Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Hmmm... I've been posting on BBS, and Web, since mid-80s, and this is the first time anyone suggested I'm a troll. Used to be member of the wearable computing forum, slashdot, and various other techie forums, too. Disregarding all the flaming: It would be nice if someone here could suggest a way I can get this unauthorized user (hacker) OFF my system, or how their initial control is accomplished. Or any technical help. How, for example, did removing and reinserting the battery solve the CD-ROM problem? But never mind... I think I've probably managed to get the message out now, and eventually someone will figure it out.
Meanwhile, I'd like to post what to do if this happens to you, but I don't quite dare. Maybe if they knew what I do, they could prevent my circumventing them (not quite shutting them out, but very nearly).
Internet access is not yet officially a "civil right," like publishing, but First Amendment does apply to Internet posting. Now if I could just figure out how to post a blog that would not be removed (plus all e-mails connected to starting the blog account).... *sigh* At least they didn't dare request this thread be removed.
Last edited by techwatcher; 01-03-2008 at 06:38 AM.
Some weeks ago, when I first got back online from home, I downloaded FBI.gov page (pasting at least a section into USB storage device) about their program targeting individuals "not really disabled" or "exaggerating their disability" re insurance fraud (medical fraud). I mentioned one could search for this on Google. Here's an update: That page has been substantially altered! I came today to a 'net cafe to print out that and some other information, and discovered the reference to prosecuting individuals has been deleted entirely. The date of the page I found is listed as May 2005, btw, with no update information. The phrase in the current document is "False or exaggerated medical disability" if anyone wants to search after reading this.
On an earlier thread (which disappeared) at MepisLovers.org, I mentioned that I first noticed a problem because I had been working on some files on the USB storage device, and as I was working on them, a box popped up saying something like "File deleted by another program. What do you want to do?" I had not been able to re-save the document, even when I copied all the text to clipboard and then into a brand-new file. Since then, I haven't dared put a USB device into a PC, so I don't know what files I still have and which are gone.
I probably won't return to this forum until I have something substantial to report (since I'm not getting any technical help here). Can't someone just report the 'name' of the vpn daemon, at least, in Mepis 6.5? It is running (shows in boot-up report, and at shutdown when that's normal), but I don't know it's name, so I can't look up any manual information about it.
On Friday I bought a couple new "small" (512Mg) USB storage devices. One I inserted into the machine to be used (as happened once before when I had plugged it in before booting) as write-through storage. I assumed or hoped it would be treated a bit like a swap file. The second I intended to plug in after the system was up and running.
The first day, I was able to create simple text files as I was browsing (searching for info on the NH voting oddities, and progress on the bid to recount all votes), and store them on the second (data) drive. I have never since been able to mount the second drive, and finally stopped inserting it at all. I was still leaving the first drive in place, until last night.
Last night as I shut down the CD-ROM based system, I saw a message I'd never seen before about a BSD (BSDFree?) shell. I'm running Mepis 6.5, of course, but it seems my "friends" upstairs have been using that USB device for their own purposes... I brought the USB storage device to the library today (where I am typing this), but I can find no files on it at all. Of course, the library PCs are all running some variant of Win OS. Anyway, just a brief update on my continuing need for information about how to shut down SOMETHING! (An interface? a port? a routine/service?)
Well... By removing the battery to completely reset the BIOS, I was able to restore PC's functioning. (Anyone want to suggest how resetting the BIOS in this way could restore CD-ROM function? Thought not.)
Isn't anyone here able to point me to useful "man" items?
Now, if you are suspecting something is being done via electromagnetic radiation, aka wireless, radio etc., then all you need to do is set up some shielding.
I set up an x-ray room for a vet clinic once. They got rolls of lead that I nailed to three of the four walls in the room. (an outside wall doesn't require shielding) It is expensive, probably prohibitively so in order to do your entire room.
So perhaps you could make a shield that only encompasses the computer. A lead box big enough to contain the entire machine, keyboard, monitor and all, would still have an opening for you to access it. But unless "they" are in a direct line of sight directing a beam at that opening, this would totally block "them" out.
Think of it as a miniature "lead room," with one door, which you can change orientations every so often so "they" in fact cannot set up shop somewhere with a beam.
BTW if you also wore a lead coverall like the x-ray technicians have, your body would then probably effectively shut that opening off entirely as you sat at your computer.
Google up "lead sheeting," it comes in rolls of various thickness. I had to use the real thick stuff, you could use the thinest available for your project.
You might also want to et a periodic brain scan to check for tumors. Most directed radiation of VHF and above does cause them. Wrapping your head in foil does help, despite the rap this practice generally gets.