Forgot your password?

Comment: Re:the NERVE of them swedes! (Score 1) 234

by caseih (#48435697) Attached to: Swedish Court Refuses To Revoke Julian Assange's Arrest Warrant

Even if you're trying to be funny, a falsehood is still a falsehood. So kindly please stop saying things that we know are untrue. Assange has neither been charged with nor convicted of rape. He is innocent until proven guilty, no matter what we know about his actions and lifestyle.

The swedes want him for questioning in regards to two (if I recall correctly) alleged rapes. However it's unlikely that if he did return to Sweden that they would even be able to charge him let alone convict him of rape. But getting him in Swedish custody paves the way for extradition to the United States where the current government wishes to punish him severely for exposing their sins. There's near certainty that's why the Swedes have pursued him thus. And that's why he's fighting this extradition tooth and nail.

It's kind of like how the mob bosses in 1930s Chicago were brought down. They never could make actual charges of murder stick, so they got him on tax evasion. Means to an end for the US government.

Comment: Mechanical computers are awesome (Score 3, Informative) 81

by caseih (#48394007) Attached to: Real Steampunk Computer Brought Back To Life

Wow, that was an amazing set of videos. Particularly how the machine can do decomposition. What a brilliant man who designed this machine.

All analog computers fascinate me. Apparently analog computers implemented fire control on navy ships for many years, compensating for the speed, direction, and roll of the ship in order to aim guns. The accuracy of such a system was impressive, and they were used up until the 1980s on some older ships. Digital systems simply couldn't get the accuracy for many years.

Slide rules are very cool as well. I want to learn how to use one.

Comment: Re:Hybrid vigor FTW? (Score 1) 377

by caseih (#48378207) Attached to: How 4H Is Helping Big Ag Take Over Africa

Well said. There's a lot of disinformation being spread by well-meaning individuals, and by some not-so-well meaning individuals. Especially rubbish like "hybrid seeds are bred... [to] typically need chemicals to thrive." Except that it's strictly true; they do need chemicals like water, CO2, Nitrates to survive. But to say they *need* pesticides suggests that the pesticides are directly causing growth and contributing to the plant, with the innuendo that our food is laced (purposely even) with toxic chemicals, is dishonest.

There are lots of issues at play here with sustaining food production for the future, but articles like this one don't bring anything to the table.

Comment: Farm topography (Score 3, Informative) 94

by caseih (#48261287) Attached to: Drones Could 3D-Map Scores of Hectares of Land In Just a Few Hours

Depending on the accuracy obtained, such mapping would be highly useful on our farm for figuring out drainage. Some areas of a field might drain better with only a very small slope, if we knew where to put the channel. Currently the only real option is to drive over the field with an RTK GPS receiver and make a GIS map of elevations. Which works well enough (depending on the grid resolution; can get really old driving every 10 feet over 160 acres), but takes quite a long time to do.

Comment: Re:super user (Score 4, Interesting) 58

by caseih (#48261081) Attached to: Dangerous Vulnerability Fixed In Wget

Yes that's good practice for any command. Though wget is used behind the scenes by, say, opkg on openwrt boxes, which has to run as root since it's unpacking and installing packages. In fact on embedded devices, most everything runs as root there, typically, even if it's a bad idea, and is going to have to change as the internet of things becomes a fact of life. Never thought I'd need to run selinux on an embedded device, but we're to the point now where that's required.

It's good to have this particular bug fixed at least.

Comment: Re:How about we hackers? (Score 3, Informative) 863

by caseih (#48251839) Attached to: Debate Over Systemd Exposes the Two Factions Tugging At Modern-day Linux

Init scripts work just fine in systemd, and will for as long as there are init scripts. So vendors and apps *can* provide systemd service definition files, but they don't have to. It's backwards compatible just like upstart was in RHEL6. So no there's not a loooooooooong drawn out process to make it work. I'm running a debian box right now with systemd and everything is still in init scripts.

Comment: Re:It's about control (Score 5, Insightful) 863

by caseih (#48248265) Attached to: Debate Over Systemd Exposes the Two Factions Tugging At Modern-day Linux

Today, the competent administrator can control startup, dependencies, etc on a granular basis. With systemd, that control has gone - somewhere else.

How so? Systemd has removed my ability to start and stop services?

How would a package mess with systemd's configuration? It's readily apparently no clue about systemd. Hint, it's no different than it was before. A package drops its own service definition file in a directory (sound familiar?). That's it. It's no different in this area than any other init system. If the file is bad, the service just won't start. Just as it was before. Runlevels or targets are defined the same way: with simple symlinks. Really in this aspect, systemd is no different than upstart or plain old system v init.

This post is one example why the debate gets so heated. People like you post stuff that's only nearly half true, without knowing anything about systemd, except the name of one of the authors. FUD plain and simple. A technical debate is fine, but you've got to actually know what you're talking about before you start debating. So far I've seen zero technical debate on this site regarding systemd. Certainly no one is willing to own up to the flaws in traditional init that have led to systemd's development. It's extremely disheartening to see this kind of irrational fear instead of technical discussion.

Comment: Re:How about we hackers? (Score 3, Insightful) 863

by caseih (#48248183) Attached to: Debate Over Systemd Exposes the Two Factions Tugging At Modern-day Linux

What Red Hat does is between them and their customers, plain and simple. People can complain about freedom of choice all they want (hint, you still have it), and you, as an experienced admin, are free to plot your own course.

I don't believe Red Hat has made this move on RHEL 7 in error. I think they have a pretty good handle on their customers and their needs. From what I can see on the RHEL lists that have many professional admins, there's been no hue and cry, no sky falling, etc.

I'm not quite sure what a "veteran administrator" is that the article speaks of, but I managed a fair number of servers professionally for quite a few years and I have no problem with systemd. It works stably and well (and no a reboot is not required for most updates as the daemons can be restarted on the fly if necessary). As I've said on many occasions, I've had race conditions completely stop boot scripts in their tracks before (pre-upstart RHEL). Any talk of a binary log is a red herring, plain and simple. Running CentOS 7 right now and syslog is still there, logging away to a normal log file. If one wishes to use it, there is journald to pour through when you need greater granularity and detail in debugging a problem. That has the potential to be of tremendous value for system administrators when tracking down obscure bugs and problems. The traditional syslog is still there to satisfy the record-keeping needs of many organizations, possibly under law in some cases.

As for the unix philosophy, init systems pre-systemd hardly did just one thing and hardly did it well.

How does systemd remind you of windows? Have you actually *used* either in a system administration capacity?

Comment: Re:So if TOR nodes can easily do it (Score 1) 126

by caseih (#48224533) Attached to: Researcher Finds Tor Exit Node Adding Malware To Downloads

What does SSL have to do with it? As you say yourself, as long as you are checking the signing key on each package, you can guarantee that the package is intact and genuine, not matter what the MITM tries to do. The worst that happens with http is that someone can determine which file you downloaded. Hence the injecting of malware can't happen to Linux packages (if the private key is secured by the distro maker). Couldn't happen to any signed executable either, but on Windows users often blindly allow programs to run even with bad signatures.

Comment: Re:Can the counterfeit chip be detected? (Score 1) 572

by caseih (#48220833) Attached to: FTDI Removes Driver From Windows Update That Bricked Cloned Chips

Obviously there is a way, since their malware driver was detecting it and *then* changing the pid to 0x0000. In fact you can see source code for this that someone posted to the Linux Kernel Mailing list a few days ago. Hopefully the new driver will do exactly as you suggest, though I think a big warning message box saying that the device is not genuine, but continue to function might be enough for end users to let companies know their devices are using the fake chips.

Comment: Re:Still have to install (Score 2) 113

by caseih (#48195759) Attached to: Delivering Malicious Android Apps Hidden In Image Files

Well the fact of the matter is that Google is only interested in making sure their app store is the only trusted store. The choice to make it all or nothing was deliberate on their part. They could easily have implemented user-selectable trust of signing certificates. Granted 90% of android users don't even understand the problem, let alone the solution.

Still, though, this vulnerability appears to be firmly in the area of social engineering because why would I want to download an encrypted image file that requires another separate, random app to decrypt and view it?