command to create Shell - Konsole
by Michael D. Berger
Under KDE on FC4, is there a shell command that will
create a Shell - Konsole just as if I clicked:
<Red Hat> -> System Tools -> Terminal ?
Thanks,
Mike.
17 years, 2 months
Here we go again -- printer not working ??
by Bill Case
Hi;
I have a HP psc 1315 attached to my FC6. I have all upgrades as of this
morning.
I tried to print a simple *.txt document through gedit and OOo Writer
with no response. The job is in the queue; gedit job shows document as
'unknown'; the OOo job shows the proper document name but does not
process. Printer is set to go; no flashing warning lights; paper
inserted; relatively new ink cartridges. Printed fine a couple of days
ago. Printer works in WindowsXP.
Command line printing (~]$ lp
'/home/bill/Desktop/Docs/Stuff/BugInstall') fails to print as well.
Message: request id is psc_1310_series_-143 (1 file(s)).
What now ??
--
Regards Bill
17 years, 2 months
xetex and fc6
by François Patte
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Bonjour,
Is there a way to install xetex under fc6: i try to compile from rpm src
but there are lots of conflicts to get xdvipdfmx compiled....
Thank you.
- --
François Patte
UFR de mathématiques et informatique
Université René Descartes
http://www.math-info.univ-paris5.fr/~patte
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iD8DBQFGL0/qdE6C2dhV2JURAuHvAJ49r1hosr357rvtIB32vCSRJcpVfQCgt8uf
B/D3VMLoMHEQNVWzCLzW6Ic=
=spXw
-----END PGP SIGNATURE-----
17 years, 2 months
Re: octave error
by Martin Marques
Till Maas escribió:
> Martin Marques wrote:
>
>> octave:14> -5^4
>> ans = -625
>
> octave:2> (-5)^4
> ans = 625
>
> I do not know octave well enough, but maybe this is intended / the same in
> matlab.
Grrr.
You are right. Didn't think about the parentesis.
Sorry for the noise.
--
select 'mmarques' || '@' || 'unl.edu.ar' AS email;
---------------------------------------------------------
Martín Marqués | Programador, DBA
Centro de Telemática | Administrador
Universidad Nacional
del Litoral
---------------------------------------------------------
17 years, 2 months
Setting up multiple simultaneous sessions
by Simon Slater
Now GDM is configured properly (thanks again Mike), I would like to set
up this FC6 box to allow 5 users (the kids) to login concurrently as
different sessions and switch to their session for as long or, more to
the point, as little as they need.
Two possibilities that I have considered is using the Lock Screen and
Switch user in KDE, so that they can select their session from the gui
menu. Alternately, can fixed login session be assigned to one of the
F1-F5 keys for each user and one other for me to access as a console if
required, rather than the default F7, with F1-F6 as consoles? If so how
can this be done?
Also, can a new session be started from within Gnome as it can from
within KDE?
All your comments and suggestions would be greatly appreciated.
Regards
Simon Slater
17 years, 2 months
ssh & sftp terminal timeout
by Tony Crouch
Hi All,
I noticed of late my ssh & sftp connections have been timing out very
quickly. If I leave my machine (or do not use the ssh connection) for
even 10 minutes the connection will timeout and I will have to close the
window and re-connect.
I am unsure whether the problem exists with my local machine or my
university's servers (the machines to which I am remotely logging onto).
I have the following modules installed (and versions) on my machine:
openssh-askpass-4.3p2-19.fc6
openssh-clients-4.3p2-19.fc6
openssh-server-4.3p2-19.fc6
openssh-4.3p2-19.fc6
While my university is running the following versions:
fuse-sshfs-1.7-1.fc4
openssh-server-4.2p1-fc4.10
openssh-askpass-4.2p1-fc4.10
openssh-4.2p1-fc4.10
openssh-askpass-gnome-4.2p1-fc4.10
openssh-clients-4.2p1-fc4.10
Was wondering if anyone could possibly shed some light on this or provide some sort of explanation?
Thanks for your assistance.
Cheers,
Tony Crouch
17 years, 2 months
Re: am I hacked?
by Chris Tyler
On Sun, 22 Apr 2007 01:50:48 +0100, Keith G. Robertson-Turner wrote:
> Verily I say unto thee, that Martin Marques spake thusly:
> > peter kostov escribi:
> >>
> >> I have logwatch installed, but I didn't know about it. Thanks for
> >> pointing it out!
> >
> > Configure it and make it run. It helps alot!
>
> AFAIK the default Fedora setup is to install and run logwatch using
> cron, every day at 4:02am.
>
> There should be a file:
>
> /etc/cron.daily/0logwatch
>
> If it's there, and crontab contains an entry for cron.daily, then that
> should be all the configuring it needs.
...Except that the reports are sent to root, and root's mail often goes
unread.
Peter, check root's mail -- if the logwatch reports are there, you can
edit /etc/aliases, find the line that says who should get root's mail
(the last line in the file), uncomment it, and change it to your user
ID:
# Person who should get root's mail
root: put-your-user-ID-here
Then run newaliases and you should start getting logwatch reports.
--
Chris Tyler
Fedora Daily Package - http://dailypackage.fedorabook.com/
17 years, 2 months
am I hacked?
by peter kostov
Hello,
I was not reading my system logs regularly (that's bad!). Today I
noticed the following:
----------
Rootkit Hunter 1.2.8 is running
Sat, 21 Apr 2007 13:30:40 +0300
Determining OS... Ready
Checking binaries
* Selftests
Strings (command) [ OK ]
* System tools
Info: prelinked files found
Performing 'known good' check...
/bin/cat [ BAD ]
/bin/chmod [ BAD ]
/bin/chown [ BAD ]
/bin/date [ BAD ]
/bin/dmesg [ BAD ]
/bin/env [ BAD ]
/bin/grep [ BAD ]
/bin/kill [ BAD ]
/bin/login [ BAD ]
/bin/ls [ BAD ]
/bin/more [ BAD ]
/bin/mount [ BAD ]
/bin/netstat [ BAD ]
/bin/ps [ BAD ]
/bin/su [ BAD ]
/sbin/chkconfig [ BAD ]
/sbin/depmod [ BAD ]
/sbin/ifconfig [ BAD ]
/sbin/init [ BAD ]
/sbin/insmod [ BAD ]
/sbin/ip [ BAD ]
/sbin/lsmod [ BAD ]
/sbin/modinfo [ BAD ]
/sbin/modprobe [ BAD ]
/sbin/rmmod [ BAD ]
/sbin/runlevel [ BAD ]
/sbin/sulogin [ BAD ]
/sbin/sysctl [ BAD ]
/sbin/syslogd [ BAD ]
/usr/bin/chattr [ BAD ]
/usr/bin/du [ BAD ]
/usr/bin/file [ BAD ]
/usr/bin/find [ BAD ]
/usr/bin/head [ BAD ]
/usr/bin/killall [ BAD ]
/usr/bin/lsattr [ BAD ]
/usr/bin/passwd [ BAD ]
/usr/bin/pstree [ BAD ]
/usr/bin/sha1sum [ BAD ]
/usr/bin/stat [ BAD ]
/usr/bin/top [ BAD ]
/usr/bin/users [ BAD ]
/usr/bin/vmstat [ BAD ]
/usr/bin/w [ BAD ]
/usr/bin/watch [ BAD ]
/usr/bin/wc [ BAD ]
/usr/bin/wget [ BAD ]
/usr/bin/whereis [ BAD ]
/usr/bin/who [ BAD ]
/usr/bin/whoami [ BAD ]
--------------------------------------------------------------------------------
Rootkit Hunter found some bad or unknown hashes. This can be happen due
replaced
binaries or updated packages (which give other hashes). Be sure your
hashes are
fully updated (rkhunter --update). If you're in doubt about these
hashes, contact
the author (fill in the contact form).
--------------------------------------------------------------------------------
[Press <ENTER> to continue]
Check rootkits
* Default files and directories
Rootkit '55808 Trojan - Variant A'... [ OK ]
ADM Worm... [ OK ]
Rootkit 'AjaKit'... [ OK ]
Rootkit 'aPa Kit'... [ OK ]
Rootkit 'Apache Worm'... [ OK ]
Rootkit 'Ambient (ark) Rootkit'... [ OK ]
Rootkit 'Balaur Rootkit'... [ OK ]
Rootkit 'BeastKit'... [ OK ]
Rootkit 'beX2'... [ OK ]
Rootkit 'BOBKit'... [ OK ]
Rootkit 'CiNIK Worm (Slapper.B variant)'... [ OK ]
Rootkit 'Danny-Boy's Abuse Kit'... [ OK ]
Rootkit 'Devil RootKit'... [ OK ]
Rootkit 'Dica'... [ OK ]
Rootkit 'Dreams Rootkit'... [ OK ]
Rootkit 'Duarawkz'... [ OK ]
Rootkit 'Flea Linux Rootkit'... [ OK ]
Rootkit 'FreeBSD Rootkit'... [ OK ]
Rootkit 'Fuck`it Rootkit'... [ OK ]
Rootkit 'GasKit'... [ OK ]
Rootkit 'Heroin LKM'... [ OK ]
Rootkit 'HjC Kit'... [ OK ]
Rootkit 'ignoKit'... [ OK ]
Rootkit 'ImperalsS-FBRK'... [ OK ]
Rootkit 'Irix Rootkit'... [ OK ]
Rootkit 'Kitko'... [ OK ]
Rootkit 'Knark'... [ OK ]
Rootkit 'Li0n Worm'... [ OK ]
Rootkit 'Lockit / LJK2'... [ OK ]
Rootkit 'MRK'... [ OK ]
Rootkit 'Ni0 Rootkit'... [ OK ]
Rootkit 'RootKit for SunOS / NSDAP'... [ OK ]
Rootkit 'Optic Kit (Tux)'... [ OK ]
Rootkit 'Oz Rootkit'... [ OK ]
Rootkit 'Portacelo'... [ OK ]
Rootkit 'R3dstorm Toolkit'... [ OK ]
Rootkit 'RH-Sharpe's rootkit'... [ OK ]
Rootkit 'RSHA's rootkit'... [ OK ]
Sebek LKM [ OK ]
Rootkit 'Scalper Worm'... [ OK ]
Rootkit 'Shutdown'... [ OK ]
Rootkit 'SHV4'... [ OK ]
Rootkit 'SHV5'... [ OK ]
Rootkit 'Sin Rootkit'... [ OK ]
Rootkit 'Slapper'... [ OK ]
Rootkit 'Sneakin Rootkit'... [ OK ]
Rootkit 'Suckit Rootkit'... [ OK ]
Rootkit 'SunOS Rootkit'... [ OK ]
Rootkit 'Superkit'... [ OK ]
Rootkit 'TBD (Telnet BackDoor)'... [ OK ]
Rootkit 'TeLeKiT'... [ OK ]
Rootkit 'T0rn Rootkit'... [ OK ]
Rootkit 'Trojanit Kit'... [ OK ]
Rootkit 'Tuxtendo'... [ OK ]
Rootkit 'URK'... [ OK ]
Rootkit 'VcKit'... [ OK ]
Rootkit 'Volc Rootkit'... [ OK ]
Rootkit 'X-Org SunOS Rootkit'... [ OK ]
Rootkit 'zaRwT.KiT Rootkit'... [ OK ]
* Suspicious files and malware
Scanning for known rootkit strings [ OK ]
Scanning for known rootkit files [ OK ]
Testing running processes... [ OK ]
Miscellaneous Login backdoors [ OK ]
Miscellaneous directories [ OK ]
Software related files [ OK ]
Sniffer logs [ OK ]
[Press <ENTER> to continue]
* Trojan specific characteristics
shv4
Checking /etc/rc.d/rc.sysinit
Test 1 [ Clean ]
Test 2 [ Clean ]
Test 3 [ Clean ]
Checking /etc/inetd.conf [ Not found ]
Checking /etc/xinetd.conf [ Skipped ]
* Suspicious file properties
chmod properties
Checking /bin/ps [ Clean ]
Checking /bin/ls [ Clean ]
Checking /usr/bin/w [ Clean ]
Checking /usr/bin/who [ Clean ]
Checking /bin/netstat [ Clean ]
Checking /bin/login [ Clean ]
Script replacements
Checking /bin/ps [ Clean ]
Checking /bin/ls [ Clean ]
Checking /usr/bin/w [ Clean ]
Checking /usr/bin/who [ Clean ]
Checking /bin/netstat [ Clean ]
Checking /bin/login [ Clean ]
* OS dependant tests
Linux
Checking loaded kernel modules... [ OK ]
Checking files attributes [ OK ]
Checking LKM module path [ OK ]
Networking
* Check: frequently used backdoors
Port 2001: Scalper Rootkit [ OK ]
Port 2006: CB Rootkit [ OK ]
Port 2128: MRK [ OK ]
Port 14856: Optic Kit (Tux) [ OK ]
Port 47107: T0rn Rootkit [ OK ]
Port 60922: zaRwT.KiT [ OK ]
* Interfaces
Scanning for promiscuous interfaces [ OK ]
[Press <ENTER> to continue]
System checks
* Allround tests
Checking hostname... Found. Hostname is hst-1-98.siriusbg.com
Checking for passwordless user accounts... OK
Checking for differences in user accounts... OK. No changes.
Checking for differences in user groups... OK. No changes.
Checking boot.local/rc.local file...
- /etc/rc.local [ OK ]
- /etc/rc.d/rc.local [ OK ]
- /usr/local/etc/rc.local [ Not found ]
- /usr/local/etc/rc.d/rc.local [ Not found ]
- /etc/conf.d/local.start [ Not found ]
- /etc/init.d/boot.local [ Not found ]
Checking rc.d files...
Processing........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
....................................
Result rc.d files check [ OK ]
Checking history files
Bourne Shell [ OK ]
* Filesystem checks
Checking /dev for suspicious files... [ OK ]
Scanning for hidden files... [ Warning! ]
---------------
/dev/.udev /etc/.pwd.lock
---------------
Please inspect: /dev/.udev (directory)
[Press <ENTER> to continue]
Application advisories
* Application scan
Checking Apache2 modules ... [ Not found ]
Checking Apache configuration ... [ OK ]
Security advisories
* Check: Groups and Accounts
Searching for /etc/passwd... [ Found ]
Checking users with UID '0' (root)... [ OK ]
* Check: SSH
Searching for sshd_config...
Found /etc/ssh/sshd_config
Checking for allowed root login... [ OK
(Remote root login disabled) ]
Checking for allowed protocols... [ OK (Only
SSH2 allowed) ]
* Check: Events and Logging
Search for syslog configuration... [ OK ]
Checking for running syslog slave... [ OK ]
Checking for logging to remote system... [ OK (no
remote logging) ]
[Press <ENTER> to continue]
---------------------------- Scan results ----------------------------
MD5
MD5 compared: 50
Incorrect MD5 checksums: 50
File scan
Scanned files: 342
Possible infected files: 0
Application scan
Scanning took 905 seconds
------------------- Sat, 21 Apr 2007 13:45:45 +0300 -------------------
Do you have some problems, undetected rootkits, false positives, ideas
or suggestions?
Please e-mail me by filling in the contact form (@http://www.rootkit.nl)
-----------------------------------------------------------------------
In the logs I found exactly the same results since one month ago.
Does that mean I have been hacked and all those binaries are replaced?
The secure logs are full with unaccepted ssh connections. The only
successful connections for this period are from a known IP, but
unfortunately I have no older logs.
Thanks for any clues!
Regards,
Peter
home site: http://bgwebdeveloper.com
17 years, 2 months
Re: ssh & sftp terminal timeout
by David G. Miller (aka DaveAtFraud)
Tim <ignored_mailbox(a)yahoo.com.au> wrote:
> Incidentally, if someone can tell me why "rpm -qa openssh-\*" doesn't
> return "openssh-4.3p2-19.fc6" in the list, but "rpm -qa openssh\*" does,
> I'd like to know.
The dash after openssh in openssh-4.2p1-fc4.10 is the delimiter between
the package name and the version. The dash after openssh in any of the
others (e.g., openssh-askpass-4.3p2-19.fc6) is part of the package
name. The wild card works on package names; not versions.
Cheers,
Dave
--
Politics, n. Strife of interests masquerading as a contest of principles.
-- Ambrose Bierce
17 years, 2 months
jigdo don't?
by Gene Heskett
Greetings;
I just installed jigdo, only to find its called jigsaw in the kmenu, thinking
it was something like a torrent manager, but apparently not.
But the menu's require a true URL to the image, and if I point it in the upper
cli line, to the nearly 166KB jigdo file I downloaded from the fedoraunity
site, called FC-20070401-6-i386.jigdo, it claims it doesn't know how to
handle that file format yet.
So, since this 'jigdo' thing will be stillborn for obvious reasons, where can
I find the .torrent for that respin? I thought I saw a link to it once, but
the availability of fedoraunity.org seems to come and go, and I've not
managed to find the page with that link on it again.
Ok, I got it to start by manually entering the URL to the exact same file I
had already downloaded. That's a right cast iron pita when it can't be
copied & pasted from firefox...
So either I need instructions on how to setup FF to start jigdo with that url
as an argument, or jigdo needs fixed. Starting a download should not take 50
screen changes and 30 minutes to get it going. Needless to say, I voted for
future releases in torrent because I can do this in azureus in just a minute
or so, plus time to carve a hole in my firewall.
And now the transfer has been interrupted after about 70 of the 255 megs just
for the template, and now it wants to know where I live but refuses to take a
USA entry. And under advanced it apparently needs a comma separated list of
url's. How the hell should I know where in a 100 million servers where this
stuff is? Rhetorical question obviously.
Screw it, send jigdo back to finishing school, and where can I get
the .torrent file?
Thanks.
--
Cheers, Gene
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Don't be irreplaceable, if you can't be replaced, you can't be promoted.
17 years, 2 months