jcl

Linux Experts
  • Content Count

    1299
  • Joined

  • Last visited

Posts posted by jcl

  1. Do you have any proof that the director of the CIA intentionally leaked this story to deflect criticism from a failing health care proposal? You're suggesting that there may possibly be some type of conspiracy between Leon Panetta and the White House?

    No, I'm suggesting that someone connected to one of the intelligence committees leaked the story. The White House or CIA might have wanted to reveal the existence of the program but I can't image why they'd want leak the details of the congressional briefing.

    I think it far more likely that it is a coincidence that the timing of the leak and the failure of the bill happened closely together.

    The timing probably was a coincidence. However, the story was still leaked for a reason. It could have been something as simple a moral outrage, but I'd like to think that the political class is competent enough to exploit stories with as much political value as this one.

  2. so you are indicating the server should be accessed by someone,or some thing i completely unknow 5 times in 3 days?

    So you figured out what user owned the sessions you saw in the log?

    and the data should be modified? what if there are massive data inside this server? i am working with an none safe tool to store my data?

    The server should be secured and backed up.

    well ,when seeing 2 people coming up to you ,one you've already known and the seconed you do not know,with out any official introdution,will you trust the second guy?

    The ARP table maps layer 3 addresses onto layer 2 addresses. That's it. Having an entry in the table doesn't imply that a host is trusted.

    PS:you people all use linux?

    Not everyone, no. In any case, I think everyone here uses Windows.

  3. it is a ms-sql server and i do not know where the problem is so i have banned my DHCP from pinging me.i am afraid that it brings in some other ARP adress.

    Why are you afraid of that?

    yet i can not confirm if the sql was injected by human hand or automated virus

    Have you considered the possibility that it's completely benign? Do you know what whatever it was was doing?

    and what if the virus take advantage of the arp table to spread?

    Nearly everything you can do on a network takes advantage of the ARP table.

    at least i need to confirm where the attack was lanched,to know who should i put into black list.

    You need to confirm that you've been attacked first.

    well,this is what happens: as soon as i allowed my DHCP to ping in,another adress which seems to be in our local ip-range pinged in too.so i got the "UNKNOWN OBJECT" in my arp table.what the F..??

    I have no idea what that means. What do you mean "ping in" and what are you using to view the ARP table?

  4. I hope some "childish" lawyers choose to waste government funds and conduct an investigation;-) I've enjoyed this debate immensely. Thanks, jcl!

    There's more to it than possible government waste. This story coincidentally broke shortly after it became clear that the health care reform plan was going down the toilet. It's entirely possible that the story was leaked to distract the public from the failure of the health care proposal. That normally wouldn't be cause for concern, but I've heard rumors that Congress is working on a rush compromise that could potentially do to health care what Patriot Act did to national security and TARP and the stimulus did to fiscal policy. Not the sort of thing that I would want passed without intense study and debate.

    [Edit: Erk, I just realized that my use of "waste" was ambiguous. I didn't mean simply wasting resources but wasting resources that we might need. I don't particular care about the government wasting resources that we don't need. In fact, I encourage it. It keeps the stupider and eviler parts of the government busy.]

  5. every time i plug in the LAN into my computer,"iana" will ping 255.255.255.255 which seems to be located on my computer,and the source is :172.24.1.* ,where * is mutiple hits at the same time. i don't know if this is normal,so i banned the range 172.16.0.0 to 172.31.255.255 on the fire wall settings.

    and it seems now that my my DHCP is not working ok, My ip can not be automatic assiened : (

    is it normal to receive icmp from these adresses above?

    255.255.255.255 is the local broadcast address. 172.16/12 is reserved for private use. Odds are that 255.255.255.255 'pings' are DHCP traffic and the source is your DHCP server. IOW, you filtered your own network.

    PS: 1 :how can i close 224.0.0.* communications on my computer?? and keep 239.255.250 away from my arp?

    Filter multicast traffic and stick Post-it on your monitor so you'll know what to undo.

    2:and if i saw a user like "spid"+ number ,(the number changes) making a big operation list on the SQL server on my machine,in several minutes,but 3 or 5 times in 3 days,and saw some very very unusuall agressive querries in the list,could i track back who the hell is "spid"?!

    "spid <number>" is probably a session ID. If this is MS SQL, you can use the sp_who stored procedure to look up the user and host associated with the session.

    3: can i make my arp list as clean as possible,i.e,left only my gateway?beacuse strange things keep hapening to my computer.

    ARP usually isn't responsible for strange things.

    is it nessary for my DHCP server to appear in my arp table?

    It's going to, regardless.

    and could it possible that my DHCP server was infected by some virus???

    There's no reason to believe that it is, but, sure, it's possible.

    look,the unknown user logged into my sql many times,and this is not so funny.and what if this is not a human but a virus still on my machine or in the local network?

    Then you have another problem.

  6. Granted, you did not equate the two transgressions, but, you did mention them together. Hence, my objections.

    Er, no, I didn't mention them together. I didn't mention Clinton's at all until the last paragraph of my last post.

    VP Cheney allegedly lied to Congress about a national security issue. If this is true in my opinion I think an investigation is warranted.

    Cheney's out of office. Congress has been informed. The program appears to have been benign. It's over. If people fell compelled to punish Cheney, they can do it themselves; there's no reason to waste government resources on people's childish urges.

  7. Probably true. If an investigation goes forward I doubt that Cheney will be convicted.

    I meant that he wouldn't have been convicted if Congress had impeached him. Convicting Cheney would have required a 2/3rds majority in the Senate and at the time the Democrats had 49+2 votes, give or take. It's unlikely that 16 Republicans would have defected.

    You can't really equate a middle aged man lying about an affair with a staffer to someone withholding information about a secret counter terrorism program from Congress.

    Grrr. I didn't equate them. I didn't even compare them. I was talking about the impeachment itself, not the actions that led to it. I could just easily have used Andrew Johnson's impeachment as an example.

    VP Cheney's alleged transgression potentially has national security ramifications. President Clinton's transgression was admittedly stupid and an embarrassment, but, it did not impact on the security of the USA.

    Clinton's actions could have left him vulnerable to blackmail. People who have affairs can lose their security clearance for precisely that reason. (And no, I'm still not comparing Clinton and Cheney.)

  8. I'd just let the Congressional Judiciary Committee handle it.

    By doing what? They can't even investigate the allegations unless the members and staff of the Committee have the required security clearance or the White House declassifies the program.

    I dont think Cheney and Clinton fell into the same category.

    They'd both be in the "impeached but not convicted" category.

  9. The point is that they didn't obey it, info got out, and now its a problem.

    So far it only seems to be a problem for Obama. No one is surprised that Cheney or the CIA would withhold information from Congress, so, at worst, this is a bit more evidence to support people's prior beliefs. Obama, on the other hand, is in a predicament: if he takes action against Cheney or any former CIA officials, he'll be compromising his (apparent) belief that we should put the Bush years behind us and move on, and setting a precedent that could come back to haunt him. On the other hand, if he doesn't take action he looks like he condones, or even supports, Cheney's behavior.

    If the law is impractical, then they should change the law.

    I think I heard that there's a bill to amend it floating around Congress, but I believe White House opposes it. Anyway, I think the current law serves its purpose.

    Or they're finding out more and more illegal things Cheney did that should have gotten him impeached back when Kucinich was pushing for it.

    I thought we learned ten years ago that symbolic impeachments are a bad idea.

  10. Wait a second. If I'm reading the original post correctly, there was a hidden directory named "gzip" directly under %APPDATA%\Mozilla\Firefox\. So... what is that directory? AFAIK Firefox doesn't use %APPDATA%\Mozilla\Firefox\ for anything except profiles and crash reports and doesn't hide directories at all. The directory doesn't exist on either of the machines I've checked.

  11. What ever happened to great screen writers and decent material to work from?

    Current films don't have the benefit of nostalgia.

    Anyway, Harry Potter. If G.I. Joe is hilariously bad, it'll move to the top of the list, but I'm not optimistic.

  12. Who set that standard?

    The World Health Organization.

    Why is it even being used?

    It's simple, fast, and there are numbers so it must be Science.

    To "scare" the populice, to give the government the power to legislate action, or am I being paranoid?

    "Never attribute to malice that which can be adequately explained by stupidity."

    On the other hand, the insurance industry's adoption of BMI probably was motivated by malice.

  13. Let me add a greeting; and note that strange fonts and such are hard for us older folks to read.

    You should see it here. It looks a ransom note made out of newspaper clippings. If I bump the size up one notch, the weight increases to ultra-bold and it looks like box drawings.