Berkeley CSUA MOTD:Entry 21838
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/12/25 [General] UID:1000 Activity:popular
12/25   

2001/7/18-19 [Computer/SW/WWW/Browsers] UID:21838 Activity:nil
7/19    Human rights + CS: http://news.cnet.com/news/0-1003-200-6575468.html
2024/12/25 [General] UID:1000 Activity:popular
12/25   

You may also be interested in these entries...
2013/8/22-10/28 [Computer/Companies/Yahoo, Industry/SiliconValley] UID:54732 Activity:nil
8/22    http://marketingland.com/yahoo-1-again-not-there-since-early-08-56585
        Y! is back to #1! Marissa, you are SEXY!!!
        \_ how the heck do you only have 225M uniq vis/month when there
           are over 1 billion internet devices out there?
           \_ You think that every single Internet user goes to Y!?
        \_ Tall blonde skinny pasty, not my type at all -former Y!
	...
2013/6/26-8/13 [Computer/Domains, Computer/Networking, Computer/SW/WWW/Browsers] UID:54697 Activity:nil
6/26    This ones for you psb -ausman
        http://25.media.tumblr.com/027fe67c84c2288cc16e9c85db690834/tumblr_mp0ag8DCQI1qzwozco1_1280.jpg
        \- that's pretty good. i wish someone had put the idea to be before i saw
           it on the internet, so see if i'd have put the 9 justices in the same
           boxes. JOHN PAUL STEVENS >> All the sitting justices. --psb
        \- that's pretty good. i wish someone had put the idea to be before i
	...
2012/4/2-6/4 [Computer/SW/Languages/Java, Computer/SW/RevisionControl] UID:54353 Activity:nil
4/02    We use Perforce at work for revision control. It seems to work okay.
        Lately, a lot of the newer developers are saying that Perforce
        sucks and we should switch to Mercurial or Git. I have done some
        searching on the Internet and some others have this opinion. Added
        advantage is that Mercurial and Git are free. However, there would
        be some work to switch for the sysadmins and the developers.
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
	...
Cache (1699 bytes)
news.cnet.com/news/0-1003-200-6575468.html -> news.com.com/2100-1001-269962.html?legacy=cnet
Greg Walton, a freelance human rights researcher, spoke to hackers at the Def Con conference in support of the Hacktivismo project, an attempt to create an anonymous, private way of getting human rights information across the Internet while protecting the identities of those who report the abuses. Though the cDc originally expected to release the software at Def Con, which concluded Sunday, unresolved technical problems have put the project on hold. While the number of people that are prevented from speaking about human rights abuses cannot be quantified, the need for such an application is great, said Patrick Ball, deputy director of the American Association for the Advancement of Science's Science and Human Rights program. Potential human rights informants "know that governments monitor the Internet, so in many cases they won't send e-mail to report abuse," he said. Ball also called for hackers to produce easier-to-use code to protect privacy. Referring to his own project cataloging human rights abuses, Ball said that a way of storing information on the individual incidents is also necessary. Using a simple database, Ball and his colleagues were able to track the war crimes in Bosnia, Haiti and other trouble spots. The group also kept track of the people commanding the forces that committed the crimes and presented summaries of the data to the respective peacekeeping forces. Hackers in the United States and other countries where abuses are infrequent should not be complacent, Ball stressed. Technology like Peekabooty could help prevent the censorship of all sorts of information. These types of incidents should convince hackers that censorship affects everyone, he said.