<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040068#M6000</link>
    <description>Without the last bit (the 'restart' bit).&lt;BR /&gt;&lt;BR /&gt;After changing rules, if you want to make them permenant, then you'll want to issue 'service itpables save', but no need to 'restart' (unless you want to reset your rules back to the last 'sane' state).</description>
    <pubDate>Mon, 11 Aug 2003 00:10:19 GMT</pubDate>
    <dc:creator>Stuart Browne</dc:creator>
    <dc:date>2003-08-11T00:10:19Z</dc:date>
    <item>
      <title>Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040058#M5990</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I am fairly new to linux...but I can move around within the system.&lt;BR /&gt;&lt;BR /&gt;I have been volunteered to document a redhat 7.2 box.Which was setup by a now defunct outside vendor.&lt;BR /&gt;This is a non paid position...and i would like to take advantage of it and enhance my skills.&lt;BR /&gt;I am trying to form the right questions so i can research on my own.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;redhat 7.2&lt;BR /&gt;the box is being used for email (sendmail)and the internet.&lt;BR /&gt;&lt;BR /&gt;There is a livingston portmaster firewall connected to it.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1.I don't see squid on the box at all.&lt;BR /&gt;2.how would i find out where users have been surfing and block those addresses.&lt;BR /&gt;3. i was using cat on a (data) file and the screen had sqiggly lines all over it. What happened??&lt;BR /&gt;4.where should i look for the configuration of the box.(what 's installed etc.)&lt;BR /&gt;5.can rehat also participate in firewalling or would it fall to the livingston. how can i tell&lt;BR /&gt;6. I know i am not supposed to but can i telnet into this box from windows?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance. I really would appreciate being pointed in the right direction.&lt;BR /&gt;</description>
      <pubDate>Sun, 03 Aug 2003 16:43:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040058#M5990</guid>
      <dc:creator>manny_9</dc:creator>
      <dc:date>2003-08-03T16:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040059#M5991</link>
      <description>Answers&lt;BR /&gt;&lt;BR /&gt;1.I don't see squid on the box at all.&lt;BR /&gt;2.how would i find out where users have been surfing and block those addresses.&lt;BR /&gt;&lt;BR /&gt;squid is not the only way to give the users web access.  They could be using the iptables firewall with a NAT(Natural Address Translation) to provide the web to users.  In this case the addresses are not logged.  To check:&lt;BR /&gt;&lt;BR /&gt;as root user&lt;BR /&gt;&lt;BR /&gt;service iptables restart&lt;BR /&gt;If you see a start and stop message then they are running it.  Look at the following file:&lt;BR /&gt;/etc/sysconfig/iptables&lt;BR /&gt;&lt;BR /&gt;Look for a  line like this:&lt;BR /&gt;# Generated by iptables-save v1.2.5 on Sun Apr 27 03:12:07 2003&lt;BR /&gt;*nat&lt;BR /&gt;-A POSTROUTING -o eth0 -j SNAT --to-source 66.92.147.104&lt;BR /&gt;&lt;BR /&gt;IP address is changed to protect my infrastructure.&lt;BR /&gt;&lt;BR /&gt;This is an indication the Linux box is providing Internet services to the rest of the network.&lt;BR /&gt;&lt;BR /&gt;This can also be done with the obsolete ipchains  &lt;BR /&gt;&lt;BR /&gt;service ipchains restart to see if it was running.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;3. i was using cat on a (data) file and the screen had sqiggly lines all over it. What happened??&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You may be cat ing a file that is binary&lt;BR /&gt;&lt;BR /&gt;file &lt;FILENAME&gt; if its binary try the strings command on it.&lt;BR /&gt;4.where should i look for the configuration of the box.(what 's installed etc.)&lt;BR /&gt;&lt;BR /&gt;Most of the configuration is in /etc/sysconfig&lt;BR /&gt;&lt;BR /&gt;There are subfolders there.&lt;BR /&gt;&lt;BR /&gt;Take a look at these directories:&lt;BR /&gt;/etc/rc1.d&lt;BR /&gt;/etc/rc2.d&lt;BR /&gt;/etc/rc3.d&lt;BR /&gt;/etc/rc4.d&lt;BR /&gt;/etc/rc5.d&lt;BR /&gt;&lt;BR /&gt;To see what is fired up at startup.&lt;BR /&gt;&lt;BR /&gt;The rmp -q command will show you what is installed on the box.  This is also possible from the GUI if the machine is configured for X-Windows which is probably console only.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;5.can rehat also participate in firewalling or would it fall to the livingston. how can i tell&lt;BR /&gt;&lt;BR /&gt;See my answer to questions 1 and 2.  I don't know livingson, but if its a mail program it does not necessarily do firewalling.  ipchains and iptables are open source firewalls and pretty darned good ones at that.&lt;BR /&gt;&lt;BR /&gt;6. I know i am not supposed to but can i telnet into this box from windows? &lt;BR /&gt;&lt;BR /&gt;this depeneds on the boxes firewall and internet setup.  try telnet &lt;HOSTNAME&gt; or telnet &lt;IP_ADDRESS&gt; from a windows box and find out.&lt;BR /&gt;&lt;BR /&gt;Out of the Box Linux 7.2 does not allow direct root telnet login, you'll have to try a regular user.&lt;BR /&gt;&lt;BR /&gt;Cone you are on the box, you can su - root if you have the root password.&lt;BR /&gt;&lt;BR /&gt;To check the configuration, look at these areas&lt;BR /&gt;&lt;BR /&gt;/etc/xinetd.d/&lt;BR /&gt;&lt;BR /&gt;telentd file  is diable yes or no.  If its yes telnet is diabled.&lt;BR /&gt;&lt;BR /&gt;If this post was helpful, please assign points. If it solved your issue or was of significant value, please assign accordingly.&lt;BR /&gt;&lt;BR /&gt;If you require more in depth help, contact me directly.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.isnamerica.com" target="_blank"&gt;http://www.isnamerica.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP&lt;/IP_ADDRESS&gt;&lt;/HOSTNAME&gt;&lt;/FILENAME&gt;</description>
      <pubDate>Sun, 03 Aug 2003 17:39:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040059#M5991</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-03T17:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040060#M5992</link>
      <description>1. the question being ? :)&lt;BR /&gt;There are a lot of ways to allow web access without squid. One might use another program for proxy; or might use routable addresses, in which case the redhat box might only be just a router; or use NAT, as Steven has said. However, masqarading rules are not always started with 'service iptables start' , so the correct check is to use 'iptables -L -t nat'. If you see something like  &lt;BR /&gt;SNAT all  --  localnet  anywhere to: &lt;SOME routable="" ip=""&gt;&lt;BR /&gt;you can bet on masquarading&lt;BR /&gt;I for one never use the default RH system, I have my own scripts.&lt;BR /&gt;&lt;BR /&gt;2. There are several ways to monitor network activity. Which one to use depends on what does the box do and on your skills. You might wish to use some form of traffic sniffer (dnisff, ettereal, ethereal ot other). Or you could use the good ol' tcpdump. Or if you are using NAT and just want a connection list, you can either cat /proc/net/ip_conntrack, or (my all time favourite) use the program called netstat-nat (&lt;A href="http://tweegy.demon.nl/projects/netstat-nat/)" target="_blank"&gt;http://tweegy.demon.nl/projects/netstat-nat/)&lt;/A&gt;&lt;BR /&gt;For blocking purposes, iptables is your best friend.&lt;BR /&gt;&lt;BR /&gt;3. You cat-ed a binary file. Use the command 'reset' to restore the terminal to normal settings.&lt;BR /&gt;&lt;BR /&gt;4. In all linux-es configuration data is normally stored under /etc and [eventually] under /usr/local/[something] (mainly for locally compiled applications). &lt;BR /&gt;To see what applications / services are automatically started, the simplest way is first find what runlevel you are into (the command is ... runlevel); then with either chkconfig (chkconfig --list) or with ntsysv you can list the services launched at boot. The more laborious way is to list the symbolic links whose name start with S from &lt;BR /&gt;/etc/rc&lt;RUNLEVEL&gt;.d&lt;BR /&gt;&lt;BR /&gt;5. yes it can, assuming all trafic is passing through it. iptables is better the cisco PIX from many point of vues. &lt;BR /&gt;&lt;BR /&gt;6. By default, no modern linux distribution will allow you to telnet into. Telnet has been replaced by the more secure "ssh" (secure shell). You should forget about telnet: install (or update!) sshd if you have not already done so and then connect from windows using a SSH client, such as putty (&lt;A href="http://google.com" target="_blank"&gt;http://google.com&lt;/A&gt; -&amp;gt; search for "putty.exe download" -&amp;gt; I feel lucky). If you must use telnet, then install the package called telnet-server and then use "service telnet start" to start it. Bear in mind that all forms of root access from other sources then console (except using ssh ...) are disabled by default. Therefore you must login as a normal user and then switch user (su - ) to become root. If you do not like putty, you can use cygwin+ssh.&lt;/RUNLEVEL&gt;&lt;/SOME&gt;</description>
      <pubDate>Mon, 04 Aug 2003 12:30:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040060#M5992</guid>
      <dc:creator>Manuel Wolfshant</dc:creator>
      <dc:date>2003-08-04T12:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040061#M5993</link>
      <description>Thanks very much to both of you .I actually think I learned something today !&lt;BR /&gt;&lt;BR /&gt;I was cat-ing a file (I panicked)&lt;BR /&gt;&lt;BR /&gt;Here is what I found&lt;BR /&gt;ip_allow / relay_allow&lt;BR /&gt;followed by some I.P's. self explanatory I think&lt;BR /&gt;&lt;BR /&gt;IPTABLES I did iptables -l&lt;BR /&gt;This is what i got....&lt;BR /&gt;&lt;BR /&gt;Chain INPUT (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;&lt;BR /&gt;Chain FORWARD (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;ACCEPT     all  --  10.0.0.0/8           anywhere           &lt;BR /&gt;ACCEPT     all  --  192.0.0.0/8          anywhere           &lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Now my big question for the day!!!&lt;BR /&gt;&lt;BR /&gt;If I wanted to block users from accessing games.yahoo.com (66.218.72.118) where and how do i do it.&lt;BR /&gt;&lt;BR /&gt;Do I add a line to iptables :  &lt;BR /&gt;-A FORWARDING -d 66.218.72.118 -j REJECT &lt;BR /&gt;&lt;BR /&gt;What is the hosts file used for ???&lt;BR /&gt;&lt;BR /&gt;I am not sure of the correct syntax. I have tried to research, but only seemed to confuse myself more.&lt;BR /&gt;&lt;BR /&gt;I want to be able to restrict users from accessing certain sites.&lt;BR /&gt;&lt;BR /&gt;Hey thanks once again to both of you!!!</description>
      <pubDate>Tue, 05 Aug 2003 01:33:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040061#M5993</guid>
      <dc:creator>manny_9</dc:creator>
      <dc:date>2003-08-05T01:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040062#M5994</link>
      <description>anyone???</description>
      <pubDate>Wed, 06 Aug 2003 01:35:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040062#M5994</guid>
      <dc:creator>manny_9</dc:creator>
      <dc:date>2003-08-06T01:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040063#M5995</link>
      <description>To restrict access to given sites, there are multiple ways.&lt;BR /&gt;&lt;BR /&gt;If it is just web traffic, and you are using squid, you can use the ACL (Access Control Lists).&lt;BR /&gt;&lt;BR /&gt;These are very simple, and are described in depth in the squid documentation (online at &lt;A href="http://www.squid-cache.org)." target="_blank"&gt;http://www.squid-cache.org).&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you don't want them to have any access at all, then yes, the rule you listed (iptables -I FORWARD -j DENY -d &lt;BAD-SERVER&gt;) would be sufficient.&lt;BR /&gt;&lt;BR /&gt;Remember that IP Tables flow downwards.  If a rule higher up accepts a given packet, it's accepted.  Using '-I' instead of '-A' forces the rule into the start of the chain, and thus get checked first.&lt;BR /&gt;&lt;BR /&gt;You might want to look at the introductory howto's at the &lt;A href="http://www.netfilter.org" target="_blank"&gt;http://www.netfilter.org&lt;/A&gt; site.&lt;/BAD-SERVER&gt;</description>
      <pubDate>Wed, 06 Aug 2003 02:49:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040063#M5995</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2003-08-06T02:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040064#M5996</link>
      <description>Thanks to everyone gor their help!!!&lt;BR /&gt;&lt;BR /&gt;I have been unsuccessful!!!&lt;BR /&gt;&lt;BR /&gt;1. Is this the correct way to edit iptables to block users from accessing a specific site.&lt;BR /&gt;&lt;BR /&gt;vi iptables edit and save???&lt;BR /&gt;&lt;BR /&gt;IPTABLES&lt;BR /&gt;Chain INPUT (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;&lt;BR /&gt;Chain FORWARD (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;ACCEPT     all  --  x.0.0.0/8           anywhere           &lt;BR /&gt;ACCEPT     all  --  xxx.0.0.0/8          anywhere           &lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination &lt;BR /&gt;        &lt;BR /&gt;-A FORWARDING -d 66.218.72.118 -j REJECT &lt;BR /&gt;&lt;BR /&gt;2. what is this hosts file used for??&lt;BR /&gt;&lt;BR /&gt;Thank you!!!!!!!!!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 10 Aug 2003 20:59:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040064#M5996</guid>
      <dc:creator>manny_9</dc:creator>
      <dc:date>2003-08-10T20:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040065#M5997</link>
      <description>/etc/hosts&lt;BR /&gt;&lt;BR /&gt;Is uses for local, file based networking.&lt;BR /&gt;&lt;BR /&gt;You can set up quite a nice little network internally without having to play with or connect to dns servers.&lt;BR /&gt;&lt;BR /&gt;Here is my interal file with the ip addresses changed to protect the innocent.&lt;BR /&gt;&lt;BR /&gt;# Do not remove the following line, or various programs&lt;BR /&gt;# that require network functionality will fail.&lt;BR /&gt;127.0.0.1       jerusalem       localhost.localdomain   localhost&lt;BR /&gt;66.92.147.194   investmenttool.com &lt;A href="http://www.investmenttool.com" target="_blank"&gt;www.investmenttool.com&lt;/A&gt; jerusalem.investmenttool.com jerusalem dns1.investmenttool.com shell.investmenttool.com ftp.investmenttool.com news.investmenttool.com&lt;BR /&gt;66.92.147.195   isnamerica.com  &lt;A href="http://www.isnamerica.com" target="_blank"&gt;www.isnamerica.com&lt;/A&gt;      isnamerica dns2.investmenttool.com&lt;BR /&gt;192.168.0.41    telaviv.investmenttool.com telaviv&lt;BR /&gt;192.168.0.70    hpweb.investmenttool.com hpweb&lt;BR /&gt;66.92.147.221   telaviv.investmenttool.com telaviv&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Note the 127 adress, for loopback, never mess with that.&lt;BR /&gt;&lt;BR /&gt;Note the general strucutre&lt;BR /&gt;&lt;BR /&gt;number fully qualified domain name alias&lt;BR /&gt;&lt;BR /&gt;You don't need to register domain names to do this kind of networking, you have pretty basic freedome to experiment and learn.&lt;BR /&gt;&lt;BR /&gt;As far as blocking users from particular sites, this is quite possible with iptables, but it can make the load time very long and may impact the performance of your box.&lt;BR /&gt;&lt;BR /&gt;If eth0 is the interface facing the internet here is how I'd do it.&lt;BR /&gt;&lt;BR /&gt;Lets say there's a porn site one of your employees is visiting and its really grossing out your girlfriend who works there and has to pass by.&lt;BR /&gt;&lt;BR /&gt;Lets call it grossporn.com&lt;BR /&gt;(That might be a real site, would not check)&lt;BR /&gt;&lt;BR /&gt;on the Linux box run this command.&lt;BR /&gt;&lt;BR /&gt;dig grossporn.com&lt;BR /&gt;&lt;BR /&gt;This will return an IP address.&lt;BR /&gt;&lt;BR /&gt;Lets say its 24.101.21.100&lt;BR /&gt;&lt;BR /&gt;Add this statement to iptables&lt;BR /&gt;&lt;BR /&gt;-A INPUT -s 24.101.21.100 -i eth0 -j REJECT&lt;BR /&gt;&lt;BR /&gt;That will block that IP address on all ports. You may have to play with that statement to get it to work, but thats the approach. I don't block any sites at my network, my kids use computers in public areas(they don't know how yet) and mommy polices that stuff.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 10 Aug 2003 21:52:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040065#M5997</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-10T21:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040066#M5998</link>
      <description>That REJECT in my previous post maybe should be a DENY&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sun, 10 Aug 2003 22:56:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040066#M5998</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-10T22:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040067#M5999</link>
      <description>Steven,&lt;BR /&gt;&lt;BR /&gt;Thank you for all of your help!!!. I am sure your tired of me by now or at least three questions ago.&lt;BR /&gt;&lt;BR /&gt;I am leery of making changes to this box so i tread carefully.&lt;BR /&gt;&lt;BR /&gt;If it matters at all xinetd is active.&lt;BR /&gt;&lt;BR /&gt;what is the correct way to edit iptables???&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;/sbin/iptables -A FORWARDING -d 66.218.72.118 -j DENY&lt;BR /&gt;&lt;BR /&gt;iptables restart&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 10 Aug 2003 23:44:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040067#M5999</guid>
      <dc:creator>manny_9</dc:creator>
      <dc:date>2003-08-10T23:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040068#M6000</link>
      <description>Without the last bit (the 'restart' bit).&lt;BR /&gt;&lt;BR /&gt;After changing rules, if you want to make them permenant, then you'll want to issue 'service itpables save', but no need to 'restart' (unless you want to reset your rules back to the last 'sane' state).</description>
      <pubDate>Mon, 11 Aug 2003 00:10:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040068#M6000</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2003-08-11T00:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Questions</title>
      <link>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040069#M6001</link>
      <description>thats &lt;BR /&gt;&lt;BR /&gt;service iptables restart&lt;BR /&gt;&lt;BR /&gt;I'm assuming you added the rule to the file&lt;BR /&gt;&lt;BR /&gt;/etc/sysconfig/iptables&lt;BR /&gt;&lt;BR /&gt;I am not tired of you at all, I want to see you succeed.  I'm on the way to Wyoming but will monitor this thread as best I can.&lt;BR /&gt;&lt;BR /&gt;Always make a backup if the iptables file so you can back out any changes you make.&lt;BR /&gt;&lt;BR /&gt;Probably a good idea to make these changes during off hours, versus the middle of the business day.&lt;BR /&gt;&lt;BR /&gt;Thanks for the earlier points.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 11 Aug 2003 00:54:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/questions/m-p/3040069#M6001</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-11T00:54:02Z</dc:date>
    </item>
  </channel>
</rss>

