Berkeley CSUA MOTD:1999:November:02 Tuesday <Monday, Wednesday>
Berkeley CSUA MOTD
1999/11/2-4 [Computer/HW/Drives] UID:16805 Activity:low
11/1    Anyone got a spare ATAPI CDROM (any speed) drive, and a floppy?
        \_ what's the diff between IDE and ATAPI?
           \_ For practical purposes: zero.  The anal will soon followup
              with a difference response.
              with a different response.
              \_ So I'm anal:  EIDE is a bus interface and protocol,
                 ATAPI is subset of EIDE which standard CD drives use.
                 The Linux kernel likes ATAPI drives:  non-ATAPI ones
                 are a pain.  --PeterM
1999/11/2 [Politics/Domestic/Gay, Reference/Law/Court] UID:16806 Activity:nil
11/1    How come the judge in the Wyoming gay bashing trial can bar the
        "gay panic" defense?  Shouldn't the jury be the ones to decide
        whether certain defenses in a court trial are valid or not?
1999/11/2-3 [Computer/SW/OS/FreeBSD] UID:16807 Activity:nil
11/2    Chembook.  Thinking of buying one.  Anyone used them, or had probs
        putting linux/bsd on one?  Chembook 8200. - paolo
1999/11/2-3 [Computer/Networking] UID:16808 Activity:kinda low
11/1    Okay, so I have DHCP set up so that everyone on the LAN can telnet
        out through the proxy.  Is there an easy way to set things up such
        that people can telnet into LAN machines (which normally have
        192.168.x.x addresses)?  I imagine you tell the proxy that port x
        maps to the telnet port of machine, and so on.  Can
        WinRoute do this?
        \_ Why would you ever give telnet access to a Windows machine.
           There's no user level security.  You pretty much log in with
           sysadmin privledges.
           \_ Not to mention snooping, etc.
        \_ DHCP has nothing to do with anything.  Winroute can map ports, yes.
1999/11/2 [Computer/SW/OS/Windows, Computer/SW/Unix] UID:16809 Activity:moderate
11/1    Just heard of Phat Linux [<DEAD>]<DEAD> from a non-techie
        friend, read up on it, and the whole idea seems pretty damn
        ridiculuous. Anyone have any experience? For one thing, do they
        actually emulate *nixish file permissions on FAT partitions?
        \_ Why should they emulate anything?  It's all just bits on disk,
           who cares where they store them?
        \_ Emulating Unix file permissions on top of FAT is an old concept.
           It's been available on Linux for some years; I recall that it
           was an _install option_ (UMSDOS) in the first version of Slackware
           I tried.  There are various caveats about diminished performance
           and so forth.  You can store a real Unix filesystem as a file
           within a DOS filesystem (mounted through the loopback interface)
           if you so desire -- thus avoiding repartitioning and still giving
           you a full-fledged Unix fs.  This also has performance problems,
           and requires you to mount the DOS fs normally first, which would
           require the use of an initial ramdisk if you wanted to use it as
           a root fs for Linux.  In general, a Linux install on top of a
           Windows system without repartitioning (and sometimes without
           the need to reboot for the install process) is a growing trend,
           because it's "kinder, gentler" to Windows users.  -- schoen
           \_ If you read the URL, you'd see they're not doing UMSDOS or
              screwing around with loopbacks or single files.  They are using
              the FAT filesystem as is without the UMSDOS shenannigans.  This
              is a bit more impressive than the silly UMSDOS method and also
              easier and less scary for the low tech folks who simply want to
              try out a semi-real OS.  Performance isn't an issue since any
              *nix will outperform their win98 crap on the same hardware.  They
              don't know the performance could be even higher and that isn't
        \_ it wouldn't take too much to implement writeable rockridge
           extensions.  the "rockridge" extensions are what give you unix
           permissions on a CDROM disk for example with extra hidden files
           that contain the unix filesystem meta-data.  the dos-style
           filnames act kind of like inodes.
1999/11/2 [Uncategorized] UID:16810 Activity:nil
11/1    Catch some lesbian action on Alley McBeal!!!
        \_ Yawn.  Ratings must be dropping.  Quick, add some BS lesbianism to
           stir up controversy and try to increase ratings among men.  This is
           such incredibly tame bullshit.  When some show has chicks making
           out hardcore on a regular basis and not just as a one shot ratings
           gimmick, let us know, it might not be entirely boring, only mostly.
           The only lesbian action worth a dime is the real thing with you
        \_ i liked the biscuit and sausage part
1999/11/2 [Computer/SW/Security, Computer/SW/OS/OsX] UID:16811 Activity:insanely high
11/1    How secure is the www Java ssh terminal? Can't someone still
        intercept packets going through your browser?
        \_ The real answer you're looking for is "No, not really".  Don't
           forget, the Java doesn't run on the site you got it from, it's
           like a downloaded program and is run _locally_ in your browser.
           The outgoing traffic is encrypted by the ssh code.  _However_,
           if someone really had it in for you, they could intercept the
           ssh java code as you downloaded it the first time you went to
           that URL and replace it with compromised java code.  --dbushong
                \_ or attach a debugger or read your process data via /proc...
        \_ yes, if they have root access to your machine, kill -SEGV your
           client and analyze the core file.  But that's true for any
           ssh client (not just the java version).
           \_ if you're going to be that way about it, all they have
              to do is intercept data going to/from your tty, and you'd
              never know.
                \_ I don't have a tty.
                \_ or attach a debugger or read your process data via /proc or
                   just secretly replace the ssh binary or hack the socket
                   system calls to log or . . . Short answer:  You must trust
                   root, because they can do anything they want to you.
                   \_ I don't trust root.  I only use a Macintosh because it
                      has the best security.  You never hear about Mac servers
                      getting broken into.
                      \_ That's because you never hear about Mac servers.
                         \_ What do you think Apple is running?  Mac rulez,
                            unix dr00lez@!
                            \_ soda [12] telnet http
                            Connected to
                            Escape character is '^]'.
                            HEAD / HTTP/1.0

                            HTTP/1.1 500 Server Error
                            Server: Netscape-Enterprise/3.6 SP3
                            Date: Tue, 02 Nov 1999 22:21:38 GMT
                            Content-length: 305
                            Content-type: text/html
                            Connection: close

                            Connection closed by foreign host.

                            Apple is runnig MacOS?
                            \_ Netscape for Macintosh, dummy!  You dr00le!!!1
                               \_ There isn't an Enterprise for Mac.  Look
                                  at their web site.
1999/11/2-4 [Computer/SW/Unix, Computer/SW/Unix/WindowManager] UID:16812 Activity:kinda low
11/1    Does Redhat not allow for .login and .cshrc files in the user
        directory to be executed automagically?
        \_ No it works fine if you use it properly.  (Are you sure your
           shell is csh or tcsh?  Are they owned by the user?)
           \_ It works fine from a virtual console, but for some reason when
              you log in at runlevel 5 your .login isn't sourced.  Not sure if
              this is from gdm, gnome, or what.  If you find out let me know;
              I got bored looking for the answer. --mogul
              \_ When you login in at runlevel 5 it runs your .profile or
                 your autoexec or some such file depending on your window
                 manager.  You can call your .login from there.  Also when
                 you start a xterm by clicking on an icon your window
                 manager is probably not starting the xterm with the right
                 options.  If you want the xterm to be a "login shell"
                 and source .login you need to do xterm -ls or xterm +ls
                 (I don't remember which). Hope that helps. --emin
              \_ Solaris 7/CDE is good about this because it does source
                 the .login when you login; and xterms that you create
                 don't re-source the .login but do inherit env vars.
                 Why Linux/KDE doesn't do it automagically I'm wondering also.
                 \_ You know why.
                    \_ yes, i do
                        \_ Then let's leave it at that before the fanatics
                           'get it' and go balistic and wipe the motd or
1999/11/2-4 [Computer/SW/Unix] UID:16813 Activity:low
11/2    How often does xntpd on soda sync the system clock with the server?
        I'm trying to sync my clock with soda's clock, and I want to see at
        what time soda's clock is supposed to be most accurate.  Thx.  -- yuen
        \_ Soda's clock has been inaccurate recently, and xntpd has not been
           very successful at keeping it in sync.  If you want to synchronize
           your clock with something, use <DEAD><DEAD>.  If you just want
           to see the correct time, run "nc ntp1 daytime".
        \_ you are implying that there is some kind of saw-tooth divergence
           in the clocks.  w/ xntpd the clock drift is a converging process,
           and the most accurate clock value is not necessarily right after
           a single sample.
1999/11/2-4 [Uncategorized] UID:16814 Activity:nil
11/2    Has anyone bought from <DEAD><DEAD> They
        have a fantastic price on a receiver I want but I have a
        hard time taking them seriously.
        \_ Use Citibank or another credit card that has online fraud
           protection. If you get something that is misrepresented or just
           plain shoddy, they'll usually take care of things for you.
        \_ Sounds hoaky to me. The sound on the site almost blew out my
1999/11/2-4 [Uncategorized] UID:16815 Activity:moderate
11/2    Does anyone have any pics of a "hi mid tom".  I just want to see
        what kind of musical instrument it is.  Searching in Yahoo only
        refers me to MIDI sites.  Thx.
        \_ It's a drum.  Someone who knows more about drums/drum sets
           than I do would be able to get more specific.
        \_ Probably between 10 and 12" diameter.  A drum (without a
           snare) usually with heads on both size (for better, if
           quieter tone).  What else do you want to know?  Should I
           scan in a picture of one?  -dpetrou
           \_ Yes please, if that's easy.  Thanks a lot!
              \_ Sorry, it's not easy.  I was joking.  -dpetrou
                 \_ i can't believe there isn't <DEAD><DEAD>
        \_ isn't a "tom tom" one of those big drums that you hit with big
           sticks that have fuzzy things wrapped on the end like q-tips?
           One of the three blue drums along the top.
           \_ Cool!  Thanks a lot!
        \_ It's a white box, about 3"x2.5"x1", with a button and a speaker.
           Press the button, and it says "SHUT THE FUCK UP, CMLEE".  The
           "hi mid" version says it in a high, squeaky voice.  The "lo"
           tom uses a deep bass croak, while the "normal" version sounds
           just like tom.  Hope this helps.
           \_ that was incredibly unfunny, twink.
                \_ I laughed.  I must be a twink, too.  -twink
1999/11/2-4 [Computer/HW/Drives] UID:16816 Activity:high
11/2    Thinking about getting a CD writer. Is it necessary to get a read
        only CD player and a writer, or can I just use one CD writer w/
        a lot of HD space?
        \_ You can get away with one CD player. However, if you ever wanna
           make CD-to-CD copies, having a CD-ROM and a CD-R makes it a lot
           simplier. of course, you can still do it with just a CD-R, but
           it's more time-consuming.
        \_ I never do it CD-to-CD, because the reader is IDE.  It doesn't
           "sound" like a bad idea to buy just a SCSI writer.
           \_ My sister's computer has an IDE DVD drive and a SCSI writer,
              and CD-to-CD works just fine.
        \_ Just use the one CD writer. Unless youre pirating software or
           something and need a huge throughput, making CD-to-CD copies
           at 4x write speed is probably only going to save you about 20
           minutes (depending on file size). Just make a disk image and
           burn it to a new CD. Hell, you can change CD's between Friends
           and Frasier.
           \_ 20 minutes?  Do the math.
        \_ Another question-- can I burn my CD 1/2 way, wait till I get the
           other half then finish burning later?
           \_No. That's a good way of getting coasters. (At least with
           conventional software).
           \_Yes. Most are quite capable of multisession writes.  You lose
           20 megs for each extra session.  Works fine without penalty for
           audio as well.
              \_ not if you plan on playing the audio CD in a regular CD player.
                 It works for computer CDROM drives, but in car or home cd
                 player, will only play tracks in the first session..
                \_And this assumes that you aren't burning an image of a CD vs.
                just data, i.e. if you want to burn a cue image of a cd you
                can't simply interrupt a burn 1/2 way and resume it later.
                 \_ if you leave the session open, you can listen to the CD
                    on your burner and add tracks later. Later, when you close
                    the session, you can listen to the tracks in your car...
1999/11/2-3 [Computer/Networking] UID:16817 Activity:nil
11/2    Does anyone have recommendations for home wireless?  Specifically
        we're going to put DSL in our place but we'd like to share the net
        connection with the kids over wireless instead of running UTP cable
        everywhere.  Specifically we're looking at a WebGear Aviator2.4 bundle.
2019/01/23 [General] UID:1000 Activity:popular
Berkeley CSUA MOTD:1999:November:02 Tuesday <Monday, Wednesday>