Best of Technical Support
What are the .plan and .project files read by the finger command and what should they contain? —Chris MasonSlackware 2.0.29
In the good old days before the Web, there were no home pages. Instead, if I wanted to find out more about someone, I would “finger” them. The finger command asks the server to display information about a user, including the contents of the user's .plan and .project files. You can put any information you wish in these files: your name, e-mail address, fax and phone numbers or favorite sayings.
Note that many system administrators consider the finger command to be a potential security risk and have turned it off, so don't be surprised if you “finger” someone and receive a message along the lines of “access denied”. Also, many implementations of finger read only the .plan file. —Vince Waldon firstname.lastname@example.org
I have a PC with an Intel Pentium 150. Will Linux run on it? I've heard it runs on a 386 or a 486 but has trouble with certain IBMs—I'm not sure which ones. —Noah Roberts
You should have no problem running Linux on the machine you describe. Early versions of the Linux kernel were unable to support true IBM machines that used the microchannel architecture or MCA (the PS\2 line). That's probably the IBM computer referred to. —Vince Waldon email@example.com
My hard drive spins up and spins down constantly. There is a kernel patch called no_idle on Sunsite [http://sunsite.unc.edu/] to fix this problem, but when I attempt to apply the patch I get a reject file. It seems that the Makefile for the disk drivers has now been created, and as a result, the patch does not apply correctly. I am running 2.0.0. I would like to know if there is something else I could do to stop the spinning. I would appreciate any help. —John BarnitzSlackware 3.1
Most likely you need to find the hdparm package and use it to set the spin down times. I know it can do this for IDE drives. If it's not part of your distribution, you can find it on Sunsite. —Donnie Barnes, Red Hat Software firstname.lastname@example.org
Are there any drivers that provide SCSI support on the motherboard? —Ryan Red Hat 4.1
That depends on the type of SCSI you wish to use. You can check the hardware compatibility lists at http://www.redhat.com/. —Donnie Barnes, Red Hat Software email@example.com
After installing Linux, I noticed I am missing an option available in MS Windows: the US-International keyboard layout. This layout lets anyone with a US keyboard type the special punctuation needed for foreign languages. I live in Puerto Rico, and most, if not all, keyboards sold here are US versions. Since I write mostly in Spanish, I am interested in learning how to make a keymap that emulates Windows' US-International layout. Is there any information about the subject or any already-made keymap file that fits the job? —Carlos M. Fernandez Red Hat 4.1
There may indeed be a keyboard mapping that fits your keyboard. If not, you will have to take one that is close to your desired arrangement and modify it.
You should obtain the kbd package from ftp://sunsite.unc.edu/pub/Linux/system/keyboards/kbd-0.98.tar.gz. It contains tools, documentation and examples that will assist you in your remapping project. It also contains a file called kbd.FAQ, which contains answers to frequently asked questions about the operation of the keyboard under Linux. —Chad Robinson, BRT Technical Services Corporation firstname.lastname@example.org
I have a problem with hackers and one security hole is the command su. I have several users on my system. While I don't want to eliminate the capability of these users to change to other IDs, I do want to eliminate the capability to use su to change to root for all except one or two users. Is this possible? —Are Tysl Slackware 3.1
You may be missing a handy program called sudo, which you can obtain from your nearest Sunsite mirror. This program allows you to configure su actions for each user based on who the user is and what you wish him to be able to access.
If that does not meet your goal, why not fall back to the standard Unix security functions? Create a new group called su. Change the group on /bin/su from bin to su. The permissions are most likely 4755 (-rwsr-xr-x), which means anybody can execute it and the program will execute as root.bin.
You can then change the permissions of /bin/su. Try changing them to 4750 (-rwsr-x---), which allows root or any user in the su group to execute it. Then you can put those users you wish to have su privileges in the su group. —Chad Robinson, BRT Technical Services Corporation email@example.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide