Berkeley CSUA MOTD:Entry 37199
Berkeley CSUA MOTD
2018/10/20 [General] UID:1000 Activity:popular

2005/4/15-17 [Computer/SW/Security, Computer/SW/Apps, Computer/HW/CPU] UID:37199 Activity:nil
        The lead author is a (recent) cal alum.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2018/10/20 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
2011/2/14-4/20 [Computer/SW/Unix] UID:54039 Activity:nil
2/14    You sure soda isn't running windows in disguise?  It would explain the
        \_ hardly, My winbox stays up longer.
        \_ Nobody cares about uptime anymore brother, that's what web2.0 has
           taught us.  Everything is "stateless".
           \_ You;d think gamers would care more about uptime.
2010/8/12-9/7 [Computer/SW/Languages/Perl] UID:53922 Activity:nil
8/12    Ruby coders, do you mostly DIY your stuff or use the ruby libs out
        there?   How is their quality compared to other libs you have used
        for other langs?  Thx.
        \_ I use Ruby for hobby stuff, etc.  I use libraries for system stuff
           (web access, process, etc.) but that's about it.  Perl libraries are
           much better/more complete.  I assume because of the maturity and
2010/2/22-3/12 [Computer/HW] UID:53723 Activity:nil
2/20    There was a failure validating the SSL/TLS certificate for the server
        The reason for the failure was
                          self signed certificate in certificate chain (details)
        We have not verified the identity of your server. If you ignore this certificate validation
        problem and continue, you could end up connecting to an imposter server.
2003/10/22-23 [Computer/SW/WWW/Browsers] UID:10726 Activity:nil
10/21   If you were as impressed with Mozilla Firebird 0.7 as I was,
        wait until you turn on pipelining:

        Look for pipelining, but instead of using user.js, go to
        about:config and use that interface to change the three pipelining
        options. That's what worked for me. --aaron
2003/5/12 [Computer/SW/Languages, Computer/SW/Compilers] UID:28412 Activity:kinda low
5/11    What is "software pipelining"? Is that like multithreaded stuff
        doing the same task on different processors? I understand hardware
        pipelining completely (took cs152), but don't understand what
        software pipelining is. ok thx.
        \_ It's a way of reducing loop overhead (much like loop-unrolling).
           SW pipelining works by taking replicating the loop body several
2000/7/29 [Computer/HW/CPU] UID:18812 Activity:moderate
7/28    The Athlon architecture is often described as "having lots of
        headroom" as compared to Pentium.  But what does changing
        architectures buy you in the Mhz race?  Why will the P4 be able to
        make 100 mhz improvements where the P3 allows 33Mhz?
        \_ In general, newer architectures are pipelined more heavily,
           so for a given process, the clock to clock delay is shorter,
1998/5/7-8 [Computer/HW/Drives] UID:14066 Activity:low
5/6     Hi, I'm building my own Linux server from scratch. Can someone tell
        me what the approximate performance gain I would get by using two
        SCSI drives (one for kernel/binary/swap, the other one for user only)
        versus two EIDE-4 drives? There is a pretty sizable price gap. THANKS.
        \_ post to ucb.os.linux for access to clueful opinions
        \_ Serving what? With only two drives SCSI will most likely not gain
Cache (3051 bytes)
CAMBRIDGE, Massachusetts (Reuters) -- In a victory for pranksters at the Massachusetts Institute of Technology, a bunch of computer-generated gib berish masquerading as an academic paper has been accepted at a scientif ic conference. Jeremy Stribling said Thursday that he and two fellow MIT graduate studen ts questioned the standards of some academic conferences, so they wrote a computer program to generate research papers complete with "context-fr ee grammar," charts and diagrams. The trio submitted two of the randomly assembled papers to the World Mult i-Conference on Systemics, Cybernetics and Informatics (WMSCI), schedule d to be held July 10-13 in Orlando, Florida. To their surprise, one of the papers -- "Rooter: A Methodology for the Ty pical Unification of Access Points and Redundancy" -- was accepted for p resentation. The prank recalled a 1996 hoax in which New York University physicist Ala n Sokal succeeded in getting an entire paper with a mix of truths, false hoods, non sequiturs and otherwise meaningless mumbo-jumbo published in the quarterly journal Social Text, published by Duke University Press. Stribling said he and his colleagues only learned about the Social Text a ffair after submitting their paper. "Rooter" features such mind-bending gems as: "the model for our heuristic consists of four independent components: simulated annealing, active ne tworks, flexible modalities, and the study of reinforcement learning" an d "We implemented our scatter/gather I/O server in Simula-67, augmented with opportunistically pipelined extensions." Stribling said the trio targeted WMSCI because it is notorious within the field of computer science for sending copious e-mails that solicit admi ssions to the conference. which ex ist only to make money," explained Stribling and his cohorts' website, " SCIgen - An Automatic CS Paper Generator." "Our aim is to maximize amusement, rather than coherence," it said. The w ebsite allows users to "Generate a Random Paper" themselves, with fields for inserting "optional author names." " Nagib Callaos, a conference organizer, said the paper was one of a small number accepted on a "non-reviewed" basis -- meaning that reviewers had not yet given their feedback by the acceptance deadline. "We thought that it might be unfair to refuse a paper that was not refuse d by any of its three selected reviewers," Callaos wrote in an e-mail. " The author of a non-reviewed paper has complete responsibility of the co ntent of their paper." However, Callaos said conference organizers were reviewing their acceptan ce procedures in light of the hoax. Asked whether he would disinvite the MIT students, Callos replied, "Bogus papers should not be included in the conference program." Stribling said conference organizers had not yet formally rescinded their invitation to present the paper. The students were soliciting cash donations so they could attend the conf erence and give what Stribling billed as a "completely randomly-generate d talk, delivered entirely with a straight face."