Berkeley CSUA MOTD:Entry 26335
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2002/10/27-28 [Computer/SW/Languages/Java, Computer/SW/Virus] UID:26335 Activity:high
10/27   In Defense of The Boom:
        http://csua.org/u/46e
        \_ What's the csua-motd username password ay nytimes?
           \_ csuamotd:csuamotd
              \_ what other web accounts does csua have?
                 \_ csua:csua at some places.  LAtimes is username:password
                 \_ csuacsua : csuacsua for Sun's JDK et al. downloads
                 \_ how about if we make a file somewhere on soda that lists
                    all of these and if people create a new one they could
                    submit it in there?
2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2013/4/29-5/18 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Compilers] UID:54665 Activity:nil
4/29    Why were C and Java designed to require "break;" statements for a
        "case" section to terminate rather than falling-through to the next
        section?  99% of the time poeple want a "case" section to terminate.
        In fact some compilers issue warning if there is no "break;" statement
        in a "case" section.  Why not just design the languages to have
        termination as the default behavior, and provide a "fallthru;"
	...
2013/5/1-18 [Computer/SW/Languages/Java, Computer/Theory] UID:54669 Activity:nil
5/1     What's the difference between CS and Computer Engineering?
        http://holykaw.alltop.com/top-ten-paying-degrees-for-college-graduates
        \_ One is science and the other is engineering.
        \_ From http://en.wikiquote.org/wiki/Computer_science
           'A folkloric quotation ... states that "computer science is no more
           about computers than astronomy is about telescopes."  The design
	...
2013/3/5-26 [Computer/SW/Languages/Java] UID:54618 Activity:nil
3/5     Three emergency Java updates in a month. Why do I have a feeling
        that the third one won't be the last one?
        \_ Bingo!
	...
2012/12/18-2013/1/24 [Computer/SW/Languages/Perl] UID:54561 Activity:nil
12/18   Happy 25th birthday Perl, and FUCK YOU Larry Wall for fucking up
        the computer science formalism that sets back compilers development
        back for at least a decade:
        http://techcrunch.com/2012/12/18/print-happy-25th-birthday-perl
        \_ I tried to learn Perl but was scared away by it.  Maybe scripting
           lanauages have to be like that in order to work well?
	...
2012/12/4-18 [Computer/SW/Languages/Java] UID:54544 Activity:nil
12/4    Holy cow, everyone around me in Silicon Valley is way beyond
        middle class according to Chinni's definition:
        http://en.wikipedia.org/wiki/American_middle_class
        \_ Let's set our goals higher:
           http://en.wikipedia.org/wiki/Upper_middle_class_in_the_United_States
           \_ How about this one?
	...
2012/10/29-12/4 [Science/Disaster, Computer/SW/Languages/Java, Politics/Domestic/President/Bush] UID:54516 Activity:nil
10/29   Go Away Sandy.
        \_ Sorry, Coursera is performing preventive maintenance for this
           class site ahead of Hurricane Sandy. Please check back in 15 minutes.
           class site ahead of Hurricane Sandy. Please check back in 15
           minutes.
        \_ Bitch.
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/3/31-4/20 [Health/Disease/AIDS, Health/Disease/General, Computer/SW/Virus] UID:54067 Activity:nil
3/21    what are these virus phages? Can they be repurposed?
        \_ are you <b>insane?</b> you really want to start messing with
           recombinant <ul>rna</ul> crap when we don't even understand
           the normal virus lifecycle?
	...
2009/5/7-14 [Computer/HW/Laptop, Computer/SW/Virus, Computer/SW/OS/OsX] UID:52968 Activity:nil
5/7     Help, I think something's wrong with my network setting. I'd go to
        a web site, and then it would say "cannot find address". Then I'd
        reload again, occassionally 3 times, to load the page. Is this
        due to DNS being too slow, TTL setting, or something else?
        \_ windows mac or linux ?
           \_ windows (company issued laptop, no alternative)
	...
2009/4/12-20 [Computer/SW/Virus] UID:52844 Activity:nil
4/11    Is there a spyware detector that is free and can scan networked
        drives? Neither AdAware (free edition) nor SpyBot S&D have this
        feature, and I'd prefer to not pay AdAware Pro a penny until
        there really isn't any other alternative.
        \_ How about SuperAntiSpyware?
           \_ Just tried that, no luck :( They let you add remote drives
	...
2008/12/2-6 [Computer/SW/Apps, Academia/Berkeley/CSUA/Motd] UID:52140 Activity:kinda low
12/1    Just curious -- what do you guys generally use soda for? Why do you
        log on? Personally, I use it to keep a presence on IRC and AIM/gTalk
        at all times, and mess around with some Python programming (been
        setting up Twisted and such so I can play with making an irc bot).
        --toulouse
        \_ I use it to post SHIT, er, I mean, spill my guts about the company
	...
2008/4/7-12 [Computer/Companies/Google] UID:49677 Activity:nil
4/7     Google searches spread spyware and hijack your PC to spread spam.
        http://www.csua.org/u/l8b
        \_ very poor understanding and description of the technical issues.
           Google isn't involved.  -tom
           \_ 'Google issued a statement saying it is helping affected
              websites fix the problem and is also developing new tools "to
	...
2008/3/4-7 [Computer/SW/Virus] UID:49325 Activity:kinda low
3/4     Hi, what's the best free anti-virus software for XP?  What about
        anti-spyware?  Currently I'm using Active Virus Shield and Spybot.
        Thanks.
        \_ I've used: avg, spybot s&d, adaware, trend micro's housecall.
           \_ Does Spybot S&D protect Firefox?  It soulds like the injection
              feature only supports IE.
	...
Cache (6987 bytes)
csua.org/u/46e -> www.docuverse.com/blog/donpark/
I suspect it was their obsession with the Design Pattern that lead Java programmers down this path. Design Pattern is a useful tool but you can hurt yourself if you pull on it too much. Being able to mold and fuse everything in your software is good, but such flexibility isn't useful if it isn't actually used. I seriously doubt if more than 10% of all the extra flexibilities and abstractions being built into Java software are ever used. All that 'fat' makes the software bigger, slower, and more difficult to understand. Dive into any popular open source Java code and you'll see lots of design pattern artifacts like Factories, Adaptors, Managers, and Observers most of which has only one or a couple of implementations. These sort of habitual abstraction often forces late comers to get lost in the abstractions to understand process and data flow. I think the best example of flexibility is the mammal skeleton structure because flexibilities are like joints, points that can bend. Each joint has cost associated with it so if the benefits don't outweight the cost of having a joint a a certain location, it shouldn't be there. Don't add flexibility in anticipation, but add it when you actually need it, where you need it, and no more than what you need. Based on my experience, I would add that real flexibility comes from preventing assumptions from leaking across component boundaries. Limiting surface areas between components will help in reducing the chance of such leaks. I went fishing for some bloom filter code but couldn't find a general library in either Java or C++. Anyhow, it's probably because there isn't much code needed. Most of the Bloom filter works is finetuning the parameters and choosing the right hashing function so it doesn't really matter. Beside Maciej's article, I found these pages useful: * 37 Bloom Filters - the math (obviously explains the math behind BF) * 38 Some Motley Bloom Tricks (does this and does that with BF) * 39 Compressed Bloom Filters (PDF - self-explanatory) * 40 Coding Bloom Filters (game developer's tuturial on BF) BF is pretty simple stuff but useful in many areas. Anyhow, Steve Kirks shot his 44 azalea for me, so I thought I should send him some of my flowers. I guess Tim Bray is too busy with his new job to take snapshots of his lawn. The tag got lost you see and my head being filled with essentials like Boo leaves little room for flower names other than simple ones like the rose and the sunflower. While the perils were preached before their subjects have, WiFi is now commonly available which means those perils are now common as well. Typically, they are poorly protected servers or home PCs with broadbands which are hijacked by hackers, supposedly even traded like Yu-Ki-Oh cards in the hacker community, and used to increase scalability to their attacks and to reduce likelyness of capture. Spyware is software running on desktops that monitors user activities and report back to it's master. Most of them are just privacy violators, some are used for more sinister purpose and are called trojans. Earthlink recently claimed that 51 PCs had, on the average, 28 spyware installed. While I think the claim is 52 over-hyped to fit their agenda, spyware is nonetheless common place and it's not difficult to place one on anyone's compure. If your PC is more than six months old, chances are that there were plenty of opportunities for hackers to seed it with spyware. So here is the scene: imagine a new class of spyware that monitors wireless network packets using code from these 53 open source wiretapping tools. AirSnort and one of the ARP poisoning packages should be enough. Now imagine this spyware being delivered to laptops with WiFi cards that supports features AirSnort needs. The laptop just became a new kind of zombie, which I call wireless zombie, that only wakes up when the WiFi card is used. All that is missing from the scene is the stage: a WiFi hotspot like Starbucks. The laptop owner sits in a corner and access the Net through the WiFi, it could even be someone like me writing this very blog post. The spyware wakes up and starts monitoring the wireless traffic looking for passwords and credit card numbers. If very strong encryption is used, wireless zombies can form a global grid and split up the work of cracking encryption keys. Once a month, the zombies reports back to their master via USENET posts. This Zombies at Starbucks scenario is particularly nasty because the potential number of compromises is just staggering. Maybe the FCC will have to dictate higher level of standards and send out a warning that helps WiFi users detect wireless zombies by the unusual fan activities triggered by the zombie grid working overtime. I feel rested but it's the kind of restful feeling one gets lying on the asphalt and lookup at the blue sky after getting hit by a truck. I never been in such an accident but I was in a head-on motocycle collision when I was young and found myself in a slow-mo flying through the air scene. I think the middle and the end part of an accident is a very tranquile place to be. One of the first news item I read was this 57 Wired piece on the national missile defense system which prompted me to wonder if we'll ever have a national virus defense system along with virus tax levied against companies whose vulnerabilities are used by virus found at the 'wall'. E-commerce tax is not popular among netizens, but I think taxing to improve the Net and to encourage better software and services might find more favorable support among netizens. I like practically everyone in it but often it's difficult to post things without giving off unintended bad vibes. When I have an opinion, I have to say it like I have to fart when I have gas. But letting one loose can cloud up the room and you know that blogosphere is a really big room where you can't pretend it's someone else. While some might deny it or might not even be aware of it, there are definitely cliques to which people and even companies belong to or are associated with by themselves or by others. When I say something negative about something one of them did, I am doing so as if I would offer an advice to a friend, but it's often seen as if I am attacking the clique as a whole. I have been busy with a project for a client and I have barely managed to get enough sleep in the last six days because I have to deliver by this Sunday something that will wow people into opening their pocket next week. As usual, it's a lonewolf project because there is neither the time nor resources to pull together a team. I am trying to slip in some fancy design features for flexibility but it's mostly wham-bam-stay-out-of-my-way-fool and I'll-fix-that-later going on. Yeah, it's Silicon Valley at its best since crash projects like these are impossible to outsource. Days of milking fat mega-corporations on multi-year projects are gone and lean mean shoot-from-the-hip or work-for-nickles days are here.