Jeff Danziger: You Gotta Know When to Hold 'em, Know When to Fold 'em...
The Labor Department's Inspector General said Monday that the federal agency responsible for ensuring the safety of the nation's coal miners was "negligent" in protecting the workers at the Crandall Canyon mine in Utah, the Salt Lake Tribune reports:
The Mine Safety and Health Agency also could not ensure that its approval of the mining plan at the Utah mine was free of undue influence by the mine's operator, Murray Energy, the Inspector General says in a report issued Monday.
MSHA responded to the report that the word "negligent" was misleading and expressed concern that the independent investigating arm of the Labor Department was implying its decisions were affected by undue influence.But the Inspector General says its findings "remain unchanged."
The report found that:
MSHA was negligent in carrying out its responsibilities to protect the safety of miners. Specifically, MSHA could not show that it made the right decision in approving the Crandall Canyon Mine roof control plan or that the process was free from undue influence by the mine operator. MSHA did not have a rigorous, transparent review and approval process for roof control plans consisting of explicit criteria and plan evaluation factors, appropriate documentation, and active oversight and supervision by Headquarters and District 9 management. Further, MSHA did not ensure that subsequent inspections assessed compliance with, and the effectiveness of, approved plans in continuing to protect miners. MSHA and mine operator officials worked together to develop rescue plans related to the August 2007 tragedy, with MSHA exercising final approval authority over all activities. MSHA, however, lacked guidance on appropriate non-rescue activities.
United Mine Workers of America President Cecil Roberts released a statement saying:
We've argued for years that many at the upper levels of MSHA are more interested in helping mine operators increase production than they are in helping miners stay safe. The Kennedy report and the OIG report both blow the lid off the internal workings of the agency, exposing for all to see what actually happens and confirming what we've said.
I always want to find an easy way to do an internet sharing between my two laptops. Well I figure out a way, which is really stupid! but well, for some extend, it works. I know there should be a proper ways to do that, but with the limited knowledge of networking, this is only what I can come out for the moment.
If you are a super linux admin user and reading this, try not to think in the perspective of admins, but try to put yourself as a layman, as I doesn’t know much about hard core network stuff, but I know ifconfig and ssh, which is some how efficient to make a “fake” internet sharing works.
Okay! lets look at the scenario I have. I have a new laptop (L1) that have wireless capabilities as well as wired installed with fedora 8. And another old laptop (L2) which only have LAN port installed with kubuntu. Obviously I want to share my internet connection from L1 to L2, well is a bit easy for me, because both of them are running linux.
I use wlassistant to connect myself to wireless LAN because fedora 8 Network Manager is so “intelligently” switch to wired when i plug in my LAN cable. After L1 is hook up to the internet wirelessly, i setup my eth0 with root privilege.
ifconfig eth0 192.168.1.1 netmask 255.255.255.0 up
Okay L1, is done, lets look at L2, same way i setup my eth0 at L2.
ifconfig eth0 192.168.1.2 netmask 255.255.255.0 up
Connect both LAN ports with LAN cable, and then do ping from L2!
ping 192.168.1.1
Okay! Now let me reveal the stupid but working way using ssh. I do this at L2.
ssh -Y mysurface@192.168.1.1 konqueror
Haha! konqueror start up and now you can surf the net from L2!
Eh! wait what is -Y option of ssh? and Why it works?
If you read up the ssh manpage, you will get this line
-Y Enables trusted X11 forwarding.
Yeah, I am loading L1’s browser and run it at L2, you can try to save a files from the internet. It will save it in L1 instead of L2, therefore this is not a real Internet sharing!
Well, I still figuring how to do an internet sharing across the LAN cable.
Do a bridging at L1 between wireless and wired interface? Then do a dynamic tunneling from L2? I tried and it doesn’t seems to be working.
Play some trick in iptables to do ip forwarding? emm may be I should try this out.
Dear Admin, do you have any suggestion?
Related PostsScientists are excited about a unique opportunity to study human anthropomorphism in action (i.e. the human tendency to personify the ‘darnest’ objects). Next to the discovery of the “crazy cat syndrome”, this revelation could rock the scientific world as we know it… or not. Just extra gossip to throw around the water cooler.
The event in question is the joint effort of a whole community to provide woolen warmth to an unassuming pear tree. That’s right! Residents somewhere in Ohio decided to do their bit for those suffering out there in the cold winter’s night and so knitted bits of yarn to make a tree-sweater… for a tree.
Cynics have quipped that, although the sturdy fellow has withstood harsh elements, test of time and numerous itchy squirrel bites, the clickety click of knitting needles weaving sweater bits for it just might be its undoing.
Tree-huggers are in two minds about this; sure, they’re kicking themselves for not coming up with this in the first place but some of the more steadfast followers are thinking of anti-sheep shearing slogans.
Does your ISP block outgoing SMTP port 25? Your mail hosting provider is giving you an alternative to relay email using a different port 2525 at their mail server and their mail server supports SMTP authentication. You may follow the simple Sendmail setup below: -
1. Find “DS” in /etc/mail/sendmail.cf and add your mail server name as below: -
DSmail.example.com
2. Find “Mrelay” in /etc/mail/sendmail.cf and add “2525″ to “A=TCP $h” as below: -
A=TCP $h 2525
3. Add the following line below in /etc/mail/access file in one line: -
AuthInfo:mail.example.com "U:user@example.com" "I:user@example.com" "P:password" "R:example.com" "M:LOGIN PLAIN"
4. Then, restart your Sendmail service as below: -
service sendmail restart
4. Finally, you can monitor your maillog using the command below: -
tail -f /var/log/maillog
If you found these helpful, please contribute to help: