jcl

Linux Experts
  • Content Count

    1299
  • Joined

  • Last visited

Everything posted by jcl

  1. Yahoo! and Google had a similar relationship years ago. It doesn't seem to have worked out for Yahoo!.
  2. Opposition to use of tracking cookies on government sites sparks mental health concern.
  3. The first thing I thought when I saw the preview image was "this looks like a porno". Then I saw Kato's name and closed the tab.
  4. Did you format sdb or sdb1?
  5. The exploit was released the day after a workaround for the vulnerability was committed to Linus's tree.
  6. No, I'm suggesting that someone connected to one of the intelligence committees leaked the story. The White House or CIA might have wanted to reveal the existence of the program but I can't image why they'd want leak the details of the congressional briefing. The timing probably was a coincidence. However, the story was still leaked for a reason. It could have been something as simple a moral outrage, but I'd like to think that the political class is competent enough to exploit stories with as much political value as this one.
  7. So you figured out what user owned the sessions you saw in the log? The server should be secured and backed up. The ARP table maps layer 3 addresses onto layer 2 addresses. That's it. Having an entry in the table doesn't imply that a host is trusted. Not everyone, no. In any case, I think everyone here uses Windows.
  8. Why are you afraid of that? Have you considered the possibility that it's completely benign? Do you know what whatever it was was doing? Nearly everything you can do on a network takes advantage of the ARP table. You need to confirm that you've been attacked first. I have no idea what that means. What do you mean "ping in" and what are you using to view the ARP table?
  9. There's more to it than possible government waste. This story coincidentally broke shortly after it became clear that the health care reform plan was going down the toilet. It's entirely possible that the story was leaked to distract the public from the failure of the health care proposal. That normally wouldn't be cause for concern, but I've heard rumors that Congress is working on a rush compromise that could potentially do to health care what Patriot Act did to national security and TARP and the stimulus did to fiscal policy. Not the sort of thing that I would want passed without intense st
  10. 255.255.255.255 is the local broadcast address. 172.16/12 is reserved for private use. Odds are that 255.255.255.255 'pings' are DHCP traffic and the source is your DHCP server. IOW, you filtered your own network. Filter multicast traffic and stick Post-it on your monitor so you'll know what to undo. "spid <number>" is probably a session ID. If this is MS SQL, you can use the sp_who stored procedure to look up the user and host associated with the session. ARP usually isn't responsible for strange things. It's going to, regardless. There's no reason to believe that it is, but, sure
  11. Er, no, I didn't mention them together. I didn't mention Clinton's at all until the last paragraph of my last post. Cheney's out of office. Congress has been informed. The program appears to have been benign. It's over. If people fell compelled to punish Cheney, they can do it themselves; there's no reason to waste government resources on people's childish urges.
  12. I meant that he wouldn't have been convicted if Congress had impeached him. Convicting Cheney would have required a 2/3rds majority in the Senate and at the time the Democrats had 49+2 votes, give or take. It's unlikely that 16 Republicans would have defected. Grrr. I didn't equate them. I didn't even compare them. I was talking about the impeachment itself, not the actions that led to it. I could just easily have used Andrew Johnson's impeachment as an example. Clinton's actions could have left him vulnerable to blackmail. People who have affairs can lose their security clearance for precis
  13. By doing what? They can't even investigate the allegations unless the members and staff of the Committee have the required security clearance or the White House declassifies the program. They'd both be in the "impeached but not convicted" category.
  14. So far it only seems to be a problem for Obama. No one is surprised that Cheney or the CIA would withhold information from Congress, so, at worst, this is a bit more evidence to support people's prior beliefs. Obama, on the other hand, is in a predicament: if he takes action against Cheney or any former CIA officials, he'll be compromising his (apparent) belief that we should put the Bush years behind us and move on, and setting a precedent that could come back to haunt him. On the other hand, if he doesn't take action he looks like he condones, or even supports, Cheney's behavior. I think I
  15. No one obeys these laws and no one expects them to be obeyed. I mean, Christ, if this story is accurate, we only know that this program exists because someone leaked the contents of a classified briefing to the NYT.
  16. Wait a second. If I'm reading the original post correctly, there was a hidden directory named "gzip" directly under %APPDATA%\Mozilla\Firefox\. So... what is that directory? AFAIK Firefox doesn't use %APPDATA%\Mozilla\Firefox\ for anything except profiles and crash reports and doesn't hide directories at all. The directory doesn't exist on either of the machines I've checked.
  17. If I'm not mistaken, a decompression bomb is a file that decompresses into an effectively infinite amount of data.
  18. The law would have made more sense if you hadn't omitted the sentence that explained why the permits are needed. I won't comment on the irony.
  19. Current films don't have the benefit of nostalgia. Anyway, Harry Potter. If G.I. Joe is hilariously bad, it'll move to the top of the list, but I'm not optimistic.
  20. The Scorpio and X25-M are SATA 3 Gbit/s drives. The X25-M practically requires 3 Gbit/s.
  21. jcl

    Spy Are

    It's a spam blog.
  22. The World Health Organization. It's simple, fast, and there are numbers so it must be Science. "Never attribute to malice that which can be adequately explained by stupidity." On the other hand, the insurance industry's adoption of BMI probably was motivated by malice.
  23. As far as I know, CCCP and K-Lite are essentially the same software. The installers, default settings, and whatnot are different but not enough to really matter.
  24. You should see it here. It looks a ransom note made out of newspaper clippings. If I bump the size up one notch, the weight increases to ultra-bold and it looks like box drawings.
  25. Ask society. It doesn't involve me and I don't care.