Printer/scanner suggestions.

Cody churst35 at
Fri Oct 5 15:22:07 EDT 2007

I use the Cannon LIDE35 flat bed scanner and works right out of the box with 
xsane. didn't have to do a thing.
----- Original Message ----- 
From: "Gaijin" <gaijin at>
To: "Speakup is a screen review system for Linux." <speakup at>
Sent: Friday, October 05, 2007 1:33 PM
Subject: OT: Printer/scanner suggestions.

> "Doug Sutherland" <doug&proficio,ca> speculated:
> > It should not be possible for files to be inaccessible by root.
> > It is possible that you now have a rootkit installed.
>     Yeah, definitely a root-kit with filenames like "input.history" and
> "".  chattr didn't work.  I think most of the commands
> have been compromised.  The little bastage didn't re-write the ls
> command very well, though.  The files appear if you do an 'ls -a .*' to
> display just the dot-files.  Then a few dot and non-dot-files
> normal and root users.  It's a pretty neat hackk.  I really
> only had sendmail and fetchmail semi-configured, and a bunch of
> symlinks to docs and HOWTO's.  Oh, and commenting out half of
> rc.profile. <grins>  I'm not losing very much.
> > > Don't leave ports open!
> > Don't run services that you don't need.
> > Create some detterants so they go somewhere else instead.
>     Had all that, except for the deterants.  The firewall's closed, and
> I'm only running sendmail.  I have other services installed but
> disabled, as they're not even configured yet.  I was planning on
> activating the whole shebang with a runlevel change.  It's barely above
> runlevel 1 at present.  It's really no big deal.  Helps me learn the
> system.
>     I was wondering though.  Do you know if it's possible to require
> that both the executable and indestructible bits be set so a program
> can run?  I was thinking of password protecting the chattr command, or
> re-writing it so that it could only be executed from localhost, and
> locking everything down.  You'd have a catch-22 scenario, if you
> removed one of the bits from chattr, though.  You couldn't change any
> binaries or libraries remotely without access to chattr, nor upload
> anything that can be made executable without chattr. <grins>  I guess
> admins who need full remote access won't like it, though.  Nor would
> anyone using a package manager, or needing to do any programming.  I
> guess there would have to be some kind of security toggle that only a
> working chattr could disable.
>     Myself, I'd prefer laughing my hairy butt off at some jerk trying
> to upload a virus or root-kit that he can't even run.
>         Michael
> _______________________________________________
> Speakup mailing list
> Speakup at
> -- 
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.5.488 / Virus Database: 269.14.1/1050 - Release Date: 10/4/2007 
> 5:03 PM

More information about the Speakup mailing list