Berkeley CSUA MOTD:Entry 16739
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

1999/10/20-21 [Computer/SW/Unix] UID:16739 Activity:nil
10/20   http://www.cs.unm.edu/~dlchao/flake/doom
        /bin/ps meets DOOM.  Really _kill_ those errant processes.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil
3/29    A friend wants a PC (no mac). She doesn't want Dell. Is there a
        good place that can custom build for you (SSD, large RAM, cheap video
        card--no game)?
        \_ As a side note: back in my Cal days more than two decades ago when
           having a 387SX made me the only person with floating-point hardware,
           most machines were custom built.
	...
2012/1/27-3/26 [Computer/SW/Unix] UID:54299 Activity:nil
1/27    Interesting list of useful unix tools. Shout out to
        cowsay even!
        http://www.stumbleupon.com/su/3428AB/kkovacs.eu/cool-but-obscure-unix-tools
        \_ This is nice.  Thanks.
	...
2011/10/26-12/6 [Computer/SW/Unix] UID:54202 Activity:nil
10/24  What's an easy way to see if say column 3 of a file matches a list of
       expressions in a file? Basically I want to combine "grep -f <file>"
       to store the patterns and awk's $3 ~ /(AAA|BBB|CCC)/ ... I realize
       I can do this with "egrep -f " and use regexp instead of strings, but
       was wondering if there was some magic way to do this.
       \_ UNIX has no magic. Make a shell script to produce the ask or egrep
	...
2010/6/8-30 [Computer/Companies/Yahoo] UID:53853 Activity:nil
6/8     Newly wed husband and wife found from old picture that they have
        actually crossed path 30yrs ago: http://www.csua.org/u/qwv
        My question is how do stories like this find its way to news media?  Do
        people just go "hey something very interesting happens in our lives.
        Let's call up a news agency or two to tell the world about it."?
        \_ "Your video will begin after a word from our sponsors."
	...
2010/3/8-30 [Computer/SW/Unix] UID:53745 Activity:nil
3/8     I have a mod_rewrite question that I think should be straight-
        forward but I think I'm not getting something.
        I have a virtual server with some root, say /home/user/public_html/
        and in there I have two subdirs, say /app1/ and /app2/
        and i want the following:
        http://mysite/app1   -->   /home/user/public_html/app1
	...
2010/3/10-30 [Computer/SW/Mail] UID:53751 Activity:nil
3/10    What email program do people in Cal CS use nowadays?  In my school days
        people used /usr/bin/mail, then RMail in emacs, then VMail in emacs.
        After my days people used Elm, Pine, Mutt (I forgot which order).  In
        my first two jobs we could tell the seniority of fellow engineers based
        on which email program they use at work, because everyone used what
        they used to use in their school years.  In my last two jobs though,
	...
2010/1/22-24 [Computer/SW/Unix] UID:53654 Activity:high
1/22    What's the difference between a job and a career?
        \_ women have jobs, men have careers.
           \_ true statement but one that is sexist and should be
              kept in a private conversation
        \_ A job could be anything that pays mortgage or feed the mouth.
           A career is something that is longer term, most of the time,
	...
2009/12/9-2010/1/13 [Computer/SW/Unix] UID:53586 Activity:nil
12/8    Is there a bash equivalent to tcsh's history-search-backward ?
        \_ There's something similar called... history-search-backward. It
           is a bit more limited, in that it only searches for strings and
           not glob patterns. You may find reverse-i-search to be useful also.
	...
Cache (3414 bytes)
www.cs.unm.edu/~dlchao/flake/doom -> www.cs.unm.edu/~dlchao/flake/doom/
For example, walking along a tricky path through a swamp would be the same as going through a firewall. The mapping of abstract operations to an intuitive environment is a difficult problem. There are two distinct obstacles: the environment must be intuitive and the mapping must be accurate. If the environment is not intuitive, it can alienate users. In a good environment, the user would instinctively do the right thing. The quality of the environment is for naught if the mapping is not accurate. For instance, if certain natural actions lead to detrimental results or if desired results can only achieved by performing contrived acts, the mapping to the underlying processes must be learned. The difficulty of the mapping is evidenced by the paucity of good user interfaces that use physical metaphors. The only widespread example is the "desktop" interface, where files are held in "folders" which may be "opened" or "thrown away". This is a fairly good mapping, but there are certainly problems. For example, the user must understand what "links" are to figure out why some folders are not always accessible. The user must also realize that one can close a folder and still see the contents of its sub-folders. As mentioned above, people frequently talk about "blowing processes away", and the Unix command to destroy a process is "kill". Each process can be a monster, and the machines can be represented by a series of rooms. I downloaded one of the 8 many versions and added a few lines of code that would spawn a new soldier for each process, renice the process when it is wounded, and kill the process when it dies. Some of the potential benefits of using Doom as a tool for system administration: * The machine load is immediately apparent to the player, who can see how crowded a room is. The player can eyeball many machines from a high vantage point and go down to a room that needs maintenance. A user may choose to simply wound processes rather than killing them, which could naturally be translated to renicing them. A rank beginner may not be given a weapon at all and be forced to attack processes with her bare hands. It would take a foolhardy player to attack a room full of monsters, just as a newbie should not kill a bunch of important processes. A more experienced sysadmin would have time to stop a newbie who is trying to kill the wrong process. Once the population in a room goes down, the monsters will stop attacking each other. In a command line interface, all actions take approximately the same amount of effort. One can ls just as easily as rm -rf *, which is kind of unfortunate. In a cyberspace environment, the players are not omnipotent, so performing large actions takes time and effort. They can then defend themselves against inexperienced sysadmins. Doom is a natural environment for player-to-player interactions. A team of players can cooperate to take care of a heavily-loaded system, or they can even take out rogue sysadmins who are killing the wrong processes. A few of the problems of using Doom as a tool for system administration: * Certain processes are vital to the computer's operation and should not be killed. For example, after I took the screenshot of myself being attacked by csh, csh was shot by friendly fire from behind, possibly by tcsh or xv, and my session was abruptly terminated. Should the monster type reflect the CPU as well as memory usage?