Berkeley CSUA MOTD:2000:July:28 Friday <Thursday, Saturday>
Berkeley CSUA MOTD
2000/7/28-29 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Unix] UID:18798 Activity:high
7/27    I love GNU indent as a code beautifier.  Is there anything
        better? or perhaps for C++?
        \_ heresy, but what about Visual C++?
           \_ Alt-F8?  It pales compared to GNU indent.
        \_ emacs --batch --exec '(indent-region (point-min) (point-max))' FILE
           \_ Is this better than GNU indent?
              \_ That was only one of the questions.
        \_ Vim = cmd.  use: vim -c "norm 1GvG$" -c wq yourfilehere.cpp
2000/7/28 [Uncategorized] UID:18799 Activity:nil
7/27    Ali Rahimi and his people deserve to DIE DIE DIE!
2000/7/28-29 [Academia/Berkeley/CSUA] UID:18800 Activity:nil 53%like:19604
7/27    Want a good job?  Got clue?  /csua/pub/jobs/ActiveSoftware-developers
2000/7/28 [Academia/Berkeley/CSUA/Troll] UID:18801 Activity:nil
7/27    [ stupid troll about ali deleted ] - mad motd troll deleter
2000/7/28 [Computer/Networking] UID:18802 Activity:high
7/27    Can tcp header information be framgmented across two packets?  So
        that the first packet has the source address and the second has the
        port information?
        \_ You're asking the wrong question.  Why are you worried about tcp
           header fragmentation?  if it's a tcp packet the header can't be
           fragmented by definition of "header" and "packet".  If it's
           a lower level packet than tcp header is just part of the payload.
        \_ Heh.  The IP datagrams constituting the TCP stream each retain
           the original destination and source ports and addresses in
           the IP and TCP headers.
2000/7/28 [Uncategorized] UID:18803 Activity:nil
7/27    Recursive pinhead deleted. Enjoy.
2000/7/28 [Uncategorized] UID:18804 Activity:nil 70%like:19619
7/27    Please to be fixing this, root:
/dev/da0e             1270240  1168624       -3   100%    /var/mail
2000/7/28-29 [Computer/SW/Apps/Media, Recreation/Music] UID:18805 Activity:high
7/28    Why are radio stations allowed to play music?  Stupid question,
        yes, but I'm interested in the royalty situation.  Can anybody
        broadcast music (assuming an fcc license) or are there rules
        regarding quality degradation (say for internet streaming
        \_ planning an internet radio station?
        \_ Not exactly.  But what's to stop me from broadcasting at 192mhz
           and having people copy songs they like?
           \_ I see the point.  But with Napster, you get music on
              demand.  Radio, only certain songs get played.
              And if it gets popular enough, perhaps the record
              industry will come and get you.
    \_ Radio stations keep a record of which songs they play, and submit
        royalties to ascap or bmi for each play.
        \_ explains how to get licenses for broadcasting
                & streaming/webcasting
           & streaming/webcasting  [motd formatting god was here]
                \_ We just need napster.  Screw royalties and property rights.
                   As in Free Beer.
2000/7/28-29 [Uncategorized] UID:18806 Activity:nil
7/28    H0Z3RZ, Please clean up your spool!
        /dev/da0e             1270240  1168624       -3   100%    /var/mail

         8400 ccc       8544 sashew     8576 klee      8592 cmingyip
         8816 gsu       8848 lolly      8864 brianl    9248 skwok
         9376 nhut      9536 brianm     9584 danny     9728 android
         9888 rico      9920 athomas    10064 bray     10240 tchuang
        11072 sophal    11152 sky       11376 lila     12704 jdy
        19120 seljos
2000/7/28-29 [Computer/SW/Security] UID:18807 Activity:high
7/28    That web-based ssh client we have is Phat,K-RAD and 2C00l.  i want to
        implement that on my server so i can access it if at a comp. without
        ssh.  What are the security implications?
        \_ It posts your username/password and session log to
 , but is otherwise pretty safe.
2000/7/28-29 [Computer/SW/Security] UID:18808 Activity:kinda low
7/28    What are the security implications of using a network time server?
        \_ If someone nasty can control your clock precisely it may make it
           easier for them to guess the values that will be generated by
           psuedo-random algorithms seeded with the current time.  If those
           are used to form keys or such, security may be weakened.  However,
           many security protocols, such as Kerberos & NIS+, require computers
           to have relatively close ideas of the current time so that they can
           prevent replay attacks by rejecting packets with far-off timestamps.
2000/7/28-29 [Uncategorized] UID:18809 Activity:kinda low
        Sign the petition to boycott the RIAA!
        \_ Yawn.  Oh?  What's that?  Did you say something?
           \_ Yawn.  Oh?  What's that?  Are you trying to troll?
2019/01/20 [General] UID:1000 Activity:popular
Berkeley CSUA MOTD:2000:July:28 Friday <Thursday, Saturday>