18
People should use development kernels and report bugs if they are found; this is a very useful thing to do if you have a machine you can use as a test machine. Instructions on how to report bugs are detailed in /usr/src/linux/REPORTING-BUGS in the Linux kernel source.
19
Remember, the IP protocol can be carried over many different types of network, and not all network types will support packet sizes as large as Ethernet.
20
Paul can be reached at [email protected].
21
Fight to clear the hacking name! Always use 'cracker' when you are referring to people who are consciously trying to defeat the security of a system, and 'hacker' when you are referring to people who have found a clever way of solving a problem. Hackers can be crackers, but the two should never be confused. Consult the New Hackers Dictionary (popularly found as the Jargon file) for a more complete understanding of the terms.
22
The enhanced parallel port adaptor patch for 2.0 kernel is available from http://www.cyberelk.demon.co.uk/parport.html.
23
NCSA telnet is a popular program for DOS that runs TCP/IP over Ethernet or PLIP, and supports telnet and FTP.
24
Niibe can be reached at [email protected].
25
You can reach Philip at [email protected].
26
David can be reached at [email protected].
27
Note that we are not talking about WinModem(TM) here! WinModems have very simple hardware and rely completely on the main CPU of your computer instead of dedicated hardware to do all of the hard work. If you're purchasing a modem, it is our strongest recommendation to not purchase such a modem; get a real modem. You may find Linux support for WinModems, but that makes them only a marginally more attractive solution.
28
The first number on each subnet is the subnetwork address, and the last number on each subnet is reserved as the broadcast address, so it's actually 62 hosts per subnet.
29
You need the address of an NIS server only if you use Peter Eriksson's NYS. Other NIS implementations locate their servers only at runtime by using ypbind.
30
Note that names in networks must not collide with hostnames from the hosts file, or else some programs may produce strange results.
31
Anyone remember Pink Floyd's 'Echoes'?