LINUX GAZETTE

March 2002, Issue 76       Published by Linux Journal

Front Page  |  Back Issues  |  FAQ  |  Mirrors
The Answer Gang knowledge base (your Linux questions here!)
Search (www.linuxgazette.com)


Linux Gazette Staff and The Answer Gang

Editor: Michael Orr
Technical Editor: Heather Stern
Senior Contributing Editor: Jim Dennis
Contributing Editors: Ben Okopnik, Dan Wilder, Don Marti

TWDT 1 (gzipped text file)
TWDT 2 (HTML file)
are files containing the entire issue: one in text format, one in HTML. They are provided strictly as a way to save the contents as one file for later printing in the format of your choice; there is no guarantee of working links in the HTML version.
Linux Gazette[tm], http://www.linuxgazette.com/
This page maintained by the Editor of Linux Gazette, gazette@ssc.com

Copyright © 1996-2002 Specialized Systems Consultants, Inc.

The Mailbag



HELP WANTED : Article Ideas

Send tech-support questions, Tips, answers and article ideas to The Answer Gang <linux-questions-only@ssc.com>. Other mail (including questions or comments about the Gazette itself) should go to <gazette@ssc.com>. All material sent to either of these addresses will be considered for publication in the next issue. Please send answers to the original querent too, so that s/he can get the answer without waiting for the next issue.

Unanswered questions might appear here. Questions with answers--or answers only--appear in The Answer Gang, 2-Cent Tips, or here, depending on their content. There is no guarantee that questions will ever be answered, especially if not related to Linux.

Before asking a question, please check the Linux Gazette FAQ (for questions about the Gazette) or The Answer Gang Knowledge Base (for questions about Linux) to see if it has been answered there.



LG 73, 2c Tips #12, USB Modems.

Sun, 20 Jan 2002 11:36:35 -0600
tomkrieger (tomkrieger from yahoo.com)

I am writing reguarding the Alcatel Speed Touch USB modem, under Linux, particularly Mandrake Linux 8.1.

I have been trying to get this modem to work for about a month now. It seems I almost have it, at least compared to where I was a couple of weeks ago. I have been following the HowTo's, I've found on the internet. They seem to differ slightly from web page to web page, but I believe I finally got the kernel and the drivers set up to work, but I think I might have some setting messed up somewhere, or maybe a module not loaded or something. I was hoping you might be able to help me find where I'm having a problem. The message I get when I try to connect with br2684ctl -b -c 0 -a 0.0.35 is something like

RFC1483/2684 bridge : Created nas0 interface

(something like that)

RFC1483/2684 bridge : Connecting to ATM 0.0.35 Encapsulation LLC

(again it says something like this)

RFC1483/2684 bridge : fatal : failed to connect on socket

(here's the error message I get exactly as given to me)

Is there anything you might be able to tell me from the informatoin given, what I should be looking at to correct my problem? If you need anymore info please let me know what it is and I will get it right to you.

Thanks
Tom


xt (xtraceroute)

Sun, 20 Jan 2002 11:01:32 -0800
Mike Orr (LG Editor)

There's a program in Debian unstable called xt (xtraceroute). It's supposed to plot the traceroute path on a picture of the earth. However, it doesn't seem to have enough location coordinates in its database to do anything. Has anybody used this program? Did you have to enter your own coordinates for all the hosts you traceroute from and to?


Euro symbol available?

Sat, 2 Feb 2002 17:05:10 -0000
Donal Rogers (rogers from clubi.ie)

Hi guys, I don't know how much this will matter to the non-Europeans in the audience, but how am I going to get the Euro symbol to appear in my favourite applications? I have just installed Red Hat 7.2 on my laptop, and would like to indicate my preferred currency symbol in a spreadsheet or word processor document. The only mention I can find in previous issues of LG (wonderful publication - keep up the great work!), apart from a Debian Euro-HOWTO, is the usual "just my .02 Euro". Does anyone have any ideas?

Regards,
Donal.


DHCP & MAC Addresses question

Thu, 7 Feb 2002 13:54:04 -0800
Dave Wulkan (dwulkan from earthlink.net)

Hi,

I've read where DHCP can return a fixed IP for specified MAC hardware addresses. My question is can DHCP be limited to return either fixed or dynamic IP to only a list of MAC hardware addresses? This would be a security enhancement as only specified machines could get access to the server?

Dave Wulkan


Convex

Wed, 6 Feb 2002 02:44:22 +0100
Robos (robos from geekmail.de)

Hi Gang! Some time ago a friend of mine took me to a guy that - via some strange ways - had gotten hold of some convex computers (2 refrigerator-sized boxes). They were struggeling to get them to boot again (I think they called the OS spp-ux os something similar) and maybe in the end getting them to boot linux (hey, not totally OT). So, short question: does somebody of you know these beasts? If yes, I can figure out more about'em, otherwise forget them (saw something like a VAXbar some time ago, maybe that'll be their new purpose real soon ;-).

TIA
Robos


Boot problem on software raid

Thu, 14 Feb 2002 09:17:28 -0500
Joe St.Clair (ksimach from ksimachine.com)

I am running RedHat 7.2 and using ext3 file system with software raid, using 2 20gig drives. The raid drive(s) are my boot drive. The 2 drives are identical and are used something like this /dev/hda1 = ext3, /dev/hdb1 = ext3. I made everything between the 2 drives the same. The mirrored drive is /dev/hda1 and /dev/hda2 = /dev/md0. The system has been running very well.

I recently did a kernel upgrade. The upgrade went ok and will boot and run from a floppy drive with no problems. But if I attempt to boot from the hard drive(s) drive it will only boot the old kernel. I have updated the grub.conf and have even attempted to enter the commands for booting from the command line. The grub menu never shows the commands entered into the grub.conf file and I receive a error "Can't find files" if I attempt to enter the command line.

I have attempted to find what I need to change/fix but have not found the information needed to update grub while booting from a raid/ext3 file system.

Anyone have any ideas?

Thanks,
Joseph St.Clair


System crash on RH 7.2 - could be related to N.P.Strickland's problem

Tue, 29 Jan 2002 14:10:15 +1100
icalla (icalla from bigpond.net.au)

Hi Gang,

I recently upgraded from RedHat 6.2 to 7.2. Since then I have experienced a number of incidents where the system simply froze up solid. It would not respond to keyboard input or mouse clicks. Screen was not being updated at all. The only way out was the Reset button. This sounds similar to the problems reported by N.P.Strickland (http://www.linuxgazette.com/issue74/tag/9.html), but I can relate my incidents to some things which infer that the solutions suggested to that post will not resolve my situation.

Firstly, this has only started happening since I upgraded. I never experienced anything similar on RH 6.2 (or 5.2 fot that matter). The hardware is unchanged, so I believe it must be caused by software, not hardware.

Secondly, I am pretty confident that it is related somehow to sound. I can bring on a freeze by running a number of multimedia programs (e.g. XMMS, gtv). They appear to work fine for, say, 30 seconds, then Zap! the system freezes up solid.

Can anyone shed any more light?

Thanks
Ian Callahan


GENERAL MAIL



Windows Telnet Client for Linux

Wed, 23 Jan 2002 14:49:23 -0800
Mike Orr (LG Editor)
replying to Jay Ashworth (The Answer Gang)

Not if you're at the only cybercafe in town and they don't let you install software there,

Educate, advocate.

The only reason I'd be in a cybercafe is if I'm in a strange town and there are no other Internet options. So I don't have much opportunity to find the most receptive staff members and spring a World Domination campaign on them.

There has to be at least one geek there...

You must have forgotten the smiley. :) That must be a joke, because in most of the cybercafes I've been in, the staff know a lot about espresso and chai, but very little about their own computers. The only two exceptions were the Speakeasy in Seattle and CoffeeNet in San Francisco, neither of which exist any more.


installing software from source

Tue, 29 Jan 2002 22:01:01 -0500
Adam York (Anonymous)

Ben,

Since I'm a relative linux newbie and software installation has been learning process, I appreciatee your article on installing from source. One question though. After downloading and uncompressing the source, installation seems to be pretty much a three step process.

./configure
make
make install

My question is this: should I become root in this process and if so at what stage? I'm thinking that I should become root after "make." and not before.

Anyway I appreciated the article especially the part about analyzing a failed install. It would have taken me a while to figure that out on my own.

Thanks,
Adam York


GAZETTE MATTERS



TAG members

Wed, 20 Feb 2002 14:26:40 -0800
Mike Orr (LG Editor)
linux-questions-only (linux-questions-only@ssc.com)

By the way, TAG now has thirty members, an increase of about eight from a couple months ago. Welcome, new Gang members, and thanks for your contributions.

If you haven't sent in your TAG bio yet or you need to revise it, send it to gazette@ssc.com. See

"Meet The Answer Gang" to read about your peers and see some example bios.

[28-Feb: Somehow it doubled in eight days. There are now sixty TAG members. -Iron.]


Confidential disclaimers

Fri, 25 Jan 2002 10:56:08 -0800
Mike Orr (LG Editor)

In the section on confidentiality disclaimers in the TAG faq, can we provide some examples of what we need the querent to say?

Provided, in "Ask The Gang" -- Heather


HOWTO subscribe to Linux Gazette

Sun, 20 Jan 2002 09:20:05 -0800
multiple readers (shown below)

We've had a number of questions on this topic lately...

D Johnson

I always enjoy reading the Gazette offline (maybe even at the beach on my notebook). Have you ever considered providing it in pdf format. Would save me the trouble of converting it myself. Imagine lotsa others do too. Keep up the good work.

Thanks for the support. -- Mike

P Reddy

i am a student from india , i want to know wether there is a mailing news letter available, if yes how to subscribe. please reply at...


Martin Willem

I'm making the jump into the linux world. Do you offer the GAZETTE in hard copy form?


To all these people and everyone else out there wondering: ...

There is no subscription. Read it online:
http://www.linuxgazette.com

Paper?

It's under an open license. Anybody has the right to publish it that way. We can't afford to do all that for free though.
If anybody chooses to convert it to paper form regularly ... and maintain that as a longterm service ... could you please let us know? We could add you to the Mirrors page :)

Other electronic formats? See http://www.linuxgazette.com/faq.html#formats_no

You can be notified that the new one has been posted each month, by subscribing to the announce list (it does not contain the articles): http://www.ssc.com/mailman/listinfo/lg-announce
You might be able to use services (elsewhere!) which let you know websites have changed (by emailing you the changed page) to give you the table of contents ONLY, by telling them to keep an eye on: http://www.linuxgazette.com/current/
One example of such an external service is Sitescooper - PDA users can get the document this way, as can others who install the Sitescooper scripts: http://scoops.sitescooper.org

So much work to get it so I was hoping...

Our webzine is quite large so it's well worth your time to find an LG mirror site that's closer to your home in cyberspace: http://www.linuxgazette.com/mirrors.html
You can also download the FTP files, or find it in the Debian distribution. Read more about all this at the Linux Gazette FAQ: http://www.linuxgazette.com/faq.html

However Martin had more to ask so we answered that too :) -- Heather

Do you offer recommendations on the most successful ways to jump from microsoft to LINUX? Any help that can save me pain would be greatly appreciated i.e. hardware, linux flavor, good books for the beginner to read before/during the move to lynux!

That's a very general question, so I can offer only a general answer. Look in The Answer Gang Knowledge Base: http://www.linuxgazette.com/lg-kb.html especially under the sections "Linux Distributions", "Before you install Linux", "Installing Linux", etc. Also see the section "Linux tech support questions" question "How can I get help on Linux?", which has a list of books and a link to the Linux Documentation Project (LDP) (Linux Documentation Project), which should be your first stop.

-- Mike


All your wonderful tips...

Sun, 23 Dec 2001 00:57:55 -0500
Robos (robos from muon.de)

Hi Gang! Just had some time and took a look into the howto section at linuxdoc.org and found the Tips-HOWTO.

Nice thingies in there, although the last editing seems to be ages ago.

Soooo, since LG is already present in there and you have such wonderful ideas, scripts and perl-thingies (Ben?), after you have discussed them here in the list and optimized them one could post it to the maintainer of the Tips-HOWTO for inclusion.

What do you think? Thats a place a newbie finds rather easier than this mailing-list, don't you think? Just a suggestion.

CU Robos

<grin> Good idea, Robos. Instead of the Tips-HOWTO, however, the areas you're asking about are a subset of the LG Knowledge Base that Chris Gianakopoulos and I have been working on for the past month plus; see <http://www.linuxgazette.com/kb-faq.html>;. Better yet, wait a week or so and see the new version - Chris has been doing a sterling job of adding the stuff from the previous issues of LG while I'm banging away on modifying the overall KB-FAQ, TAG-FAQ, etc. The difference between the last month and the one that's coming up is going to be a large one - there are many, many more articles/issues incorporated into it than there were the last time - and it's really turning into a great resource. -- Ben


Why we stay plain when we could look Really Cool

Fri, 18 Jan 2002 15:21:53 +1100
Leon Czechowicz (Leon.Czechowicz from anu.edu.au)

Hey!

Nice to see your online mag - content seems good!

...pity I was about as excited about the presentation of your "mag" as I am about brussel sprouts!

Check out http://www.onlamp.com for an example of what to make it look like - I know in essence its the same, but I'd love to see some Linux heads make something that actually looks good! (ie stop acting like text crazed command line geeks and get with us poxy graphical idiots, who have been web building with Macromedia products and the like)

Yes that means you will actually have to stop using Lynx and start using Mozilla to check the visual integrity of your code!

I'm not really bagging, just sick of not being excited when I hit a linux site.

cheers, L

Oh my. This resulted in a lively discussion defending Brussel sprouts, our decision process in making the webzine rather more plain than all-dancing-and-glitzy, some comments about the browsers we actually use, thoughts on Macromedia Flash, a certain amount of curmudgeonly eyebrow raising, cheerful thanks for the kudos that were present, and encouragement to take on the glitzy task himself. Pleasantly he took it all in good stride and will probably join the Answer Gang :) -- Heather

KUDOS

Nice to see your online mag - content seems good!

Thanks, always happy to hear it. -- Heather
Thanks for writing in. If you like the content, well, that's our goal. -- Mike

BRUSSEL SPROUTS

...pity I was about as excited about the presentation of your "mag" as I am about brussel sprouts!

I like brussel sprouts, when prepared properly and covered with butter :) Oh, you mean the boiled-grey kind, perhaps ... -- Heather
I can force myself to eat brussel sprouts and broccoli. But I draw the line at cauliflower. -- Mike
I'll trade you: you can have my brussel sprouts, and I'll have the cauliflower. It's good to have friends. :) -- Ben

CURMUDGEONS, THAT'S US

...pity I was about as excited about the presentation of your "mag" as I am about brussel sprouts!

The Answer Guy, enjoying yet another Python book (in this case New Riders' "Python Web Programming" -- slow since it aims at non-programmers, but quite good nontheless) at a local coffee shop, was heard to mutter:
"Bon Apetit mon ami, enjoy your sprouts"
before taking another sip of his latte. -- Jim
Hey, nice layout on your e-mail!
...too bad the content had me yawning.
So you've got your MacroWhozits, ShockWhatsits, and RealWhatchamacallits running. Booo-ring. I can get more and better flash and glitter at the 99-cent store. Incidentally, I find the layout of the site that you've mentioned just as garbaged up as that of Slashdot - it requires a 21" screen just to see properly, and the "noisiness" of unrelated multi-column layout, with 2-3 words per column (hey, you've got to make room for all those ads - right?) is something that I find really unpleasant to read.
Look. Our strength is that we are accessible to _everyone._ Not everybody in the world has a cable modem, or even a fast phone connection; a number of our readers are still using 33.6 modems attached to their 486s, and a fair number of them are still paying for content "by the byte". I'm using a CDPD modem (I live on a sailboat) to connect, myself. Should we all be denied access, or should it be made more difficult or expensive because our layout doesn't reflect somebody's idea of the Latest And Greatest fashion in web pages? Please, let's not even go there. -- Ben

I'm not really bagging, just sick of not being excited when I hit a linux site.

<snort> I'll make you a deal: we'll tell you how to dress and how to present yourself in general (anybody here have some orange lipstick and a flourescent pink purse?), and you'll be welcome to present us with your idea of an "up-to-date" site that excites you. That sound good to you?
Thought so. -- Ben

ALL GLITZ, WE'RE NOT

Check out http://www.onlamp.com for an example of what to make it look like -

It looks nice. -- Mike
(For the readers: ONlamp is an O'Reilly Network site.)
Are you with O'Reilly? They are a big publishing house and hire people to maintain their websites. We are a batch of volunteers scattered all over the world. But we're flattered that you chose to compare us with them.
(it turns out, no, he's not; he just feels their site looks cool.)
To be fair, though, I tried to visit that site with Netscape. I only got an ad -- no content! Ouchie!
Luckily we only put these itty bitty graphics at the side and logos on top. Since we don't do animated banners you can't get hit with the won't-finish bug in some browsers either :) -- Heather

I know in essence its the same, but I'd love to see some Linux heads make something that actually looks good!

Go to linux.com. Or better yet, put up your own demonstration site. Then send us a link to it and an announcement about what it contains, and we'll put an item for it in News Bytes. Maybe all that will encourage other Linux sites to get more pizzazz. -- Mike

(ie stop acting like text crazed command line geeks and get with us poxy graphical idiots, who have been web building with Macromedia products and the like)

Linux Gazette is slow to adopt new visual technology, kind of like the Amish. We prefer to wait a few years and see which technologies would actually be a long-term benefit to all our users. It's an unusual kind of zine; I don't know of any others like it. Most people read it from mirrors in 47 countries, through the Linux Documentation Project, download the FTP files, read it on a CD-ROM, download the articles to their palm pilot, etc. So anything dynamic is out because it would cut off a significant portion of the readership. We also don't want to impose any special software requirements on the mirrors. Two concessions to dynamism: the search engine and talkbacks on the main site.
We're also mindful of bandwidth restraints: many readers and mirrors live in countries where they pay by the minute for Internet access, so I try to keep each issue down to less than a megabyte or two (compressed).
We also have to piece together the whole thing into an all-in-one version (the entire issue on one page), because that's how LG started and many readers prefer to print it that way. This rules out differing stylesheets per article, or anything special the article needs in the HTML header.
Most of the editors subscribe to the "good website design" philosophy, meaning content is king. If you can't say it in text, it isn't worth saying. Obviously we don't go all the way on that, because we have been publishing several cartoon series. But still, all decorations are evaluated in terms of how essential they are to the content. If readers like the text, they'll be back. if they won't read it unless it has bells and whistles all around it, well, we don't want them anyway. There are plenty of sites that are highly graphical (and can't be navigated unless you have Flash and Javascript enabled), and LG doesn't wish to compete in that department.
By the way, Your Editor has a strong adversion to "left column" and "right column" sidebars (tables), and will resist them as long as he can. Let the article text flow freely across the entire width of the browser, outside a table, and in the default font. Persumably, the reader has adjusted his default font to his preference. -- Mike
A-men to that! And a-women, too. I don't long for uniformity on the Web, but if more people paid attention to those basics, more information would be more easily accessible. Sing that song! -- Ben
Not to rag too hard back, but:
  1. Tell O'Reilly to get that wart zapped. The last time I saw this was LWN having some problems with an ad provider whose "pull through" would bomb out that way about 1 time in 10. I'm not sure if they fired the ad provider, or just made 'em fix it, but I know it's tricky to chase down problems that are hard to reproduce.
  2. We can't shoot at bugs without a target symbol over the varmint. In other words "it's ugly" isn't enough of a problem description. Try again.
Since we live in a world of choice, try a few of the following on for size: Dillo, Chimera, Amaya, Opera, Arachne, links (not the same as lynx), w3m, Browsex, ViewML, mnemonic, Zen, konqueror. If you find a copy of Grail let me know as its homesite died ages ago and I haven't found packages since. Maybe it was under a non-free license?? -- Heather
Grail (a Python web browser) is now at http://grail.sourceforge.net . The last version was April 1999. It died because its sponsoring organization (CNRI?) stopped putting developer resources into it. They did that because they realized its features and speed were never going to compete with recent versions of Netscape and Internet Explorer.
With Grail died the ability to run Python applets in a browser, but that's OK because there never were any Python applets except a few demos. But now there's Jython, which is an implementation of Python in Java, so you can do almost the same thing.
However, there was a good thing from the Grail legacy. The parts to build a browser, parse URLs, parse HTML files, etc, and everything else a browser needs to do, got put in the standard Python distribution as modules, so you can use them in other programs. -- Mike
Visit some students at your local blind school, ask them if their speech readers do our site alright... and have your local PDA pick up the current Linux Gazette packet from Sitescooper. I'm not going to suggest that you telnet to port 80 and handle your own client side of the HTTP connection, but you can do that if it makes you feel like a completist :D
We try not to change the templates too often :)
Variety may be the spice of life but aiming generic rather than in any one direction means less work to have readable results without heavy testing. (We do try to test for broken hotlinks, and sorta glance around for typos, but those sometimes escape us too.) As we're all unpaid volunteers, and not very many of us, making the best use of our time is important too.
We're modeled more after the community green sheet (e.g. Campbell Reporter gets a picture here and there, but mostly it's plain ink on rag paper) than a large city newspaper (with its Home and Garden section, coupons in the food section, comics section bigger than some articles, classified ads fatter than all other sections but the sports, etc) or a 90 page glossy magazine on clay-laden paper with dye sublimation ink. On the flip side we don't charge $7.95 on newsstands and have a two to three month lead time for articles, either.
There's a great little article at "This website optimized for --- arguing with customers" (http://www.htmlhelp.com/feature/art2.htm). Like it says, we're not going to tell people to get rid of whatever they already have just to read anything here. -- Heather
OnRamp gets brownie points for using the default font in the center column, but loses points for having the left sidebar. At least the center column isn't too narrow. And at least--thankfully--they don't split the articles into pages, unlike, say, Salon (http://salon.com), where you have to wait for a download cycle between each page. -- Mike

JUST CHECKING...

Yes that means you will actually have to stop using Lynx and start using Mozilla to check the visual integrity of your code!

Actually, I do most of my work in Netscape 4. I occasionally use Konqueror 2.2.1 for comparision, but I get sick of the 3-5 seconds of extra overhead on every click. At home I use Galeon. For local documentation or when I'm going to a known-text page, I use links, or lynx if it requires https:. I don't know what the other editors use. -- Mike
Funny you should mention that, I was able to read your site with lynx when Netscape failed abysmally -- since noting yourself as a GUI fan, I figured to hit it with a graphical browser first...
My portion of the Gazette is always checked with both lynx (2.8.3dev9 with SSL patches, yeah I know it's ancient, but I'm happy with my color settings) and netscape (4.77 normally). They each correct for different varieties of HTML misbehavior, and that allows me to fix glitches generated by my preprocessing script, which tortures about 400 slices of mail into something resembling pieces of a webzine. I sometimes test with konqueror, NS6, or Browsex. We've been advised that Opera's rendering of the Front Page only (ironically, the only one where we tried to get fancy with layout) is a mite strange... of course, that's commercial software, and the effect doesn't really stop reading, but we dunno any way to convince it to do the table-heuristic we wanted. Oh well. -- Heather
That vertical black line is gone. It was a 1-pixel black .gif inside a table cell, which was supposed to expand into a vertical black bar. However, it used WIDTH="2%", which made it stretch wide on some browsers. So I changed it to a fixed width. However, Opera continued to expand it while the other browsers stopped. Now it's gone. Good riddance. -- Mike
What version of Mozilla are you using, what bug/wart did you encounter, and does it also afflict Netscape 6, Galeon, or other mozilla derivatives? -- Heather
Argh. Leon, could you send your stuff in plain text, and wrap it at less than 80 (preferably, around 72) columns? That's considered good e-mail manners. -- Ben

Argh indeed - I am forced by the hand of Bill Gates - my headers will inform you my work machine is a W2K with Outlook - I couldn't be polite with my text if I tried. As far as it's concerned I AM sending plain text!!!!!!!! I am moving jobs soon, but staying on the same campus - I will then rebel and use Linux for my desktop....AND BILL WILL WEEP!!!!!!!!!!!! (HeeHeeHeeee...)

Seems like there's a way to tell even Outlook to be civil, at least in this respect.

Unfortunately this way eludes me ... could somebody here more versed than I in the Dark Arts speak up? -- Dan

<laugh> Cool. Mike Orr, our editor here, has mentioned that we have the procedure for smacking Outlook down to decent behavior written down somewhere; -- Ben

Chris G here, from the Dark Arts group of people. I supplied detailed instructions on how to set up Outlook Express to send in plain text mode when sending email. In it was included the fact that the MUA should not reply in the same format as the original message. That was in issue 65, "Setup of Microsoft Outlook Express 5 for Sending of Clear Text": http://www.linuxgazette.com/issue65/tag/8.html

Hopefully, that will work for Leon. -- Chris G

A friend of mine sent me the following step-by-step guide (he works in a mixed environment, and needs to twiddle his settings back and forth):

...............

How to send plain text email using Outlook in 3 clicks or less By Samuel Kopel

This will work in Outlook(not sure about express)

Start a new message

On the menu bar select 'Format/Plain Text'

Click [YES] to the message "Warning: Changing the formatting of this message from HTML to plain text requires removing all the current formatting, including any pictures you may have included. Are you sure you want to do this?"

If you want to change your default to text (recommended if the majority of your email does not go to other Outlook users) you need to change the options settings.

From the menu: 'Tools/Options' Select the [Mail Format] tab and change to "plain text"

...............


MACROMEDIA FLASH

Macromedia Flash, Javascript and fancy graphics would be possible since they are self-contained (i.e., don't require particular software on the web server). However, they would have problems on non-major browsers, and LG readers have a wide variety of browsers, and are more likely than the general public to run experimental browsers on principle. Also, some readers have older computers, and buying a new computer would cost several months' salary. Last year I got a letter from a reader in Africa asking if there is an e-mail version of LG (there isn't), because his school cannot afford to read it on the web. --Mike

Macromedia Shockwave isn't readable on Linux (unless something new has happened that I don't know about). Flash is ok but broken in some contexts, unusable entirely in others, and we don't want the site unusable to anyone. There are so many versions of Javascript nee' ECMAscript I stopped counting -- and Java is getting there. People read us worldwide including on PDAs and in libaries and coffee shops. (ok, the coffee shops probably can handle the cool stuff. We've gotten lots of questions about coffee shops running Linux.) Also on "that slow old thing" and a cheap dialup link while preparing the spiffy new box to run Linux. (Even though they can render the graphics, maybe it's so bad they even turn off image loading in the GUI.) Etc. -- Heather
I forgot to mention. If you have a small Flash movie on a Linux theme, we may be able to put it in as an article. Or if you'd like to write an article about building Flash movies on Linux or something like that, we could also publish it. -- Mike

YOU CAN DO IT

I'm not really bagging, just sick of not being excited when I hit a linux site.

Linux is a do-it-yourself thing. Go forth and build the ultimate Linux web site. -- Mike
Feel free to actually do a cool new layout and have that be the format for your new mirror of us. We'd happily list you in our mirrors database, and publish the script you use to tweak it if you like, so other mirrors can do things your way too. Sharing resources is good.
That's the beauty of stuff under free licenses ... you can tweak your copy and you aren't breaking any laws whatsoever.
If you have good tricks for having your GUI cake and eating text too, it'd make an excellent article for the Gazette (a linux focus in it would put it on topic), and Mike Orr (gazette@ssc.com) would be glad to accept your submission. If that excites you about us, read our author guidelines in the Linux Gazette FAQ, and we look forward to seeing it! -- Heather

cheers, L

Have a good weekend, hope your Linux is being more fun than our layout for ya. -- Heather

ALL IN GOOD STRIDE

Ben,

Don't take it so personal - the Editor explained everything very nicely, I'm sorry if I offended - I am a graphical ponse, it's not my fault I was born that way!!!!!!!

L

<grin> No worries, Leon - you didn't offend me. I got a little grumpy at you telling us how we've got to do something without knowing our requirements, but that's all; no offense involved.
For myself, I like graphical stuff when done in appropriate amounts relevant to the material at hand. Today, there are way too many web pages that use graphics gratuitously, without any sense behind them - and I must say that the page you pointed to does not fit that category, although it has other problems (at least from my perspective.)
So, here's an idea for you; an opportunity to possibly convert a few folks into "graphical ponses", if you will. Go with what Mike suggested: write an article about Web page design; include some links to demonstrate each of your points. Who knows?... it might become a graphical ponse revolution. :) -- Ben

Heather,

You write too much - I can't even type that fast and you want me to read all that!????

As I said I like the content - I'm sold an that - I also said I'm new to Linux, thus may only be bagging what I don't understand....yet!

All points on bandwidth, mirroring etc etc are taken - OK!!!!!

I still hate Brussel sprouts with butter - I'd rather eat the tub of butter.

Geez, I know not now to stir whith what ain't broken....

Oh and to clarify - I Certainly Don't Work For O'Reilly!! (And I'm not such a fan of Flash myself - but don't tell my boss!)

I am glad to have stimulated some conversation though


Mike,

Thanks for an in depth reply : This shows me your commitment to uphold all that is good and right in the computing world, and your reasons for doing it. Good on ya! - I can take much of what you have said about the web and put it into practice - thanks - all points noted.

I am pleased that you did in fact reply - you would be surprised how many people would take a comment like my and ignore it - so thanks again.

I am what your world would call a Linux Newbie so your feedback and explanations are essential to my development, and I suspect yours. I am looking forward to building new sites, I do have some commercial Intranets on the build, and in use, none of which I can advertise - interestingly enough, I am using mySQL, PHP on guess what: Red Hat Linux 7.2. They work a dream, and are - FULL of lovely graphics, but tied to 100Mbps LANs, so I can afford the bandwidth! Call me a cheat!

Oh and thanks for the cauliflower laugh.

You want some more cauliflower? :) -- Mike

Keep up the good work, I will be a regular visitor for the CONTENT!

cheers, L

Leon, given your responsiveness (most important), verbosity and funny comebacks, have you ever considered a career in The Answer Gang? Would you feel comfortable answering questions about Linux?
If so, see The Answer Gang FAQ, http://www.linuxgazette.com/tag-faq.html -- Mike

I gave it some thought Mike - I dont know if I can match up to the class of company - I have little Linux experience (love the 'Iron Orr' bit) When I move jobs next week, (and desktop machines! yay to the end of W2K) I'll have to set up some Linux servers, with RAID and big network transfer speeds for up to 20 Mac OSX clients running video editing software - Utilising the network drives as a data bank, so clients can log onto any machine to edit and be presented with up to 10GB of storage space for the hungry video stuff.

Only 10GB? What are they editing; news packages? :-) -- jra

After that I'll be in a position to answer some questions on Linux!

(If anyone has some pointers on the above problem please jump in - or even if it is possible! specially Mac OSX Vs Linux issues.)

'till then Ciao!

Leon Czechowicz

The problem is sustained throughput. TTBOMK, nothing is fast enough at the network filer level at the moment to do anything much faster than DV (3.5MB/s). To beat that, you need, I think, to go to NAS, or something similar: shared drives, rather than shared filesystems.

Perhaps things have speeded up a bit... but be prepared to go to either 100Mbs Ether with dedicated adapters, or Gigabit shared... and something more towards token than ether is not out of line.

Either that, or nasty buffering on the mount client.

Investigate Cinelerra, too.

Cheers, -- jra


This page edited and maintained by the Editors of Linux Gazette Copyright © 2002
Published in issue 76 of Linux Gazette March 2002
HTML script maintained by Heather Stern of Starshine Technical Services, http://www.starshine.org/

More 2¢ Tips!


Send Linux Tips and Tricks to linux-questions-only@ssc.com


ques

Fri, 1 Feb 2002 11:32:44 -0800
Dan Wilder (The Answer Gang)
asked by piyush moghe

respected sir
i have a problem with linux instalation on 20Gb or more capacity disks,i had installed on p3,20gb hd,64 mb ram.i make 2 1Gb partition as linux native & one 200 mb as swap the instalation goes on smoothly but at the end it gives error that first partition not lies in 1024 cylinders what i can do to solve this problem

Actually we're several guys, and one or more gals. If you respect us, that's nice, but not essential.

Upgrade to current LILO. Most new distributions should contain a LILO able to overcome the 1024 cylinder limit, and so a newer distribution might be the easiest way to do it.

Or, re-partition the disk so that its first partition, about 16Mb, is mounted at /boot, second partition is swap, and the third partition containing the remainder of the disk is mounted as /, the root partition. The installation scripts on the distribution will probably give you an opportunity to specify how you want the hard drive partitioned, and that's where you do this.

Make sure your kernel boot image (usuall vmlinuz) is located in /boot, and is referenced from /etc/lilo.conf as such. You may have to move things around and rerun lilo after the installation stuff completes.

Let us know how you are doing.


File cache...

Thu, 14 Feb 2002 22:25:24 -0800
Dan Wilder (dan from ssc.com)
asked by Matthew Koundakjian

Is there a way to control in a 2.4.x kernel how large the file cache can grow?

File cache always seems to take as much as it can and we really would prefer to keep it low.

The main user is routinely running tasks upwards of 1.5GB at time and there are times when the system thrashes and thrashes.


3:55pm  up 2 days, 23:36, 19 users,  load average: 0.60, 0.72, 0.75

162 processes: 160 sleeping, 2 running, 0 zombie, 0 stopped
CPU0 states: 76.0% user,  0.0% system,  0.0% nice, 23.0% idle
CPU1 states: 31.0% user, 13.0% system,  0.0% nice, 55.0% idle
Mem:  2059412K av, 2053732K used,    5680K free,       0K shrd,   41576K buff
Swap: 3072112K av,  703596K used, 2368516K free                 1236900K cached

Big file cache is not necessarily A Bad Thing. As long as it unloads fast when demand grows.

I'd look to other problems first.

  1. Are you running 2.4.17 or something older and buggier? If not 2.4.17, upgrade now.
  2. Are you running an AMD Duron or Athlon + AGP video? If so, you'll need a kernel boot parameter to cut cache page size, there's an interference between the way the kernel handles DMA and the way AMD handles AGP, leading to sporadic random cache corruption.
  3. You're 700M into swap. That's never a Good Idea. Unless what's swapped out is more or less permanently swapped out. If so why are you running it? If possible, get another gig of memory. The slowest memory is much faster than the fastest hard drive.

Hello Dan...

Thanks so much. Yes, we're running an older kernel ... mostly, 2.4.6 ... I'll fix that.

As far as the swap, originally, we had no swap, but because the file cache is so "hungry", I threw in swap as a brute force means because processes were dying from lack of memory...

As it is, we run a computational fluid dynamics code that periodically dies with no more than "broken pipe" as the error diagnostic, which, if I had to make a W.A.G., I would assume a process died. Before, it was a LOT worse... It was ugly when something like portmap would croak. So, lacking any coherent solution and having unhappy users, I threw some swap in and it seemed to help with stability tremendously.

But most recently, with one user process running, allocating about 1.7G, the system was apparently thrashing horribly... very unresponsive and with a system load on the order of 10.

As far as the swap versus file cache, it would seem to be silly to have a file cache that's so large that swap starts coming into play.

Bye,
Matt


Answer for "getting volume label from CD".

Thu, 24 Jan 2002 16:09:19 -0700
Sean Reifschneider (jafo from tummy.com)

The URL:

http://www.linuxgazette.com/issue72/tag/2.html

asks the question "How do I get the volume label from a data CD", and then the three guys go on to not provide a very good answer...

If you would like to add the following, it may be useful to other readers.

There are two problems in identifying CDs -- one is identifying a data CD, the other is identifying an audio CD. Mr. Bray is asking specifically about data, but it's also possible to determine a fairly unique ID for audio CDs as well.

Data CDs are easy -- a 32-byte string is written in the ISO at offset 32808. Some systems have a program called "volname" (part of the eject package), which can pull this data out. Otherwise, "dd" can be used:

dd if=/dev/cdrom bs=1 skip=32808 count=32

This is the volume label specified via the "-V" argument to "mkisofs" when creating the CD image.

For audio CDs, it's (unfortunately) not as easy. The CD Digital Audio standard does not include a location for storing CD or track identification information. The answer for this that I've heard is that they felt it was too hard a problem to solve initially.

While it may seem easy to add a few strings on the CD, it becomes harder when you have to deal with an international market -- how do you make it so that Japanese tracks can be identified, for example. Remember, this was back in the <gasp> '80s, when Unicode wasn't common.

So, the way people go about identifying audio CDs is by generating a signature. This signature consists of information about the length of tracks, number of tracks, and various other information. You can then condense this information down into a single value.

This value can then be used to submit and request more specific data about a disc or track.

Thanks to the LinuxDoc CDROM-HOWTO for the dd command to pull this data off the CD.

Sean


Compiling from source

Fri, 1 Feb 2002 09:03:21 -0800
John Davies (johnny5_tc from yahoo.co.uk)

Hi, I've just read your informative article on installing from source in this months Linux Gazette.

You mention that it would be good if make files has and uninstall target and that most don't. Well, if you have a look at Checkinstall (http://asic-linux.com.mx/~izto/checkinstall-en.html) it allows you to uninstall programs built from source.

What it does is to replace the "make install" command with checkinstall. It makes a note of which files were installed and allows you to uninstall the program using the package management tools on your machine (in my case dpkg). It also creates a .deb (or .rpm) so you can install it on another machine.

I've played with it for a few days now and it is extremely useful.

Regards John

John,

Thanks for that tip. I'm a moderately long-time member of The Answer Gang, and had not heard of checkinstall before. I often build from source, and had until now resorted to clumsy and time-consuming expedients to manage uninstalls.

"checkinstall" is just what we need here at SSC, host of The Answer Gang's mailing list server and The Linux Gazette's web site.

This is pretty much the reason that I forwarded this to TAG. I've had seven or eight e-mails telling me me about "buildpkg", "rpm", etc.; under Debian, I'm familiar with "alien" - but none of these deal with the real issue of "remembering" what the "make" did. They just convert the tarball (which often cannot be done due to layout, etc.) into RPMs or DEBs, etc. This tool - although I have not yet had the time to check it out - sounds like a very nice possibility, and I'm going to be looking into it. -- Ben

Well thanks, Ben, for forwarding it.

It sounds like this tool does something like what I've been doing by hand. After building a package, I often

  su root
  script
  make install
  ^D

(that's "CTRL-D", an EOT character, to log out of script) then edit the resulting "typescript" file to build a roster of what was installed, which I then save in an "ssc" subdirectory of the build directory, against a day when I wish to know what was installed.

You're absolutely right about alien et al. They work from a tarball, .deb, .rpm, etc.

However, most stock GNU packages don't even build an install tarball. They just install directly, leaving a cryptic trail of what they installed in the output from the "make install". Without analyzing that output you don't even get a tarball to "alien".

There are exceptions. Debian-modified source trees build the .deb packages directly, which can then be installed. Slackware-modified source trees build a tarball directly. No doubt Red Hat et al has something similar ... brainfade prevents me from saying at the moment ...

All too often I find I must go directly to the original release of some package, rather than using the distribution's source, either because the package is not available under the appropriate distribution, or because the distribution's package doesn't do it for us. Wrong or broken version, etc etc etc.

If this checkinstall does what it looks like it might do, it solves that problem of "what do you do if you've only the original source code". -- Dan


Automate dialing?

Wed, 20 Feb 2002 18:26:42 -0500
Ben Okopnik (The Answer Gang)
asked by gagandgupta

I want to write a program that on getting some sort of trigger will automatically connect to the internet by dialling the ISP's telephone number. After it has established connection it should store the IP address assigned to it by the ISP in a file.

Two major hints that, together, should give you the solution:

  1. Search the Net for "linux" and "dial-on-demand". The standard answer to this used to be "Diald", but nowadays it's built into pppd, so reading the man page may be an even better solution.
  2. Read "/etc/ppp/ip-up", paying special attention to "PPP_REMOTE".

That's it. There's no deep science to it.


Redhat 7.2 Linux firewall-Howto

Tue, 5 Feb 2002 22:01:56 -0800
Dan Wilder (The Answer Gang)
asked by Franco Fernandes

Hi!

Can anyone tell me from where can i get the Redhat 7.2 Linux firewall-Howto download

Thanks & Regards
Franco.F

I don't know about a Redhat 7.2 firewall howto ... if there is such, I'd expect to find it by searching www.redhat.com.

A generic Linux howto, now ...

http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html

There's a lot of other great stuff in that same directory. -- Dan

Not the question you were asking - but if you want to get a basic iptables firewall in place you could want to look at firestarter or something similar -- Mike E


File System problem

Fri, 8 Feb 2002 11:53:32 +0000 (GMT)
Thomas Adam (The LG Weekend Mechanic)
asked by Ben Wood

i require help fixing my linux hard drive, it is a ext2 file system and during startup it fails to pass the file system check, it says "Directory inode 38381, block 0, offset 0: directorty corrupted" how do i fix it, can it be fixed?

You can do the following.....

If you need any help, let me (us) know.
Kind Regards,
Thomas Adam


Quick C function lookup

Thu, 24 Jan 2002 22:24:21 -0500
Ben Okopnik (The Answer Gang)

In your ".bashrc" file, add the following line:

alias chlp="info --file libc.info.gz --node \"Function Index\" --index-search $1"

The next time you log in (or even open another xterm or console), you'll have this as an alias. Call it this way:

chlp setuid

to have it drill down to where the "setuid" function is defined in the documentation. For those of you that use "vi", you can also redefine your "man page lookup" key:

set kp=chlp

Put your cursor on a function name and press 'K'; Magic Will Happen. :)


GNU

Thu, 21 Feb 2002 18:25:10 -0500
Jay R. Ashworth, Chris Gianakopoulos (The Answer Gang)
asked by Rafel Burrial

What in the hell does GNU mean?

It's this uncommon African animal, also called a white bearded wildebeest. -- Jay

In hell, it's the ... -- Ben
I really think Ben needs to stop talking about dark things like that... Poor Chris, who specializes in our cross-MSwin questions, got bit by a nasty mailerdevil for that one. Just in case, I didn't print it :D -- Heather
I think if you go to (D'oh!) www.gnu.org, and look at the first page -- and I might point out that this is the first hit on Google for 'gnu' and the answer is in the frigging page title -- you'll probably find the answer to your question. -- Jay
GNU's not Unix like Unix is not Multics!!!!! !! Ho! Ho! Ho! <laugh from down there in h*ll>
A day late, because I've had no mail for the last 24 hours!! -- Chris


Is there a way to check if a dial up ppp connection is REALLY up?

Tue, 29 Jan 2002 08:54:08 -0500
Chuck & Crystal Shepherd (cc_shep from yahoo.com)
with points from Ben and John K. of The Answer Gang

I have a linux box (RH 7.1) set up to serve as mail and internet server for my two other home computers.

It is set up to dial on demand. Therefore ifconfig shows ppp0 up and running all the time (when it is working properly)

I would like to be able to check the status of the modem without lifting the telephone from it's cradle.

I have checked into using the lock file which can be written by pppd but this is not very reliable when if pppd goes down unexpectantly it does not always clean up after itself.

I haven't done anything with "diald" in a couple of years, but doesn't it use SLIP to do its dirty work (i.e., the PPP link you request is actually to a local VT; "diald" feeds your PPP daemon lots of baloney and sweet talk while it actually makes the connection behind its back)? If so, then you could always check if the 'sl0' interface is up without tripping off the dial-up. -- Ben

The querent doesn't specifically mention 'diald', which does use the slip interface as part of its mechanism. The newer versions of pppd also support dial on demand, and uses a different type of mechanism. Unfortunately, I can't be too specific, as I've never set it up. I would guess that you could simply check to see if ppp0 (assuming only one dial-up connection active at a time) is up, much the same way as was suggested for diald. Actually IIRC, in the case of diald, (which AFAIK, is no longer actively supported) the slip interface goes away when the ppp link gets established; so simply checking for a ppp interface would work for diald as well. -- John Karns

I am a big LG fan. Thanks for all the tips and advise.

<smile> We do what we can. Good luck - let us know how it goes! -- Ben

Thanks for your response.

I think I have got my solution by using lsof /dev/ttyS1

(ttyS1 is my serial port)

It does not seem to initiate a connection and does not seem to interrupt an existing connection.

Thanks for your help!

Chuck


large file support detection

Mon, 21 Jan 2002 22:37:22 -0500
Robos (robos from geekmail.de)
and Ben from The Answer Gang

On Tue, Jan 22, 2002 at 01:35:56AM +0100, Robos wrote:

Hi Gang! Maybe I already told you about my little program to copy dvd's to harddisk, called vobcopy (look on freshmeat). In the next release I want to incorporate large file support (lfs - no, not linux from scratch ;-). I found Jim Dennis' answer in the 67 issue and read around various places (info libc, the suse-page, the large file summit papers) but I am still unable to detect if the usersystem has support for large files. We (another person joined me and did most of the lfs stuff) found out about the -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE (the last one being redundant if not even close to being wrong in my opinion) and off_t. But we are not sure if this works correctly on both systems (supporting/not supporting). I would think its better to know if the users system has support or not and compile accordingly. My approach would be somthing along the lines of look whats defined in <linux/*file.h> and what the file system is the file gets written to. But kinda ugly and probably wrong. Does one of you happen to know how to figure it out?

Check for the presence of "ftello64" (declared in <stdio.h> ;). From "info libc -> I/O on streams -> File Positioning":

...............

- Function: off64_t ftello64 (FILE *STREAM)

This function is similar to `ftello' with the only difference that the return value is of type `off64_t'. This also requires that the stream STREAM was opened using either `fopen64', `freopen64', or `tmpfile64' since otherwise the underlying file operations to position the file pointer beyond the 2^31 bytes limit might fail.

If the sources are compiled with `_FILE_OFFSET_BITS == 64' on a 32 bits machine this function is available under the name `ftello' and so transparently replaces the old interface.

...............

"ftello" is the 'fixed' version of "ftell", but can be found on systems with or without LFS. From the above, it looks like "ftello64" would only exist on systems with LFS, where "ftello" would be an alias for it. I've got to hand it to the GNU folks: cute trick.


Re: [LG 75] 2c Tips #5 Linux with win2000

Fri, 22 Feb 2002 15:26:13 +0530
sanjay sharma (sanjayjisuno from hotmail.com)

this related with redhat linux

  1. if you have free space in your harddisk for windows 2000 partition then
  2. if there is no free space
    use partition magic to make some free space for windows 2000 and use the same steps


Basic Newbie Question

Thu, 21 Feb 2002 22:11:03 -0500
Faber Fedor (The Answer Gang)
asked by Steven Bruce

I've just installed RH 7.2 on a sony vaio, and was quite surprised by the ease with which it went on (Far cry from RH5.5). Anyway, I created the suggested user so that I wouldn't be logging in as Root all the time, however, the user I created can not create, delete, copy, etc, files in ROOT, or USR, or even HOME.

Of course you can't! This isn't That Other Operating System. :-)

I am assuming I have to login as ROOT and join the user to the administrators group, or some such group which will allow the user the appropriate permissions, but I am not sure. Is thre something I am missing or something I should be doing different?

You're missing something. :-) In Linux (and unix in general) users don't have the right to willy-nilly create files and run any old program. Would you like it if user jane had the rights to delete files in you home directory? Of course not!

Linux has rather strict rules about what you, a normal user can do. The root user, OTOH, can do anything. This is a very dangerous thing if you're not careful. Let's say you wanted to delete all the files in your home directory (you're allowed to do that, they're your files). That would be done with the command

rm -rf /home/steve

If you accidentally typed it as

rm -rf / home/steve

You would get some error about not having permissions, etc. And depending where you were in the directory, ypou might or might not wipe out your home directory.

However, if you were logged in as root and type the accidental line, you would, literally, wipe out every file on the hard drive.

You might want to add the normal user to various groups, but you should proabbly read up on Linux and permissions and all that. Start by reading the Dos/Windows User to Linux User HOWTO ( http://www.linuxdoc.org/HOWTO/DOS-Win-to-Linux-HOWTO-4.html ) to get an idea on what's going on.

Reading the HOWTOs in general is a good idea (maybe not all at once, mind you). You can find all of them and more at www.linuxdoc.org

Any help would be greatly appreciated!

A little appreciation is just fine, thank you. :-)


Regards,
Faber


Re: [LG 75] 2c Tips #15 posters

Thu, 31 Jan 2002 15:22:52 -0500
Boyer, Charles (Charles.Boyer from tycoelectronics.com)

Probably old news...but just in case:

http://linux.oreilly.com/news/linuxanatomy_0101.html

backPosters are available free with a $50 purchase at the following O'Reilly conferences and tradeshows:

O'Reilly Conferences:

Tradeshows:

Cheers.


printing

Thu, 31 Jan 2002 22:11:58 -0600
Jack Berger (jhb from mapp.org)

You mention that you are having problems w/your epson printer.

I'm not too familiar w/printer defs in things like ghostscript or gimp, but my printing w/an hp 970 improved by orders of magnitude for all applications when I installed turbo print. Colors come out good, speed is improved. Just works nice.

-jhb-


Linux rocks!

Thu, 21 Feb 2002 23:21:00 -0500
Ben Okopnik (The Answer Gang)

Today, the curiosity bug bit me again, so I poked my nose into the Linux Visor USB mailing list, and - lo and behold - there it was. Seems that the new version of "coldsync", at least the beta, now handles the m125! I downloaded it, configured it, compiled it, made a config file - and... ta-daa! Palm USB synchronization, under Linux.

Life is good. :)


Setting up telnet in a Linux server.

Thu, 24 Jan 2002 18:43:04 -0800
Dan Wilder (The Answer Gang)
asked by Subroto Sengupta

Hello Sir,

I would like to know how to set up a Linux 7.1 server and configure it properly to be able to telnet into it from a Windows client machine.

A reply would be greatly appreciated.

Sincerely,
Subroto.

Well, that's a whole lot of questions.

There's no "Linux 7.1". The Linux kernel's current versions are 2.5.2 (pretty wild), 2.4.17 (conditionally stable), and 2.2.20 (quite stable). (labels mine).

Linux is distributed by several vendors, who label their own distribution with a version number. You may be thinking about Red Hat Linux 7.1. Don't. Get Red Hat Linux 7.2 or 6.2. Other vendors (Debian, Mandrake, Slackware, SuSE, Caldera, to name just a few) each use their own numbering schemes, which have not much to do with those of the others.

How to set up a server? Best advice I can give is "follow the vendor's directions, and ask questions here when you get lost".

Telnet? Only on a protected network, I hope! Telnet exchanges a password in the clear, OK if just your immediate family is watching the 'net, not so good if the password traverses six ISPs and a few chunks of the backbone.

That said, during install, select the telnet package. Sometimes that's part of some other package, sometimes not. Consult the vendor documentation and help.

On exposed networks, use the ssh (secure shell) package on Linux, and get "putty" secure shell client for Windows. It's much better than windows telnet, and it'll even telnet, if you must.

http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

or search google.com for "putty.exe".

-- Dan Wilder


Linux Journal's Weekly News Notes Tech Tips


ssh -n

Use ssh -n to run an X program from one computer on another. For example,

ssh -n frodo gimp &

will run the GIMP on the host frodo, but display locally.

Using ssh for this is much easier and more secure than setting it up in X manually.

The -n option means prevent reading of stdin. Many times you don't need this, but if your application hangs waiting for input or does something else strange, try it.


The simplest way to process a web form

You can put a simple form on your web site even if you don't have CGI privileges. Just use <form method=GET action="result.html"> where result.html is a "thank you for filling out the form" page.

You can then get the values people filled in from the web server access log.


How to switch between several network profiles on your laptop

Use the scheme option to cardctl to manage multiple network schemes on one laptop. The scheme is passed in as the first part of the device address in the PCMCIA wireless.opts script. Make two entries in wireless.opts:

ssc,*,*,*)
    INFO="SSC WiFi Net"
    ESSID="wifi.ssc.com"
    ;;

dana,*,*,*)
    INFO="live.com network at Dana St. Roasting Co."
    ESSID="LIVE.COM"
    ;;

To switch between them, do

sudo cardctl scheme ssc

or

sudo cardctl scheme dana

For more info, see the PCMCIA HOWTO. You can change all the settings, including WEP key, mode and other options. For more information on free wireless access and coffee in Mountain View, California, see Dana Street: http://www.live.com/danastreet, a LIVE.COM Neighborhood Network.

Rob Flickenger explains how to set up shell scripts to switch schemes with less typing in his new book, Building Wireless Community Networks (O'Reilly, 2002).


Speeding up commands like "route" and "netstat"

If "route" takes a long time to run because you have no route to your nameserver, do "route -n" to skip the DNS lookup and use IP addresses only.

This works with "netstat", "ping" and "traceroute" too.


Very important topic: keeping your "fortune" file indexed

You can keep your fortune file indexed and up-to-date on multiple servers with make. Here's an example Makefile to handle common fortune-related tasks:

# List all the fortune files you maintain here.  (I just have them
# all in one big file)
FORTUNES = dmarti

# For every fortune file, the datfile is the same name but with .dat
# on the end
DATFILES = $(FORTUNES:=.dat)

# Make a copy of the fortunes file to the zork.net  collection
# (http://zork.net/fortunes/)  Since it's the first target, this
# target and its dependencies will run if you just type "make"
tozork : $(DATFILES)
        scp $(FORTUNES) $(DATFILES) zork.net:/usr/local/etc/fortunes
        touch tozork

# This target makes each .dat file from the appropriate fortune
# file, if it has changed.
%.dat : %
        strfile $<

# Get rid of all the .dat files (not really needed, but it's traditional
# to have "make clean" do _something_)
clean :
        rm -f $(DATFILES)

# There is no file named "clean", but always build this target.
.PHONY : clean

For more information, see "man strfile" and "info make". Now that you know how to manage fortunes by editing only one file and typing make, why not put your favorite sayings on your web site as a fortune file others can also use? (The old fortunes that come with most distributions have come up way too often for us.)


Limiting the files "locate" shows

"locate" is a wonderful command for quickly finding files on your system. Unfortunately, sometimes it produces so many hits that it takes too long to find the forest among the trees. Distributions and programs often have lots of files, making locate seem useless. To refine your search, type:

loc ()   {
        locate "$1" | egrep -v 'bmp|html|whatever'
         }

or put it in your .bashrc, and you won't receive any entries that contain


This page edited and maintained by the Editors of Linux Gazette Copyright © 2002
Published in issue 76 of Linux Gazette March 2002
HTML script maintained by Heather Stern of Starshine Technical Services, http://www.starshine.org/

"Linux Gazette...making Linux just a little more fun!"


The Answer Gang

By


The Answer Gang column isn't ready yet. Check back tomorrow.


Copyright © 2002, .
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


News Bytes

Contents:

Selected and formatted by Michael Conry

Submitters, send your News Bytes items in PLAIN TEXT format. Other formats may be rejected without reading. You have been warned! A one- or two-paragraph summary plus URL gets you a better announcement than an entire press release.


 March 2002 Linux Journal

[issue 95 cover image] The March issue of Linux Journal is on newsstands now. This issue focuses on web scripting. Click here to view the table of contents, or here to subscribe.

All articles through December 2001 are available for public reading at http://www.linuxjournal.com/magazine.php. Recent articles are available on-line for subscribers only at http://interactive.linuxjournal.com/.


Legislation and More Legislation


 DMCA

At risk of sounding like a broke record, there are a couple of links we would like to bring to your attention regarding the DMCA (Digital Millennium Copyright Act), the law used to imprison Dmitry Sklyarov. The Electronic Frontier Foundation has produced an extensive FAQ about the Dmitry Sklyarov & ElcomSoft Prosecution. The information is of course relevant to a wider range of circumstances than this particular case, and details the DMCA, fair use, eBooks and the EFF's role in the case. This is a good resource for anyone who wants to get the whole crazy story straight (if that is even possible!).

A recent story on Slashdot highlighted how bad this law really is. Apparently it turns out that serial cables might be illegal. The story submitter, Colin McMillen, related how US Customs rejected entry of a PC-Sega Dreamcast serial cable into the US, even though the cable had a legitimate academic use.


 Copyright

The New York Times has reported [registration required] on a legal challenge to the Copyright Term Extensions Act 1998, which extended copyrights another 20 years. The US Supreme Court has agreed to hear the challenge, which is being brought by a coalition of interested parties (publishers, etc.,) who depend on using material in the public domain. It will be interesting to see how this challenge progresses, as the original law was the result of extensive lobbying by powerful players in the media industry, notably Disney who would lose control of Mickey Mouse in 2003 under the original law which gave 75 year protection. The challenge is being backed by at least one lawyer most readers will be familiar with: Lawrence Lessig. Various news and information resources are available on the Openlaw website.


In related news, Slashdot reported that Canada is to hold public hearings on digital copyright. There are various locations and dates, and it would be great if people from Canada with an interest in the Free Software movement were able to make their points of view heard at these meetings.


Linux Links


Linux Focus
The following articles are in the March issue of the E-zine LinuxFocus:

The Register have featured the following stories which might interest you:

The O'Reilly stable of websites have published various articles which might be useful or interesting to you:

The Dillo web browser. Still pretty basic, no frames or style sheets, but it is VERY FAST! This is worth supporting.

Mike Orr's Linux Journal report from the Tenth International Python Conference.

Slashdot story on CodeWeavers CrossOver plugin 1.1 which plays Windows Media 6.4 under Linux.

The LinuxBIOS project.

UnixReview.com have taken a look at three Linux firewall products: SuSE Firewall on CD, Mandrake Single Network Firewall and Coyote Linux.

LinuxSecurity.com has a guide to configuring Postfix.

Newsforge reports on Fluxbox, an evolved version of the Blackbox window manager.

IBM article on clustering with MOSIX.

Linuxtoday with a Boston Consulting Group report on the mind of the average Open Source community member.

US-Patent on perfect machine translation. Quoting a little from a post by Hartmut Pilch to the European Patent Office mailing list:

"The description is very voluminous and explains a whole new cosmology, comprising insights about Buddhism illumination, androids, perpetuum mobiles, subject-object dichotomy and much more. Based on this cosmology, a solution to the above-claimed problem seems to become possible. At least it should be difficult for an examiner to refute that it does. He could ask the inventor to provide a working reference implementation, but that is not adequate, because only a key idea of a huge complex system is claimed."

Some more patents links

Wotsit.org ("What's it?") is a reference site for information on various file formats.


Upcoming conferences and events


Listings courtesy Linux Journal. See LJ's Events page for the latest goings-on.

COMDEX (Key3Media)
March 5-7, 2002
Chicago, IL
http://www.key3media.com/comdex/chicago2002/

BioIT World Conference & Expo (IDG)
March 12-14, 2002
Boston, MA
http://www.bioitworld.com/

Embedded Systems Conference (CMP)
March 12-16, 2002
San Francisco, CA
http://www.esconline.com/sf/

CeBIT (Hannover Fairs)
March 14-22, 2002
Hannover, Germany
http://www.cebit.de/

COMDEX (Key3Media)
March 19-21, 2002
Vancouver, BC
http://www.key3media.com/comdex/vancouver2002/

FOSE
March 19-21, 2002
Washington, DC
http://www.fose.com/

Game Developers Conference (CMP)
March 19-23, 2002
San Jose, CA
http://www.gdconf.com/

LinuxWorld Conference & Expo Singapore (IDG)
March 20-22, 2002
Singapore
http://www.idgexpoasia.com/

Software Solutions / eBusiness World
March 26-27, 2002
Toronto, Canada
http://www.softmatch.com/soln20.htm#ssebw

SANS 2002 (SANS Institute)
April 7-9, 2002
Orlando, FL
http://www.sans.org/newlook/home.htm

LinuxWorld Conference & Expo Malaysia (IDG)
April 9-11, 2002
Malaysia
http://www.idgexpoasia.com/

LinuxWorld Conference & Expo Dublin (IDG)
April 9-11, 2002
Dublin, Ireland


Internet World Spring (Penton)
April 22-24, 2002
Los Angeles, CA
http://www.internetworld.com/events/spring2002/

O'Reilly Emerging Technology Conference (O'Reilly)
April 22-25, 2002
Santa Clara, CA
http://conferences.oreillynet.com/etcon2002/

Software Development Conference & Expo, West (CMP)
April 22-26, 2002
San Jose, CA
http://www.sdexpo.com/

Networld + Interop (Key3Media)
May 7-9, 2002
Las Vegas, NV
http://www.key3media.com/

Strictly e-Business Solutions Expo (Cygnus Expositions)
May 8-9, 2002
Minneapolis, MN
http://www.strictlyebusiness.net/strictlyebusiness/index.po?

Embedded Systems Conference (CMP)
June 3-6, 2002
Chicago, IL
http://www.esconline.com/chicago/

USENIX Annual (USENIX)
June 9-14, 2002
Monterey, CA
http://www.usenix.org/events/usenix02/

PC Expo (CMP)
June 25-27, 2002
New York, NY
http://www.techxny.com/

O'Reilly Open Source Convention (O'Reilly)
July 22-26, 2002
San Diego, CA
http://conferences.oreilly.com/

USENIX Securty Symposium (USENIX)
August 5-9, 2002
San Francisco, CA
http://www.usenix.org/events/sec02/

LinuxWorld Conference & Expo (IDG)
August 12-15, 2002
San Francisco, CA
http://www.linuxworldexpo.com

LinuxWorld Conference & Expo Australia (IDG)
August 14 - 16, 2002
Australia
http://www.idgexpoasia.com/

Communications Design Conference (CMP)
September 23-26, 2002
San Jose, California
http://www.commdesignconference.com/

Software Development Conference & Expo, East (CMP)
November 18-22, 2002
Boston, MA
http://www.sdexpo.com/


News in General


 Linux, Microsoft and the Bundestag

A group of German citizens concerned that Germany should both exploit the advantages of free software, and avoid some of the perils of proprietary software have been lobbying for the introduction of free software into the German parliament, the Bundestag. The www.bundestux.de (English and Deutsch) calmly makes the case for free software in the Bundestag (and indeed in all government), and provides the opportunity to submit your contact details in support of the sentiments.

The Register reported that this civil activity was received with hostility by Microsoft Germany, who felt they were unjustly being labelled as: "undemocratic and a hindrance to democracy". The consultants report released later on basically divided the spoils [The Register] between Microsoft (recommended for desktops) and free software (recommended in server/groupware roles). Microsoft's poor email client security was noted, but was not sufficient to tip the balance.


 W3C Climbdown

Linux Weekly News has reported that the W3C appears to have backed down on the issue of incorporating royalty governed technology into its standards. This is a significant victory for people speaking out on issues that upset them. LWN also notes that there is another comment period leading up to the final review, for those who still have something to say or contribute.


Also on the topic of open standards, The Register reported on the Free Standards Group, which has currently completed two standards, the Linux Standard Base (broadly covering system layout) and the Li18nux standard (covering internationalization). Happily, this initiative seems to have widespread support, and should be a significant boon to the whole Free Software movement.


 Linux Weekly News

Linux Weekly News (LWN) is becoming independent again. Tucows, which had acquired it, has spun it off. "As of the beginning of February, LWN will operate, once again, as an independent publication of Eklektix, Inc., which will be owned by the current LWN staff. All of our financial issues remain, and they have only gotten more pressing over time, but we will have more freedom in how we try to address those issues." LG has long been a supporter of LWN (after all, we get some of our best links from them!), and we were saddened in November to hear of their difficulties. We wish the LWN staff the very best of luck.


Distro News


 General

Distro News is based on the information sent to us by the publishers/authors of Linux distributions. This does not necessarily give a broad view of the Linux scene. One excellent resource for anyone interested in choosing a distribution or just in the state of the business is DistroWatch.com which has profiles and comparisons of almost every distribution under the sun. Another resource is the distribution section of Linux Weekly News (for example, here) which covers news regarding new distribution releases, changes/updates to existing distros, and distribution releases.


 Bluecat

LynuxWorks have announced BlueCat 4.0 Linux and VisualLynux Integrated Development Environment (IDE) support for the for the new ARM920T processor. Developers will now be able to develop embedded Linux software applications for the ARM920T processor, which features high-performance and low-power characteristics for handheld devices, network computers, smart phones and other processor-intensive applications. LynuxWorks' BlueCat 4.0 Linux distribution is based on the 2.4 Linux kernel. With VisualLynux, developers have access to an integrated and tested cross development environment to facilitate development. VisualLynux is an extension of Microsoft Visual Studio, developed for Windows-hosted development, with the added benefit of all the commands and standard GNU tools needed to streamline the design and creation of applications targeted to run on BlueCat Linux.


 Debian

Debian Weekly News reported that a new revision (r6) of Potato is in preparation, and is expected to arrive early March. Looking to the next release, it seems Woody is beginning to take shape for its ultimate release. Unofficial Woody CD's have been available for a while, but recently Ho-seok Lee has released a mini CD image suitable for 3.5" mini CD's.


 SuSE

SuSE has announced the implementation of mySAP.com on "SuSE Linux Enterprise Server". Since the beginning of this year, SuSE Linux has been utilising SAP's enterprise resource planning tool on Compaq hardware for the company's business operations. SuSE has also announced the availability of "SuSE Linux Enterprise Server 7 for iSeries and pSeries"


Software and Product News


 Graphics Muse Tools CD V1.0.0 for GIMP 1.2

In response to the growing demand for off the shelf products for desktop Linux systems, the Graphics Muse is now offering The Graphics Muse Tools CD, an easy to install package of plug-ins, scripts, and data for use with the latest version of GIMP. The Graphics Muse Tools CD V1.0.0, a suite of Plug-Ins, scripts and data designed specifically for use with GIMP 1.2 and Red Hat 7.x was released on Feb 7, 2002. This release includes 4 original plug-ins and 84 plug-ins and Perl scripts from the GIMP Registry, all compiled for use on Red Hat 7.x. This includes 16 programs that had not previously been ported to GIMP 1.2. Additionally, the CD includes over 125 new brushes and 125 new patterns.

The Graphics Muse Tools CD is available for Red Hat Linux 7.x systems and can be purchased for $12, plus shipping and any applicable sales tax, from the Graphics Muse Tools CD web site. (Should also work on SuSE 7.2 and Mandrake 8.1)


 CryptoHeaven

CryptoHeaven offer a set of tools and services aimed at bringing encryption technologies to a wider audience. The tools deal with such tasks as encrypting/signing emails, secure instant messaging and chatting, online encrypted file storage, key management, etc., with the emphasis on ease of use. Available for Windows, Linux, Mac OS X. Free download, with charges for some services, consult website for details.


 OmniCluster SlotServer

OmniCluster Technologies is an IBM spin-off that has created a plug-n-play server blade products that fit within the PCI expansion slots of existing hardware. Since SlotServers are built on an industry standard PCI architecture and are compatible with virtually all operating environments -- including Windows 2000, Windows NT, RedHat Linux and FreeBSD. Users can run applications tuned for an operating system, regardless of the host server's operating system. For example, users can run a Linux-based firewall within a Windows-based host, on an isolated server. SlotServers range in cost from $499 - $1,199.


 Zend Studio 2.0

Zend Technologies have released Zend Studio 2.0: an environment for developing, debugging, and deploying PHP applications in one integrated package. Zend Studio 2.0 is intended to allow people with intermediate computer skills to develop, de-bug and deploy PHP-based applications ranging from e-commerce to Web hosting.


 New Release of Motif

In cooperation with The Open Group, ICS have just released an update to the Motif GUI toolkit. Open Motif 2.2 includes 10 new user interface controls and universal tooltip support. A roadmap has also been defined that defines availability for additional functionality including anti-aliased fonts, improved imaging support (png, jpg, etc.) and canvases.

More details are available at www.motifzone.net.


 Fake

Fake is a utility, released by Verge Systems, that enables an IP address to be taken over by bringing up a second interface on the host machine and using arp spoofing. This can be used to switch in backup servers on a LAN during periods of both unscheduled and scheduled down time.


 QuickHelp and QuickUML Linux

Excel Software have announced the availability of two new packages for Linux. QuickHelp is a development tool for quickly creating and distributing online help for Linux applications with support for the Linux KDE and GNOME desktops. QuickHelp consists of a QuickHelp Builder for creating help systems and a QuickHelp Viewer for deploying them to end-users. The help information resides in a single XML file distributed with the QuickHelp Viewer.

QuickUML for Linux is an object-oriented design tool that provides extensive integration and ease-of-use for a core set of UML models. An entire project is accessible through a tabbed window with smooth integration between use cases, class models, object models, dictionary and code. The project is saved as an XML file that is compatible with QuickUML Windows so design work can be shared between platforms.


 Team ASA Releases Dual Gigabit Ethernet NPWR Linux Engine with 733 MHz XScale CPU

Team ASA have today announced the latest release in the NPWR single board networking computer series. NPWR, a first single board networking computer (SBNC) designed for manufacturers and OEMs in the Network Attached Storage (NAS), RAID, and Personal Server marketplaces, is now available with dual Gigabit Ethernet ports. The NPWR is powered by the Intel XScale processor and the standard configuration includes a 160 Mbytes per second (LVD) SCSI port, 8 Mbytes of FLASH ROM, 128 Mbytes of SDRAM and Dual Gigabit Ethernet ports.


 VariCAD

VariCAD have announced the recent release of its MCAD - VariCAD 8.1. This CAD package features many tools for 3D modelling and 2D drafting: libraries of mechanical parts, surface development (unbending), calculations of standard mechanical components, tools for working with non-graphical information (BOM), and more. VariCAD 8.1 can also import and export common CAD file types such as DWG, DXF, and IGES.


Copyright © 2002, Michael Conry and the Editors of Linux Gazette.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Linux User Caricatures

By Franck Alcidi


[cartoon]

My previous LG cartoons: issue72 issue73

You can view my other artwork and sketches on my projects page.

Franck Alcidi

Franck is an artist in Australia. His home page ("Ausmosis") is http://www.ozemail.com.au/~geisha/projects.html.


Copyright © 2002, Franck Alcidi.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Fil & Lil

By ESC Technologies


[cartoon]
[cartoon]
[cartoon]
[cartoon]
[cartoon]
[cartoon]
[cartoon]
[cartoon]
[cartoon]

Fil and Lil's Linux Gazette debut was in January. All their cartoons are on the What Is New page.


Copyright © 2002, ESC Technologies.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Taming The Linux Keyboard (My Programming Adventures in Writing a Console Application for Linux)

By Petar Marinov


It was about a year ago when I ventured into the idea of porting my Windows-based console editor to Linux. Naturally, I targeted the text console. The editor was designed in a way to facilitate the porting to any other text console environment. I have isolated all the keyboard input and text output functions in two files, which I planned to rewrite whenever a new platform comes to my way. I've supplied two different versions of these files for Windows console and plain DOS which, I presumed then, validated my initial idea that porting should be a simple task.

My only knowledge about Linux then comprised the GNU compiler package obtained by spending a year with its DJGPP port to DOS. While I knew how to write, compile, and debug programs in Linux, my knowledge for the console was limited to functions like printf() and getch(). As I knew how prominent is the role of the text console in Unix, I supposed that programming console applications should be really advanced and on a par or even better to this in DOS and Windows.

I pulled the anchor and once underway, I started to gather necessary information. Getting the advantage of having the sources of everything, I tried to find the good tides by downloading two applications that had console oriented text interfaces.

First it was the ubiquitous MC (Midnight Commander). This program was the straw, which everyone that comes from Windows or DOS into the UNIX land grabs gasping for a breath in the ocean of the unknown.

Second it was the TurboVision port to Linux. TurboVision is a popular windowing framework for DOS designed in Borland. The company was amicable enough to release the sources in public domain and shortly after having them in 32-bit DJGPP I found out that there is a Linux version as well. This pretty much showed me that there is a resolution to my problems. To further milk the ship metaphor, this blew good winds in my sails.

Something has spoiled the nice experience of using MC. There is something rotten in Denmark, as one of the Great used to say. Why ESC ... is not ESC? In MC when you press ESC it does nothing until you press it again and then the two-ESC combination does the action supposed for the single ESC. Helloooo, why is that? Read on, to learn what dictates the rules here.

In DOS we had ANSI.SYS. You use printf() with a sequence (starting with ESC and hitherto called an ESC-sequence) of funky characters to move the cursor, change the color etc, following the needs of the full-text screen applications. It was considered primitive and unproductive to use ANSI.SYS, and besides fancy ASCII art, nothing serious engaged in using this methodology. Advanced libraries offered direct access to the video memory which greatly improved the user experience in working with console applications. I remember looking in dismay the sources of tpcrt.pas of the TurboPower package, where tight assembler code tried to squeeze whatever the graphic (maybe we should say "text") card had to offer.

It turned out that what was considered a very primitive way to do full screen applications in DOS, is the road to go in UNIX! I needed sometime to collect myself after learning one of those basic facts of life. Back on my feet I tried to devise a scheme for taming the beast; I thought that as I learn the ESC-sequences and write the functions it would be a dream come true. After some further research I discovered that there is no single standard for these ESC sequences! There are different terminals that support different set of operations and that one needs to have a whole database to properly operate all possible terminals. Why does everything grow so complex? I still tremble remembering the waves of the aftershock by all the discoveries I made in a single day.

"Curses" is the king. Long live the king! It turns out that somebody has already developed this database and all the functions I need in a library originally called "curses". In Linux it is "ncurses". Everyone uses it.

Screen access functions are almost intuitive enough for everyone to start immediately utilizing them. "Ncurses" takes care to update only the portions of the screen that actually changed, which is a nice performance improvement when you use your program in a telnet session or any other remote mode to minimize the amount of the transferred data.

One simple problem I faced was the fact that DOS and Windows color attributes do not directly map to "ncurses" color attributes. The problem is aggravated by the fact that in "ncurses" I have only 64 pairs of color and background available. How will I map my 127 possible color/background attributes to just 64?! Well, a short analysis revealed that my program uses only about 25 distinctive attributes, which allows me to fit them nicely in the 64 attributes map that "ncurses" uses. It works like that, I have an array of attributes -- my pallete. I first go and count how many unique attributes I have. Then for each unique attribute, that I dissolve to color and background, I create correspondent entry in the "ncurses" color palette. The index of this entry (consider it as an ID) is stored in a secondary array of 256 bytes (the whole range of Windows and DOS). When I then pass to my display function an attribute from my palette it is used as an index in this secondary array to extract the correspondent attribute ID that is generated by "ncurses". So as long as I do not go beyond 64 unique attributes, my program will be happy and will use the good old 256 attribute values. This allows me to have a single color palette for all the platforms that I currently support, where for DOS and Windows it is used natively, it is dynamically remapped in Linux.

The TurboVision port used a direct screen access when running in a text mode linux terminal. Temporarily I considered this option, it is still possible to add this to my modules, but later I thought that the small performance gain simply doesn't worth the effort.

I had a bad hunch about the keyboard. First just by looking in the key definitions in ncurses headers, I noticed that this library basically lacks the infrastructure to define rich key combinations. The terminal ships all the "extended" keys via ESC sequences which, I don't know why, prevents you from getting single ESC as an ESC and you are always required to press ESC twice for your program to receive it once. Plus you have only a certain number of key codes, which I presume are derived from an ancient crippled terminal, and nothing creative happened to the definitions since then. Compare this to Windows, and even in DOS, where you can have an ASCII translation of a key, then you can have the keys as position codes and you can always have the shift state of the keyboard. In Windows you are delivered, via a standard API, different events as key pressed and key released. It sounds natural, isn't it? Well, because it is so natural, UNIX faithful to its orthodox approach to these matters defines everything in an extremely crippled model. Working this way is maybe good for improving your mental stamina, but believe me, is totally unproductive if you would like to achieve something fast.

Then I was unable to make ncurses operate with a 0 timeout when reading a key. Add to this the double ESC syndrome, the total lack of any roads to extend this, and in a while you look as an abandoned donkey in a desert with a water for just couple of hours. I always have a bottle of Evian within reach, I needed no more evidences that while "ncurses" support for the display is adequate, its keyboard support beyond some very basic functionality is totally irrelevant to my needs. I started to think how to maintain the whole keyboard business with my own code.

The keyboard is a file -- stdin. I never thought I will use stdin in a full screen program but, as you can suspect, this is the way to go in Unix. The stdin file transports everything in ASCII codes and keys like the arrows form a sequence that starts with ESC. At first the impression is that if ESC is a start of sequence then the key ESC itself should be ESC-caped as well. That is the way "ncurses" go. That's why in MC we need to press ESC twice.

Beside delivering all the ASCII codes and the ESC sequences, the keyboard module needs to supply a kbhit() function. In the documentation "ncurses" promises that its getch() function can work with a 0 timeout, thus never blocking when there is no key in the buffer. Maybe a plan like mine starts to form in your mind, I will use getch() with 0 timeout, then I will have a small sleep(xxx) and this loop will exit whenever a key is pressed. This sounds good in theory, but "ncurses" is short on delivering on this specific feature. Its maybe something that I didn't do right, or I used old version, or maybe it is something else, I may eventually even look at the sources of the "ncurses". I didn't want to go that deep, the whole keyboard model looked totally outdated, fixing a small flaw in "ncurses" wouldn't have helped me, I thought.

I need basically this: 1. kbhit(). I need to check for a key and exit. 2. I need to be able to read something like Ctrl+Shift+Left_Arrow. 3. I need to exit with a timeout if for sometime a key is not pressed.

For anything of this to happen one needs to put the keyboard stdin file in a row mode. By default you enter lines of text, which are send to your program only after the user presses Enter. So to be able to read a single character you need to switch to a row mode. The stdin file may not only serve a keyboard but may get characters via a serial cable, yes, only 3 wires should be enough to manipulate a whole machine. For a serial connection to operate properly you need to maintain flow control. This could be done by adding 2 additional wires for each of the talking sides to request "stop sending me characters" and when the buffer is empty to ask "now start dumping again". But adding 2 wires may prove expensive and even complex, and this shuttle in the space, who knows, something may happen if we introduce this extra level of hardware complexity. What one can not do with the hardware makes up with the software, a host of characters (in fact 31) is wasted to not only maintain the flow control but to switch modes of echoing, the canonicality (whew, this is a word, a?!) etc. As you may already know these 31 characters are the control characters that populate the lower district of the ASCII table. While this sounded as a good idea 20 years ago now pressing Ctrl+S to suspend the output on the screen looks arcane to me, and I need to use Ctrl+S to save the current file. It smells like the keyboard needs some extra massaging to fit into the shape I need. So the setup function easily grows beyond the lines of a single screen, after some hours of reading documentation and experimentation I managed to come up with something that actually works. I felt proud, and in this era of people doing space tourism I felt that I have my small shred of achievements to show.

Kbhit() proved to be relatively easy. To wait for a characters on a file (or socket), use select(). If you apply this to stdin then select() will unblock when someone presses a key. If the timeouts are tuned to 0, then it will exit immediately with a failure or success code indicating that a key is ready to be read.

The ReadKey() function has a 2-tier structure (complex isn't it, sounds like something that is multi-tire). At the first level I use select() to block for incoming characters. When select() unblocks I issue a single read() function and try to extract as much as possible. Whatever I manage to suck from stdin I store in a fifo queue. On the second level the characters are extracted one by one and a string sequence is compiled that is matched against an exhaustive list of ESC sequences. We have a definite success if we find a matching string. We have a definite success if we have a single ESC followed by a time-out. Then it is just an ESC, simple! Some code takes place to close the extra cases where nothing matches and it is not an ESC etc. All this is supplied by a function that extracts the Shift state of the keyboard. You may guess that this is a hack that only works in Linux text terminals. I learned this from the source code of MC. The downside is that this doesn't work outside bare-bones text Linux terminals. Try to work in a X terminal and you are dead, no shift key status and no means to ever extract it.

Linux keyboard gives one more advantage in front of any other Unix keyboard (that I know of), you may define your own ESC sequences. So, if you need for example Ctrl+Shift+F3 you can define this with a new ESC sequence and by using the "loadkey" utility to download it into the kernel. The changes are immediate and non-permanent. If you reboot you need to reexecute the same command with the same definition. I liked this, so I added all the key combinations that I used, and were undefined in Linux and defined in Windows.

Actually by having the function to extract the shift-state, the possible key-combinations one needs to explicitly define is greatly decreased. As for example if we have Shift+F3 defined, we can get the Control key state and then we have Ctrl+Shift+F3. Which without the shift-state function should be defined as a new key sequence with "loadkey". A problem surfaces here, which although subtle, should be well noted. If the extraction of the key from the keybuffer does not coincide with the time we extract the shift state we create a big mess. With a great probability (the computers nowadays a fast enough) we can expect for this not to happen, but hey, as this is just a probability so mathematicions say the odds are that sometimes it may actually happen. Example follow. If in my editor F3 is "close all files and discard changes" and Ctrl+Shift+F3 is assigned to be "next file", I beg for trouble here. Imagine that F3 is in the buffer and you can not get the shift state at the same time you will get just F3 and not "Ctrl+Shift+F3".

Having stdin as keyboard input has one great advantage, I should admit. The editor is subject to a total automation by just supplying an input file, provided that you put there the ESC sequences to activate various extended keys if necessary.

To scold the enthusiasm in your eyes I should note that ... ostensibly, full automation is possible, but to a certain extent ... maybe you have already figured this out, right ... you can not supply the shift states in a text file. Well, that's life, you can not have your cake and eat it too!

In Windows a console application works equally well in text mode and in a graphical console window. While my module works perfectly well in a text linux console ($TERM="linux"), its keyboard support is totaly inadequate when started from within X window terminal. All this is corollary of the fact that the most common denominator of the UNIX keyboards is "unsigned char" and the extended keys use predefined ESC sequences that didn't evolve for the last 20 (or more) years. So I'll keep working in making my modules X aware. Whenever the program senses that it is started from within X terminal it will open a new window where all the text output will be emulated with a fixed width font and the keyboard will be processed to the best possible extent that X server offers.

Eventually what I initially planed proved to be doable. It was quite an effort and that is why the victory was so sweet.

demo.tar.gz contains the whole story expresed in C language.

You may find this article at the "zepp" discussion group, here. I will be glad to respond to questions or any opinions regarding this article posted in the discussion group. Generally, the discussions are usually about software development, comments on hardware, programming languages. Anything related to 42 will find benign soil. You are welcome to join.

Petar Marinov

I come originally from Rousse, Bulgaria. Now I live in San Francisco and work in Foster City (California). I program mainly embedded systems. I started using Linux in 1998. My work is mainly done on Windows because of Visual C, but it is deployed on Linux platform.


Copyright © 2002, Petar Marinov.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


The Foolish Things We Do With Our Computers

By Mike "Iron" Orr


Horror Story

By Craig Reeson

Here's a quick horror story for you. I was recently admin-ing one of my Linux servers. This server is the company print server. What had happened was a user was connected to a legacy system via a terminal program. Somewhere along the line there was a screwup and his system starting dumping lots of extraneous data to the nearest printer. The user tried to power-cycle the printer to no avail. Thankfully, they came to me next to try and resolve the problem.

Anyway, I ssh'd into the Linux box, changed to the 'spool/' directory and did an 'ls' of the appropriate folder. After noting that there were a few hundred print jobs waiting in the print queue I decided it was best if I just deleted them all...

Here is where the proverbial hit the spinning thing!

...I decided to 'rm -rf *' all the files. The problem is I did it from the 'spool/' directory rather than the proper printer directory. This had the effect of deleting everything in my system spool directory!

After realising my error I tried to fix it. First thing was trying "unrm". This did not work as I could not read from the filesystem without errors. Next I tried using a boot floppy and trying 'unrm' again. But no that would not work because I could not get the RAID array to be recognised!!! Tried a few other options until I gave up and decided it was time for an "upgrade".

Problem solved after 3 hours :)

By Craig Shelley

After buying an all-on-board style PC and installing linux, I wanted to try out a dual-headed configuration. This was mainly because I found myself with a spare graphics card and monitor. I plugged in the new graphics card, and realised that the super complex modular BIOS system was automatically disabling interrupts from the on-board graphics system. According to the manual, it was impossible to turn off this 'feature'. Then I had an idea!

The idea was that if the new graphics card could be disabled while booting, the BIOS may ignore it. Then, I could re-enable the card for normal use.

After studying the PCI bus pinout and specs, I decided to disconnect the reset line from the graphics card using a sharp screwdriver to destroy the track. I then re-connected the reset line through a switch, and then down to the ground connection. (Reset is Active Low)

Using the switch I could disable the card, but it then became impossible to re-enable it because the PC could not reset it when it wanted to. I then decided to connect a resistor across the broken track so that the card could also be reset by the PC, and my switch would not affect anything else.

The switch was neatly mounted on the metal back plate of the card, and can be switched when required.

Using the switch, I put the card into reset mode, booted the PC, then turned the card back on, and found myself with two working monitors ;-) ;-)

Also, have you ever wondered how to get out of the situation where X does not return VGA text mode? Adding one of these switches to your card solves this problem.


[If you have a story about something foolish or ingenious you did to your computer, send it to gazette@ssc.com-Iron.]

Mike Orr

Mike ("Iron") is the Editor of Linux Gazette. You can read what he has to say in the Back Page column in this issue. He has been a Linux enthusiast since 1991 and a Debian user since 1995. He is SSC's web technical coordinator, which means he gets to write a lot of Python scripts. Non-computer interests include Ska/Oi! music and the international language Esperanto. The nickname Iron was given to him in college--short for Iron Orr, hahaha.


Copyright © 2002, Mike "Iron" Orr.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Qubism and HelpDex

By Jon "Sir Flakey" Harsem and Shane Collinge


[I'm putting these two cartoons on the same page because the cartoonists are borrowing ideas from each other, and because there are few HelpDex cartoons available at the current time. -Iron.]

[cartoon]
[cartoon]
[cartoon]
[cartoon]

Previous cartoons about Vi-agra, the evil vi paperclip, are in issues 54, 55, 66, and 67.

All Qubism cartoons are here at the CORE web site.

Jon "SirFlakey" Harsem

Jon is the and creator of the Qubism cartoon strip and current Editor-in-Chief of the CORE News Site. Somewhere along the early stages of his life he picked up a pencil and started drawing on the wallpaper. Now his cartoons appear 5 days a week on-line, go figure. He confesses to owning a Mac but swears it is for "personal use".

Shane Collinge

Part computer programmer, part cartoonist, part Mars Bar. At night, he runs around in a pair of colorful tights fighting criminals. During the day... well, he just runs around. He eats when he's hungry and sleeps when he's sleepy.


Qubism copyright © 2002, Jon "Sir Flakey" Harsem.
HelpDex copyright © 2002, Shane Collinge
HelpDex cartoons may be be published electronically, but may not be used in a public print publication without permission from the author.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


The Standard C Library for Linux, part 7: String Handling

By James M Rogers


I finally have time (after a few years) to give back a little more to the Linux community with the next in my series of articles on the Standard C Library.  I hope that you enjoy.

The last article was on <assert.h> diagnostics for programmers.  This article is on <string.h> string handling.   C is not much better at handling strings than machine code, so machine language programmers will feel quite at home in this section.  There are many limitations and problems with string.h that will be addressed in the appropriate function descriptions.

I am assuming a knowledge of C programming on the part of the reader.  There is no guarantee of accuracy in any of this information nor suitability for any purpose.

The example is rogers_example07.c .  This is a basic example that will demonstrate each of the string functions.  If you compile it and run it you will be able to see the output.   Compare the output to the code and enjoy.

As always, if you see an error in my documentation please tell me and I will correct myself in a later document.  See corrections at end of the document to review corrections to the previous articles.

WARNING:  Copying strings in C is the most dangerous part of programming in C.  C itself doesn't perform bounds checking, so it is very easy to overwrite the end of a string and actually overwrite other variables or even to crash the program.  Crackers use this weakness in C and inexpert coding practices to perform controlled overflows to force programs into giving them a shell to the account that the program is running under.  This is usually root for most servers.

C doesn't really have strings.  I know that is a strange thing to say in a document talking about string handling in C, but it is true.  What C does have is an array of characters.  To make space for a string you can ask the compiler to reserve room for that string.  The most common way is with a simple character array:

char string[17];

This reserves room for 16 characters and an end-of-string marker.

strcpy ( string, "This is a string" );

Will work to copy the static string "This is a string" into the space that we allocated.  The static string is composed of 16 characters followed by the ASCII nil character.  So there is plenty of room in the variable called string to hold the static string.  Nil is typically represented with the number zero or with the character '\0' or with the character '\000'.

Surprisingly the following will sometimes work as well, even though there are more then 17 characters copied into the char array:

strcpy ( string, "This is a long string" );

There is never any bounds checking when you are copying strings.  So even though you went past the end of string and wrote to memory in an unexpected way, most of the time you can get away with it.  Of course your program can also unexpectedly crash at anytime as well, sometimes in a place far away from the place where you made your error.  Crackers can get a shell from the computer by overwriting the end of a buffer in such a way that the program executes a shell.  This is one of the reasons that you should really not use strcpy.  Use strncpy instead:

#define  MAX_STRING_LENGTH  17
char string[MAX_STRING_LENGTH];
strncpy ( string, "This is a long string", MAX_STRING_LENGTH );
string[MAX_STRING_LENGTH-1] = '\000';

The reason that I used a macro for the string length is that I am using this length in many places in my program, if I ever decide to change the size of the variable string I would have to find everywhere where I used the number 17 and fix each one.  Sometimes you may use the same number in different places to mean different things.  So even if you only use a literal number in a few places using a macro can make the meaning of that number really stand out and it makes it trivial to change the size of the string buffer in this case.

The reason that I put the last line there is that if the literal string is longer than the string that we are copying into then the end-of-string marker isn't put into place.  If you don't set the final character to null, most of the time you will be fine, but every once in a while your program will crash and you will wonder why.

There is also a third way to define a string and that is with malloc, realloc and calloc.  These functions work by requesting the memory that you need at runtime.  This is the most complicated but also the most flexible and powerful.

#define STATIC_STRING "This is a long string that will be copied into a location during runtime"

char *string;
int string_length;

string_length = strlen(STATIC_STRING);

if (!(string = (char *) malloc ( string_length ))){
   /* no memory left, die */
   exit (1);
}

strncpy( string,  STATIC_STRING, string_length);
string[string_length] = '\000';

/* do something with the string */

free(string);

One of the dangers of this method is that you have to clean up after yourself, using the free function.  If you don't free everything when you are done with then you will be leaking memory and eventually your program will crash.

The <string.h> library has numerous problems.

The biggest problem is that the library was never designed to be complete and consistent.  <string.h> really is a collection of functions written by various people, assembled into a library and given to the world.   And now we are stuck with it.

Most of the functions can return a NULL or a pointer to a string.  If a function can return a NULL, you should always check the return value after calling it, and take appropriate action if it is NULL.  If you attempt to treat a NULL return value as a pointer to a string, you will quickly crash your program.


I have arbitrarily grouped the functions into sections according to task, to show the slight differences between similar functions. One could also group by string functions vs memory functions, but that seemed less useful.


Copying

void *dest is a pointer to the array which will receive the copy.
char *dest is a pointer to the string which will receive the copy.
const void *src  is a pointer to the array from which the copy will be made.
const char *src is a pointer to the string from which the copy will be made.
size_t n is the number of characters to be copied.

These functions all return a pointer to dest.  Which is strange, because you already have a pointer to dest.

memcpy copies n characters from the location pointed at by src to the location pointed at by dest.  Don't copy areas that overlap or your program will crash.

memmove also copies n characters from the location pointed at by src to the location pointed at by dest.  But it first copies the characters to a temporary location then into the final location, so this is the function to use if you are copying overlapping areas of memory.

strncpy copies no more than n characters from the location pointed at by src to the location pointed at by dest.  This function will stop at the first null character, which may be at any location less than or equal to n. If n characters are copied and no null is found, no null is written.  This is a great way to leave the end of a string open.  You should always explictly write zero to the end of the string.

strcpy copies the string pointed at by src to the location pointed at by dest, including the ending null character.  Warning! Never use this function for data that comes from the real world !!!    The biggest danger of using this function is that if there is no null character you will happily go copying through memory until you randomly find a null or you access memory that doesn't belong to your process and the process is killed with a SEGV (segfault) signal.  Programs can capture this signal and shutdown, but at this point you are so hosed that it is best just to let the program core dump.

I have already given a few examples of how to use strcpy and strncpy.  memcpy and memmove are used exactly like strncpy, but they can copy arbitrary blocks of bytes, not just strings.


Concatenation

char *dest  is a pointer to the string which will receive the copy.
const char *src  is a pointer to the string from which the copy will be made.
size_t n  is the number of characters to be copied.
 

strcat appends the source string, including the final '\0', onto the end of the destination string. It overwrites the trailing '\0' on the end of the destination string.

strncat does the same, except it will only copy at most n characters from destination and it will append a '\0'.

Both strcat and strncat return a pointer to the destination string.  Again, there is no bounds checking on the resulting string, so make sure that the string you create isn't too long to fit in the memory you have allocated for it.


Comparison

const char *s1 is a pointer to the first string.
const void *s1  is a pointer to the first memory array.
const char *s2  is a pointer to the second string.
const void *s2  is a pointer to the second memory array.
size_t n  is the number of characters to be copied.

memcmp compares the number of bytes given by n.  If  s1 is less than s2, return a value less than zero.  If s1 is equal to s2, return zero.  If s1 is greater than s2, return a value greater than zero.  The comparison is based on the byte values of the ASCII characters in the memory array.

strcmp compares the two strings s1 and s2.  A string is a null terminated array of characters.  If  s1 is less than s2, return a value less than zero.  If s1 is equal to s2, return zero.  If s1 is greater than s2, return a value greater than zero.  The comparison is based on the byte values of the ASCII characters in the two strings.

strncmp is very similar to memcmp, except that it compares the two strings, up to the length given by n.  If a string is shorter than n, than the memory locations following n are not compared.  If  s1 is less than s2, return a value less than zero.  If s1 is equal to s2, return zero.  If s1 is greater than s2, return a value greater than zero.

strcoll compares the two strings s1 and s2.   If  s1 is less than s2, return a value less than zero.  If s1 is equal to s2, return zero.  If s1 is greater than s2, return a value greater than zero.  The comparison is based on the locale that is set with the setlocale() function in the <locale.h> library.  I will cover this library in a later article.

strxfrm transforms string s2 based on the locale category LC_COLLATE.  It then copies n bytes into string s1.  Finally it returns the number of characters actually placed into string s1.  If y >= n then there was an error.


Search

const void *s is the pointer to the array to be searched.
int c is the character to search for.
char *dest  is a pointer to the array which will receive the copy.
const char *src  is a pointer to the array from which the copy will be made.
size_t n  is the number of characters to be copied.

memchr will search the memory array pointed to by s for character c, up to n characters, returning a pointer to the first location, or NULL if the character is not found in the memory array.

strcspn returns the length of the beginning of the string s that contains no characters in the reject string.

strspn returns the length of the beginning of the string s that contains only characters in the accept string.

strpbrk returns a pointer to the location of the first character in string s that matches any character in the accept string.  Or a NULL if c is not found in string s.

strchr will search the string pointed to by s for character c, returning a pointer to the first location, or NULL if the character is not found in the string.

strrchr returns a pointer to the location of the last character in string s that matches the character represented by integer c.  Or a NULL of c is not found in s.

strstr returns a pointer to the location of string substring in string s, or a NULL if the substring is not found in s.

The strtok man page says that there are a lot of problems with this function and says to never use the function.  strtok takes a string and divides it up into tokens.  The first call to the function has string s as its first argument and returns the first token.  After the first call the function is called with NULL as the first argument and the function continues to return each token in turn until a NULL is returned when there are no more tokens.  The delimiter can be changed with each call, or can be kept the same through all the calls.  The limitations of this function are many;  the function modifies the original string s, the value of the delimiter isn't retained between calls and the function won't work with constant strings.


Miscellaneous

void *s
int c
size_t n
int errnum
const char *s

memset fills memory array s of size n with the integer value in c and returns a pointer to memory array s.

strerror returns a pointer to the string that describes the errornum passed as an argument, or an unknown error string if the errnum isn't known.  This works with various other error related functions in the <stdio.h> and <error.h> libraries that a future article will have to cover in great depth.

strlen returns the number of characters in string s, not including the '\0' string terminator.


Non-Portable Functions

The GNU string library has many that the Standard C Library doesn't.  The descriptions are taken out of the man pages cut and paste.  If you want your code to work on any Unix box then don't use these functions.  However, they are a good guide for implementing a function in your own code that is portable.

int strcasecmp(const char *s1, const char *s2);

strcasecmp compares the two strings s1  and s2,  ignoring  the  case of the characters.  It returns an integer less than, equal to, or greater than zero if s1 is found,  respectively,  to  be  less  than, to match, or be greater than s2.

int strncasecmp(const char *s1, const char *s2, size_t n);

strncasecmp is similar, except it only compares the first n characters of s1.

strcasecmp and  strncasecmp return an integer less than, equal to, or greater than  zero  if  s1 (or  the first n bytes thereof) is found, respectively, to be less than, to match, or be greater than s2.

char *strdup(const char *s);

I have implemented this function all on my own without knowing about this function!  I learn something new about Linux everyday.

strdup returns a pointer to a new string which is a duplicate of the string s.  Memory for the  new string  is  obtained with malloc(3), and can be freed with free(3).

strdup returns a pointer to the  duplicated string, or NULL if insufficient memory was available.

char *strfry(char *string);

strfry randomizes the contents of string by using rand(3) to randomly swap characters in  the  string. The result is an anagram of string.

strfry returns a pointer to the randomized string.

char *strsep(char **stringp, const char *delim);

strsep  returns  the  next token from the string stringp which is delimited by delim.  The token  is terminated with a `\0' character and stringp is updated to point past the token.  Similar to the strtok() function, but is non-portable.

strsep returns a pointer to the  token,  or NULL if delim is not found in stringp.

char *index(const char *s, int c);

index returns a pointer to the first occurrence of the character c in the string s.  We should probably just use the strchr() function, it performs the same function in a portable manner.

char *rindex(const char *s, int c);

rindex returns a pointer to the last occurrence of the character c in the string s.  The terminating '\0' character is considered to be a part of the strings.  Please use the Standard C Library function strrchr(), it performs the exact same function, in a portable manner.

index and rindex return a pointer to the matched character or NULL if the character is not found.


Corrections to previous articles:

That's right!  I have finally gotten around to publishing  all the accumulated corrections to my previous articles.  Just look at all the mistakes that I have made!   My thanks to those who took the time to e-mail me after noticing a mistake in my articles.
 

Subject:      The Standard C Library for Linux, Part Three"
  Date:       Wed, 12 Aug 1998 11:27:08 +0200
  From:       Lars Hesdorf <hesdorf@ibm.net>

Hej James M. Rogers

You wrote somewhere in The Standard C Library for Linux, Part Three

"putchar writes a character to standard out.  putchar(x) is the same as
fputc(x, STDIN)"

You probably meant "...fputc(x, STDOUT)

Lars Hesdorf
HESDORF@IBM.NET

Reply:

  Actually I think that I even got the capitalization wrong, I believe that it should be "fputc(x, stdout)"  The example program is correct because I compiled and tested that for correctness.
 

Subject:          The Standard C Library for Linux, Part Two
      Date:          Wed, 04 Aug 1999 21:00:59 +1000
     From:          32000151 <32000151@snetmp.cpg.com.au>
 Organization:   Student of Computer Power Institute
 

Dear Sir,

in The Standard C Library for Linux, Part Two you wrote

"   char *fgets(char *s, int n, FILE *stream);

char *s the string that will hold the result.
int n the maximum number of characters to read.
FILE *stream is an already existing stream.
.
.
.

fgets reads at most n characters from the stream into the string.

    char s[1024];
    FILE *stream;
    if((stream = fopen ("filename", "r")) != (FILE *)0) {
       while((fgets(s, 1023, stream)) != (char *)0 ) {
         <process each line>
       }
    } else {
        <do fopen error handling>
    } "

but fgets() actually reads up to n-1 characters, so it always has room
for the \0 (if n is set to the array size).

Tim McCormack
32000151@bran.snetmp.cpg.com.au

Reply:
   Thanks, I am going to have to make sure that I used this function correctly in my example program.
 

  Subject:  snprintf in Article C Library for Linux?
  Date:  Tue, 01 Sep 1998 17:53:19 +0200
  From: Renaud Hebert <hebert@bcv01y01.vz.cit.alcatel.fr>

I didn't know snprintf, but I think that it is a clever thing to
do to avoid overflowing the string buffer (much better than the evil
sprintf).

But that the first time I see it in a C library, so is-it a Linux only
function or is-it a "new" standard function which wasn't included in
HP-UX for example.

Maybe you could distinguish in your article, the standard library
function and those Linux only.

Anyway this snprintf function is "A good Thing" TM.

Thanks for your articles, they are very well-written and very
informative.
--
__________________________________________________________________
Renaud HEBERT                   CR2A-DI
Software Developer

Reply:
  I think that it is a GNU only thing.  So you may want to avoid using the snprintf function unless you only want your programs to work in a GNU environment.  I found a bunch of very useful GNU only string functions and will taking your advice on pointing out those functions that are only found in Linux.
 

Subject:          Standard C Programming Library Part 3
     Date:          Sun, 20 Sep 1998 09:52:29 -0400
    From:          Laurin Killian <lek@uconect.net>
   Organization:          Streamlined Development
 

Since you ask for corrections....
There are a couple of typos in your examples:

------------you wrote:
float x=99.1234;
sprintf(string, "%d", x)
------------should be...
sprintf(string, "%f", x);
                          ^
------------you wrote:
float x=99.1234;
returnValue=sprintf(string, 4, "%d", x)
------------should be...
returnValue=snprintf(string, 5, "%f", x);
                      ^                    ^        ^
(to get the desired result of "99.1" - you need space for the null char)

All the "scanf" type functions should have ampersands (&):
scanf("%f%2d%d", &float1, &int1, &int2);

Hope this helps
-Laurin

Reply:
  Helps a lot, thank you!
 

Subject:      character handling program
  Date:       Mon, 15 Mar 1999 13:31:41 +0100
  From:       jorgen.tegner@sundsdefibrator.com

Hi,

your code in Linux gazette is missing the setlocale() function call at the
beginning. That´s why you don´t get any
useful results for characters above 127 as programs start out in the C locale by
default. Also, isalpha(), toupper()
and tolower() are not restricted to the A-Za-z range.

Regards,
Jörgen Tegnér

Reply:
  Absolutely right, I am saving setlocale() for when I cover <locale.h>.  :)


Bibilography:

The ANSI C Programming Language, Second Edition, Brian W. Kernighan, Dennis M. Ritchie, Printice Hall Software Series, 1988

The Standard C Library, P. J. Plauger, Printice Hall P T R, 1992

The Standard C Library, Parts 1, 2, and 3, Chuck Allison, C/C++ Users Journal, January, February, March 1995

STRING(3), BSD MANPAGE, Linux Programmer's Manual
 


 

Previous "The Standard C Library for Linux" Articles

The Standard C Library for Linux, stdio.h, January 1998
The Standard C Library for Linux, stdio.h, August 1998
The Standard C Library for Linux, stdio.h, September 1998
The Standard C Library for Linux, ctype.h, March 1999
The Standard C Library for Linux, stdlib.h, April 1999
The Standard C Library for Linux, assert.h, May 1999

James Rogers

James Rogers is a systems programmer specializing in the area of Cloverleaf HL7 routers. He is also currently working on an open source library of HL7 routines. He hopes to use this library to write an open source HL7 interface engine.


Copyright © 2002, James M Rogers.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Writing Documentation, Part IV: Texinfo

By Christoph Spiel


Texinfo is the documentation system preferred by GNU projects.

The major design goal of the Texinfo format is to produce high quality printed output as well as online browsable output from the same source (.texi) file. Texinfo obtains the basis for a high quality hardcopy with a trick: it builds on plain TeX and adapts it by reading the file texinfo.tex (Your system might have more than one copy of this file. Check that you are really using a recent version (2002-01-04.07 as of this writing)). texinfo.tex does all the necessary formatting setup. It extends TeX to recognize hyper-references and all the gizmos that is needed for online documentation. Rendered for online viewing, Texinfo source yields Info (.info) files.

Info? What's that?

Info is an ASCII file format suitable for browsing hyperlinked documents. It is intended to be portable to all platforms which run GNU applications. Info focuses on textual data; this is, all Info files are viewable from a text console. High resolution graphics are available only in printed output. Thus, Info is the GNU counterpart of HTML minus some graphical extras. However, texi2html(1) transforms Texinfo sources (.texi) directly into HTML; see the section on Browsers.

Document Structure

Since Texinfo is based on TeX (see my second article in this series, "LaTeX with latex2html"), we expect to see again a header-body division. Also, the support for hyperlinks calls for additional structuring that we will meet in the form of so-called nodes.

Overall Structure

Every Texinfo document starts by reading texinfo.tex with the plain TeX command \input. This is about the only place where plain TeX leaks into Texinfo. The part of the file from the inclusion of texinfo.tex up to the so called Top node -- more on nodes later -- is the document's header. The Top node opens up the body of the document, which extends to the closing command @bye.

All Texinfo commands are introduced with an ``@''-character. The at-character is followed by one or more letters. Only a few commands require curly braces to group together their arguments. We have already encountered the end-of-document command @bye. The following example of a minimal Texinfo file introduces the comment command, which is @c. Texinfo comments extend to the end of the line in which they are given.

\input texinfo


@c === header ===
...


@c === body ===

@c --- Top Node ---
...

@c --- Sub Nodes ---
...


@bye

Header

The header of a Texinfo file is optional, but it appears in all documents. It at least contains the name of the online-reading output file, and the title used in the printed output.

The output filename is set with the command @setfilename output-filename. I recommend adding the extension .info to output-filename, because files without an extension are harder to access with common shell tools--just think of ls *.info! The argument of @setfilename reaches right to the end of the line, thus you cannot add a comment after setting the output filename. Bummer!

Set the document title with @settitle document-title. Again, the argument stretches until the end of the line. The title -- as defined by @settitle -- is used for page headers or footers in the printed output. It has nothing to do with the document title used on the title page (if a title page exists at all).

Thus, a simple header looks like this:

    @setfilename example.info
    @settitle Texinfo Example

Other useful commands in the header are:

Tip: All GNU development projects ship with documentation in Texinfo format. If you want to print the documentation on your local output device, it is a good plan to modify the header of the Texinfo files to match your paper size (Letter, A4) and printing equipment (duplex unit, and so on).

Body

The body of a Texinfo document is a mixture of sectioning commands for printing (the TeX part: chapters, sections, sub-sections, and so on) and grouping commands for online viewing (the Info part: nodes). In theory both parts can impose different structures on the document, however this would seriously confuse readers -- probably not what you want when writing technical documentation.

I will present a simplified way of writing the body, where the structure of the online version and of the printed version closely go together. This saves the writer the headaches of manually setting up the structure for the online version at the price of sacrificing some additional navigation possibilities. The simplified way requires pairing the Info structure information with that of the printed version.

The Info structure is defined with @node node-name commands, whereas the printed structure is given -- among others -- with the commands @chapter chapter-title, @section section-title, and @subsection subsection-title. The @node command always goes first. So we get, for example,

    @node Introduction
    @chapter Introduction

or

    @node Iterative-Processes
    @section Iterative Processes

or

    @node Numerical Stability
    @subsection Numerical Stability of Iterative Algorithms

The argument to @node, assigns the name node-name to the node. The name consists of one or more words. Spaces are perfectly valid in node-name, but periods ``.'', commas ``,'', colons ``:'', and apostrophes ``''' are not. It is also better to avoid commands (anything starting with ``@'') in a node name. Case of node-names is significant. Within a Texinfo document each node must have a unique name. By convention, node names are capitalized just as chapter or section titles are.

A node either contains only data (this is, text, tables, images, and cross-references), or a node defines a navigation menu. I call the former a Terminal Nodes and the latter a Menu Nodes.

Terminal Node
The structure of a Terminal Node is
@node node-name
@section section-title

text-for-node-and-chapter

where I use @section as an example for a sectioning command.

Terminal Nodes are the ``meat'' of a document. They hold all the visible information. text-for-node-and-chapter usually consists of one or more paragraphs, tables, and so on.

Menu Node
Menu nodes provide decentralized tables of contents, this is meta information, from which you can jump to any of the topics referred to in the menu.

The structure of a Menu Node is the same as for a Terminal Node, with the exception that a Menu Node is ended by the definition of a navigation menu. The navigation menu only goes into the Info version, never into the printed one.

@node node-name
@chapter chapter-title

optional-introductory-text-for-node-and-chapter

@menu
* Node name of first section:: Synopsis of first section
* Node name of second section:: Synopsis of second section
...
* Node name of last section:: Synopsis of last section
@end menu

A navigation menu is bracketed by

@menu

@end menu

where every line in between makes up one menu entry. Each menu entry starts with an asterisk ``*'' followed by the name of the node it points to (the target node's name). It is ended by two colons ``::'' and an optional short description of the target:

* Target Node Name:: Optional description of target node

Top Node
One menu node in every Texinfo document plays a special role: the master menu node from which the rest of the document is accessed. This root node is called Top node; we define it with the pair
@node Top
@top name-of-top-node

As the Top node will appear first whenever the online version is browsed (unless you explicitly specify a node to start browsing with), you want to have some introductory text to go with it. This introduction often is not suited for the printed version. The printed version shows no menus at all, remember? Thus, we want to exclude the introductory text from the printed version, which is done with the conditional translation command pair @ifinfo and @end ifinfo. A simple Top node then looks like this:

@ifinfo
@node Top
@top Example
This is an example Texinfo document.

@end ifinfo

@menu
* Name of first chapter:: Synopsis of first chapter
* Name of second chapter:: Synopsis of second chapter
* Name of third chapter:: Synopsis of third chapter
@end menu

Now we are ready to write a complete Texinfo document.

    \input texinfo
    @setfilename example.info
    @settitle Texinfo Example
    @ifinfo
    @node Top
    @top Example
    This is an example Texinfo document.
    @end ifinfo
    @menu
    * Introduction::                 Definitions, Measures, Complexity
    * Evaluation of Polynomials::    Study of a common operation
    @end menu
    @node Introduction
    @chapter Introduction
    In this chapter I define the concepts that will be used throughout the
    rest of the document.  Moreover, measures of efficiencies as well as
    bounds of complexity will be introduced.
    @menu
    * Definitions::               Fundamental stuff
    * Measures of Efficiency::    How to measure efficiency
    * Bounds of Complexity::      Typical bounds of complexity
    @end menu
    @node Definitions
    @section Definitions
    ...
    @node Measures of Efficiency
    @section Measures of Efficiency
    ...
    @node Bounds of Complexity
    @section Bounds of Complexity
    ...
    @node Evaluation of Polynomials
    @chapter Evaluation of Polynomials
    ...
    @bye

Syntax

As we have already seen, Texinfo commands start with an at-sign ``@''. The at-sign is either followed by a single non-letter character or one or more characters. Some commands of the first group include

@@
Insert a literal at-sign (``@'').
@"character
Typeset the umlaut equivalent of character, where character is a single ASCII character like, for example, ``a''. The same holds for accented (@'character), circumflexed (@^character), or cedilla decorated (@,character) characters. See node ``Inserting Accents'' in the Texinfo documentation for details.

and some in the latter group are

@contents
Insert the table of contents where @contents occurs.
@page
Start a new page.
@findex function-name
Generate an index entry for function-name in the index of all functions.

Depending on the command, no argument, one argument, or more than one argument may be required. Some commands require their arguments to be enclosed on curly braces, like cross references, @xref{node-name, cross-reference-name, title-or-topic}. We have seen commands which take rest of the line as their arguments (for example @setfilename).

Sectioning

As with TeX, we just type text, separating paragraphs with blank lines. Paragraphs will be filled or even justified depending on the used translation tools.

Section Body has introduced the main sectioning commands. @node groups the input together in chunks for online reading. An accompanying TeX-like sectioning command does the same for the printed output. In particular Texinfo offers the following sectioning commands: chapter, section, subsection, and subsubsection.

Please remember that -- for a simplified node management -- each @node must be followed by one of the sectioning commands for the printed version.

Title Page

Making a decent title page is easy. The @titlepage command with its sub-commands @title, @subtitle (optional), and @author completely takes care of the layout. If you want the material after the title to go on an odd page add a page break @page right before @end titlepage.

Example:

    @titlepage
    @title A Texinfo Example Document
    @subtitle Playing With the Texinfo Format
    @author Joanne H. Acker
    @page @c -- force odd page
    @end titlepage

Conditional Translation

In the section on the Top Node, we encountered the condition translation command @ifinfo/@end info. Conditional translation means directing parts of a document to one translator only, or, in the negated form @ifnotinfo/@end notinfo, excluding one translator (makeinfo in our example) from processing a chunk of the document.

The opening (@ifformat) and closing sequence (@end format) should appear on lines by themselves.

Three conditionals are available in positive and negative form for diverting data to or away from Info, TeX and HTML.

    @iftex
    ...
    @end tex
    @ifinfo
    ...
    @end info
    @ifhtml
    ...
    @end html
    @ifnottex
    ...
    @end nottex
    @ifnotinfo
    ...
    @end notinfo
    @ifnothtml
    ...
    @end nothtml

Lists

Texinfo features the fundamental types of lists, which any author expects: itemized and enumerated lists. Description lists are written in terms of tables.

All lists nest.

Command @item starts an entry in a list or table. The entry can comprise several paragraphs or further lists. Did I tell you that all lists nest? They do!

Itemized Lists
@itemize glyph
@item Text for first item
@item Text for second item
...
@item Text for last item
@end itemize

Symbol glyph will be put in front of every item. Useful values for glyph are @bullet, @minus, and *.

Enumerated Lists
@enumerate counter-selector
@item Text for first item
@item Text for second item
...
@item Text for last item
@end enumerate

counter-selector selects the type of counter (numeral or letter) and the starting value. If counter-selector is omitted, the list will be decorated with Arabic numerals starting at one.

A positive integer value for counter-selector starts the list at the given value. This is useful when continuing a list. An uppercase or lowercase letter for counter-selector selects letters for the enumeration; again, the list starts with the given letter.

Texinfo cannot render enumerate lists with Roman numerals.

Description Lists
I have mentioned that Texinfo does not offer native description lists, but emulates typesetting them with two-column tables. So, we get the following syntax for description lists:
@table format-selector
@item First term
Description for first item
@item Second term
Description for second item
...
@item Last term
Description for last item
@end table

format-selector determines how the terms are typeset. For no added markup, this is, plain description lists, use @asis as format-selector. If you have code, sample input or output, variables, or keystrokes as terms, use @code, @samp, @var, or @kbd respectively. See section Inline Markup for how to markup specific items.

Within a table, the argument to @item is all the text from @item to the end of the line. Note that this is different from itemized and enumerated lists! Thus, the term in a "description list" can only be a single line. The text after the @item-line up to the next @item or the end of the table becomes the term's description. The description can be several paragraphs long and it can contain other lists, and so on.

Sometimes we need additional terms on separate lines. Because @item puts its argument on a single lines, another command is required: @itemx places an additional term right below an existing term. @itemx is only valid directly after an @item command or @itemx command.

Cross-References

Texinfo supports a variety of cross reference types: with or without additional text, within the same file, across different Texinfo files, and to the outside world.

Nodes are the primary targets of cross references. @anchor{anchor-name} marks additional targets. Command @anchor does not produce any output. The names of anchors must not conflict with node names.

@xref
Insert a decorated cross reference. @xref formats the decoration for the start of a sentence.

Example usage:

    ... is the basis for several multi-point
    methods.  @xref{Multi-point Methods}.  We
    study the single point method ...
@pxref
@pxref behaves like @xref, but it is meant to be used inside parenthesis.

Example usage:

    The algorithm fails at higher order
    roots (@pxref{Higher Order Root}) and
    ill-conditioned roots of order one.
@ref
Inserts an undecorated cross reference. Otherwise it behaves like @xref.

Until now we have only used the one-argument form of the cross referencing commands. However, they accept up to five parameters. Here is how the output changes with the number of parameters. I demonstrate the flexible usage with @xref.

One Argument
@xref{target-name}

produces

*Note target-name::

in the Info version and

See Section target-section [target-name], page target-page

in the printed version, where target-section and target-page are the section number and the page number where the target lives in the printed version.

Two Arguments
@xref{target-name, cross-reference-name}

produces:

*Note cross-reference-name: target-name

and

See Section target-section [target-name], page target-page

Three Arguments
@xref{target-name, cross-reference-name, title-or-topic}

produces:

*Note cross-reference-name: target-name

and

See Section target-section [title-or-topic], page target-page

Five Arguments
@xref{target-name, cross-reference-name, title-or-topic, info-file-name, printed-manual-title}

produces:

*Note cross-reference-name: (info-file-name)target-name

and

See section "title-or-topic" in printed-manual-title

Inline Markup

Texinfo defines a whole bunch of commands to markup special parts of text as being code, input from the user, a filename, and so on.

Tools

makeinfo
makeinfo transforms Texinfo files (.texi) into
  1. Info

    By default, makeinfo generates Info files with the filename selected by @setfilename. Option --no-split prevents makeinfo from breaking the output in chunks (approximately 50KB in size).

    Processing a Texinfo file with makeinfo also thoroughly validates the input file.

  2. Plain ASCII

    Option --no-headers makes makeinfo generate plain ASCII files. Plain ASCII is a useful format for proofreading the online version and also for applying spelling checkers like, for example, diction(1).

texi2html
As you might have guessed from the command's name, texi2html transforms Texinfo into HTML. Option -monolithic forces the output of a single file. Option -split on the other hand forces one file per node.

texi2html by default converts @iftex sections and not @ifinfo ones. You can reverse this behavior with the -expandinfo option.

Note that all of texi2html's options start with a single dash.

texi2dvi
Produce a device independent file .dvi form Texinfo source. To get Postscript, apply dvips(1) to the .dvi file. I have found the options --clean and --quiet useful. The first removes all intermediate files, leaving only the final .dvi file. The second suppresses all non-essential messages (``No gnews is good gnews!'').
texi2pdf
texi2pdf makes a Portable Document File (.pdf) from Texinfo source in one shot. It accepts the same options as texi2dvi does. However, I found, it definitely wants to see option --pdf or it stops, crying for a .dvi file even if this very file exists. Argh! So, my typical calls are
    texi2pdf --quiet --clean --pdf foobar.texi

Browsers

Texinfo differs from all the document preparation systems that we have had a look at so far, for Texinfo can be translated in an online viewing format different from HTML, namely: Info. Having an online viewing format, we need browsers to actually view it!

info

info, the mother of all Info browsers, is a simple but efficient browser for viewing Info files at a console.

To view the Info pages of topic, use

    info topic

To browse Info file info-file, add --file=info-file to the invocation of info, where info-file contains the complete path to the Info file.

If you would like to start browsing at specific node node-name, add --node=node-name.

My favorite mistake is mixing up topic with info-file, this is saying

    info ./cache-profiler.info

when I really mean

    info --file=./cache-profiler.info
pinfo

pinfo is a curses(3) based Info browser with lynx(1) like navigation. pinfo does a nice job colorizing Info pages.

emacs

Emacs version 21.x features an improved Info browsing mode as proves this screen shot.

I know, it's only Emacs Info, but I like it, like it! Yes, I do!

You browse the installed Info documents (`C-h i', info). Or you load an Info file into Emacs and turn the buffer an Info-browser with Info-on-current-buffer (note the capital "I"). If you dislike switching between the Info buffer and you working buffers, open the file to browse in another frame (`C-x 5 f', find-file-other-frame). To open a new frame with an Info browser in it, switch to the *info* buffer in your current emacs and issue view-buffer-other-frame.

For additional browsing pleasure, try Info-speedbar-browser.

xinfo
xinfo is an ancient Info browser for the use under X11. It does not do any colorization. What bothers me most about xinfo -- to the degree that I refuse to use this browser -- is the separation of navigation hot spots and display. This means you have to click in the topmost pane to navigate a menu shown in the second pane. Clicking directly on the menu item in the second pane has no effect.

Here is a screen shot.

tkinfo

My favorite X-based Info browser! It has all the nice features of info(1), starts up fast and has a compact layout.

gnome-help-browser

If you are a Gnome user, you probably know the gnome-help-browser(1x). It displays Info pages, too.

kdehelp

Same for KDE users... You probably know kdehelp(1x). Amongst various other formats it also displays Info pages.

kdehelp is easily convinced to browse a specific Info file:

    kdehelp ./cache-profiler.info

Thumbs up!

konqueror also displays info files (at least konqueror 2.2.2); just type "info:" in the Location: bar.

Overview of Common Info Browsers

Overview of Common Info Browsers. Multi-format browser accept other formats than Info. X11-based browsers require X11 to run. info-like navigation duplicates the navigation commands of info(1).
Application Multi-format X11-based info Navigation
info no no yes
pinfo no no no
emacs no no yes
xinfo no yes yes
tkinfo no yes yes
gnome-help-browser yes yes no
kdehelp yes yes no

Pros and Cons

Pros
  • Texinfo format: user definable macros (not shown in this article)
  • TeX output: perfect typesetting, fantastic hardcopy quality
  • Info format: alternative to ubiquitous HTML
  • Info browsers: uniform, fast and easy navigation
Cons
  • Texinfo source format:
    • 4-argument nodes difficult to maintain without emacs(1). (In this article, I have not shown the 4-argument form, but introduced the simplified 1-argument form of nodes.)
    • 1-argument nodes plus sectioning commands more difficult than necessary
  • Info format: Info is rendered statically, this is, browsers do not refill paragraphs if the line width in a browser is different from the linewidth when the Info page was generated. HTML browsers usually handle this automatic refilling.

Further Reading

The home page of Texinfo, with lots of references and all that, is located at http://texinfo.org/

Available converters for Texinfo are listed at http://www.fido.de/kama/texinfo/texinfo-en.html

Christoph Spiel

Chris runs an Open Source Software consulting company in Upper Bavaria, Germany. Despite being trained as a physicist -- he holds a PhD in physics from Munich University of Technology -- his main interests revolve around numerics, heterogenous programming environments, and software engineering. He can be reached at cspiel@hammersmith-consulting.com.


Copyright © 2002, Christoph Spiel.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Poetry Requiem

By Martin Vermeer


Business Model, Failed

Today, poetry went into receivership.
Which is why this poem doesn't rhyme,
so the creditors won't notice.

Linux, like poetry, is not contingent upon the existence of successful business models. It cannot actually go bankrupt. Its success is unrelated to business success.

Previous LG articles by Martin (both allegorical stories):

Martin Vermeer

Martin is a European citizen born in The Netherlands in 1953 and living with his wife in Helsinki, Finland, since 1981. He is professor of Geodesy at the Department of Surveying, Helsinki University of Technology. His first UNIX experience was in 1984 with OS-9, running on a Dragon MC6809E home computer (64k memory, 720k disk!). He is a relative newcomer to Linux, installing RH4.0 February 1997 on his home PC and, encouraged, only a week later on his job PC. Now he runs Red Hat 6.2 exclusively at both home and work. Special Linux interests: LyX and Tcl/Tk.


Copyright © 2002, Martin Vermeer.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


Implementing a Bridging Firewall

By David Whitmarsh


What is the difference between a bridging firewall and a conventional firewall? Usually a firewall also acts as a router: systems on the inside are configured to see the firewall as a gateway to the network outside, and routers outside are configured to see the firewall as the gateway to the protected network. A bridge is piece of equipment that connects two (or more) network segments together and passes packets back and forth without the rest of the network being aware of its existence. In other words, a router connects two networks together and translates between them; a bridge is like a patch cable, connecting two portions of one network together. A bridging firewall acts as a bridge but also filters the packets it passes, while remaining unseen by either side.

Why might you want to so such a thing? A couple of reasons spring to mind:

  • You can plug in a firewall without changing any of your existing network software configuration.
  • You may want to protect part of a network where you do not have control of the external routing into your network.

My Problem

In my office I had a shiny new ADSL connection from Demon Internet with an assigned 16 address subnet (less base, broadcast and router IP = 13 IP addresses). Because of the vagaries of the UK commercial and regulatory environment, the line and router were installed and owned by British Telecom plc. and there was no facility to configure the router to use an internal gateway. This left me two choices:
  • Connect every host directly to the ADSL router and set up iptables separately for each one.
  • Use a firewall with ip masquerading to present a single ip address to the outside world.
The first was untenable. Multiplying the number of iptable configurations multiplied the chances of error and the administration overhead. The second had its own drawbacks. While most things can be set up to work quite happily with IP masquerading, there are exceptions, including some technologies that I wished to explore, such as VPNs. A bridging firewall would solve this problem. The firewall could stand between the ADSL router and the rest of the router and protect the network without reconfiguring the router. The one remaining obstacle was that the bridging code in the standard Linux kernel completely bypasses iptables, so you can have a box which is either a bridge, or a firewall, but not both.

The Solution

Fortunately, there is a project to implement bridging in conjunction with iptables, so that any packets transmitted across the bridge can be subject to iptables rules. The result is a firewall that can be totally transparent to the network, requiring no special routing. As far as the Internet is concerned, the firewall does not exist, except that certain connections are blocked. The bridge software is a kernel patch to allow the existing bridge code to work inside iptables. Conveniently, the developers have made available a Redhat 7.2 kernel rpm with the patch installed. Less conveniently, documentation on how to use it is minimal, so I thought to document this implementation as an aid to anyone else following the same path.

Bridging and Routing - how it works

Briefly. the linux bridge implementation works by tying together two or more network interfaces. By monitoring activity on all the attached network segments the bridge code learns which MAC addresses are accessible from each interface and uses this information to decide which packets to send out on each interface. The interfaces attached to the bridge to not normally have an IP address associated with them, but the entire bridge is configured as a single interface to the firewall. packet flows within the firewall

Network topology

My allocated static IP addresses are in the range xxx.xxx.xxx.48-63, i.e. a subnet mask of 255.255.255.240. I decided to split this range into two network segments,xx.xxx.xxx.48-56 would be used outside the firewall, and this includes the IP address of the ADSL router itself (xxx.xxx.xxx.49). xxx.xxx.xxx.57-62 would be the secure section behind the firewall. Note that these are not truly subnets as they are linked by a bridge rather than a router.

network topology

Firewall Rules

The sample firewall script is broadly similar to a conventional firewall setup (cribbed from Oskar Andreasson's iptables tutorial. The basic firewall policy is:
  1. Block packets from unlikely IP addresses
  2. Allow any outgoing connections from behind the firewall
  3. Allow packets in that belong to established connections
  4. Allow connections to specified ports and hosts from outside

Variable definitions

For clarity and maintainability it is a good idea to keep interface names and IP addresses as variables. The values used for these examples are:

BR_IP="xxx.xxx.xxx.57"
BR_IFACE=br0

LAN_BCAST_ADDRESS="xxx.xxx.xxx.63"
INTERNAL_ADDRESS_RANGE="xxx.xxx.xxx.56/29"

INET_IFACE="eth1"
LAN_IFACE="eth0"

LO_IFACE="lo"
LO_IP="127.0.0.1"
"xxx.xxx.xxx" represents the first three bytes of the network IP addresses. $INTERNAL_ADDRESS_RANGE is the secure network segment.

Setting up the bridge

We have to do a some less conventional things to set up the bridge. First we shut down our two interfaces and remove any IP address from them.

ifdown $INET_IFACE
ifdown $LAN_IFACE
ifconfig $INET_IFACE 0.0.0.0
ifconfig $LAN_IFACE 0.0.0.0
If you just executed these commands from a telnet connection (or ssh as you are so security conscious), get up and cross the room to your firewall's console.

Next we create a bridge and assign the Ethernet interfaces to it.

brctl addbr $BR_IFACE

brctl addif $BR_IFACE $INET_IFACE
brctl addif $BR_IFACE $LAN_IFACE
You can now bring up the bridge as an internal interface if you wish:
ifconfig $BR_IFACE $BR_IP

Blocking spoofs

We can block spoofed packets in the mangle PREROUTING chain. By blocking here we can catch both INPUT and FORWARDED packets at the same time. We use mangle PREROUTING rather than nat PREROUTING because only the first packet of each stream is checked in the nat table.

This line ensures that only packets with valid internal addresses are accepted on the internal interface.

$IPTABLES -t mangle -A PREROUTING -i $LAN_IFACE -s $INTERNAL_ADDRESS_RANGE -j ACCEPT
And this prevents packets with internal addresses being accepted on the external interface:

$IPTABLES -t mangle -A PREROUTING -i $INET_IFACE ! -s $INTERNAL_ADDRESS_RANGE -j ACCEPT

Accessing the firewall from the internal network

You may choose to leave your firewall completely invisible to the network, or you may wish for convenience to allow connections from within. These commands will allow all connections to the firewall from the internal network only. You may wish to be more selective depending on your level of trust of your network systems and users.

$IPTABLES -A INPUT -p ALL -i $BR_IFACE -s $INTERNAL_ADDRESS_RANGE -d $LAN_BCAST_ADDRESS -j ACCEPT
$IPTABLES -A INPUT -p ALL -i $BR_IFACE -s $INTERNAL_ADDRESS_RANGE -d $BR_IP -j ACCEPT
Remember that we have already eliminated packets that claim to be from $INTERNAL_ADDRESS_RANGE that appear on the wrong interface.

More information

The kernel patch without which all your iptables rules are in vain.
Oskar Andreasson's iptables tutorial is recommended reading.
Try Rusty's Remarkably Unreliable Guides for background on packet filtering and networking.

Sparkle Home Page (the author's company)

Acknowledgments

Thanks to Lennert Buytenhek for a really useful patch, and also for reviewing this article.

David Whitmarsh

David is an independent consultant working mostly for financial institutions in the City of London through his company, Sparkle Computer Co Ltd. With four young children, spare time is a precious commodity, so the daily commute from Sussex is his main opportunity for tinkering with Linux and open source software on his laptop.


Copyright © 2002, David Whitmarsh.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002

"Linux Gazette...making Linux just a little more fun!"


The Back Page


Wacko Topic of the Month


Coal port

Contributed By Thomas Adam

My main PC is a 166 pentium with 32MB ram. This beast also has a "coal" port at the back so that if the speed starts to dwindle, then you can "stoke" her up. :)


Not The Answer Gang


Hacking

Answered By Jay Ashworth, Iron

hi my name is phill and i am new to hacking i have done a few hacks with some trojan programs but nothing big and i dont no were to start if you would be willing to help me with some skills on how to hack that dbe great i really wanna get some advanced hacking skillsGet more from the Web. FREE REE MSN Explorer download : http://explorer.msn.com

(!) [Jay]

Anyone wanna take a swing?

(!) [Iron]

I held back because I know Dan Wilder and Ben Okopnik will soon be posting volumuous pieces of Helpful Advice, and Heather will chime later in with an extra special spin, maybe with a supermarket analogy or something to surprise us.

What do you have to say, Jay?

(!) [Jay] Given that I have to *work* with a new trainee consultant who sounds like this, I don't think it's safe for my blood pressure to say anything. I work for a living; I suppose I ought to pay the script kiddies for improving my revenue, but the whole thing sorta galls my sister.

Our last published piece on hacking I could find was: http://www.linuxgazette.com/issue71/lg_backpage71.html#nottag ("Help me crack my school") But I'm sure there were more in 2001 somewhere, either in The Answer Gang column or on the Back Page.

I do wonder why a hacker-wannabe is using MSN for a mail service....

The prosecution *rests*.

He's not a "hacker" wannabe. He's a "cracker" wannabe. Or, if you prefer, a juvenile delinquent.

(!) [Ben]

Diving into dry pools head-first is a good start, particularly from the high board - it's been known to cure incipient crackers. Sure, some - well, most - end up looking like a squashed bug, but you've got to admit, it's much better than the alternative. Be sure to try it today!

For advanced hacking skills, take a look at Eric S. Raymond's "How To Become A Hacker", at http://www.tuxedo.org/~esr/faqs/hacker-howto.html. That takes you all the way from beginner to advanced... not what you meant? Oh, right, I forgot; when the cracker maggots invade your brain, language skills are the first thing to go. <shrug> I guess you'll never be able to explain what you really want, now. I understand that progression of the disease is difficult to reverse, deterioration is rapid, and the prognosis is NOT positive.

A friend of mine's got a 10th floor apartment, and the pool might even have been emptied for the winter. Want me to ask? Really, it wouldn't take long at all...

Regarding MSN, Good news!!! I've got a *great* cracking opportunity coming up for you; you'll need to break into MSN and establish a new account. See, you'll *have* to do this because I'm about to report your criminal activities to MSN - including your confession of having already "done a few hacks with some trojan programs", so that even their admin people can have a laugh at your terminally moronic behavior. All they have to do is look at the headers in your e-mail (didn't know about those, did you?), compare them with the copy that will still be on their servers (missed that one too, huh?), and TOSs your ass so hard that you'll bounce.

You know, if you ask the folks at your local TV or radio station, they might let you climb their tower - you could get a coupla hundred feet up that way - and you could always drag up a bathtub. Seriously, give it a shot: it can't hurt. Well, actually it would, but it's the kind of thing you're supposed to say...

(!) [Jay]

Now, *see*? I *knew* Ben would come up with something lyrical.

(!) [Ben]

I've got to give MSN their due: they actually have humans assigned to dealing with this stuff, and when these folks LART one, they let you know: "Hi, my name is X, and I'm the one assigned to this case. I've examined the information you've sent us, and terminated our former customer on that basis. Thank you for...", etc. They also seem to pay attention to the info that you send them in the complaint letter. My "spamkill" file contains quite a few from them.


More Tux trivia

Answered By Iron, Heather Stern, Rachel Rawlings

This is a follow-up to an important issue we reported in January, namely:

When I gave her a stuffed Tux as a present, my Girlfriend asked me, what it's sex is?

At the time, I commented:

(!) [Iron]

Four out of five sexist computer nerds surveyed agree Tux is male.

Now we have some updated commentary:

(!) [Heather] That might refer to Linus' original comment that penguins are happy because they have just stuffed themselves full of herring or have been hanging out with lady penguins. We only know that Tux is stuffed full of herring, but we can assume Tux hangs out with lady penguins.

(!) [Rachel]

Which actually doesn't get say definitively whether Tux is male. Tux could hang out with lady penguins cf. Marlena Dietrich, or be a high-class drag king. :>

However, speaking as a dyke with a largish stuffed animal collection (one of whom is a female Peter Rabbit named Katja), my Tux is male. Other users' Tuxen may vary according to the needs of the user, much like their kernel configurations.

(!) [Iron]

Interesting. I wonder if Eric Raymond's enhanced kernel configurator will have a question for which sex your kernel should be built as.


More on Ben's reputation

Answered By Ben Okopnik, Iron, Faber Fedor

Ben writes:
You're always welcome to control "further correspondence from Mr. Ben Okopnik" _in your mailbox_ via your 'Del' key...

(!) [Iron]

Why, that's mighty fine of you, Ben. You must be getting soft in your old age. You can't wear those dark menacing LG sunglasses anymore.

I'm neither a friend of yours or a paid consultant for you.
Now that sounds right proper curdgemeonly (sp). OK, you can keep the glasses.
if you have either a thick head or a thin skin,
And we'll get you a pirate eye patch to go with it. Hey, you can use that on your sea voyages too! Do you need a flag with a skull and crossbones too or do you already have that? Or maybe your flag is getting a bit tattered....

By the way, guess what came in the spam today. Just perfect for Ben.

Subject: Your metals sunglasses

One of the world largest Sunglasses company is clearing stock.
Get a pair of Sexy Metals Sunglasses model 2002 for free
while stock last.

(!) [Ben]

<Splort> You... you... <Daffy Duck mode> You're dethhhhhhpicable. </DDm>

Besides, you probably wouldn't want "Metals sunglasses"; I understand that Metal gets mean after a few drinks, and he *really* gets upset about people that take his sunglasses. Just a warning to the wise.

(!) [Iron]

Another spam came through too.

From: <RipoffArtist@spamhaven.com>
Subject: Spy Ear Blowout Sale

Oh yeah! What a great way to identify spies; they'll be the ones with their
ears blown out. 

- "Excuse me, sir..."
- "What? what? I can't hear you." 
- "ARREST THAT MAN!!!"
Of course, Ben knows a lot about how spies operate...

(!) [Ben]

<Glare> Your time vill come, Comrade. Ve haff long memories.

In another thread...

(!) [Faber]

I hate to do this, but I have to agree with Ben...again!

(!) [Ben]

Why, Faber! I'm cut to the quick by your implications; I'm shocked - simply shocked, I tell you - by this. <sniffle> Eh, just admit it; I'm always right.

In another thread...

(!) [Ben]

a) Make the script SUID root (!!! use with caution - this is a *bad* idea unless you know exactly what you're doing !!!):

chmod 4755 mswin

(!) [Dan]

Ben, which OS are you running that one on ?!? Last I heard, Linux didn't accomodate setuid scripts.

(!) [Iron]

Dan's too polite. I told him to ask Ben what drugs he's on.

(!) [Ben]

Oh, the same as usual. I think it's the mix, though: I just tried using a little more plutonium and a little less crack, and that's _clearly_ not the way to go.

(Boy, the FBI is going to be all *over* this one. The only thing that's missing is a reference to sex and death... ah, there we go. See y'all in about 20 years.)

(!) [Iron]

You can join Don Marti, future political prisoner.

(!) [Karl-Heinz]

You should maybe consider some strong encryption like rot13 to keep the AFN, SOV and PVN computers occupied ;-)

(!) [Ben]

Shhhay! Isthay isway away IGBAY ecretsay!

Now *there's* a Denial of Service attack that'll take'em right down. My diabolical plan for World Domination is proceeding apace...

In another thread...

(!) [Iron]

I wanted to change "side comments from Ben Okopnik and Heather Stern" to "with snide comments from Ben Okopnik and Heather Stern", but I refrained.

(!) [Ben]

My God, Mike. The incredible amount of self-restraint that must have taken... oh, the feeling of sacrifice... I'm stunned that you managed to overcome such a temptation. Worse yet, you could have always pretended to be innocent and blamed it on a simple misspelling.

Want a pair of these dark glasses? <innocently> Just asking.

Heather can put it in her todo list for next month, to sneak the "for snide comments in" quote when nobody's looking. Which means you'll have to be extra snide over the next month to give her material. Do you think you can handle that?

Besides, I can't possibly imagine how you came by that impression. /Moi/, *snide?* Huh. The very _idea._

If someone *deserves* to be smacked down, however... <rubbing hands gleefully>


Debian and World Domination

Answered By Iron, Jay Ashworth, Ben Okopnik, Heather Stern

Jim Dennis writes:
This is very reliable when you're Debian system is tracking "stable". Reasonably robust and reliable when tracking "testing". Occasionally *very* broken when tracking "unstable."

(!) [Iron]

Especially when a package depends on itself! This happens a few times a year in Unstable.

(Note that many agitators and activists *do* have "Linux world domination" as their goal,

But many who support World Domination aren't really activist about it.

but there isn't much overlap between the core developers in free software, and the agitators and activists).

:) :) As in sports. There's not a lot of overlap between the hockey players who score the most goals and the players hired to pick fights.

Then in another thread...

(!) [Jay]

Defense in Depth, my revered senior partner.

(!) [Ben]

<gasp> Jay has called me "senior" and "revered"! *NOW* I shall rule!

(!) [Iron]

I don't even have to say anything...

(!) [Ben]

"Hello, Central? What's holding up that assassination team? Oh, Seattle traffic. OK. I'll give them fifteen more minutes..."

(!) [Iron]

Tell Mr Okopnik he'd better give us two hours.

(!) [Heather]

We're all whippersnappers at some point, Ben, your turn will come. <wicked grin>

(!) [Ben]

Why, you young... oh. Never mind.

I'll be turning 40 in a couple of months, so I'm practicing.

(!) [Jay]

I want him to drop and give me 20, myself.

(!) [Ben]

"Hello, US Air Force? Do you happen to have 20 of those bunker-busters left? Here are some coordinates in Florida..."

I got done "dropping and doing 20" almost 20 years ago, Jay. Although I've just started working out again, so that's maybe a reasonable equivalent.


Esperanto

Answered By Iron, Ben Okopnik, Jay Ashworth

[I'm working on an Esperanto translation of parts of LG. It'll be another month or so till it's up. -Iron.]

(!) [Jay]

Heh. "Dubitando ad veritatem venimus" ("We arrive at the truth by being sceptical").

(!) [Iron]

Malfidante ni trovas la veron. (Untrusting, we find the truth.)
Malfidante ni malkasxas la veron. (Untrusting, we discover [=unhide] the truth.)
Per skeptikemo ni atingas la veron. (By our tendency to be skeptical, we achieve the truth.)

(!) [Ben]

<LOL> Well, *that* didn't take long. Do we need a modified version of Godwin's Law here, or what?

(For the humor-impaired: Just kidding. I really like Mike's little Esperanto bits... I also like twitting him about it.

And in another thread...

(!) [Iron]

To support other languages, various 8-bit charsets were introduced. The ISO-8859-x series ("man iso_8859_1") is the most common on UNIX. -1 (aka LATIN-1) covers Western Europe (Germanic/Romance languages), -2 (aka LATIN-2) covers Eastern Europe (Slavic languages), -3 (aka LATIN-3) covers miscellaneous Europe (and Esperanto :).

(!) [Ben]

<narrowed eyes behind the dark glasses> You thought I'd miss that, didn't you? The Revolution Never Sleeps.

(!) [Iron]

No, I knew you'd never miss that. You had extensive training, comrade.


$3 words and Trainspotting

Answered By Jay Ashworth, Iron, Ben Okopnik, Dan Wilder

What's the opposite of "concur"? ;-)

(!) [Iron]

Since "concur" means "agree", the opposite is "disagree".

(!) [Jay]

Yeah, but that's only a 49-cent word. I prefer the buck-2.98 ones. :)

(!) [Iron]

Down with $3 words! It's ridiculous that children compete in spelling bees over words that ordinary people would never use and don't know exist. Just because it's *possible* to derive a fancy Latin word for an ordinary English word doesn't automatically make it an English word. It's academickese, not English. There's probably a simple English word or circumlocution that covers the same terrain perfectly adequately, so why not use it? There's nothing to be gained by using words Joe Sixpack can't understand, except for the "few" technical terms that are absolutely necessary for a given field.

(!) [Jay]

I disagree, almost entirely. It depends, of course, on what your *objective* is, and there are many objectives in writing: you might be trying to impress people, to inform them, to persuade them... Each of these jobs requires a different set of tools, just as there is no one answer to the question "what kind of computer should I buy" other than "well, what are you going to *do* with it?"

Certainly, it's possible to use words which are fancier-than-thou, and lose your audience in the process. But that possibility isn't by any means justification for not being literate and -- dare I say it -- lyrical in your writing.

But, contrary to many people's belief, I think that people want to read elegant writing, even if it occasionally makes them need to look up a word that they can't glark from context.

(!) [Iron]

True, there is language-for-communication and language-as-art. I would argue that academic/techical writing is supposedly language-for-communication, thus, its tendency to fanciness hinders its basic purpose.

An urgent example in US society is the language of laws. Nobody but lawyers can understand then, and even lawyers don't agree on what the DMCA means. How are people supposed to obey laws they can't understand and don't have time to read? How can they evaluate whether the law is just? How can they avoid being hoodwinked?

Personal writing-as-art is a personal thing. I just don't like the way it can hinder communication, especially works that end up being read by others than the author intended. For instance, when non-English speakers read Gazette articles. That's why try to keep LG as straightforward as possible. I'd love to clean up the spelling/grammar mistakes if I had the time, but I don't have 50 extra hours per month, so I just do the ones that seriously impede communication.

I read Trainspotting and think, the Scottish phonetic style offends my sense of clarity, but the author's goal is to convey this style of thought/viewpoint as much as it is to convey content, so I can accept it.

I read Star Wars and think, why does the author have to write in such a convoluted manner? It adds nothing to the story except to make it "hip".

I read Ratz Are Nice (PSP) and think, why does the author have to write in such a slangy style? "They go weekend hunting looking for ruffboichail'z. They wontz to be quickened... I Edison basically loseout 3 wayz." Actually, I never got past the first chapter. I don't have time to sound out what he's trying to say, much less guess what dialect they're speaking. God forbid a non-English speaker should take an interest in the book. I prefer a writing style readable by as wide an audience as possible.

But, contrary to many people's belief, I think that people want to read elegant writing, even if it occasionally makes them need to look up a word that they can't glark from context.
Funny, you say this, but I find your writing perfectly clear and void of $3 words. (Oops, I said "void of" rather than "doesn't have".)

(!) [Jay]

I haven't read Trainspotting; I'll assume it's half way to James Joyce.

I'm not gonna get a bite on "glark", eh? :)

(!) [Iron]

Trainspotting quotes:

"That's no the f*****g point," ah sais, but withoot conviction. "Aye. The point is ah'm really f*****g suffering here, n ma so-called mate's draggin his feet deliberately, lovin every f****n minute ay it!" His eyes seem the size ay fitba's n look hostile, yet pleadin at the same time; poignant testimonies tae ma supposed betrayal.

At the Fit ay the Walk thir wir nai taxis. They only congregated here when ye didnae need them.

"See whit yuv done now, ya big-moothed c**t. Next time one ay us ur walkin home oan oor Jack Jones, wi git hassle fi these wee radges." Ah wisnae chuffed at Sick Boy. "Yir no feart ay they wee f****n saps ur ye?" This c**t's really gittin ma f****n goat. "Aye! Aye ah f****n am, if ah'm oan ma tod n ah git set oan by a f****n squad ay shell-suits! Ye think ah'm Jean-Claude Van F****n Damme? F****n doss c**t, so ye are Simon." Ah called him 'Simon' rather than 'Si' or 'Sick Boy' tae emphasise the seriousness ay what ah wis sayin.

Actually, the book switches between Scots and English pretty much at random. There are entire passages in English, and recent words like "taxis" and "dealer" that have no Scots equivalent are just thrown in unchanged, looking out of place because they're not spelled phonetically.

Of course, Scottish literature is pretty scarce and underrepresented, and Irving Welsh is one of the few authors filling the gap.

(!) [Ben]

I'm fairly close to the middle of this one, but with somewhat of a lean in Jay's direction: there are times - especially when writing for a techie audience - when the more spendy variety of verbal pyrotechnics (remember to always and ever eschew needless and unnecessary word usage!) is called for... but the reason is the one that Mike mentions: writing to a given audience.

(!) [Iron]

Believe it or not, I *am* a fan of writing differently depending on your audience. I'm just pointing out that sometimes one's audience ends up being bigger than anticipated, and the assumptions one made about the audience no longer hold true.

PS. Just in case it's unclear, I'm *not* complaining about anything anybody's written on TAG. This is just a problem I've seen other places.

(!) [Dan]

Oh darn. Guess I hafta go get out the old thesaurus more often.

(!) [Ben]

Should be familiar territory by now, Dan; ISTR that you were raised on the stuff. Or was that brontosaurus? Either way, should be pretty tasty with just a touch of lemon and Hollandaise sauce...

(!) [Dan]

Customarily prepared by briefly grilling steaks rubbed with wild onion directly on top of a hardwood twig fire. Also great as thesaurus tartare.


Boring documentation

Answered By John Karns

Anybody please tell me about installation of linux with win2000. I already installed linux 7 on my pc. now i want that without format my system i install win2000 on my pc.

any body pls give me any utility. don't tell me FAQ. this is boring for me. if anybody wants help me out than pls provide me utility.

(!) [John]

If you find reading FAQ's boring, I don't think you're going to like Linux too much.


University admissions

Answered By Dan Wilder

dear sir, i am living in pakistan. a newely institution namely biztek affliation with girne american university north cuprus in turkey has opened in pakistan . they said that they r also affliated with u because they r giving degree of girne american university . sir plz tell me that r u affliated with girne american university ? . and u can take transfer from biztek in pakistan to ur university and also tell me the process to take transfer in ur university .is my cradit hours transfer to ur university. reply me soon.

(!) [Dan]

We are affilitated with no university. None. Nil. Nor college, high school, research institute, preschool. Not even a skateboard park. Nor basketball stadium, automotive repair garage, not even a pizza parlor.


Tennis rackets

Answered By Ben Okopnik, Iron

Chris Gianakopoulos writes:
I got this information by looking at sendlib.c in the Mutt source code. I am sorry. I really shouldn't have posted this question. I WAS lazy, and now I feel bad.

(!) [Ben]

Oh... bosh. Chris, you often launch interesting questions, and digging down to the bottom of those can be fun. Now quit smacking yourself; you're wearing out that nice new tennis racket.

(!) [Iron]

Next time, Ben, buy him the plastic racket, not the metal one. He'll be less likely to hurt himself that way.

(!) [Chris]

I could wear a helmet for extra protection too. That will help during intense software debug sessions when I keep hitting my head against the wall.


Tea

Answered By Heather Stern, Iron, Ben Okopnik

(!) [Heather]

Well, the deli counter is that way, but it doesn't serve beer or milk or tea much less mango lassi or jumbo smoothies. Only coffee and soda pop. Oh well.

(!) [Iron]

And Rory called my Jasmine tea yesterday "fou-fou". Can you believe it?

(!) [Ben]

Well, *yeah*. I keep telling you to get rid of the little plastic umbrella and the maraschino cherries - they really _do not_ go with jasmine tea - but would you listen?...


Iron

Answered By Ben Okopnik, Jay Ashworth

What flags would you use with " tcpdump " in order to view the Ethernet source and destination addresses of three packets with no time stamp data added ?

(!) [Ben]

There's always the "--view-the-Ethernet-source-and-destination-addresses- of-three-packets-with-no-time-stamp-data-added" switch (one of the standard GNU long options.) Be sure to type it out every time, too; cut-and-paste won't work, since the "cut_and_paste_detect()" function will just reject it.

(!) [Jay]

tcpdump: command line switch too long.
What do I do now, Unca Ben?

(!) [Ben]

You probably mistyped it. Try it fifteen or twenty more times. If that fails, try

tcpdump --irony
(Hint: does not mean "kinda like iron". :)


World of Spam


Dear Future Millionaire:
I'll make you a promise. READ THIS E-MAIL TO THE END! - follow what it says to the letter - and you will not worry whether a RECESSION is coming or not, who is President, or whether you keep your current job or not....

===WHEN YOU PLACE YOUR ORDER, MAKE SURE =====YOU ORDER EACH OF THE 5 REPORTS! ==You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5 = $25.00.

Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you.


Analysis by Chris Gianacopoulos
The NON-detectable KISS has arrived!!!
I wonder if it'll be non-detectable like a computer virus.
These fantastic new lip products are waterproof will not smear off, kiss off, or rub off.
Almost like a clown face!
Lip-gloss products will not come off until you TAKE them Off. Look like a movie star all day long.
Oh no! If I look like a movie star, then, people will know who I am. There goes my private life.

Analysis by Ben Okopnik
From: <RipoffArtist@spamhaven.com>
Subject: Spy Ear Blowout Sale
Oh yeah! What a great way to identify spies; they'll be the ones with their ears blown out. - "Excuse me, sir..." - "What? what? I can't hear you." - "ARREST THAT MAN!!!"
Try the HOTTEST and NEWEST thing on the market, the discreet ISPY007 SPY EAR Mini Hearing Enhancer. It will let you hear up to 20 feet away with crystal clear reception!
Can we test that? Go ahead and put that thing in your ear, and listen closely: ***AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHHH!***

Oh, oops. Look at that; your poor eyeballs. Are they supposed to protrude like that? Say, that ear looks blown out, too. Are you *sure* you're not a spy? Quick, somebody - ARREST THAT MAN!


Put the Internet to Work for You! It's easy to turn the internet into your own 24/7 business and earn an executive's salary!
You can make a fortune on Ebay and other auctions sites provided your armed with the RIGHT information. Get your hands on the closely guarded secrets the pro's use everyday!
[Nice grammar there, "your". -Iron.]

XXXXX Publications Co. is broadening its publishing scope by releasing the first in its series of books designed to cover .NET, Microsoft's new programming platform, arguably the most important Microsoft innovation since the introduction of Windows itself. .NET fuses desktop and network-based development and provides programmers with a unified, language-neutral framework. It also makes many existing developer skills obsolete and a transition to .NET inevitable.
Get Background Information on anyone! NOTHING can be hidden from you when you have the power of NetDetective! You can investigate - Wife, Husband, Boss, Babysitter, Boyfriend, Girlfriend. Do it today!
From: IncreaseSalesToday@bigcashtoday.com

Dear linux-questions-only@ssc.com,

Would you like to send an Email Advertisement to
OVER 12,000,000 PEOPLE DAILY for FREE?

Do you have a product or service to sell? Do you want an extra 100 orders per week?

NOTE: (If you do not already have a product or service to sell, we can supply you with one).


Is your spouse cheating online? Are your kids talking to dangerous people on instant messenger? FIND OUT NOW with Big Brother
instant software download.

Big Brother will hide on your computer and secretly record all instant messages, chat, email, web sites and more! Once you install it, it becomes completely invisible. Then, after the computer is used, you just enter a secret key-sequence, and you can see everything that happened!


Compressed air cost about 1.25 paise per Cu. Ft. Using air amplifying blow guns and blow nozzles you can save upto 80% compressed air. That is why pay back period is in hours.

***************************************************
Since India has no anti-spamming law, we follow the US Unsolicited Electronic Mail Act of 2000, which states that mail cannot be considered Spam if it contains contact / removal information, which this mail does. If you want to be removed from the mailing list then you must reply to this mail with "Remove" in the subject line and e-mail for faster response and action.
********************************************


[ Here's an evil spam. Not only does it pretend to be a WinXP patch (making you think it's an official Service Pack), but why is it base64 if it claims to be an *.htm file? -Iron.]
Subject: A WinXP patch
Content-Type: application/octet-stream;
	name=NOMODEM.HTM
Content-Transfer-Encoding: base64

PEhUTUw+DQoJPEhFQUQ+DQoJCTxsaW5rIHJlbD1zdHlsZXNoZWV0IHR5cGU9InRleHQvY3Nz
IiBocmVmPSIuLlxzZXR1cFxtc29ic2hlbC5jc3MiPg0KCQk8TUVUQSBodHRwLWVxdWl2PSJD

Can't get email out to the masses without losing your ISP??? Don't know how to get sales for your product??? Can't get traffic to your site???

I have plenty of fresh verified email names and can get you results. You simply furnish your message and I do the rest. I guarantee you 100% delivery. It can even be done in full color at no extra cost.

[I wonder how he manages to show full-color messages on pine. -Iron.]

We are looking to buy: Submersible piling hammers for use offshore. Pile sizes are from 24" to 56". Depth 70-100 meter
I am Mrs. Monica Martins, the wife of late Brigadier Arnold Martins of Angola. I am writing to you from South Africa. Your firm was introduced to me by a career diplomat who I consulted in my search for a reliable individual /company who can assist my son in transferring a reasonable sum of money abroad to a company or private account. I on behalf of my late husband and my only son Frank decided to solicit for your assistance to transfer the sum of US$12.6 M (twelve million six hundred thousand united states dollars) deposited by my late husband in a private security company in South Africa.
[A paltry $12.5 million? I'm sure there'll be a better deal later in my inbox. -Iron.]

We'd visited your website: info.xxxxx.net. After thorough research, we found that your web site has not registered on any popular search engines and directories.

This will definitely be the choke point of raising reputation and business development deeply of your company. We fully believe that with our service, visitors of your web site will increase significantly.

At present, there are about 500,000 search engines in the whole world, but fortunately XXXXX is the rare breed that can help you register your website with the famous search engine companies.

[I admire the quality of your "thorough research". Especially since Linux Gazette is on plenty of search engines. -Iron.]

Is there pornography on your computer? Are you sure? FREE PC Check.

Clean it off now !


(( This is not SPAM ))

Happy Linuxing!

Mike ("Iron") Orr
Editor, Linux Gazette, gazette@ssc.com


Copyright © 2002, the Editors of Linux Gazette.
Copying license http://www.linuxgazette.com/copying.html
Published in Issue 76 of Linux Gazette, March 2002