[I've been busy]
Michael ODonnell [EMAIL PROTECTED] writes:
I have a semi-mongrel collection of libraries on a
system that I'm planning to turn over to a client as
a development platform for a coding effort that'll be
making heavy use of pthreads in combination with signals.
We already
Ken D'Ambrosio [EMAIL PROTECTED] writes:
Not sure... after all, you need the Internet infrastructure -- with a
fair bit of bandwidth -- in place to take advantage of it. I believe
calls are ~80kb/s, including TCP overhead, which is a fair bit more
than analog can cope with.
RTP nearly
Brian Chabot [EMAIL PROTECTED] writes:
Of course xinetd is making connections on 110.
Sorry. Of course I meant 113.
The interesting thing I found is this:
# lsof -r -i tcp:113
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
xinetd 8017 root0u IPv4 1639491
Thomas Charron writes:
Additionally, it deals with messages. Well, differently. Messages
are displayed and stored more like newsgroups then email. It keeps
track of conversation threads.
I'm curious: did whatever email client you used before Gmail handle
threads or not?
Does Gmail
[EMAIL PROTECTED] writes:
While we have used Outlook with IMAP with some success, it is far from
perfect. It is mail only. Contacts, calendar, and so on are still stored
in a .PST file on each workstation. (PST is a self-destructing file format
that even Microsoft Exchange fans hate.)
Is there any way to configure Evolution to use shared/public calendars
in conjunction with an Exchange server. Suppose I don't have the
Exchange Connector.
Obviously, what I am trying to prevent/manage is being invited to 1
meeting at the same time. I've also noticed that people who are
Bruce Dawson [EMAIL PROTECTED] writes:
I'm not sure if this will fit your bill or not, but you can use the
Publish Free/Busy Information button. Its not as easy to use as
Exchange, and it doesn't seem to work everywhere, but its there.
Note that you'll have to have everyone look at your
Bruce Dawson writes:
On Wed, 2004-08-18 at 09:30, Kevin D. Clark wrote:
Using this feature basically would mean that I'd have to manually send
bits and pieces of my schedule to *everybody* who could conceivably
schedule me for a meeting. Hmm. This doesn't seem too convenient.
OTOH
Ben Scott writes:
Do either support MAPI? That is, do they provide seamless Microsoft
Outlook integration? Not just IMAP mail (which Outlooks has limits with
anyway), but contacts, calendar -- the whole Outlook store. Right or wrong,
that's what a lot of people want.
What does MAPI
Travis Roy [EMAIL PROTECTED] writes:
Okay, so basically what I'm looking for, is there an easier way to do
this? What would be good options to automate this? I have our IP
ranges, it would be nice to just feed them in then get a list of what
IPs are connect to whatever switch port.
Does the
Some of the members of this list have not signed Gmail's user
agreement (let's call this Group A). Others have (let's these people
Group B).
It takes some amount of effort to belong to this group. Why should
the efforts of Group A be available to Gmail (in the form of raw data,
marketing data,
Jeff Macdonald [EMAIL PROTECTED] writes:
Some one, be it a company or an individual, is going to 'profit' in
some way from content on a mailing list. I don't think that's bad.
OK, let's apply Occam's Razor for a moment and ignore the issue of
whether the mail in question comes from a mailing
Writing secure code is very difficult:
http://www.newsfactor.com/story.xhtml?story_title=Mozilla-Security-Nightmare-Beginsstory_id=25807
Regards,
--kevin
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
Brian Chabot [EMAIL PROTECTED] writes:
I've found in *most* (not all) situations, no one ever uses the
integrated calendar functionality in Outlook.
My experience is that this is false.
[snip]
1. Use a web interface. One client I had was impressed that you never
had to install software
Thanks to those of you who were kind enough to respond to my query
about wireless cards. After looking through the responses, I was led
to this site:
http://www.linux-wlan.org/docs/wlan_adapters.html.gz
I don't know if this is a complete list, but I found it to be very
useful when I was
Chris [EMAIL PROTECTED] writes:
[EMAIL PROTECTED] wrote:
On Sun, 13 Jun 2004, at 9:40pm, [EMAIL PROTECTED] wrote:
... shared secrets went out in the 1980s ...
Maybe, but SNMP V3 still uses it..
That's hardly an endorsement. SNMP's approach to security issues has
I'm especially interested in how well the card works with Linux.
Performance, stability, and driver support. Ideally, I like finding a
full-featured, GPL driver in a mainline kernel. Third-party Open Source
drivers are also okay. Binary-only modules are unacceptable.
I have pretty much
Michael ODonnell writes:
I'd also be curious to know whether Cisco has ever tried to
enforce it.
Of course, you can be curious, but your curiosity will probably
forever remain unsatisfied.
You know how patents work: a lot of the time they're used as a
defensive mechanism, and in most of the
Larry Cook [EMAIL PROTECTED] writes:
What you're asking for is kindof weird
Yes, I guess it is. Let me explain:
A POP3 server I use doesn't send a response on occasion. This causes
Mozilla to stop checking that POP3 account because the connection is
still up. And the connection just
I have a silly question about OpenOffice.
I have some spreadsheets with some data that I am collecting. Within
these spreadsheets, to help me interpret the data, I have setup some
graphs.
These graphs are useful, but I also need to take these graphs and
generate encapsulated postscript from
Larry Cook [EMAIL PROTECTED] writes:
Does anyone know of or have a utility that can drop TCP connections
without killing the process that made the connection?
Warning: Cisco's sleek black gunships are speeding towards your office
right now. Ha ha. At least they're not sending their
Kenneth E. Lussier writes:
Can anyone suggest any other good sites for information on building
beowulf clusters or parallel processing?
I highly recommend grabbing a copy of MPICH, a freely-available
implementation of MPI. I use this all the time, and it is of very
high quality. It is
Cole Tuininga writes:
This definitely depends on your setup. I have a couple systems running
spamd as root to allow it to su to the given user. It works quite well.
Did you roll your own code to handle the su-ing to a given user, or
did you get some code from somewhere? IIRC, I had to
I haven't messed around with my SpamAssassin setup for a while now,
except to enhance some of the basic scoring checks.
However, I recall that I encountered two problems when I attempted to
use SpamAssassin's spamd/spamc combination:
o my databases for spam/ham wordlists seemed to get
[EMAIL PROTECTED] writes:
Just got a question from a friend who is looking for a sniffer
to capture network session traffic so he can dump packets to
look at certain anomolies that seem to be occurring. All I am
familiar with is tcpdump, wondered if there's anything easier
to configure and
Jared Watkins [EMAIL PROTECTED] writes:
I'd like to get an impression of what traffic is like between these
places... if anyone on list does this commute... and if it's at all
reasonable to expect to be able to live somewhere in NH and work in
cambridge.
Another possiblity that I haven't
[EMAIL PROTECTED] writes:
Here's the real problem description.
Electronic voting machines are feared to be vulnerable to
hidden malicious code (Easter eggs) that could subvert voter
intentions and deliver votes to the wrong candidates. One
proposed solution is to require paper ballots be
Travis Roy [EMAIL PROTECTED] writes:
I also don't think that any company that is writing software for these
electronic voting machines is going to try to fix the elections.. The
risk is far to great for the companies and the people running the
companies. That's not to say an outside party
[EMAIL PROTECTED] writes:
From: [EMAIL PROTECTED] (Kevin D. Clark)
Think about what you're asking for [...]
I did, and your PERL multi-liner might be the way to solve it.
I hope that you were being as facetious as I was.
--kevin
___
gnhlug
[EMAIL PROTECTED] writes:
Hint to others, I would also appreciate greatly any other
similar tools to the Bullseye coverage analyzer, pointers
thereto and discussion thereof.
Hint to you: what you asked for is a solution to a very difficult
problem. A tool like Bullseye (or PureCoverage,
[EMAIL PROTECTED] writes:
Requirement is to be able to take an executable image and
determine every reference to specific data item(s) by
simulating execution of every possible code path. In other
words, the equivalent of setting a debug watchpoint on a
variable (or small set of variables,
|son|daughter)/i
score MARRY_YOUR_RELATIVE 1.5
body OBFUSCATED_EBAY_SCAM /\bF.?[o0q].?r.?t.?u.?n.?e\s+W.?[i1!|[EMAIL PROTECTED])/i
score OBFUSCATED_EBAY_SCAM 2.3
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
Marc Nozell writes:
Create a little gif or jpg image that displays your email address.
The downside of this scheme is that it makes the site inaccessable to
those who are visually impared.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com
); /* ...and not this */
Regards,
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED])
ADVERTISEMENT: On Sunday May 2nd, I'm riding my bicycle 100 miles
in the American Diabetes Association's Tour de Cure ride. If you're
interested in sponsoring me, please send me email
Ted Roche writes:
I would welcome experiences and opinions (like I have to ask!) on the
various database backends available.
If all you need to store are key/value pairs and you don't need SQL or
network access, Berkeley DB is very nice/fast/reliable/portable.
Regards,
--kevin
--
Kevin D
good toolbox and know how to use the tools,
life is good.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http
;
}
}, .);
Of course, you can easily generalize this to your particular problem.
Hope this helps,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
. This shouldn't be a big deal.
Again, thanks to everybody for their comments!
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
the track changes
feature. I know about this. I guess that I'm asking about something
else. BTW, I have confirmed that show changes in OpenOffice doesn't
show me the reviewer's changes.
Thanks for your help,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com
can help when the protocol in question doesn't support
multicast.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED
distributions. Are these
people {de facto} idiots?
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http
/securityAlert/8.html
If you're running a SMTP server on a win32 box and you're using Zone's
software, this update is important to you.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
Travis Roy writes:
Pretty charts and graphs are a big plus :)
I suggest MRTG and RRDtool.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
yourfile.pl)
Regards,
--kevin
--
Kevin D. Clark (cetaceannetworks.com!kclark) | Will hack Perl for
Cetacean Networks, Inc. | fine food, good beer,
Portsmouth, N.H. (USA)| or fun.
alumni.unh.edu!kdc (GnuPG ID: B280F24E
? If so, can you
try a traceroute to www.gnhlug.org?
Why are the archives no longer publicly accessible?
(http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss sez
The current archive is only available to the list members.)
Thanks,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth
also heard other people mention
on this list that MailMan can take care of this. I strongly recommend
that the maintainers of the archive consider these two avenues.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E
tell traceroute to use TCP on port 25?
What does 'tcpdump tcp port 25' say?
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL
'tcpdump host my-computer tcp port 25 or ip proto icmp
produce when run on or near the computer that is trying to connect to
my-computer?
If you don't run this or the moral equivalent to this, it's going to
be difficult to diagnose your problem.
--kevin
--
Kevin D. Clark / Cetacean Networks
you show us your .fetchmailrc? (sanitized, of course)
What appears in the fetchmail logfile when you invoke fetchmail with
--verbose?
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
It seems to me that if Habeas is successful in protecting its
copyright, then the spammers will be the losers here.
Nobody should be surprised that a spammer violated Habeas' copyright.
--kevin
--
Colder then a welldigger's ass.
-- Tom Waits
___
.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
This all looks good to me, no?
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman
Bob Bell writes:
On Fri, Nov 07, 2003 at 05:15:30PM -0500, Kevin D. Clark wrote:
Steven W. Orr writes:
Another way to go is for your C program to fork and exec a child
process to be the tee. Then the shell script would also inherit
the stdout/stderr descriptors which are also shared
Kenny Donahue writes:
I have a c program that gathers a bunch of information then writes
this information to a file. The c program then calls a bash script with
the file that was created as an argument. The bash script sources the
file and does things according to what was set in the file.
Did you mean to send out a blank email? I couldn't see any text in
your message (aside from the quoted text).
Kind regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
with great success)
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug
Cole Tuininga [EMAIL PROTECTED] writes:
I guess my first question would be How do I change exim to deliver to
maildir format? I haven't had a chance to look at the links that have
been sent to me yet, so it's very possible I will find the answer there.
Not sure here.
My next question
Travis Roy [EMAIL PROTECTED] writes:
Installing extra software, like what? If you're running RH9 how hard is it
to type:
rpm -Uvh http://www.xmms.org/files/1.2.x/rpm/rh9.x/xmms-1.2.8-1.i386.rpm
That's really a hassle?
It's not a hassle for me, I guess.
(although I love the little
in Perl is a nice bonus,
methinks. (-:
Anyways, I just wanted to let other people know about this useful
program.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
[EMAIL PROTECTED] writes:
Okay, so I swapped out pump for dhclient, and I still get nothing!
I've set the eth1 address to 192.168.100.5, and set the route up:
route add -net 192.168.100.0 gw 192.168.100.1 netmask 255.255.255.0 dev eth1
and still can't ping anything.
Let's have
[EMAIL PROTECTED] writes:
I found this IP on the web somewhere after googling around. The
question I have is this, how can I access a network for which I have
no route?
# assumes eth0 is your external nic
# 10.1.2.3 is arbitrary
ifconfig eth0 10.1.2.3
route add 192.168.100.1 eth0
[EMAIL PROTECTED] (Bill Sconce) writes:
There are very few ways to get buffer overflows.
1. Use assembly language.
2. Use C.
Obviously, in many circles, C is referred to as high-level assembly
language...
What's depressing is that we keep doing the same thing over
again (we'll still use
or not,
they're not at fault here (well, except for the fact that there's a
need to patch in the first place...).
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
Travis Roy [EMAIL PROTECTED] writes:
3rd one in two days... that's just bad.
I'd say that it was more unfortunate than bad. Writing useful,
correct, and secure software isn't easy.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark
have to move away from
this simple one-liner to do this.
Hope this helps,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL
stream (SMTP), so why bother spending the CPU cycles to
encrypt it for the last few steps?
In practice, how would either scheme interact with the anti-spam,
reverse-DNS schemes employed by certain MTAs?
I'm still mulling this over, myself.
--kevin
--
Kevin D. Clark / Cetacean Networks
notation...
Regards,
--kevin (who is ecstatic now that he found the bug he looked for all
day long)
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
in a later post, exactly *what* the compiler does for
these cases is implementation defined.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss
=512 };
char arr[BUFSIZE];
I use this frequently, and I recommend this.
I believe that C++ const variables can be used wherever a
simple #define can.
Well, they can be used for array initialization too.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA
in
there. const most certainly exists in C.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http
of pointers, but you
shouldn't care about this.
There you go.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED
if it can.
lsof | awk \$4 ~ \cwd\ \$NF ~ \^$YOUR_DIRECTORY\$\ { print }
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
on it*)
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
, it doesn't sound like you're looking for a bulletproof
solution, so I guess these points are moot.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
there was a config file for getty or login or something,
that let you modify which devices this occured for. I have yet to find this
file on my linux machine...
The file that I think that you want to look at is:
/etc/security/console.perms
Hope this helps,
--kevin
--
Kevin D. Clark / Cetacean
I vote that we:
1: Not require people to strip email addresses from the headers and
body of posts. This is too much work. Humans shouldn't have to
do this.
2: Keep the archive going, keep it world-accessible
3: Obfuscate email addresses in the web-archives. Many, many lists
pointers?
What you probably want is a H.323 Multiple Call Unit (MCU).
I'd recommend checking out the stuff at http://www.openh323.org/ .
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
the caps-lock key,
especially for Real World programming.
--kevin (who never uses the caps-lock key, and who would die without
xmodmap)
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
Derek Martin [EMAIL PROTECTED] writes:
On Thu, Jul 31, 2003 at 09:58:51AM -0400, Kevin D. Clark wrote:
So I guess that what we're saying is that people who don't use
emacs need Caps-Lock, because their editors are toys? (For the humor
impaired: :^) )
(-: I guess that the vi
Derek Martin [EMAIL PROTECTED] writes:
On Thu, Jul 31, 2003 at 11:46:12AM -0400, Kevin D. Clark wrote:
If you want to use your caps lock key, use it. Myself and other
people think that it is a useless key.
[snip]
But why hate it?
Remember, I said that I found the key to be useless
Tilly, Lawrence [EMAIL PROTECTED] writes:
I think the reason many techies hate the capslock key can be summed up in three
letters: A O L
Yes, but [EMAIL PROTECTED] was pretty funny in his time.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA
depend on C99 features.
Perl could be enhanced to support these features on C99
conformant platforms, probably most easily by writing a module.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
Stephen Ryan [EMAIL PROTECTED] writes:
Aha! Google for round to even -- it's an IEEE floating point
computation rule.
Note that many systems *can* do IEEE floating point, but by default
don't, since using the native floating point implementation can yield
better performance.
Regards,
Bob Bell [EMAIL PROTECTED] writes:
On Tue, Jul 22, 2003 at 05:13:03PM -0400, Kevin D. Clark [EMAIL PROTECTED] wrote:
*3* Interesting fact of the day: Using binary, it is possible to
exactly represent some numbers that cannot be exactly represented
in base-10.
Can you name
Mark Komarinski [EMAIL PROTECTED] writes:
Perl with a code formatter? I think that's one of the signs
of the apocalypse.
Another sign would be a Python one-liner or the announcement of an
Obfuscated Python Contest.
Ha ha.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H
not be saved in the clear. Hmm.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman
.
Come to think of it, this would solve the encryption side of the
problem as well.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss
, if the file
isn't ascii-armored)
:%!gpg --decrypt
Edit your file to your heart's content
:%!gpg --encrypt
:wq
That's the general idea.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu
misconceptions that I have about any of
this)
Thanks,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http
Derek Martin [EMAIL PROTECTED] writes:
Since my posts are not archived by any of the mailing lists
I'm on these days, I receive almost no spam, in absentia of any RBL
configuration or spam filtering software.
I'm curious: for those of you who post using X-No-Archive, have any
of you ever
.
A couple of other things:
1: A bit of netiquette. If you respond to my email privately, and I
reply to your reply privately, then it's not OK for you to
subsequently reply and CC: a public mailing list.
2: PLEASE DON'T TOP-POST.
--kevin
--
Kevin D. Clark / Cetacean Networks
the changes to take
effect.
Regards,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman
think that the rule that Outlook uses is try to always do the wrong
thing.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL
[EMAIL PROTECTED] (Michael O'Donnell) writes:
I've checked that do-not-call site several times today
and it's been unresponsive - I think they're swamped.
Hmm. They seem to be running IIS.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark
this? Pointers
on where to start looking/downloading?
Aside from your requirement that there be a window system, I'd
recommend Bering.
Hope this helps,
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
Ben Boulanger [EMAIL PROTECTED] writes:
Then by this logic, -anything- you do, except for pulling the drive and
mounting it in a system or booting off of a CD is suspect. While the most
correct way, it's also the most impractical. You can find rootkits on
systems with a much more minimal
Derek Martin [EMAIL PROTECTED] writes:
I don't even disagree with you.
Actually, you and I argued about this a long time ago on this list.
But if you don't disagree with me now, that's great.
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark
[EMAIL PROTECTED] writes:
When did Google change the logo on their website to the Escher-esque
style? While I like the new logo, I think I liked the old one
better, at least it added *some* color to the site :)
Google frequently changes their logo, especially on the birthdays of
famous
boggles. (and the scalp singes...)
--kevin
--
Kevin D. Clark / Cetacean Networks / Portsmouth, N.H. (USA)
cetaceannetworks.com!kclark (GnuPG ID: B280F24E)
alumni.unh.edu!kdc
___
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman
401 - 500 of 582 matches
Mail list logo