Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Addition for Gnus (Score 1) 412

A useful addition to Gnus (it may be part of the distribution now):

;; Provide a function to switch to a *Summary buffer or the *Group buffer.
;; Let the user decide whether to bind it.  Written by Randell Jesup.
;;
(defun switch-to-gnus ()
  "Switch to a *Summary whatever* buffer if one exists.  If none exist,
switch to the *Group* buffer.  If that doesn't exist, complain."
  (interactive)
  ;;
  (let ((buflist (buffer-list))
        (done 0)
        (saw_group 0))
    (while (and (= done 0)
        (not (equal buflist nil)))
      (let ((candidate (car buflist)))
         (let ((candname (prin1-to-string candidate)))
          (if (string-match "#<buffer +\\*Summary.*\\*>" candname)
              (progn
            (switch-to-buffer candidate)
            (setq done 1))
            (setq buflist (cdr buflist)))
          ;; remember if we saw *Group*
          (if (string-equal "#<buffer *Group*>" candname)
              (progn
            (setq saw_group 1))))))
    (if (= done 0)
    (if (= saw_group 1)
        (switch-to-buffer "*Group*")
      (error "Gnus doesn't appear to be running")))))

;; This switches to the a *Summary buffer if one exists, else to *Group*
(global-set-key [f9] 'switch-to-gnus)

A couple of other goodies:

;; If invoked from a non-shell buffer, it changes to or opens a shell
;; buffer with the path set to that of the buffer from which this command
;; was invoked.  If invoked from a shell-mode buffer, it changes back to
;; the last buffer from which the shell was invoked whith this command.
(global-set-key [f3] 'shell-pushd-to-buffer-path)

;; make switching buffers easy
(global-set-key [f6] 'other-window)
(defun prev-window ()
  "previous window"
  (interactive)
  (other-window -1))
(global-set-key [S-f6] 'prev-window)

;; Windows-ish commands:
;; Block cut, copy, paste:
;;; KEY: [A-x]: Cut region.
(global-set-key [?\A-x] 'kill-region)
;;; KEY: [A-c]: Copy region.
(global-set-key [?\A-c] 'copy-region-as-kill)
;;; KEY: [A-v]: Paste.
(global-set-key [?\A-v] 'yank)
;;; KEY: [ESC A-v]: If you've just used paste, use this key to cycle through
;;; KEY:            previous available pastes on the Emacs clipboard.
(define-key esc-map [?\A-v] 'yank-pop)
Government

House Republicans Renew Push for Telecom Immunity 123

CNet is running an update to the controversy over giving telecommunications giants such as AT&T immunity from lawsuits involving the assistance they gave the NSA for illegal wiretaps. Republican leaders are circulating a petition which would force a vote on the bill passed by the Senate but not by the House. Democrats are holding out for a version of the FISA bill which opens the telecoms to prosecution. President Bush still intends to veto any such document. "At a wide-ranging House hearing on Wednesday, FBI Director Robert Mueller again urged passage of a bill that includes immunity for phone companies, arguing that 'uncertainty' among the carriers 'affects our ability to get info as fast and as quickly as we would want.' He admitted, however, that he was not aware of any wiretap requests being denied because of Congress' inaction."
Music

MSN Music DRM Servers Going Dark In September 543

PDQ Back writes to tell us about an email Microsoft sent to former customers of MSN Music today. The company said it would be turning off the DRM servers used to authorize playback of music purchased from the now-defunct MSN Music store. "'As of August 31, 2008, we will no longer be able to support the retrieval of license keys for the songs you purchased from MSN Music or the authorization of additional computers,' reads the e-mail. This doesn't just apply to the five different computers that PlaysForSure allows users to authorize, it also applies to operating systems on the same machine (users need to reauthorize a machine after they upgrade from Windows XP to Windows Vista, for example). Once September rolls around, users are committed to whatever five machines they may have authorized — along with whatever OS they are running."
Privacy

FBI Lied To Support Need For PATRIOT Act Expansion 396

I Don't Believe in Imaginary Property writes "It probably won't surprise you, but in 2005, the FBI manufactured evidence to get the power to issue National Security Letters under the PATRIOT Act. Unlike normal subpoenas, NSLs do not require probable cause and you're never allowed to talk about having received one, leading to a lack of accountability that caused them to be widely abused. The EFF has discovered via FOIA requests that an FBI field agent was forced by superiors to return papers he got via a lawful subpoena, then demand them again via an NSL (which was rejected for being unlawful at the time), and re-file the original subpoena to get them back. This delay in a supposedly critical anti-terror investigation then became a talking point used by FBI Director Robert Mueller when the FBI wanted to justify their need for the power to issue National Security Letters."
Privacy

Administration Claimed Immunity To 4th Amendment 703

mrogers writes "The EFF has uncovered a troubling footnote in a newly declassified Bush Administration memo, which asserts that 'our Office recently [in 2001] concluded that the Fourth Amendment had no application to domestic military operations.' This could mean that the Administration believes the NSA's warrantless wiretapping and data mining programs are not governed by the Constitution, which would cast Administration claims that the programs did not violate the Fourth Amendment in a whole new light — after all, you can't violate a law that doesn't apply. The claimed immunity would also cover other DoD agencies, such as CIFA, which carry out offline surveillance of political groups within the United States."
Software

Feds Overstate Software Piracy's Link To Terrorism 448

Lucas123 writes "Attorney General Michael Mukasey claims that terrorists sell pirated software as a way to finance their operations, without presenting a shred of evidence for his case. He's doing it to push through a controversial piece of intellectual property legislation that would increase IP penalties, increase police power, set up a new agency to investigate IP theft, and more. 'Criminal syndicates, and in some cases even terrorist groups, view IP crime as a lucrative business, and see it as a low-risk way to fund other activities,' Mukasey told a crowd at the Tech Museum of Innovation last week."
Google

Patriot Act Haunts Google Service 277

The Globe and Mail has an interesting piece taking a look at Google's latest headache, the US Government. Many people are suddenly deciding to spurn Google's services and applications because it opens up potential avenues of surveillance. "Some other organizations are banning Google's innovative tools outright to avoid the prospect of U.S. spooks combing through their data. Security experts say many firms are only just starting to realize the risks they assume by embracing Web-based collaborative tools hosted by a U.S. company, a problem even more acute in Canada where federal privacy rules are at odds with U.S. security measures."
Government

UK Police Want DNA of 'Potential Offenders' 578

mrogers writes "British police want to collect DNA samples from children as young as five who 'exhibit behavior indicating they may become criminals in later life'. A spokesman for the Association of Chief Police Officers argued that since some schools already take pupils' fingerprints, the collection and permanent storage of DNA samples was the logical next step. And of course, if anyone argues that branding naughty five-year-olds as lifelong criminals will stigmatize them, the proposed solution will be to take samples from all children."
Communications

US House Rejects Telecom Amnesty 614

The US House has just approved a new bill that rejects the retroactive immunity to telecommunication businesses and denies most of the new powers for the US President to spy on citizens without a warrant. "As impressive as the House vote itself was, more impressive still was the floor debate which preceded it. I can't recall ever watching a debate on the floor of either House of Congress that I found even remotely impressive -- until today. One Democrat after the next -- of all stripes -- delivered impassioned, defiant speeches in defense of the rule of law, oversight on presidential eavesdropping, and safeguards on government spying. They swatted away the GOP's fear-mongering claims with the dismissive contempt such tactics deserve, rejecting the principle that has predominated political debate in this country since 9/11: that the threat of the Terrorists means we must live under the rule of an omnipotent President and a dismantled constitutional framework."
Biotech

Japan's Unique Cow/Whale Hybrid Experiments 348

RemyBR writes "Controversial scientific research happens all the time, but a review conducted by scientists in Japan uncovered a list of 'bizarre' trials - including one program designed to crossbreed cows with whales.'Scientists have analyzed 43 research papers produced by Japan over 18 years, finding most were useless or esoteric. The scientific research included injecting minke whale sperm into cows eggs, and attempts to produce test-tube whale babies.'"
Security

Feds Have a High-Speed Backdoor Into Wireless Carrier 229

An anonymous reader writes "An unnamed U.S. wireless carrier maintains an unfiltered, unmonitored DS-3 line from its internal network to a facility in Quantico, Virginia, according to Babak Pasdar, a computer security consultant who did work for the company in 2003. Customer voice calls, billing records, location information and data traffic are all allegedly exposed. A similar claim was leveled against Verizon Wireless in a 2006 lawsuit."

Alienware Planning Android iPhone Killer? 152

meteorit found a story about rumors of an Alienware phone based on Google's Android phone OS. As Dell has a history of bombing with handhelds, it would be interesting to try the Alienware brand instead. And I'm not exactly sure where they get off claiming that their drawings are the first pictures of the thing. Cheesy renderings designed explicitly for your website are not quite pictures of a product... they are artists impressions.
Supercomputing

One Computer to Rule Them All 288

An anonymous reader writes "IBM has published a research paper describing an initiative called Project Kittyhawk, aimed at building "a global-scale shared computer capable of hosting the entire Internet as an application." Nicholas Carr describes the paper with the words "Forget Thomas Watson's apocryphal remark that the world may need only five computers. Maybe it needs just one." Here is the original paper."
Security

Does Anonymity In Virtual Worlds Breed Terrorism? 295

An Anonymous Coward writes "The Washington Post has an article about the Intelligence Advanced Research Projects Activity's take on the numerous virtual worlds (e.g. Second Life) that have cropped up in recent years. IARPA's thesis is that because the Government can't currently monitor all the communication and interaction, terrorists will plot and scheme in such environments."
Privacy

DHS Official Suggests REAL ID Mission Creep 277

The Register noticed that a senior US Department of Homeland Security official has floated the idea of requiring citizens to produce federally compliant identification before purchasing some over-the-counter medicines — specifically, pseudophedrine. The federal ID standard spelled out by the REAL ID act has been sold as applying only to air travel and entry to federal buildings and nuclear facilities. A blogger on the Center for Democracy and Technology site said, "[The] suggested mission creep pushes the REAL ID program farther down the slippery slope toward a true national ID card." Speaking of federal buildings, CNet has a state-by-state enumeration of what will happen on May 11, when REAL ID comes into effect, to citizens who attempt to enter, say, the Washington DC visitors bureau.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...