XChat urlfix updated for 2.6.4
Posted by Eric Stein - June 19, 2006 CE @ 05:34:53 UTC
Today I saw that XChat was at version 2.6.4, newer than the 2.6.2 version I patched last month to make the URL handling nicer. I've checked my patches against the latest version and it's still operational. The download page now contains patched sources for 2.6.4 in addition to the older patched code.
For more information, check out my XChat URL handling fix.
To the comments...For more information, check out my XChat URL handling fix.
Caldera OpenLinux - ...what?
Posted by Eric Stein - June 18, 2006 CE @ 04:32:42 UTC
OK, to start off, this whole thing is completely insane. To understand what I'm talking about here, you might want to read:Published on the 16th, this press release claims that SCO will be releasing a new version of Caldera OpenLinux, which as been stagnant for years. Here's the best part:
There are a few possibilities that I'm currently considering:
I doubt very much that this is the intent of SCO - and not only because I think they have at least some business sense. Nobody in their right mind would fork the 2.5 kernel code for a production system.
To the comments...To provide extensive reliability and performance features, the Linux Kernel 2.5 codebase has been merged with recently developed additions to SCO's world leading UNIX core operating system. Already contained code owned by SCO is still included benefiting the stability and overall experience opposed to recent Linux kernel releases.
Now, anyone who is aquainted with the GPL and SCO's history will realize that something is VERY VERY WRONG here. SCO's entire set of lawsuits against Linux users & distributors is that the "already contained code" could not be legally included in Linux. Publishing it this way would (through the GPL) force that code to be licensed under the GPL.There are a few possibilities that I'm currently considering:
- The press release is fake
- The press release is real, and indicates that SCO is giving up litigating against Linux
- The press release is real, and indicates that SCO intends to violate the GPL by selling modified binary forms of Linux without source code
1) The press release is fake
Besides the overall tone of the release, we have this:eastein@pippin:~$ host openlinux.org
openlinux.org has address 131.188.40.90
openlinux.org mail is handled by 10 openlinux.informatik.uni-erlangen.de.
openlinux.org mail is handled by 50 fauern.informatik.uni-erlangen.de.
openlinux.org mail is handled by 100 mailhub.rrze.uni-erlangen.de.
eastein@pippin:~$
The www.openlinux.org website is hosted by a university in Germany? That seems a bit off to me. For more details, check out the article on this over at groklaw.net.openlinux.org has address 131.188.40.90
openlinux.org mail is handled by 10 openlinux.informatik.uni-erlangen.de.
openlinux.org mail is handled by 50 fauern.informatik.uni-erlangen.de.
openlinux.org mail is handled by 100 mailhub.rrze.uni-erlangen.de.
eastein@pippin:~$
2) SCO is giving up
Considering how poorly their case has been going over the last few years (and how reluctant they have been to let it go to trial), this isn't that unlikely. Quitting while they're ahead and encouraging SCO UNIX users to switch to an SCO commercial Linux distribution would be a good business move.3) SCO wants to invalidate the GPL
If SCO does produce a new version of Caldera OpenLinux containing their proprietary source code merged into the Linux kernel code and not also release their source code, they will be violating the GPL. If they do that, there is absolutely no chance that the EFF will not grab the chance to start a class action lawsuit on the behalf of Linux kernel developers. The only logical reason for SCO to take this path is to attempt to invalidate the GPL in court - however, any other outcome from this would be a huge financial judgement against SCO.I doubt very much that this is the intent of SCO - and not only because I think they have at least some business sense. Nobody in their right mind would fork the 2.5 kernel code for a production system.
amaroK partial collection update
Posted by Eric Stein - June 14, 2006 CE @ 00:47:41 UTC
One of the interesting quirks amaroK has is that the automatic collection update (reads metadata from ID3 tags) doesn't reload the data unless the parent directory of the music file has been modified. If you move an mp3 into the directory, this updates the directory's modification time and the file will get scanned. However, if you modify the tags in place with another application (which updates the file's modification time), amaroK will be oblivious. You have to rescan your entire collection for the updates to take effect. Until now, that is.
Note that the ending slash is required - the script was built to work with tab complete.
To the comments...find * -type d|sed 's/$/\//'|egrep "^($1.*)$"|sed -e "s/^\(.*\)$/\"\1\"/g"|xargs -l1 touch
dcop amarok collection scanCollectionChanges
The above script, once installed, can be used like so:dcop amarok collection scanCollectionChanges
update Folder\ To\ Update\ Recursively/
All music files in the folder and its descendants will be updated in a reasonably short amount of time.Note that the ending slash is required - the script was built to work with tab complete.
Unenforceable law and the rule of law
Posted by Eric Stein - June 7, 2006 CE @ 02:10:37 UTC
There are two different basic kinds of government - those that rule arbitrarily and those that rule through law. For the sake of argument, I will assume that rule of law is a superior form of government. In the United States, the US Constitution sets down the rules for how government is to operate. The legislative branch writes laws, the judicial branch interprets them, and the exectutive branch enforces them.
This brings up the topic of unenforced laws and worse, unenforcable laws. The stated purpose of a law is usually to either encourage an activity (usually through financial incentives) or to discourage it. Laws against murder exist to discourage people from killing each other. Then there are the laws that may claim to do something about a perceived bad behavior, but are rarely if ever enforced (but carry heavy penalties). Selectively enforced laws are just as bad - if the law is not intended to be enforced, what is it for? To intimidate the citizens, perhaps?
The fact that the commonly recognized phrase 'throw the book at' even exists is a problem. Constitutional safeguards are there to prevent tyranny - to restrict the government. When a government lets people break its laws for a long period of time, this gives them a false impression that they are not going to get prosecuted for what they currently do.
The huge body of unenforced laws that remain on the books in the US could potentially allow an extreme executive branch to turn our country into a dictatorship overnight. Not to say that that will happen, but it is legally possible.
To the comments...This brings up the topic of unenforced laws and worse, unenforcable laws. The stated purpose of a law is usually to either encourage an activity (usually through financial incentives) or to discourage it. Laws against murder exist to discourage people from killing each other. Then there are the laws that may claim to do something about a perceived bad behavior, but are rarely if ever enforced (but carry heavy penalties). Selectively enforced laws are just as bad - if the law is not intended to be enforced, what is it for? To intimidate the citizens, perhaps?
The fact that the commonly recognized phrase 'throw the book at' even exists is a problem. Constitutional safeguards are there to prevent tyranny - to restrict the government. When a government lets people break its laws for a long period of time, this gives them a false impression that they are not going to get prosecuted for what they currently do.
The huge body of unenforced laws that remain on the books in the US could potentially allow an extreme executive branch to turn our country into a dictatorship overnight. Not to say that that will happen, but it is legally possible.
USA PATRIOT ACT - you should actually read it!
Posted by Eric Stein - June 2, 2006 CE @ 19:09:34 UTC
Ah, the PATRIOT act. There is so much to say that I'm pretty sure you already know I want to say. Today someone mentioned the redefinition of terrorism in the act and it piqued my curiosity - so I popped over to THOMAS and looked it up!
I found section 802 to be of particular import:
To the comments...I found section 802 to be of particular import:
SEC. 802. DEFINITION OF DOMESTIC TERRORISM.
(a) DOMESTIC TERRORISM DEFINED- Section 2331 of title 18, United States Code, is amended--
(1) in paragraph (1)(B)(iii), by striking `by assassination or kidnapping' and inserting `by mass destruction, assassination, or kidnapping';
(2) in paragraph (3), by striking `and';
(3) in paragraph (4), by striking the period at the end and inserting `; and'; and
(4) by adding at the end the following:
(5) the term `domestic terrorism' means activities that--
(A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State;
(B) appear to be intended--
(i) to intimidate or coerce a civilian population;
(ii) to influence the policy of a government by intimidation or coercion; or
(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and
(C) occur primarily within the territorial jurisdiction of the United States.'.
(b) CONFORMING AMENDMENT- Section 3077(1) of title 18, United States Code, is amended to read as follows:
(1) `act of terrorism' means an act of domestic or international terrorism as defined in section 2331;'.
Huh. That definition of terrorism seems a bit broad to you, doesn't it? Not that governments ever abuse power or anything like that...(a) DOMESTIC TERRORISM DEFINED- Section 2331 of title 18, United States Code, is amended--
(1) in paragraph (1)(B)(iii), by striking `by assassination or kidnapping' and inserting `by mass destruction, assassination, or kidnapping';
(2) in paragraph (3), by striking `and';
(3) in paragraph (4), by striking the period at the end and inserting `; and'; and
(4) by adding at the end the following:
(5) the term `domestic terrorism' means activities that--
(A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State;
(B) appear to be intended--
(i) to intimidate or coerce a civilian population;
(ii) to influence the policy of a government by intimidation or coercion; or
(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and
(C) occur primarily within the territorial jurisdiction of the United States.'.
(b) CONFORMING AMENDMENT- Section 3077(1) of title 18, United States Code, is amended to read as follows:
(1) `act of terrorism' means an act of domestic or international terrorism as defined in section 2331;'.
Users - the real problem
Posted by Eric Stein - June 1, 2006 CE @ 09:07:32 UTC
Recently (read: for the last ten years) Microsoft has been continuously blamed for all the computer security woes of the world. Their OS is ridiculed as full of holes while Internet Explorer is lambasted for its amazing ability to toss control of a hapless user's computer to the winds.
There are some very basic reasons for the insecurity of MS Windows.
On platforms where security patches and a firewall aren't enough (e.g. Windows), antivirus and antispyware are needed to stop the user from doing stupid things.
Stop being stupid. You know who you are.
To the comments...There are some very basic reasons for the insecurity of MS Windows.
- the Windows system was designed before networks were very important for most users
- security wasn't the focus of design - usability was
- users were expected to be intelligent
On platforms where security patches and a firewall aren't enough (e.g. Windows), antivirus and antispyware are needed to stop the user from doing stupid things.
Stop being stupid. You know who you are.
All my plans for naught
Posted by Eric Stein - May 30, 2006 CE @ 23:25:29 UTC
Every so often the plan for a perfect crime springs full-formed to my attention. However, my dastardly plots always come to nothing - either because someone else has already thought of and used my ingenious idea or because it just plain old won't work.
After your escape, monitor the stock of the company for a short term drop in value - buy low, sell high! Unfortunately you may well be charged with assault and slander - so you may have to settle for the fun and skip the profit.
To the comments...The Armored-Truck Fraud
As I rode the ski lift through the fog, driving snow, and wind, I realized that a theft of possibly hundreds of millions could be pulled off through a conspiracy. Requirements:- 30 or 40 conspirators
- about $10 million in investment
- no criminal record or morals
The Artificial Stock Depression
Someone on IRC brought up a pastime of his - buying a single stock in a company merely to go to the stockholder meetings and enjoy himself. The activities you can engage in are many:- eating the free food
- criticizing the leadership of the board
- charging the podium with a super soaker
After your escape, monitor the stock of the company for a short term drop in value - buy low, sell high! Unfortunately you may well be charged with assault and slander - so you may have to settle for the fun and skip the profit.
mmm, pancakes
Posted by Eric Stein - May 29, 2006 CE @ 22:53:03 UTC
Pancakes - fluffy but not weak, and not strangely tasting of buttermilk.
Heat griddle and grease (extra credit: use bacon grease for a nice flavor). If water hisses and quickly evaporates when dripped on the griddle, it is hot enough.
Pour about a third of a cup of batter onto the griddle for each pancake. Allow the pancakes to cook until the edges begin to look dry and bubble holes stay open further towards the middles. Flip them but be careful to keep them the on griddle and avoid overlap. If you want them to come out well, avoid dropping them to the griddle too far - gas will be expelled and reduce their fluffyness. When the middle of the pancakes rise into a somewhat convex shape and you can feel with the spatula that there is no liquid batter left, serve fresh with maple syrup!
To the comments...Ingredients:
- 6.75 cups flour
- 0.875 cups granulated sugar
- 3.75 teaspoons salt
- 3.75 tablespoons baking powder
- 5.25 cups milk
- 0.75 cups oil
- 4 large eggs
- REAL maple syrup
Heat griddle and grease (extra credit: use bacon grease for a nice flavor). If water hisses and quickly evaporates when dripped on the griddle, it is hot enough.
Pour about a third of a cup of batter onto the griddle for each pancake. Allow the pancakes to cook until the edges begin to look dry and bubble holes stay open further towards the middles. Flip them but be careful to keep them the on griddle and avoid overlap. If you want them to come out well, avoid dropping them to the griddle too far - gas will be expelled and reduce their fluffyness. When the middle of the pancakes rise into a somewhat convex shape and you can feel with the spatula that there is no liquid batter left, serve fresh with maple syrup!
Apostrophe's arent difficult, people
Posted by Eric Stein - May 29, 2006 CE @ 06:31:49 UTC
There are very few things in life as annoying as misplaced apostrophes. 2 or 3 very simple rules will tell you when and where to use them, but lately it seems that almost nobody knows what those (very simple) rules are. Not to mention that 50% of those in-the-know don't care enough to move a finger half and inch and press down at the correct time. Often the perpetrator is a reasonable and intelligent person - but they hide it well behind their facade of grammatical stupidity.
This awful crime - known to be associated with parking in two spaces, leaving lights on uselessly for hours, and purposefully timing clocks forward in a vain attempt to make oneself wake up on time - is what is known as a 'pet peeve'.
In closing, here is Bob's quick guide to the apostrophe, you idiots.
To the comments...This awful crime - known to be associated with parking in two spaces, leaving lights on uselessly for hours, and purposefully timing clocks forward in a vain attempt to make oneself wake up on time - is what is known as a 'pet peeve'.
In closing, here is Bob's quick guide to the apostrophe, you idiots.
Network neutrality and the future of the Internet
Posted by Eric Stein - May 26, 2006 CE @ 20:38:31 UTC
At the present time, ISPs are generally well behaved. You give them money and they provide a reasonably reliable and fast network connection to the Internet. Using this connection, you can send and recieve packets. All packets are created equal.
Now, a group of ISPs want to make some packets more equal than others. With the laws they are pushing for, ISPs will be allowed to legally extort any online service (this will impact more than the web, remember!) for extra money.
Network neutrality requires that the common carrier rules be applied to public access IP networks. The supporters of Internet network neutrality include Microsoft, Google, Yahoo, and last but not least one of the pioneers of the Internet, Vinton Cerf.
People who care about the online first amendment rights should find out more at save the Internet and sign the petition.
Yesterday, the House Committee on the Judiciary approved the Internet Freedom and Nondiscrimination Act (HR 5417). This is great news, but the future of network neutrality remains uncertain.
To the comments...
Now, a group of ISPs want to make some packets more equal than others. With the laws they are pushing for, ISPs will be allowed to legally extort any online service (this will impact more than the web, remember!) for extra money.
Network neutrality requires that the common carrier rules be applied to public access IP networks. The supporters of Internet network neutrality include Microsoft, Google, Yahoo, and last but not least one of the pioneers of the Internet, Vinton Cerf.
People who care about the online first amendment rights should find out more at save the Internet and sign the petition.
Yesterday, the House Committee on the Judiciary approved the Internet Freedom and Nondiscrimination Act (HR 5417). This is great news, but the future of network neutrality remains uncertain.