The Secret Relationship Between the World’s Two Most Powerful Dynasties
by Craig Unger
Michael Moore but without the spin.
The Secret Relationship Between the World’s Two Most Powerful Dynasties
by Craig Unger
Michael Moore but without the spin.
Wireless Street Lamps for Traffic Monitoring
Posted by michael on Thursday January 15, @10:48AM
from the one-big-hotspot dept.
RMH101 writes “The Register has a story about a UK initiative to create a country-wide wireless data network using street lamps. It’s come to pass through a government initiative to monitor all cars’ speed and location, all the time, everywhere. The company involved, Last Mile, are proposing an intelligent mesh of smart street lamps embedded with storage and wireless networking to create 200MBit network access across the UK, including remote areas not reachable by conventional broadband. Work is due to start this year.”
http://slashdot.org/articles/04/01/15/1410253.shtml?tid=137&tid=158&tid=193&tid=99
Continue reading
Operation
To start the program, type screen. Screen then creates a single window with a shell in it. You now have the ability to detach and reattach, turn output logging on, etc. But mostly screen stays out of your way. You work as you normally would.
-a is the default key used to send a command to the screen window manager. To create a new window, type -a, and then c. Now you have two windows.
To switch from window to window you can type -a n, to go to the next window, -a p, to go to the previous window, or -a and the window number. For example, -a 7 would switch you to screen number 7. How do you detach? -a d, to detach. If you’re viewing screen number 7 when you detach, screen number 7 will reappear when you reattach. To reattach the next time you log in, start screen with the -r flag
Create new screen:
screen -d -R -S test
Detach:
CRTL-A d
List:
screen -ls
Kill the current window:
CRTL-A k
…
Also see
http://www.freebsddiary.org/screen.php
http://kb.iu.edu/data/acuy.html
screen -d -R -S test
-d -R Reattach a session and if necessary detach or even create it first
Options:
-4 Resolve hostnames only to IPv4 addresses.
-6 Resolve hostnames only to IPv6 addresses.
-a Force all capabilities into each window’s termcap.
-A -[r|R] Adapt all windows to the new display width & height.
-c file Read configuration file instead of ‘.screenrc’.
-d (-r) Detach the elsewhere running screen (and reattach here).
-dmS name Start as daemon: Screen session in detached mode.
-D (-r) Detach and logout remote (and reattach here).
-D -RR Do whatever is needed to get a screen session.
-e xy Change command characters.
-f Flow control on, -fn = off, -fa = auto.
-h lines Set the size of the scrollback history buffer.
-i Interrupt output sooner when flow control is on.
-l Login mode on (update /var/run/utmp), -ln = off.
-ls [match] or -list. Do nothing, just list our SockDir [on possible matches].
-L Turn on output logging.
-m ignore $STY variable, do create a new screen session.
-O Choose optimal output rather than exact vt100 emulation.
-p window Preselect the named window if it exists.
-q Quiet startup. Exits with non-zero return code if unsuccessful.
-r [session] Reattach to a detached screen process.
-R Reattach if possible, otherwise start a new session.
-s shell Shell to execute rather than $SHELL.
-S sockname Name this session <pid>.sockname instead of <pid>.<tty>.<host>.
-t title Set title. (window’s name).
-T term Use term as $TERM for windows, rather than “screen”.
-U Tell screen to use UTF-8 encoding.
-v Print “Screen version 4.01.00devel (GNU) 2-May-06”.
-wipe [match] Do nothing, just clean up SockDir [on possible matches].
-x Attach to a not detached screen. (Multi display mode).
-X Execute <cmd> as a screen command in the specified session.
Note: Every screen
 command begins with Ctrl-aÂ
.
Ctrl-a c |
Create new window (shell) |
Ctrl-a k |
Kill the current window |
Ctrl-a w |
List all windows (the current window is marked with “*”) |
Ctrl-a 0-9 |
Go to a window numbered 0-9 |
Ctrl-a n |
Go to the next window |
Ctrl-a  Ctrl-a |
Toggle between the current and previous window |
Ctrl-a [ |
Start copy mode |
Ctrl-a ] |
Paste copied text |
Ctrl-a ? |
Help (display a list of commands) |
Ctrl-a  Ctrl-\ |
Quit screen |
Ctrl-a D  (Shift-d) |
Power detach and logout |
Ctrl-a d |
Detach but keep shell window open |
The Directive on Privacy and Electronic Communications (2002/58/EC)
directive_on_privacy_electronic_communications
Summary of Changes
The new Directive:
replaces existing definitions for telecommunications services and networks with new definitions for electronic communications and services to ensure technological neutrality and clarify the position of e-mail and use of the internet;
enables the provision of value added services based on location and traffic data, subject to the consent of subscribers (for example, location based advertising to mobile phone users);
removes the possibility for a subscriber to be charged for exercising the right not to appear in public directories;
introduces new information and consent requirements on entries in publicly available directories, including a requirement that subscribers are informed of all the usage possibilities of publicly available directories – e.g. reverse searching from a telephone number in order to obtain a name and address;
extends controls on unsolicited direct marketing to all forms of electronic communications including unsolicited commercial e-mail (UCE or Spam) and SMS to mobile telephones; UCE and
SMS will be subject to a prior consent requirement, so the receiver is required to agree to it in advance, except in the context of an existing customer relationship, where companies may continue to email or SMS to market their own similar products on an ‘opt-out’ basis;
specifies that Member States may introduce provisions on the retention of traffic and location data for law enforcement purposes;
introduces controls on the use of cookies on websites. Cookies and similar tracking devices will be subject to a new transparency requirement – anyone that employs these kinds of devices must provide information on them and allow subscribers or users to refuse to accept them if they wish.
WordNet® is an online lexical reference system whose design is inspired by current psycholinguistic theories of human lexical memory. English nouns, verbs, adjectives and adverbs are organized into synonym sets, each representing one underlying lexical concept. Different relations link the synonym sets.
Jan. 13, 2004—EPCglobal, the organization that is commercializing Electronic Product Code technology, has awarded Internet and telecommunications infrastructure services provider VeriSign a contract to manage the directory for looking up EPC numbers on the Internet.
…
…
Asian treasuries pull US strings
The levers of power may, in any case, lie outside the hands of the US authorities. The worry is that many of those Treasury bonds – equivalent to gilts – that the federal government has been selling to underwrite its spending have ended up with Asian countries whose exporters have been enjoying the fruits of US demand. But this build-up of US assets in Asia has been rising much faster than America’s trade deficit with that part of the world.
According to the investment banking arm of HSBC, Japan’s trade imbalance at $48bn in the first nine months of the year is roughly the same as in 2002. However, the increase in its foreign currency reserves has been $133bn, some $84bn more than the trade deficit with the US. On a smaller scale, this pattern is repeated across most of the region. So far this year there has been a build-up assets totalling $153bn more than the trading imbalance would warrant. Little wonder that foreign investors now own 46% of the US Treasury bond market.
This was all very well when the dollar was appreciating and bond prices rose. Those T-bonds were an increasingly valuable asset. But since the dollar peaked in 2002 and yields on bonds started to rise this summer, that happy combination no longer applies. Asian investors are sitting on depreciating assets.
…
http://www.hemscott.com/hstoday/focus2003/dollar_3112_2003.htm
January 2004
(This essay is about heresy: how to think forbidden thoughts, and what to do with them. The latter was till recently something only a small elite had to think about. Now we all have to, because the Web has made us all publishers.)
Have you ever seen an old photo of yourself and been embarrassed at the way you looked? Did we actually dress like that? We did. And we had no idea how silly we looked. It’s the nature of fashion to be invisible, in the same way the movement of the earth is invisible to all of us riding on it.
What scares me is that there are moral fashions too. They’re just as arbitrary, and just as invisible to most people. But they’re much more dangerous. Fashion is mistaken for good design; moral fashion is mistaken for good. Dressing oddly gets you laughed at. Violating moral fashions can get you fired, ostracized, imprisoned, or even killed.Continue reading
http://dmoz.org/Computers/Programming/Languages/PHP/Scripts/Link_Management/
Booby – PHP Bookmarks/Favorites and contacts management (and other stuff). Booby is a multiuser, multilanguage, fully themeable web-based desktop application which provides online management for bookmarks/favorites, contacts, todo’s, notes and news feeds.
Directory Search – Multi-level category directory, integrated search engine, powerful control panel. [Free and commercial versions”>
PhpDig – A search engine written in PHP that uses a MySQL database backend. It features indexing of both static and dynamic pages and full text indexing.
…Now we don’t have to get into arguments over whether spending time in a chat group on AOL is a productive activity, but it’s no more or less productive then watching a soap opera on TV, which is clearly part of the economy. But when you spend time in a chat room on AOL or when you answer questions on music in a newsgroup or mailing list or when you write Linux — that’s not being measured as part of the economy. And since a lot of people are doing that, and more and more people are spending more and more time online, they are disappearing off of the economic face of the world, as it were. So, nobody can see them, you don’t know where they are — they are becoming invisible. And that won’t actually lead to a drop in international GDP figures or anything, but clearly there is a lot of economic activity going on which is not measured. Now that’s the reason, essentially, why there is so much interest from so many different sides on the economics of what is free on the Internet. …
http://slashdot.org/articles/03/12/02/1536227.shtml?tid=106&tid=185&tid=190&tid=201
Using the Real ntfs.sys Driver Under Linux
Posted by CmdrTaco on Tuesday December 02, @11:45AM
from the some-serious-duct-tape dept.
caseih writes “A very neat hack uses the real ntfs.sys driver (obtained from your own windows XP partition and used via a wine-like layer (borrowed from ReactOS) to mount an ntfs partion with full read/write access. While not an ideal solution and certainly not free as in speech, this is an ideal stop-gap measure for many people trying out linux. I think that we’ll probably see this in Knoppix pretty soon.”
http://slashdot.org/articles/03/12/02/1837223.shtml?tid=103&tid=126&tid=95&tid=99
FCC Forum Divided on Future VoIP Regulation
Posted by michael on Tuesday December 02, @02:45PM
from the not-a-question-of-if dept.
ElCheapo writes “As the great philosopher Eminem once said, ‘The FCC won’t let [VoIP”> be, or let [VoIP”> be free.’ In Washington today, the FCC held a public forum ‘to gather information concerning advancements, innovations, and regulatory issues related to VoIP services.’ Slashdot has seen numerous stories on VoIP regulation recently, but Tom Evslin, CEO of ITXC, brought up another point: If VoIP is over-regulated, it will not go away, it will just move to other countries and reach the point where regulation can no longer be enforced. With or without VoIP regulation, will a global P2P (PSTN-connected) voice network emerge? Will it start out as hobbyists setting up Asterisk Open Source PBX boxes connected to their home POTS line? Will some form of ENUM allow least cost routing to boxes sitting in basements and garages around the world? If an ITSP in Europe can setup an Asterisk box with PSTN access and start offering US phone numbers and vice-versa, will global number plans become obsolete? What effect will the ridiculously low barrier to entry for VoIP have on telecommunications?”
http://connect.voicepulse.com/
Content Express
http://www.xexpress.org/
RTE for PN Beta5 (release 0.8.1)
http://web2.chicago180.server4free.de/pw/index.php?newlang=eng
Pagesetter
http://www.elfisk.dk/
Open CMS (Serverlets)
http://www.opencms.org/opencms/en/support/features.html
Easy Web Editor
http://www.openmymind.net/products/ewe/index.php
Spaw
http://www.solmetra.com/en/disp.php/en_products/en_spaw/en_spaw_about
WE HAVE THREE TYPES OF MEMORY. The first one is organic, which is the memory made of flesh and blood and the one administrated by our brain. The second is mineral, and in this sense mankind has known two kinds of mineral memory: millennia ago, this was the memory represented by clay tablets and obelisks, pretty well known in this country, on which people carved their texts. However…..
Block Spam Bots With Free CAPTCHA Service
Posted by timothy on Wednesday November 12, @12:55PM
from the screwtape-and-pals-shriek dept.
Chirag Mehta writes “I just released a freeware service called BotBlock (barebones demo) that lets site owners copy/paste a few lines of PHP code and insert a CAPTCHA image-verification system into any web form. The amount of form spamming by bots is on a rise. While remedies exist for MT blogs, a more efficient solution is to use image-verification or text-identification. Used for a while by sites like Yahoo! (scroll to bottom), Hotmail and patented in 2001 by AltaVista, CAPTCHAs are now being used more widely. PARC also came up with two algorithms Baffletext and Pessimal Print. The technology always existed, but until now required the site owners to install image libraries and understand how to generate images that cannot be OCR’ed. With BotBlock it is like inserting a page counter.”
http://developers.slashdot.org/article.pl?sid=03/11/12/1715232
Re:NBD Does this (Score:5, Informative)
by dbarclay10 (70443) on Wednesday October 29, @04:37PM (#7341575)
(http://markybobdeb.sourceforge.net/)
Just to clarify what this guy is saying:
1) Make all your machines NBD servers. NBD for Linux [sourceforge.net”>, NBD for Windows [vanheusden.com”>. NBD stands for “network block device” and allows a client to use a server’s block device.
2) Set up a master client/server (using Linux or something else with a decent software RAID stack). This machine will be the only NBD *client*, and it will use all the NBD block devices exported by the rest of your network.
3) On the master set up in 2), create a Linux MD RAID array overtop all the NBD devices that are available.
4) Create a filesystem on the brand-spanking-new multi-machine RAID array.
5) Export it back to the other machines via Samba or NFS or AFS or what have you.
Why does only one machine (the “master server”) access the NBD devices, you ask? Because for a given block device, there can only be one client accessing it safely. Thus, if you want to make the RAID array available to anything other than the machine which is *running* the array off the NBD devices, you need to use something which allows concurrent access; something like NFS, Samba, or AFS.
Original /! thread:
http://ask.slashdot.org/askslashdot/03/10/29/205229.shtml?tid=126&tid=137&tid=198&tid=95