I drew up a quick note on how to handle CSS child selection, even though it’s not properly supported by Internet Explorer 6.
In response to eWeek’s review of a few Linux distributions. [Update: eweek link no longer available?]
This sort of review (and there are a lot of them) is misleading because there’s no sense making a comparison between the release schedules of binary-based and source-based distributions. Fedora and Ubuntu don’t have strict requirements for a build toolchain, so they have less stringent requirements for, say, gcc.
For Gentoo, stabilizing a toolchain package means it has to be able to complete several cycles of building every system package in addition to closing the bugs in a tracker bug like this.
I don’t object to descriptions like “Gentoo isn’t for the everyday user” or “Gentoo exchanges transparency for configurability,” but I get defensive when I’m told it doesn’t keep up with distributions who have fewer tests to do on a much smaller range of hardware.
Here is a perl script that interacts with mplayer on the commandline to rip DVDs to an iPod-usable format. It is untested so if it breaks something, sorry.
I had an interesting discussion with Joyce’s parents about the current state of North Korea. That led to a discussion of their childhood in Cultural Revolution China.
It’s frightening how effective brainwashing is. Joyce’s mom said everyone at that time loved Chairman Mao and would do anything for him. At the same time, many people in China were starving, while China devoted most of its resources to weapons proliferation and improving ties with Africa.
On the other hand, my wife and her parents are well-adjusted critical-thinkers now, so I should be heartened that brainwashing is not a permanent state-of-being.
All this comes just ahead of the State of the Union address, which I’ve recorded, but haven’t watched. I don’t really think I’m brainwashed, not while my opinion seems to be distant from that of our Head of State.
…but then you never know, do you?
I have two Macs, three Windows machines, and a Linux box. My hosting company uses FreeBSD. Therefore I feel somewhat qualified to discuss multiplatform development and administration.
I’m not impressed with Windows Vista. It doesn’t really seem to bring anything new to the table for the end users. It requires a lot more work on the computers’ ends, and there are more editions of Windows Vista than any earlier Windows release. The attempt to make it secure by allowing users to run it without administrative privileges has fallen short of ideal. I can’t even get my antivirus software to automatically update without entering the admin password.
I guess I’ll wait on buying Windows Vista. Maybe I’ll have two Windows machines and two Linux machines after the Vista trial expires. I’ll keep you posted.
SSH has been a world-class solution for secure administration over untrusted networks since its inception. Remote administration connectivity tools fall into two categories: Commandline and graphical. (SSH transcends this boundary and is well able to handle graphical administration, but that’s beyond the intended scope of this post.) No other commandline tool is encrypted, and no graphical tool can compete in terms of speed over a slow connection. SSH encrypts the entire connection, so your password is protected from snoopers, but it’s a hassle to have to remember and type several passwords when you’re working with many remote machines.
I recently set up most of my ssh connections with ssh public key authentication. It’s exciting: My connection is secure. I only have to enter my password once, when I log in to my local machine. In fact, my password is never sent over the ’net at all, even in encrypted form.watch full film All Nighter 2017 online
Passwordless logins is not a hard concept to implement. You could accomplish the same thing with a key on a USB stick, for example. Now instead of forgetting your password you can just lose your keys.
Still, for someone with many computers, it’d be a delight to have to type a little less, especially given the obscure, unergonomic nature of good passwords.