Berkeley CSUA MOTD:Entry 18843
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/09 [General] UID:1000 Activity:popular
7/9     

2000/8/1-2 [Computer/SW/WWW/Browsers, Computer/Networking, Computer/Domains] UID:18843 Activity:nil
8/1     http://www.securityfocus.com/news/65
        \_ "It's just a packet sniffer... We call ours Sniffy"
           Fucking morons, who the fuck do they think they're kidding?
2025/07/09 [General] UID:1000 Activity:popular
7/9     

You may also be interested in these entries...
2013/8/22-10/28 [Computer/Companies/Yahoo, Industry/SiliconValley] UID:54732 Activity:nil
8/22    http://marketingland.com/yahoo-1-again-not-there-since-early-08-56585
        Y! is back to #1! Marissa, you are SEXY!!!
        \_ how the heck do you only have 225M uniq vis/month when there
           are over 1 billion internet devices out there?
           \_ You think that every single Internet user goes to Y!?
        \_ Tall blonde skinny pasty, not my type at all -former Y!
	...
2013/6/26-8/13 [Computer/Domains, Computer/Networking, Computer/SW/WWW/Browsers] UID:54697 Activity:nil
6/26    This ones for you psb -ausman
        http://25.media.tumblr.com/027fe67c84c2288cc16e9c85db690834/tumblr_mp0ag8DCQI1qzwozco1_1280.jpg
        \- that's pretty good. i wish someone had put the idea to be before i saw
           it on the internet, so see if i'd have put the 9 justices in the same
           boxes. JOHN PAUL STEVENS >> All the sitting justices. --psb
        \- that's pretty good. i wish someone had put the idea to be before i
	...
2012/4/2-6/4 [Computer/SW/Languages/Java, Computer/SW/RevisionControl] UID:54353 Activity:nil
4/02    We use Perforce at work for revision control. It seems to work okay.
        Lately, a lot of the newer developers are saying that Perforce
        sucks and we should switch to Mercurial or Git. I have done some
        searching on the Internet and some others have this opinion. Added
        advantage is that Mercurial and Git are free. However, there would
        be some work to switch for the sysadmins and the developers.
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
	...
Cache (1914 bytes)
www.securityfocus.com/news/65
By 20 Kevin Poulsen, SecurityFocus Jul 28 2000 3:53PM LAS VEGAS -- The DefCon hacker convention opened here Friday, and hackers, government agents and reporters gathered in the cavernous Alexis Park hotel conference room for the opening panel: an perennial favorite titled "Meet the Feds," which each year features a gaggle of government officials lecturing the cyberpunks. Arthur Money "The whole game has changed," said Arthur L. Money said that he believes that terrorists and foreign government are attacking defense computers over the Internet, and that recreational hack attacks make it more difficult to pick out state sponsored assaults. Instead of adding to the problem, patriotic hackers should enlist in the armed forces, or go to work for defense contractors. And if you'd like to gain access to those toys and become part of an elite team, then we want to talk to you," said Dick Schaefer, the Pentagon's director of infrastructure and information assurance. Attendees who asked questions responded with some skepticism to the offer, and quizzed the panel on policy issues. Hackers, mostly politely, buffeted Money with questions on proposed legislation that would expedite the tracking of Internet users, his opposition to unregulated encryption and his support for a stike-back policy involving retaliatory "electron kills" of cyber attackers. Money also claimed that hackers had changed blood type records at a military hospital. He said in all, attacks on defense computers cost taxpayers $25 billion dollars last year. Twenty-five billion dollars represents almost ten percent of the 1999 defense budget. Another conference-goer asked panel members for their opinion on the FBI's "Carnivore" Internet surveillance system, the recent subject of congressional inquiry. James Christy, an Air Force senior computer crime investigator, responded that the controversy amounted to a tempest in a teapot.