trying all I can but nothing does.
I have edited my /etc/aliases file and added this line.
ecard-bounce: "|/usr/bin/php /etc/smrsh/ecardbounce.php"
Then, of course I do a 'newaliases'.
In my /etc/smrsh I have placed the symbolic link defined above, which has
been created this way:
ln
2004 Sep 10
3
deafening silence
I haven't seen too much feedback since the 0.9 release, which
probably means one of three things:
1. it works perfectly and nobody has any complaints!
2. nobody is using 0.9.
3. the list is having problems.
I mention #3 because at least one person has been blocked by
sourceforge's new filter.
Anyone...anyone?
__________________________________________________
Do You Yahoo!?
Get email
2008 Mar 14
15
Am I off track on my testing?
Is it just me or does anyone else miss being able to create something
quickly. Once you start writing all the tests your time is now
increased by a factor of 10. I agree with the logic in testing, but am
I doing something wrong?
Take the simple example of a controller test for an index action that
shows all the forum posts for a user account.
The controller code would be something like what is
2015 Dec 10
4
wifi on servers and fedora [was Re: 7.2 kernel panic on boot]
...do with mobile devices and plug-and-play networking. Take that page's statement about setting net.ifnames=0 cautiously, I found it was the exact opposite. biosdevname is a program written by someone at Dell which is supposed to report on hardware configurations and make some sense out of the cesspool. It appears the source of the whole thing is hardware vendors doing whatever they want and in some cases not playing by the rules.
----- Original Message -----
From: "John R Pierce" <pierce at hogranch.com>
To: centos at centos.org
Sent: Thursday, December 10, 2015 4:33:24 PM
Subj...
2005 Oct 02
11
Repeated attacks via SSH
Everyone:
We're starting to see a rash of password guessing attacks via SSH
on all of our exposed BSD servers which are running an SSH daemon.
They're coming from multiple addresses, which makes us suspect that
they're being carried out by a network of "bots" rather than a single attacker.
But wait... there's more. The interesting thing about these attacks
is that
2015 Dec 10
7
wifi on servers and fedora [was Re: 7.2 kernel panic on boot]
Warren Young wrote:
> On Dec 9, 2015, at 11:55 AM, m.roth at 5-cent.us wrote:
>> Matthew Miller wrote:
>>> On Wed, Dec 09, 2015 at 01:05:15PM -0500, m.roth at 5-cent.us wrote:
>>>>>>
>>>> So, you're saying that end users need to go poke their noses into the
>>>> development process
>>>
>>> If you want to go out of
2008 Mar 21
27
Alexandre says "let the newbies run as root"
I don't agree with him, but there you have it.
---------- Forwarded message ----------
From: Alexandre Julliard <julliard at winehq.org>
Date: Fri, Mar 21, 2008 at 1:32 AM
Subject: Re: loader: more stringent sanity check
To: Dan Kegel <dank at kegel.com>
Cc: wine-devel at winehq.org
"Dan Kegel" <dank at kegel.com> writes:
> Many, many newbies are running