Best of Technical Support
Can I get two nearby modems to talk over a short connecting line without going through the telco, i.e., going from the phone line connector of one modem to the other with a twisted pair (reversed)? It seems this should work and I think I know the correct AT commands, but I can't get it to work and nobody seems to know the answer. I am not talking about a null modem cable. I want to use this to test out PPP server setups. Thanks for any information. —William Strickfaden, firstname.lastname@example.org
This depends on your modems. The phone company normally provides line voltage that modems modulate with their signals to talk to one another. Some modems have been known to work without this voltage, but before you go that route, you can look for a “phone-line simulator”. This device will provide the line voltage and will even ring one end when the other picks up. They're usually not too expensive, or if you're a hobbyist, you can try to build one. Many circuit encyclopedias have simple circuits which do that.
This is the only option. LAN signals have voltage supplied by the devices on each side. You cannot do the same thing with phone connections just by reversing the wires. —Chad Robinson, Chad.Robinson@brt.com
Has anyone had success in establishing a reliable PPP connection from Linux to a Shiva LanRover modem bank(www.shiva.com/remote/d56)? I've been through DejaNews and talked to the Red Hat PPP guru, but so far no luck.
Also, my employer uses SecurID to form part of the password, so it is literally impossible for me to have a static password entry in /etc/ppp/pap-secrets or /etc/ppp/chap-secrets. Is there any way to accommodate passwords that are generated through SecurID? —Steve Masticola, email@example.com
The dip program has scripting features that include explicit support for SecurID cards. It even understands about the static and variable parts of SecurID passwords, with support for both pieces independently. The script simply says:
to store the fixed part. Later, the script says
whenever the password prompt is recognized; this makes the script stop and prompt you for the variable part, and then dip sends the combined parts to the server. —Scott Maxwell, firstname.lastname@example.org
Try using seyon or minicom to see if you can get a login and password prompt. Type ATDTnumbertocall then press enter once you get the CONNECT message. If you can, you should use those to connect, close the application without hanging up the modem, then run pppd by hand:
pppd /dev/modem 57600 crtscts modem noipdefault\ defaultroute
If you don't have a /dev/modem link, substitute it for your serial port. —Marc Merlin, email@example.com
I am a new user. I installed Red Hat version 5.01 for the first time on a partitioned disk (486 system). Immediately after I switch on the message, “Lil” comes up and the system stops. When I use a floppy boot, it is all right. Should I reinstall Linux again, or can I configure properly after it is booted through the floppy? The other partition is Windows 95. I want both options to be displayed while booting. Please help. —Manilal, firstname.lastname@example.org
You must have had a problem with configuring LILO during the Red Hat install. One possible reason is that your root partition crosses the 1024 cylinder boundary on your disk, and this prevents LILO from booting. There are many other possible problems with IDE disks and the different kinds of translations that your BIOS may be able to do (CHS or LBA head translation). I suggest you try different settings in the BIOS and the linear option for LILO. Also refer to the following LILO HOWTOs:
—Marc Merlin, email@example.com
I need to mount a 6GB HDD IDE drive formatted for NTFS on my Linux system that will allow me to transfer a 5GB file from the drive to Linux format, so that I can process the data in the UNIX world. I have found a read-only NTFS drive that is under development, but I could not get it to compile. I get an error on a time_t call. I've tried to use FTP to transfer the file, but it goes so slow I'm afraid it would take a week to do the transfer. I also tried to FTP the file to my RS/6000, but that consistently dies at 1.2GB. If I try to use the SAMBA interface, the transfer dies at about 500Mb.
I've also installed AWK on the NT box, but it goes so slow that I can't believe the NT box will stay up long enough to complete the transfer. Help! —Algis Posius, firstname.lastname@example.org
The 2.2.x kernels already have support for both read/write in NTFS partitions. Even though I've never tried to copy that amount of data, it seems stable enough for the task. Just one question: do you have 5GB of data or a 5GB file? If you have a 5GB file, you are out of luck. The 32-bit version of Linux (and AIX also) can address files only up to 2GB. —Mario Bittencourt, email@example.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide