Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Yesterday, Mike Bilow gleaned this insight: > It is certainly possible that you managed to block your own outbound ports > using an ipchains rule. I can't think of any obvious way to do this, off > the top of my head, but it is easy to get yourself into situations with > ipchains where things occur unexpectedly. It's actually quite easy: ipchains -A input -d <my ip address> 1:1023 -p TCP -j DENY The request will go out (depending on what other rules you have) but the answer will be dropped. -- PGP/GPG Public key at http://cerberus.ne.mediaone.net/~derek/pubkey.txt ------------------------------------------------------ Derek D. Martin | Unix/Linux Geek derekm at mediaone.net | derek at cerberus.ne.mediaone.net ------------------------------------------------------ - Subcription/unsubscription/info requests: send e-mail with "subscribe", "unsubscribe", or "info" on the first line of the message body to discuss-request at blu.org (Subject line is ignored).
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |