[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-users] Raq 2 / SSL / POST stopped working



I recently installed the BroSoft SSL software on my RAQ2, which seems to be
working fine.  After the installation I noticed that all of my Perl scripts
were no longer working.  All of these scripts are in non-secure folders.  I
either get Bad Referrer errors or the script does not function at all.
I've triple checked the referrer info and everything is correct.  These
scripts were all working fine before SSL was installed.

BroSoft support suggested changing the POST to a GET in the script and that
worked fine (but I don't know why).  All scripts function perfectly if I
change the POST to a GET in the HTML.  This has worked in a form mailer,
chat room, message board, etc.

Two questions:
Is there a problem with using GET instead of POST (more server intensive,
less secure?)

How do I fix it?   Most scripts I use come with POST and it would be a real
waste of time to have to change them all to GET.

Thanks for the help, this list has taught me a lot!
Paul


At 03:06 AM 2/28/01 -0800, you wrote:
>Send cobalt-users mailing list submissions to
>	cobalt-users@xxxxxxxxxxxxxxx
>
>To subscribe or unsubscribe via the World Wide Web, visit
>	http://list.cobalt.com/mailman/listinfo/cobalt-users
>or, via email, send a message with subject or body 'help' to
>	cobalt-users-request@xxxxxxxxxxxxxxx
>
>You can reach the person managing the list at
>	cobalt-users-admin@xxxxxxxxxxxxxxx
>
>When replying, please edit your Subject line so it is more specific
>than "Re: Contents of cobalt-users digest..."
>
>
>Today's Topics:
>
>   1. #! is not interpreted (Katrin =?iso-8859-1?Q?=C7appar?=)
>   2. RE: hacked raq + chattr command (flash22@xxxxxxx)
>   3. Re: #! is not interpreted (flash22@xxxxxxx)
>   4. Re: Recent Hacks - Why? (gery.jansen@xxxxxxxxxxxxx)
>   5. Ping command (benoit.le-dizes@xxxxxxxx)
>   6. Re: ErrrorDocument (help) (Fabian)
>   7. Re: Recent Hacks - Why? (flash22@xxxxxxx)
>   8. Re: URGENT - Help needed (johnm@xxxxxxxxxxxxxxxxxxxx)
>   9. Re: Ping command (flash22@xxxxxxx)
>  10. CROND (Joshua Kim)
>  11. Re[2]: [cobalt-users] Free Shopping Cart with Processing back end.
(Pierre Chopot)
>  12. Re: #! is not interpreted (Babu P. Yogarajah)
>  13. [OT ?] Wndows SSH/SFTP/SCP software (Pierre Chopot)
>  14. Re: #! is not interpreted (Oliver Schlag)
>  15. Re: CROND (flash22@xxxxxxx)
>  16. Re: Control Panel (Carrie Bartkowiak)
>
>--__--__--
>
>Message: 1
>Date: Wed, 28 Feb 2001 08:24:46 +0100
>From: Katrin =?iso-8859-1?Q?=C7appar?= <k.cappar@xxxxxxxxx>
>To: cobalt <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: [cobalt-users] #! is not interpreted
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>We have the problem with one of our shells that the
>#! is not interpreted (i.e. perl scripts are not
>executed from browser but from shell).
>
>Any ideas?
>
>Katrin
>
>
>--__--__--
>
>Message: 2
>From: flash22@xxxxxxx
>Date: Wed, 28 Feb 2001 02:09:58 -0500 (EST)
>Reply-To: flash22@xxxxxxx
>To: cobalt-users@xxxxxxxxxxxxxxx
>Subject: RE: [cobalt-users] hacked raq + chattr command
>
>On Tue, 27 Feb 2001, GPS wrote:
>> >
>> >What are the benefits of using the chattr command if it can be undone
using
>> >the same command with a different flag?
>> >+ Add attribute
>> >- Remove attribute
>> >
>> >So wouldn't actually be "chattr +i /bin/login" to enable, and "chattr -i
>> >/bin/login" to disable? But I still don't see the point if the
attributes can
>> >be removed.
>
>> It's not a fool-proof measure...just an extra precaution. Since it seems
that 
>> it's not a widely known or used file protection it is effective because
it immediately
>> throws the less-experianced for a loop. (myself included!) 
>
>No, that would be an attempt at security through obscurity, which is
>pointless (as shown by the fact the hackers seem to know more about this
>command than the users)
>
>The idea here is that *after* you have all the files that you want to
>protect set immutable or append only, you tell the kernel to disable the
>chattr command, once disabled, it can not be reenabled except by
>rebooting, if you  have a command in the boot scripts that disables it
>during boot, it becomes impossible to disable immutability without having
>a boot floppy to start the machine from....
>
>The magic is in /proc/sys/kernel/securelevel  btw, you cat cat this
>'magic' file and it will tell you the current status of secure level
>(0=disabled, allow changes, 1=secure, disable changes) Note 2 important
>things, if you set this, you can't install anything that needs to replace
>protected files (none of th current package managers pays any attention to
>chattr , and they will get quite upset if they can't replace files they
>are installing) and 2) Older kernels don't have working securelevel,
>eg: the 2.0.34 kernel on the raq2 can tell you what this setting is , but
>it doesn't lock properly, all of the chattr stuff has been experimental
>for some time, and some of it is quite DANGEROUS, so i don't recomment
>playing unless you have an easy way to recover your machine ;)
>
>ps: extended attributes also do other things besides lock files, there's a
>on-the-fly disk compression flag, an undelete flag (somewhat broken) , and
>some options to improve performance by allowing the filesystem to
>selective not do some expensive things, like setting the last access date
>on all the directories in a tree when a file is accessed....
>
>gsh
>
>
>--__--__--
>
>Message: 3
>From: flash22@xxxxxxx
>Date: Wed, 28 Feb 2001 02:26:16 -0500 (EST)
>Reply-To: flash22@xxxxxxx
>To: cobalt <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re: [cobalt-users] #! is not interpreted
>
>On Wed, 28 Feb 2001, Katrin [iso-8859-1] Çappar wrote:
>
>> We have the problem with one of our shells that the
>> #! is not interpreted (i.e. perl scripts are not
>> executed from browser but from shell).
>
>I'm not quite sure what you are asking...
>
>Perl scripts should start with
>#! /usr/bin/perl
>shell scripts should have the name of the shell
>#!/bin/sh
>
>If you are uploading scripts make sure you have a normal newline at the
>end...
>
>It *must* be the very first line, and if it has arguments, they can't be
>over 512 bytes long..
>
>If it has no arguments, it also can't have any trailing spaces in some
>cases...
>
>The path has to be correct, no searching is done generally...
>
>It has to be executable, or #! is ignored...if it's a cgi, cgi's have to 
>be enabled and the extension has to be one of the recognized cgi types
>(.pl, .cgi)
>
>Hope that helps...
>
>gsh
>
>Linux Registered User 72146
>
>
>--__--__--
>
>Message: 4
>From: gery.jansen@xxxxxxxxxxxxx
>To: <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re: [cobalt-users] Recent Hacks - Why?
>Date: Tue, 27 Feb 2001 08:32:45 +0100
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>Hi,
>
>This is a really cool bit of information. I thank you for that.
>My only question is .... are only Cobalt RAQ's and Cube's involved in this
>resent swap of attacks? or are also other systems involved? when only Cobalt
>there are 2 questions.
>Why are only Cobalt systems involved and when only Cobalt, why the other
>systems not?
>
>Thanks
>
>cuall
>
>Gery Jansen
>internet24 gmbh                       056 470 60 16
>www.internet24.ch                   079 378 26 14
>gery.jansen@xxxxxxxxxxxxx
>----- Original Message -----
>From: "Christian Karlsson" <info@xxxxxxxxx>
>To: <cobalt-users@xxxxxxxxxxxxxxx>
>Sent: Monday, February 26, 2001 8:56 PM
>Subject: SV: [cobalt-users] Recent Hacks - Why?
>
>
>> Okay! Thanks for the information!
>>
>> -----Ursprungligt meddelande-----
>> Från: cobalt-users-admin@xxxxxxxxxxxxxxx
>> [mailto:cobalt-users-admin@xxxxxxxxxxxxxxx]För Dee Dreslough
>> Skickat: den 26 februari 2001 17:52
>> Till: cobalt-users@xxxxxxxxxxxxxxx
>> Ämne: RE: [cobalt-users] Recent Hacks - Why?
>>
>>
>>
>> >What is it with all the recent "hacks" on the Raq's? Is it really hacks
>or
>> >is some sort of bug? It seem to me that very many raq's has been hacked.
>> >Even my raq was proberly hacked. Who is it that are hacking our servers,
>> and
>> >why? I don't see any point in doing this...
>>
>> I have a friend who's run a few ISPs in his day who now works for my
>> husband.  He's been doing security for years, so I asked him about what
>> might be going on.
>>
>> Basically, all these hacks are probably happening for two reasons:
>>
>> 1. There's a new HUGE recently discovered hole or holes (BIND) that all
>the
>> hackers are now trying out. Our systems aren't spontaneously corrupting
>> themselves...this isn't just a bug. I wish it was!
>>
>> 2. A new crop of 'pups' is cutting their hacking teeth at the same time.
>> Basically, more kids are discovering hacking right now, so more and more
>> portscans and scripts are going to be thrown at us. More amateur hackers
>are
>> learning by throwing their scripts at our machines.
>>
>> My friend explained that one of the reasons my hack was so obvious (I
>> immediately started receiving BIND: Address already in use messages in my
>> email box within 15 minutes of the hack) was because there are Real
>Hackers
>> and Kiddie Scripters.  The real hackers have a kind of honor (if you can
>> call it that) and they purposely leave errors in the hacking scripts they
>> distribute to the kiddies so that amateurs leave footprints whenever they
>> use them to break into systems.  This is the real hackers' way of actually
>> allowing us to know when we've been hacked. Nice, eh?
>>
>> These Real Hackers have probably already had access to our systems for
>> months...we probably never would have known... but now all the Kiddie
>> Scripters are trying out the scripts, and leaving a mess behind. And,
>there
>> are a lot more kiddie scripters than real hackers, I would guess...just
>like
>> there are more RaQ newbies than old salts. :)
>>
>> >Why so much hacking? Why do they do it?
>>
>> There seems to be some kind of 'cache' in having a list of compromised IPs
>> of boxes you've hacked. Also, hackers try to pre-prime machines for Denial
>> of Service attacks. They try to sneak onto as many machines as they can to
>> set them up to do an attack at a later time. They're basically trying ot
>get
>> as many compromised machines in their 'back pockets' for when they need
>them
>> to attack someone who's angered them.
>>
>> So, the kiddies are probably doing it to 'collect' a bunch of hosts they
>can
>> use later, or to just show their friends how cool they are. >:P Of course,
>> they don't realize that they're basically doing the equivalent of breaking
>> into someone's store downtown...they're threatening our livelyhoods by
>doing
>> this.  For them, it's just long distance teenage mayhem, I guess.
>>
>> I don't think the problem's going to get any better any time soon. As we
>> pass the 50% internet-use mark in the USA, more and more kids are going to
>> have access to the web, and more and more are going to want to learn to
>> hack, and try every portscanner and script they can get their paws on
>again
>> and again.
>>
>> I'm not a hacker, so this is just what my friend (who as a security
>> specialist has had to study hackers) has explained to me.  I hope it helps
>> make the possible motivations of these people clearer, and also explain
>why
>> we've been catching them so often.
>>
>> -Dee Dreslough
>> With love to the Admins -- may we always keep fighting the good fight! :)
>>
>> _______________________________________________
>> cobalt-users mailing list
>> cobalt-users@xxxxxxxxxxxxxxx
>> To Subscribe or Unsubscribe, please go to:
>> http://list.cobalt.com/mailman/listinfo/cobalt-users
>>
>> _______________________________________________
>> cobalt-users mailing list
>> cobalt-users@xxxxxxxxxxxxxxx
>> To Subscribe or Unsubscribe, please go to:
>> http://list.cobalt.com/mailman/listinfo/cobalt-users
>>
>
>
>--__--__--
>
>Message: 5
>Date: Wed, 28 Feb 2001 09:49:03 +0100
>From: "benoit.le-dizes@xxxxxxxx" <benoit.le-dizes@xxxxxxxx>
>To: cobalt-users@xxxxxxxxxxxxxxx
>Subject: [cobalt-users] Ping command
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>Hello,
>
>I would like to know if there is an update of the ping command for my
cobalt Qube 2 because I think it is very poor in functions compared to new
releases of Linux mandrake or Red Hat.
>
>And if is it possible, where can I download this update ?
>
>please message me
>thanks
>
>
>__________________________________________________
>Voila vous propose une boite aux lettres gratuite sur Voila Mail:
>http://mail.voila.fr
>
>
>
>
>--__--__--
>
>Message: 6
>From: "Fabian" <cobalt@xxxxxxxxx>
>To: <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re: [cobalt-users] ErrrorDocument (help)
>Date: Tue, 27 Feb 2001 00:42:41 -0300
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>HI:
>
>I need to use the migration utility of cobalt to move domains from a cobalt
>4i to another cobalt 4i..
>
>I just installed in the source cobalt 4i the Migartion Utility..
>
>But I don't undertand some things..
>somebody can help me?
>
>1 - both RAQS must be in the same network? (because the source raq is in one
>company, and the target RAQ is another company)
>2 - regarding the point 6 of the migration utility manual..
><on target appliance> Set up the target appliance so that it can communicate
>with the surece appliance.
>
>I'm installed the migration utility pkg on both RAQs.
>How I do it to setup the target appliance to communicate with the source
>appliance?
>(the same way that setup the source appliance?)
>
>3 - this system works from a cobalt 4i to another cobalt 4i ?
>
>I'm feel myself an stupid:( but is the first time I use this utility, and I
>need to use because my source cobalt was hacked:(
>
>Many thanks in advance.
>Regards
>Fabian
>
>
>--__--__--
>
>Message: 7
>From: flash22@xxxxxxx
>Date: Wed, 28 Feb 2001 03:17:12 -0500 (EST)
>Reply-To: flash22@xxxxxxx
>To: cobalt-users@xxxxxxxxxxxxxxx
>Subject: Re: [cobalt-users] Recent Hacks - Why?
>
>On Tue, 27 Feb 2001 gery.jansen@xxxxxxxxxxxxx wrote:
>
>> Hi,
>> 
>> This is a really cool bit of information. I thank you for that.
>> My only question is .... are only Cobalt RAQ's and Cube's involved in this
>> resent swap of attacks? or are also other systems involved? when only
Cobalt
>> there are 2 questions.
>> Why are only Cobalt systems involved and when only Cobalt, why the other
>> systems not?
>
>Don't be silly, *thousands* of redhat machines have been hacked as well,
>due to shipping with rpc.statd enabled when it'a not even used, same
>versions of bind, unupgraded ftp's etc, it really truly has little to do
>with the machines being raq's/qubes/etc
>
>I've been told by a security fellow that 7 out of every 1000 machines
>scanned were susceptable to being broken into...(estimate) and that's just
>the 4 most recent issues, rpc, bind, qpopper, and proftp...
>
>It has *a lot* to do with users failing to keep software up to date, and a
>little to do with the fact large numbers of people are using the same
>exact versions of software which makes it easier to hit a random machine
>and be successfull...
>
>Another factor that seems to be involved lately is that the way cable
>modems and adsl connections work on many ISP's makes it trivial for
>someone to change their IP address on the fly, by just asking the server
>for a new ip address, making it remarkably easy to hide....you could of
>course do this via dialup , but it takes quite a lot longer for someone to
>disconnect and redial, making them reluctant to do it unless forced to...
>
>> > 2. A new crop of 'pups' is cutting their hacking teeth at the same time.
>
>> > and Kiddie Scripters.  The real hackers have a kind of honor (if you can
>
>and they also hide on irc telling the kiddies what to do, so the kiddies
>get caught and they don't -/
>
>> > call it that) and they purposely leave errors in the hacking scripts they
>
>some of these kids can't even spell, much less write a working program...
>
>one fellow that tried a password attack on my pop server took 3 tries to
>spell 'mail'...
>
>> > These Real Hackers have probably already had access to our systems for
>> > months...we probably never would have known... but now all the Kiddie
>
>This is why folks like BugTraq insist that information should be made
>public quickly instead of burying it for months waiting around in the hope
>a vendor will release a patch, the 'in the know' folks already know, and
>they are by far the most dangerous...the kiddies won't do anything until
>someone else writes a script for them...
>
>> > are a lot more kiddie scripters than real hackers, I would guess...just
>
>s/hackers/crackers/g
>
>> > there are more RaQ newbies than old salts. :)
>
>It's not just the Raq's there are a *lot* of people administering machines
>on the network that have little or no experience at all, and they are
>making predictable mistakes...
>
>> > There seems to be some kind of 'cache' in having a list of compromised
IPs
>> > of boxes you've hacked. Also, hackers try to pre-prime machines for
Denial
>> > of Service attacks. They try to sneak onto as many machines as they
can to
>
>I have already seen 2 DOS attacks based on recently compromised
>machines...get ready for the next wave folks...
>
>> > So, the kiddies are probably doing it to 'collect' a bunch of hosts they
>
>Your anonymous ftp server makes a nice warez site ;)
>
>gsh
>
>
>--__--__--
>
>Message: 8
>From: johnm@xxxxxxxxxxxxxxxxxxxx
>To: cobalt-users@xxxxxxxxxxxxxxx
>Cc: 
>Subject: Re: [cobalt-users] URGENT - Help needed
>Date: Wed, 28 Feb 2001 09:16:06 GMT
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>Thanks to all that answered.
>
>I found an old dial up account on my laptop and used that to telnet in and 
>remove my IP address from the hosts.deny file.
>
>All I have to do now is remember not to finger my server again.
>
>Cheers
>
>John
>
>
>--__--__--
>
>Message: 9
>From: flash22@xxxxxxx
>Date: Wed, 28 Feb 2001 03:32:29 -0500 (EST)
>Reply-To: flash22@xxxxxxx
>To: cobalt-users@xxxxxxxxxxxxxxx
>Subject: Re: [cobalt-users] Ping command
>
>On Wed, 28 Feb 2001, benoit.le-dizes@xxxxxxxx wrote:
>
>> Hello,
>> 
>> I would like to know if there is an update of the ping command for my
> cobalt Qube 2 because I think it is very poor
> in functions compared to new releases of Linux mandrake or Red Hat.
>> And if is it possible, where can I download this update ?
>
>ping hasn't had any signifigant changes other than a small security patch
>since it was ported to linux from bsd half a decade ago -/
>
>'Current' should be in 'netkit'
>
>What are you trying to make it do ?
>
>gsh
>
>
>--__--__--
>
>Message: 10
>From: "Joshua Kim" <thejk@xxxxxxxx>
>To: "COBALT USER GROUP" <cobalt-users@xxxxxxxxxxxxxxx>
>Date: Wed, 28 Feb 2001 01:31:25 -0800
>Subject: [cobalt-users] CROND
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>Umm... I did ps -aux and found both crond and CROND running. Is one of
>them an illegit process?
>
>And, yes, my server was hacked and I am in the process of figuring
>things out. ;-) Kinda fun, in a perverse sorta way.
>
>Thanks for your help!
>
>
>--__--__--
>
>Message: 11
>Date: Wed, 28 Feb 2001 10:33:38 +0100
>From: Pierre Chopot <pierre@xxxxxxxxxxx>
>Reply-To: Pierre Chopot <cobalt-users@xxxxxxxxxxxxxxx>
>Organization: Zapilou
>To: Dan <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re[2]: [cobalt-users] Free Shopping Cart with Processing back end.
>
>Hello List,
>
>Tuesday, February 27, 2001, 11:49:01 PM, you wrote:
>
>D> Gregg,
>
>D> But ranting aside I have a question - I WAS using WS-FTP for ftp and
>D> Shuttleftp for telnet. Now I'm using Tera Term pro with the SSH patch for
>D> telnet and I'm trying out IXplorer for the secure ftp side of things,
but it
>D> doesn't have the same functionality (it seems) as WS-FTP. You can't create
>D> directories, delete files, CHMOD anything etc etc All you can seem to
do is
>D> upload and download. Can anyone suggest a secure FTP program that uses SSH
>
>I sent an email to the list on the 25 listing each and every software
>for Windows using SFTP and SCP. Seems I missed iXplorer :-(
>Anyway, you might want to try WinSCP at http://winscp.vse.cz/eng/ ,
>gives you more features than iXplorer.
>(BTW both do use SCP, Secure CoPy, not SFTP).
>
>-- 
>Regards,
> Pierre                          
> pierre@xxxxxxxxxxx
>
>
>
>--__--__--
>
>Message: 12
>Date: Wed, 28 Feb 2001 09:20:07 +0000
>To: cobalt-users@xxxxxxxxxxxxxxx
>From: "Babu P. Yogarajah" <bpy@xxxxxxxxx>
>Subject: Re: [cobalt-users] #! is not interpreted
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>At 08:24 28/02/01 +0100, Katrin Çappar <k.cappar@xxxxxxxxx> wrote:
>>We have the problem with one of our shells that the
>>#! is not interpreted (i.e. perl scripts are not
>>executed from browser but from shell).
>>
>>Any ideas?
>
>Hi Katrin,
>Did you upload the perl script in ascii format?
>if not or doubt, upload it again in ascii format and try again.
>
>
>Best regards,
>Babu P.
>Yogarajah
>___________________________________________________
>99p Domain
>Registration Scheme -> http://99p.org/
>
>
>
>--__--__--
>
>Message: 13
>Date: Wed, 28 Feb 2001 10:40:50 +0100
>From: Pierre Chopot <pierre@xxxxxxxxxxx>
>Reply-To: Pierre Chopot <cobalt-users@xxxxxxxxxxxxxxx>
>Organization: Zapilou
>To: Cobalt Users <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: [cobalt-users] [OT ?] Wndows SSH/SFTP/SCP software
>
>Hello List,
>
>  Because I did some research, I thought I could drop you a line about
>  what I found on the Net as far as SSH/SFTP/SCP software for Windows
>  and MAcOS:
>  (Disclaimer: I have no interest in any of these companies, just hope
>  this will help someone, list without any specific order)
>
>  Update 0.2 :-) added iXplorer.
>
>  TeraTerm (http://hp.vector.co.jp/authors/VA002416/teraterm.html)
>  free telnet client, supports SSH 1.5 with Robert Callahan's extension
>  (http://www.zip.com.au/~roca/ttssh.html). Port forwarding Yes.
>  
>  SecureCRT (http://www.vandyke.com/products/securecrt/) SSH1 and
>  SSH2, port forwarding, $99, capable of SCP.
>
>  SecureFX (http://www.vandyke.com/products/securefx/index.html), FTP
>  and SFTP, all the bells and whistles, $59
>
>  SSH Secure Shell (http://www.ssh.com), $99, SSH1/2, SFTP, command
>  line SCP, port forwarding, Win and Unix, client and server from the
>  makers of SSH
>
>  SecureKoalaTerm (http://www.midasoft.com/koala98/index.htm) Telnet
>  and SSH1 and SSH2, no port forwarding, $79, scripting language (very
>  power-full to automate complete tasks)
>
>  Putty (http://www.chiark.greenend.org.uk/~sgtatham/putty/) a free
>  SSH1/2 client, no port forwarding, still in beta 0.5, but nice and
>  stable, comes with PSCP, a command line scp.
>
>  WinSCP (http://winscp.vse.cz/eng/) a free GUI for the above PSCP,
>  provides nice features (in fact it is very similar to a FTP client),
>  you can create/delete/rename/chmod remote files, free, PSCP is
>  included (no need to download it separately)
>
>  iXplorer (http://i-tree.org/ixplorer.htm), another free GUI for
>  PSCP, not as many features as WinSCP, sits nicely in the tray.
>
>  Penguinet (http://www.siliconcircus.com/products.php?name=PenguiNet)
>  Telnet and SSH1 (FAQ says SSH2 is not ruled out but not forecasted
>  at this time), SCP is on it's way, port forwarding yes, 15 pounds
>  (that's the price, not the weight !), annoying ads when running the
>  trial version (keeps connecting..)
>
>  CSTelnet (http://www.celestialsoftware.net/telnet/index.html)
>  supports SSH (unable to say from their web site 1 or 2) shareware.
>
>  Eric's Telnet (http://www.telnet98.com/) $29, supports SSH and
>  UUencode, I was unable to see if this is SSH1 or 2 (from testing
>  software and from FAQ's)...I guess it's 1.
>
>  Mocha Telnet (http://www.mochasoft.dk/win95.html#wtelnet) $25, SSH1
>  only, no port forwarding.
>
>  F-Secure (http://www.f-secure.com/products/ssh/) $150, everything
>  you need for Windows, MAcOS, Unix, client or server, SSH1 and 2,
>  port forwarding, SFTP, etc..
>
>  MacSecSH (http://www.macsecsh.com/), free GPL, SSH2 only, no SFTP,
>  port forwarding for MacOS.
>
>  Nifty Telnet (http://www.lysator.liu.se/~jonasw/freeware/niftyssh/),
>  free, SCP, SSH (1 or 2?) for MacOS
>
>  And I am pretty sure there is something for Emacs...
>
>-- 
>Regards,
> Pierre                          
> pierre@xxxxxxxxxxx
>
>
>
>--__--__--
>
>Message: 14
>To: <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re: [cobalt-users] #! is not interpreted
>Date: Wed, 28 Feb 2001 11:12:55 +0100
>From: Oliver Schlag <chairman@xxxxxxxx>
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>Hy,
>
>which extension does this file have ? .pl or .cgi ? Perhaps you have to say 
>mod_perl or apache to parse this file.
>
>Greetings
>Oliver
>
>
>--__--__--
>
>Message: 15
>From: flash22@xxxxxxx
>Date: Wed, 28 Feb 2001 04:32:55 -0500 (EST)
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>To: COBALT USER GROUP <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re: [cobalt-users] CROND
>
>On Wed, 28 Feb 2001, Joshua Kim wrote:
>
>> Umm... I did ps -aux and found both crond and CROND running. Is one of
>> them an illegit process?
>
>yeah, ps eax will tell you more about the program, it's path,environment 
>etc
>
>
>
>--__--__--
>
>Message: 16
>From: "Carrie Bartkowiak" <ravencarrie@xxxxxxxx>
>To: <cobalt-users@xxxxxxxxxxxxxxx>
>Subject: Re: [cobalt-users] Control Panel
>Date: Wed, 28 Feb 2001 05:34:22 -0500
>Reply-To: cobalt-users@xxxxxxxxxxxxxxx
>
>> > OTOH, you could hire a programmer to take the shell tools and whip you
>up
>> > your own personalized control panel.
>> So,  Ms. Raven <big grin> are you volunteering?
>
>Oh goodness... can I duck out of this one by saying "not at this time"??  ;)
>The money would be nice but honestly I'm swamped with a bunch of database
>projects and building a control panel for my hosting business.
>(When I have extra time [HA!] I'm also trying to work on a RaQ4 control
>panel but *nothing* as complex as other stuff that's been advertised on
>here, it deals more with interacting with your customers and offering them
>stuff than running your machine. You won't be able to drop the Cobalt GUI
>all together.)
>
>I would really *really* recommend that anyone interested in shopping carts,
>form processors, even online control panels for their 'balts buy a good PHP
>book and take a read. PHP is super easy to learn (makes much more sense than
>CGI/Perl scripting) and you can make your *own* *customized for your
>business* shopping cart/whatever in just a few days.
>One book that's great is PHP Fast & Easy Web Development by Julie Meloni.
>It's perfect for beginners. If you're interested, get it at Fatbrain.Com,
>because it's waaaaay cheaper there than anywhere else on the web.
>Use the "Search" box at www.php.net and look at the user notes to get a lot
>more info, ideas, and code snippets when you start going out of the realm of
>what Julie's book covers.  (Although if you just think a little bit and be
>creative, you can use the examples in Julie's book and modify them a bit to
>fit just about whatever you need.)
>And once you grow beyond Julie's book and you get tired of looking up
>functions on PHP.net, get the PHP4 Bible (by Tim Converse and Joyce Park). I
>swear there's more functions in this book than there are on the php.net
>site. *L* (It just seems that way.)
>
>For people wanting to know how in the world they could build their own
>control panel or anything like it, just take a look at the SHELL TOOLS. Open
>each script and read it. Look at the examples. You can do so much with those
>things, and all of those commands in the shell tools can be executed by
>CGI/PHP scripts!
>
>Sorry if I just gave away some big trade secret and made people who are
>developing control panels mad. Hey, people have a right to info.
>And note I didn't even give my fatbrain.com page/affiliate link. <grin>
>
>> No need to duck the swipe, there wasn't one. Just a smile across the
>> miles.
>
>~8>
>(that's a feather, a pair of eyes, and a beak... a smiling Raven. Hehe.)
>
>CarrieB
>
>
>
>--__--__--
>
>_______________________________________________
>cobalt-users mailing list
>cobalt-users@xxxxxxxxxxxxxxx
>http://list.cobalt.com/mailman/listinfo/cobalt-users
>
>
>End of cobalt-users Digest
>