And you'll still be 3.5 years behind the curve. 12.04 is LTS, though, so you'll be ok.I'm moving into 12.04 in about 3 minutes.
And you'll still be 3.5 years behind the curve. 12.04 is LTS, though, so you'll be ok.I'm moving into 12.04 in about 3 minutes.
Things take me 20x longer on Windows.Welcome to the world of Linux, w[h]ere nothing is easy and everything you do takes 10 times longer than before!
What the heck do you think Linux is?It has to be handled by by Internet router or firewall.
So, now I have 15.04. Fast enough for you?And you'll still be 3.5 years behind the curve. 12.04 is LTS, though, so you'll be ok.
I don't even see an option for "subnet broadcasting".If you have your own router, turn off the directed subnet broadcast capability.
I think I'm gonna havto in order to get my printer to work. No drivers in Ubuntu for a Canon 4150 laser printer.Install virtualbox. Then you can run Windows 'as an application'
I don't believe it's impossible. What's the full model number?I think I'm gonna havto in order to get my printer to work. No drivers in Ubuntu for a Canon 4150 laser printer.
That's fine. I'm not home. I'll see if I can find instructions for you later.Canon ImageCLASS MF4150 Laser Multifunction
At least that's what's on the front. Should I look on the back?
Yes. But you did it the long, hard way.So, now I have 15.04. Fast enough for you?
Looks like 15.10 is available...only one update click to get it, right?
It was that instruction that said you can only upgrade by one level at a time. I eventually figured out to just download a disk image of 15.04 and install it.you did it the long, hard way.
It's an operating system.What the heck do you think Linux is?
It is networked operating system with a stateful packet filter built into the kernel. In other words, it is an internet router, and firewall, and just about anything else you could want it to be with respect to networking.It's an operating system.
But I don't. Because you said this:I'm happy you agree
Which is dead wrong.iptables will help but won't protect Linux from smurf attack.
So, how do I get it to the desktop or the "enter .ppd here' box?Try the attached CUPS driver. It might work.
Smurf attacks
A smurf attack (which is named after the program people use to perform the attack), consists of three hosts: The attacker, a middle-man, and the victim.
The intention here is to flood the victim with ICMP packets, clogging up their network bandwidth, or exhausting their bandwidth quota with their ISP. The reason for using a middle-man to do this is so that the attacker cannot be identified as the source of the attack.
What the attacker does is to craft an unending stream of ICMP packets, spoofed to appear as if they had originated from the victim. These packets are sent to the middle-man, who responds to each one by sending an ICMPecho-response packet to the victim. The victim, of course, never asked for these packets,but it has no way to stop the unending flood. Even if he calls the middle-man’s ISP, there is no way for the middle-man to easily stop the flood,except by turning off all ICMP traffic. Even if he examines his packet logs,he cannot find out the IP address of the attacker, because the attacker has spoofed the packet.
There is a defense against the smurf attack: rate limit incoming ICMP packets down to an extremely slow trickle. After all, when ICMP traffic is legitimate, it is very low-bandwidth. If someone pings you to see if you’re alive, usually just a few response packets is all that’s necessary. And for the other types of ICMP response – such as when the router informs your network card about routing issues – again only a few packets are needed, not the huge flood that represents a smurf attack.
Here is how to mount a defense using iptables:
Here we limit ICMP traffic to one packet per second. So, even if someone floods us via smurf, the most packets we’ll ever receive in a day is just over 86,000. If you want even fewer, increase the limit.Code:# Allow most ICMP packets to be received (so people can check our # presence), but restrict the flow to avoid ping flood attacks iptables -A INPUT -p icmp -m icmp --icmp-type address-mask-request -j DROP iptables -A INPUT -p icmp -m icmp --icmp-type timestamp-request -j DROP iptables -A INPUT -p icmp -m icmp -m limit --limit 1/second -j ACCEPT
by Jeff Child
by Duane Benson
by Jake Hertz