Berkeley CSUA MOTD:Entry 17587
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

2000/2/22-23 [Computer/SW/Security, Computer/SW/Unix] UID:17587 Activity:moderate
2/22    Is it possible for Soda to create a web mail interface similar to
        http://mail.yahoo.com to access emails on soda?
        \_ No.  Soda is a computer and has not yet achieved sentience.
                Use POP or IMAP or forward your mail to luser@@yahoo.com.
                \_ Soda still allows POP and IMAP? I thought that the whole
                   point of turning off telnet/ftp/etc was to prevent some
                   twinks from sending their passwords in clear text over the
                   net. So, what's the point of turning off telnet and ftp
                   if POP and IMAP are still running?
                        \_ There is no point, only trolls.
        \_ You may email your request to the entity known as "Soda".
        \_ I was looking at something called 'mailman' a while ago.  It'd
           require nothing more than a few cgi scripts and a cron job that
           copies your mail into a directory off your public_html/.  They
           started charging for mail man, though, and I haven't had time
           for it since.  Mail me if interested.  -John
                \_ there are at least a dozen different mail->web gateways
                        listed on http://freshmeat.net
        \_The OCF got acmemail up and running in a few hours -jones
                \_http://secure.OCF.Berkeley.EDU/cgi-bin/acme/acmemail.cgi
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil
3/29    A friend wants a PC (no mac). She doesn't want Dell. Is there a
        good place that can custom build for you (SSD, large RAM, cheap video
        card--no game)?
        \_ As a side note: back in my Cal days more than two decades ago when
           having a 387SX made me the only person with floating-point hardware,
           most machines were custom built.
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/1/27-3/26 [Computer/SW/Unix] UID:54299 Activity:nil
1/27    Interesting list of useful unix tools. Shout out to
        cowsay even!
        http://www.stumbleupon.com/su/3428AB/kkovacs.eu/cool-but-obscure-unix-tools
        \_ This is nice.  Thanks.
	...
2011/10/26-12/6 [Computer/SW/Unix] UID:54202 Activity:nil
10/24  What's an easy way to see if say column 3 of a file matches a list of
       expressions in a file? Basically I want to combine "grep -f <file>"
       to store the patterns and awk's $3 ~ /(AAA|BBB|CCC)/ ... I realize
       I can do this with "egrep -f " and use regexp instead of strings, but
       was wondering if there was some magic way to do this.
       \_ UNIX has no magic. Make a shell script to produce the ask or egrep
	...
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil
4/28    Will wall be fixed?   - jsl
        \_ What's wall?
           \_ An anachronism from a bygone era, when computers were hard to
              comeby, the dorms didn't have net, there was no airbears, and
              when phones didn't come standard with twitter or sms.
           \_ A non useful implementation of twitter.
	...
2011/4/6-20 [Computer/SW/Mail, Computer/SW/Unix, Industry/Startup] UID:54078 Activity:nil
4/6     My company is evaluating version control systems. Our two candidates
        are Perforce and Subversion. Anyone worked with both and have good
        arguments one way or the other? (These are the only two options we
        have.) We're most interested in client performance, ease of use, and
        reasonable branching.
        \_ I'll be 'that guy'. If perforce and subversion are optins, why isn't
	...
2010/3/10-30 [Computer/SW/Mail] UID:53751 Activity:nil
3/10    What email program do people in Cal CS use nowadays?  In my school days
        people used /usr/bin/mail, then RMail in emacs, then VMail in emacs.
        After my days people used Elm, Pine, Mutt (I forgot which order).  In
        my first two jobs we could tell the seniority of fellow engineers based
        on which email program they use at work, because everyone used what
        they used to use in their school years.  In my last two jobs though,
	...
2009/11/13-30 [Computer/SW/Unix] UID:53523 Activity:nil
11/12   How does one find out if a system has rootkit installed?
        \_ Unix or m$?
           \_ Unix. On M$ I always assume it's compromised.
              \_ Install Tripwire before you plug your server into The Net?
                 The only other answer I can think of is to reinstall the
                 OS from scratch on another server and do an md checksum
	...
Cache (138 bytes)
mail.yahoo.com
Sign in as a different user Why am I being asked for my password? To protect your account, you need to confirm your password periodically.
Cache (95 bytes)
yahoo.com -> www.yahoo.com/
La Toya London Entertainment Tonight goes one-on-one with this week's 'American Idol' cast-off.
Cache (8192 bytes)
freshmeat.net
BlackJack - Thursday, May 13th 2004 23:36 PST About: An almost ISO C compatible C compiler which produces binaries for 6502-based computers. Targets that are supported out of the box are: Apple , Atari 8Bit machines, Commodore C64/C128/C16/C116, Commodore Plus/4, Commodore 600/700, and GEOS for C64. The package includes a complete suite of assembler developement tools (assembler, linker, archiver) which allows mixing of C and assembler code. Mikio Hirabayashi - Thursday, May 13th 2004 23:36 PST About: QDBM is an embedded database library compatible with GDBM and NDBM. It features hash database and B+ tree database and is developed referring to GDBM for the purpose of the following three points: higher processing speed, smaller size of a database file, and simpler API. Changes: This version adds a debug log, add a performance testing utility, enhances the utility API, cleans up the source code, and fixes some mmap-related bugs on BSD systems. Thierry bothorel - Thursday, May 13th 2004 22:00 PST About: The Meeting Room Booking System (MRBS) is a PHP/MySQL-based Web application for booking meeting rooms. It uses 'areas' to group rooms, and rooms within each area are shown side-by-side. Changes: This version adds "periods" support, an 'auth_db' authentication scheme, and email support. It can send email to the system administrator, area or room administrators, or bookers, for each entry created or modified. Tom Goodale - Thursday, May 13th 2004 21:54 PST About: Cactus is a general, modular, parallel environment for solving systems of partial differential equations. The code has been developed over many years by a large international collaboration of numerical relativity and computational science research groups and can be used to provide a portable platform for solving any system of partial differential equations. Changes: This release allows thorns using aliased functions to require that there be a thorn providing the function. Duilio Protti - Thursday, May 13th 2004 21:50 PST About: Infinity is a visualization plugin with light effects for the XMMS audio player. It supports full-screen mode, mouse resizing, and saved preferences. It is designed to be as end-user oriented as possible, so installation and manipulation are kept simple. It requires SDL and GTK+ 12 to run, and doesn't require 3D acceleration support. Changes: This release significantly improves performance. John Graham-Cumming - Thursday, May 13th 2004 21:11 PST About: quepasa is a program and method of generating unique passwords for Web sites automatically. The user remembers a single passphrase and it can generate the same password from a combination of the passphrase and the name of the Web site. This means that remembering a single passphrase will cover all the Web sites you visit. The passwords are generated automatically using SHA-256 to generate a cryptographically secure password. Kooper - Thursday, May 13th 2004 21:09 PST About: Plesk Server Administrator (PSA) is a multi-platform, Web-based software solution that simplifies and automates the administration of UNIX and Linux Web servers. PSA helps Web hosting companies and their reseller clients deliver better, faster service to domain owners by sharing server management with them. Changes: Bugs were fixed in the creation utilities, file manager, Web host skeletons, statistics information displaying, and SpamAssassin support. The Plesk interface is now compatible with Safari 12 PhpBook was added as a site application. Upgrades were made to OpenSSL, Mambo, Courier-IMAP, and phpBB versions, resolving security issues. It includes a chess visualization trainer that teaches chess visualization by drilling you on the color of a particular square, on your ability to tell if two squares are the same color, your ability to tell if two (or three) squares are on the same diagonal, your ability to tell if two squares are a knight move apart, your ability to tell if two squares are two knight moves apart, and your ability to tell if a simple position is checkmate. It also includes a weak chess program (called Vince) that lets you lag the display by several ply, hide all pieces or all pawns, and block out quadrants of the board. Changes: Bugfixes and performance improvements were made. Vince now searches faster and the Knight test actually gives some valid cases. Jay - Thursday, May 13th 2004 21:05 PST About: RemoteWAP is a remote administration tool for most operating systems that can run a Java virtual machine. It has been designed for anyone who wishes to have complete control of their operating system from anywhere by using a WAP enabled mobile phone. The RemoteWAP application is written in Java, and the client front-end pages are written in WML RemoteWAP has a Java Swing GUI for easy control. Server commands now load from a file to allow you to add your own WML and commands. The configure tab was changed and now updates the settings file. Joey Kelly - Thursday, May 13th 2004 21:05 PST About: Listserv2Mbox in a command-line PHP utility that converts Listserv archive digests to standard UNIX mail spool (mbox) format. This makes it possible to present Listserv mailing list traffic on the Web using Hypermail or similar Web archive tools. Changes: This release attempts to obfuscate or render unusable all email addresses in the LISTSERV archives, so spambots can't harvest email addresses from the Web archives. If you are putting your archives on the Web, upgrading to this use this version is recommended. Skrol 29 - Thursday, May 13th 2004 21:04 PST About: TinyButStrong is a template class for PHP that allows you to generate HTML pages using MySQL, ODBC, SQL Server, or ADODB databases. It is possible to design templates using any visual HTML editor (like Dreamweaver or FrontPage). It features simple block management, useful display formats, conditional displaying for blocks and locators, a cache system, and the ability to include other HTML pages and execute associated scripts. Changes: Support for SQLite was added, the MergeField method can now merge with a user function, and some minor bugs were fixed. Morty Abzug - Thursday, May 13th 2004 21:03 PST About: RT is an industrial-grade trouble ticketing system. It lets a group of people intelligently and efficiently manage requests submitted by a community of users. RT is used by systems administrators, customer support staffs, NOCs, developers, and even marketing departments to track issues, outages, bugs, requests, and all kinds of other things at thousands of sites around the world. It provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of damage that can be caused by malicious or flawed applications. It includes a set of sample security policy configuration files designed to meet common, general-purpose security goals. Changes: The current prototype and the experimental NFS code are now based on Linux kernel 266 Several races and kernel socket creation problems were fixed and a runtime disable was added. The userland patches were updated from Fedora Core 2 development. X server security classes and access vector definitions were added and many policy updates were made. Andrej Bagon - Thursday, May 13th 2004 20:58 PST About: media-box is a program to watch all kind of multimedia files using a computer. It suports playing DVDs and VCDs, various movie files, audio CD, various music files, and watching various still pictures. The main goal is to have a dedicated computer in your living room by replacing your Hi-Fi component (DVD or CD-player). It can be also called an embedded distribution for playing all kinds of multimedia. Subtitles of the new Xine lib are displayed as a background image. Nuclear Elephant - Thursday, May 13th 2004 20:57 PST About: DSPAM is a server-side statistical anti-spam agent for Unix email servers. It masquerades as the email server's local delivery agent and effectively filters spam using a combination of de-obfuscation techniques, specialized algorithms, and statistic...