Berkeley CSUA MOTD:Entry 12387
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2004/2/24-25 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:12387 Activity:nil
2/23    Is there a web based free email compatible with lynx?
        \_ kinda curious why you'd want this... if you have access
           to a command line, can't you use a command-line mail
           program or log into a box that has one?
           \_ it's useful to have throw-away mailboxes.
              \_ http://spamgourmet.com
              \_ throw away mailboxes don't have to be web-based...
                 that said, I use an extra netzero account for throw
                 away mail... it has POP3 mail.  Perhaps there's a
                 reason they want web-based?
              \_ why not use sneakemail for throw-away mailboxes?
           \_ It's nice to have an email acct. that is 1) fully functional
              with SSL login, 2) completely disposable and anonymous,
              3) can be accessed anywhere, whether from a comand line host or
              public library shared web machines.
              \_ sure, that's nice. it's also not profitable, which is why
                 you don't see that kind of thing. free email services
                 need to serve ads, which are predominantly graphical.
              \_ find a non-free service that satisfies 1 and 3, and then you
                 use sneakemail to satisify 2.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2011/11/16-12/28 [Academia/Berkeley/CSUA, Computer/HW] UID:54230 Activity:nil
11/16   We'll be taking all CSUA machines offline in the near future for a Soda
        Hall server room reorganization (we're being moved to a neighboring
        server cabinet).  Downtime will hopefully be minimal.  --jordan
        \_ Thanks for all your work keeping the machines running!  It's
           been awesome having soda actually working again.
        \_ Update:  this is tentatively scheduled for Saturday afternoon.
	...
2011/8/9-27 [Computer/SW/Editors/Emacs, Academia/Berkeley/CSUA] UID:54162 Activity:nil
8/9     So I just found out that an old college friend of mine lost her
        four month old daughter to SIDS. What is the correct response here?
        \_ "Did she sleep with her belly?" and "Did you breastfeed?"
        \_ try this joke:
           How do you make a dead baby float?
           ˙ʎqɐq pɐǝp ÉŸo sdooÉ”s oʍʇ puɐ ɹÇ\
	...
Cache (872 bytes)
spamgourmet.com
How spamgourmet works If you give your email address to everyone, you are bound to receive spam emails, and you won't know where they came from. Wouldn't it be convenient to give a different email address to every business or web site, while getting all your email as before? Wouldn't it be easiest to assume the address will be given to spammers, and have it shut off automatically unless you decide otherwise? There is nothing to install on your computer, and once you're set up, it's likely you won't ever have to come back here. This is what makes spamgourmet one of the most convenient and effective ways to avoid spam. Arm yourself against spammers in three easy steps: 1 If you haven't done it yet, create a spamgourmet account. You will be asked to identify the word in a picture and pick a password. If you want more options, choose the "advanced mode" tab above.