|
2008/8/5-10 [Uncategorized] UID:50778 Activity:nil |
8/5 What's the current percentages of Windows v. Linux v. Other on instructional machines. i.e. in labs for undergrad EE/CS. |
2008/8/5-10 [Politics/Domestic/California/Arnold] UID:50779 Activity:nil |
8/4 The Governator wants to increase the sales tax, thanks Republicans, can we impeach this guy now? Why doesn't he just raise the VLA, which he should have never lowered in the first place? http://preview.tinyurl.com/6gespy \_ Uh, the Gov. is barely an R. It's the legislature that can't stop spending, even though revenues are up 40% over the last 4 years. [added later] And no, I'm not excusing the Governor. He's been trying to paper over the deficit instead of solving it for the past several years. |
2008/8/5-10 [Academia/Berkeley/Classes, Computer/Companies/Apple, Computer/Networking] UID:50780 Activity:nil |
8/4 http://iCrowdSurf.com - app available on Iphone app store.. if the library has a wifi you can use it to create instant chat rooms/groups and name the group by topic (ie: CS 152 midterm)..etc check it out.. \_ It's not free. \_ So this essentially turns your phone into an open server? I wonder what the security risks are? \_no..it's just a service that runs on the iPhone.. using a different protocol other than http or even tcp \_ iPhone does have a pretty good app sandbox. (More to keep people from jailbreaking the phones, but still...) \_ no..it's just a service that runs on the iPhone.. using a different protocol other than http or even tcp \_ Um, yes. An open server with a proprietary protocol. That *never* goes wrong. \_ apple tested it out and okayed it.. \_ Bwahahaha! |
2008/8/5-10 [Uncategorized] UID:50781 Activity:nil |
8/5 Anyone have a link to Carmack's 2008 Quakecon keynote? \_ Found it: link:preview.tinyurl.com/5wo3ec [64 MB mp3] |
2008/8/5-10 [Politics/Domestic/Election] UID:50782 Activity:nil |
8/5 I may have to start watching Jon Stewart again. http://tinyurl.com/5zhpfa \_ The "liberal" media goes after whoever is in power. Anyone older than 21 remembers the Clinton years and already knows this. \_ Wait, what??? I thought the liberal media always says nice things about Jewish people \_ Yes, but when the audience has to be prompted to laugh when an Obama joke is made, it gets a bit tiresome. Now that people are able to laugh at Obama as well as McCain I might be able to watch it again. \_ So your problem is with his audience. \_ And the rarity of the Obama jokes. Now that he's figured out an approach that isn't PI, that rarity is probably not an issue any more. \_ I am sure after he is elected President, he will be the subject of non-stop jokes and ridicule. \_ PI? Wait, you think Jon Stewart and the Daily Show are concerned with being Politically Incorrect? Are you fucking retarded? \_ Why yes, yes he is. \_ WRT Obama, they were avoiding hitting him until recently. \_ WRT Obama he's a lot less hit worthy than McCain. McCain is a joke, Obama isn't. \_ Hahahahahaha! \_ Don't worry, humorous attacks on the POTUS will remain a legal expression of 1st Amend. under President Obama. God, I'm so looking forward to January. \_ Obama track record: jack and shit. \_ McCain track record; fuck up and backpedal. \_ Don't forget being one of the Keating 5. \_ It's not track record. McCain is running a pathetic campaign, the kind that just begs to be made fun of. "That's not change we can believe in... [insert pained smile here]" \_ This post is contentless. \_ I enjoy the Colbert Report more. \_ His schtick gets old pretty quick. \_ I never tired of it. \_ I'm sick of the sponsorships. \_ ha |
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil |
8/5 Laptop with names of 33K people in the 'Clear' program stolen. Data was (of course) unencrypted. http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc When are people going to learn to encrypt sensitive data? \_ When encryption becomes transparent enough that noone has to learn, it just works. Seriously, people will keep fucking this kind of thing up until it's the default. this kind of thing up until encryption is the default. \_ Laptop found in the same office where it was thought to have been stolen, and was never turned on during the missing period. (Of course this doesn't change the necessity of encrypting.) |
2008/8/5 [Uncategorized] UID:50784 Activity:high |
8/5 what is 'Critical Theory'? what is 'Post-Modernism'? thanks. |
2008/8/5 [Uncategorized] UID:50785 Activity:high |
8/5 is it Sheee-ite or Sheeeeeeeeeeeeeeee-it? |
2008/8/5 [Uncategorized] UID:50786 Activity:high |
8/5 Is it Ad-Dium or Aye-Dium? Adium chat, is the topic. |
2008/8/5-10 [Computer/HW/Laptop] UID:50787 Activity:nil |
8/5 how is power usage on my laptop if i encrypt everything http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html \_ Steve Gibson's analysis on performance was that Trucrypt on a WinXP laptop was actually faster, but I don't know about battery. laptop was actually faster, but I don't know about battery life. \_faster? How can that be? Also, I don't see that in the article. Can you provide a specific pointer? |
2008/8/5-10 [Computer/Networking] UID:50788 Activity:nil |
8/5 It looks like my company has started blocking HTTPS tunneling. I used to do this by tunneling SSH through the HTTP/HTTPS proxy server, but this seems to have stopped working. Does anyone know how the implementation of tunneling detection works, and whether there are widely available implementations? We run a bunch of MS stuff, so I imagine we're running an MS proxy server or something. It seems to me that the most straightforward tunnel detection method would be to first check if the requested site actually talks HTTPS, and perhaps check whether the SSL cert is valid and all that, optionally rejecting self-signed certs. Has anyone encountered the same block at work and found a way to circumvent it? Thanks. \_ Take a look at stunnel. Thought about using it a while back but then the block got removed. \_ Thanks, that might conceivably work. Will look into it... \_ You can SSH tunnel through any open port so just find one. \_ Amen. Try port 25. \_ There are no open ports. I'm behind a firewall. The only way out that I'm aware of is through the HTTP/HTTPS proxy. Telnet used to be open, but not anymore. \_ Use nmap or ethereal to look for open ports. \- if dns is allowed, there is kind of a crufty way to run ssh over dns, but really if there is a business case for this, you should lobby for what you need. i've circumvented cafes, hotels, WAPs etc and what you need to do depends on doing a bunch of diagnosis to reverse engineer what is going on so you know what your options are. and in some cases, you have to pre-arrange to have some infomation on hand [like ip addresses] or pre-arrage some listening servers of some kind on the outside. those last two things shouldnt be an issue if you commute to and from work everyday and have admin access to an external networked box. BTW, you can do some kind of dynamic porotocol detection to quash this kind of thing. see e.g. http://www.icir.org/robin/papers/usenix06.pdf \_ Yes, I've used IP over DNS before, but it's not really something I'd want to use on a regular basis, for performance and reliability reasons. Thanks for the suggestion, though. \_ Maybe work at a company that doesn't block ports? Do you think subverting your company's IT policy is a good idea? \_ Maybe later. No, but I'm skeptical that any somewhat nerdy person who works at a large company can get by without breaking some IT policy or other. |
2008/8/5-10 [Politics/Domestic/President/Bush, Politics/Foreign/MiddleEast/Iraq] UID:50789 Activity:nil 71%like:50835 |
8/5 Pulitzer prize winning journalist breaks the lid on the illegal techniques the White House used to decieve the nation into supporting the Iraq War: http://news.yahoo.com/s/politico/20080805/pl_politico/12308 \_ Obviously he is making this all up. You anti-semite! \_ No evidence. Let's start an impeachment based on some guy's book! \_ Oh, you have already read it? Where did you get the advance copy? I thought it wasn't in the bookstores until tomorrow. \_ I don't need to read it to know that. Someone else will waste their time, read it, and summarize (like this article you posted). I'll read a 415 page work of art. Not a political article/masturbation session blown up to 415 pages. \_ I'm sure that someone will summarize and say that the claims have veracity and Bush is a criminal. Someone else will summarize and say that the author is full of it. I'm going to go way out on a limb and predict that you'll believe the second guy. -tom \_ The book itself is obviously not evidence. If there is veracity, we can go to the actual source of the veracity. This book is irrelevant. \_ You don't need to read it to know that there is no evidence in it? How do you know that? \_ If he has real evidence, publish it in a paper, not a book for profit. |
3/14 |