Berkeley CSUA MOTD:2008:August:05 Tuesday <Monday, Wednesday>
Berkeley CSUA MOTD
2008/8/5-10 [Uncategorized] UID:50778 Activity:nil
8/5     What's the current percentages of Windows v. Linux v. Other on
        instructional machines. i.e. in labs for undergrad EE/CS.
2008/8/5-10 [Politics/Domestic/California/Arnold] UID:50779 Activity:nil
8/4     The Governator wants to increase the sales tax, thanks Republicans,
        can we impeach this guy now? Why doesn't he just raise the VLA,
        which he should have never lowered in the first place?
        \_ Uh, the Gov. is barely an R.  It's the legislature that can't stop
           spending, even though revenues are up 40% over the last 4 years.
           [added later] And no, I'm not excusing the Governor.  He's been
           trying to paper over the deficit instead of solving it for the past
           several years.
2008/8/5-10 [Academia/Berkeley/Classes, Computer/Companies/Apple, Computer/Networking] UID:50780 Activity:nil
8/4 - app available on Iphone app store..
        if the library has a wifi you can use it to create instant chat
        rooms/groups and name the group by topic (ie: CS 152 midterm)..etc
        check it out..
        \_ It's not free.
        \_ So this essentially turns your phone into an open server?  I wonder
           what the security risks are?
           \'s just a service that runs on the iPhone..
            using a different protocol other than http or even tcp
           \_ iPhone does have a pretty good app sandbox.  (More to keep
              people from jailbreaking the phones, but still...)
           \_'s just a service that runs on the iPhone..  using a
              different protocol other than http or even tcp
              \_ Um, yes.  An open server with a proprietary protocol.  That
                 *never* goes wrong.
                \_ apple tested it out and okayed it..
                   \_ Bwahahaha!
2008/8/5-10 [Uncategorized] UID:50781 Activity:nil
8/5     Anyone have a link to Carmack's 2008 Quakecon keynote?
        \_ Found it:
        [64 MB mp3]
2008/8/5-10 [Politics/Domestic/Election] UID:50782 Activity:nil
8/5     I may have to start watching Jon Stewart again.
        \_ The "liberal" media goes after whoever is in power. Anyone older
           than 21 remembers the Clinton years and already knows this.
           \_ Wait, what??? I thought the liberal media always says
              nice things about Jewish people
           \_ Yes, but when the audience has to be prompted to laugh when an
              Obama joke is made, it gets a bit tiresome.  Now that people are
              able to laugh at Obama as well as McCain I might be able to watch
              it again.
              \_ So your problem is with his audience.
                 \_ And the rarity of the Obama jokes.  Now that he's figured
                    out an approach that isn't PI, that rarity is probably not
                    an issue any more.
                    \_ I am sure after he is elected President, he will be
                       the subject of non-stop jokes and ridicule.
                    \_ PI? Wait, you think Jon Stewart and the Daily Show are
                       concerned with being Politically Incorrect? Are you
                       fucking retarded?
                       \_ Why yes, yes he is.
                       \_ WRT Obama, they were avoiding hitting him until
                          \_ WRT Obama he's a lot less hit worthy than
                             McCain.  McCain is a joke, Obama isn't.
                             \_ Hahahahahaha!
                                \_ Don't worry, humorous attacks on the POTUS
                                   will remain a legal expression of 1st Amend.
                                   under President Obama. God, I'm so looking
                                   forward to January.
                             \_ Obama track record: jack and shit.
                                \_ McCain track record; fuck up and backpedal.
                                 \_ Don't forget being one of the Keating 5.
                                \_ It's not track record.  McCain is running
                                   a pathetic campaign, the kind that just
                                   begs to be made fun of.  "That's not
                                   change we can believe in... [insert
                                   pained smile here]"
                                   \_ This post is contentless.
        \_ I enjoy the Colbert Report more.
           \_ His schtick gets old pretty quick.
              \_ I never tired of it.
               \_ I'm sick of the sponsorships.
                  \_ ha
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
              to learn, it just works.  Seriously, people will keep fucking
              this kind of thing up until it's the default.
              this kind of thing up until encryption is the default.
        \_ Laptop found in the same office where it was thought to have been
           stolen, and was never turned on during the missing period.  (Of
           course this doesn't change the necessity of encrypting.)
2008/8/5 [Uncategorized] UID:50784 Activity:high
8/5     what is 'Critical Theory'?  what is 'Post-Modernism'?  thanks.
2008/8/5 [Uncategorized] UID:50785 Activity:high
8/5     is it Sheee-ite or Sheeeeeeeeeeeeeeee-it?
2008/8/5 [Uncategorized] UID:50786 Activity:high
8/5     Is it Ad-Dium or Aye-Dium? Adium chat, is the topic.
2008/8/5-10 [Computer/HW/Laptop] UID:50787 Activity:nil
8/5     how is power usage on my laptop if i encrypt everything
        \_ Steve Gibson's analysis on performance was that Trucrypt on a WinXP
           laptop was actually faster, but I don't know about battery.
           laptop was actually faster, but I don't know about battery life.
           \_faster?  How can that be?  Also, I don't see that in the article.
             Can you provide a specific pointer?
2008/8/5-10 [Computer/Networking] UID:50788 Activity:nil
8/5     It looks like my company has started blocking HTTPS tunneling.
        I used to do this by tunneling SSH through the HTTP/HTTPS proxy
        server, but this seems to have stopped working. Does anyone know
        how the implementation of tunneling detection works, and whether
        there are widely available implementations? We run a bunch of MS
        stuff, so I imagine we're running an MS proxy server or something.
        It seems to me that the most straightforward tunnel detection method
        would be to first check if the requested site actually talks HTTPS,
        and perhaps check whether the SSL cert is valid and all that,
        optionally rejecting self-signed certs. Has anyone encountered the
        same block at work and found a way to circumvent it? Thanks.
        \_ Take a look at stunnel. Thought about using it a while back but
           then the block got removed.
           \_ Thanks, that might conceivably work. Will look into it...
        \_ You can SSH tunnel through any open port so just find one.
           \_ Amen. Try port 25.
           \_ There are no open ports. I'm behind a firewall. The only way
              out that I'm aware of is through the HTTP/HTTPS proxy. Telnet
              used to be open, but not anymore.
              \_ Use nmap or ethereal to look for open ports.
        \- if dns is allowed, there is kind of a crufty way to run ssh
           over dns, but really if there is a business case for this,
           you should lobby for what you need. i've circumvented cafes,
           hotels, WAPs etc and what you need to do depends on doing a
           bunch of diagnosis to reverse engineer what is going on so
           you know what your options are. and in some cases, you have
           to pre-arrange to have some infomation on hand [like ip addresses]
           or pre-arrage some listening servers of some kind on the outside.
           those last two things shouldnt be an issue if you commute to
           and from work everyday and have admin access to an external
           networked box. BTW, you can do some kind of dynamic porotocol
           detection to quash this kind of thing. see e.g.
           \_ Yes, I've used IP over DNS before, but it's not really something
              I'd want to use on a regular basis, for performance and
              reliability reasons. Thanks for the suggestion, though.
        \_ Maybe work at a company that doesn't block ports?  Do you think
           subverting your company's IT policy is a good idea?
           \_ Maybe later. No, but I'm skeptical that any somewhat nerdy
              person who works at a large company can get by without breaking
              some IT policy or other.
2008/8/5-10 [Politics/Domestic/President/Bush, Politics/Foreign/MiddleEast/Iraq] UID:50789 Activity:nil 71%like:50835
8/5     Pulitzer prize winning journalist breaks the lid on the illegal
        techniques the White House used to decieve the nation into supporting
        the Iraq War:
        \_ Obviously he is making this all up.  You anti-semite!
        \_ No evidence.  Let's start an impeachment based on some guy's book!
           \_ Oh, you have already read it? Where did you get the advance
              copy? I thought it wasn't in the bookstores until tomorrow.
              \_ I don't need to read it to know that. Someone else will
                 waste their time, read it, and summarize (like this
                 article you posted).
                 I'll read a 415 page work of art. Not a political
                 article/masturbation session blown up to 415 pages.
                 \_ I'm sure that someone will summarize and say that the
                    claims have veracity and Bush is a criminal.  Someone
                    else will summarize and say that the author is full of
                    it.  I'm going to go way out on a limb and predict
                    that you'll believe the second guy.  -tom
                    \_ The book itself is obviously not evidence. If there
                       is veracity, we can go to the actual source of the
                       veracity. This book is irrelevant.
                 \_ You don't need to read it to know that there is no
                    evidence in it? How do you know that?
                    \_ If he has real evidence, publish it in a paper, not a
                       book for profit.
2019/04/22 [General] UID:1000 Activity:popular
Berkeley CSUA MOTD:2008:August:05 Tuesday <Monday, Wednesday>