2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil | 8/26 Poll: how many of you pub/priv key users: 1) use private keys that
are not password protected 2) password protect your private keys
but don't use ssh-agent 3) use ssh-agent:
1) .
2) ..
3) ...
...
|
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil | 8/29 There was once a CSUA web page which runs an SSH client for logging
on to soda. Does that page still exist? Can someone remind me of the
URL please? Thx.
\_ what do you mean? instruction on how to ssh into soda?
\_ No I think he means the ssh applet, which, iirc, was an applet
that implemented an ssh v1 client. I think this page went away
...
|
2012/9/24-11/7 [Computer/SW/Languages, Computer/SW/Unix] UID:54484 Activity:nil | 9/24 How come changing my shell using ldapmodify (chsh doesn't work) doesn't
work either? ldapsearch and getent show the new shell but I still get
the old shell on login.
\_ Scratch that, it magically took my new shell now. WTF?
\_ probably nscd(8)
...
|
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil | 3/29 A friend wants a PC (no mac). She doesn't want Dell. Is there a
good place that can custom build for you (SSD, large RAM, cheap video
card--no game)?
\_ As a side note: back in my Cal days more than two decades ago when
having a 387SX made me the only person with floating-point hardware,
most machines were custom built.
...
|
2011/10/26-12/6 [Computer/SW/Unix] UID:54202 Activity:nil | 10/24 What's an easy way to see if say column 3 of a file matches a list of
expressions in a file? Basically I want to combine "grep -f <file>"
to store the patterns and awk's $3 ~ /(AAA|BBB|CCC)/ ... I realize
I can do this with "egrep -f " and use regexp instead of strings, but
was wondering if there was some magic way to do this.
\_ UNIX has no magic. Make a shell script to produce the ask or egrep
...
|
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil | 4/28 Will wall be fixed? - jsl
\_ What's wall?
\_ An anachronism from a bygone era, when computers were hard to
comeby, the dorms didn't have net, there was no airbears, and
when phones didn't come standard with twitter or sms.
\_ A non useful implementation of twitter.
...
|
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil | 5/19 Uh, is anyone still using this? Please mark here if you post and
haven't added this yet. I'll start:
\_ person k
\_ ausman, I check in about once a week.
\_ erikred, twice a week or so.
\_ mehlhaff, I login when I actually own my home directory instead of
...
|
2010/3/10-30 [Computer/SW/Mail] UID:53751 Activity:nil | 3/10 What email program do people in Cal CS use nowadays? In my school days
people used /usr/bin/mail, then RMail in emacs, then VMail in emacs.
After my days people used Elm, Pine, Mutt (I forgot which order). In
my first two jobs we could tell the seniority of fellow engineers based
on which email program they use at work, because everyone used what
they used to use in their school years. In my last two jobs though,
...
|
2009/11/13-30 [Computer/SW/Unix] UID:53523 Activity:nil | 11/12 How does one find out if a system has rootkit installed?
\_ Unix or m$?
\_ Unix. On M$ I always assume it's compromised.
\_ Install Tripwire before you plug your server into The Net?
The only other answer I can think of is to reinstall the
OS from scratch on another server and do an md checksum
...
|
|