Forgot your password?

Comment: Re:Beware journald... (Score 1) 379

by oojah (#46208475) Attached to: Debian Technical Committee Votes For Systemd Over Upstart

Are you using some magic shell which understands the syntax of every executable command line in the system? I want me one of those.

No magic shell, just bash. I knows what you tell it. Lots of distros take care to provide this sort of support, I couldn't comment on arch. Perhaps you're missing some bash-completion package? See e.g.

Comment: Stimulated emission and depletion (Score 4, Interesting) 182

by oojah (#44070159) Attached to: New Technique For Optical Storage Claims 1 Petabyte On a Single DVD

The "one beam going through a doughnut beam" technique is well known through STED microscopy:

STED is a superresolution technique for imaging when using fluorophores.

This is a very nice idea using the technique in a different way for a different application.

Comment: Re:Address scarcity predictions (Score 1) 460

by oojah (#30640906) Attached to: At Current Rates, Only a Few More Years' Worth of IPv4 Addresses

Yes agreed, although it's a bit of a different situation of course given that we know exactly the limit on IPv4 addresses.

Based on a very quick hand drawn trend line fit to the last years predictions, they seem to be reducing at such a rate that they'll be predicting zero days until IANA exhaustion at around the middle of 2014.



Comment: Address scarcity predictions (Score 2, Interesting) 460

by oojah (#30639118) Attached to: At Current Rates, Only a Few More Years' Worth of IPv4 Addresses
I'm sure many of you have seen the IPv4 Address Report, which attempts to predict when the IANA and RIRs will exhaust the unallocated pool of IPv4 addresses.
I've been tracking the results of those daily predictions for a while now and since this time last year, they've moved further away by about 6 months. There are graphs online at
We're still roughly at the same place we were back when this was discussed in April (ARIN Letter Says Two More Years of IPv4).


Comment: Re:Linux needs a "Zone Alarm" like program (Score 2, Interesting) 611

by oojah (#30387134) Attached to: Malware Found Hidden In Screensaver On Gnome-Look

I suspect the GP is talking about the interactive features of Zone Alarm. My understanding is that it only allows outgoing network traffic from known executables that the user has allowed. If an executable hasn't requested network access before, or if an executable that previously asked for access and was granted it but has now been modified (an upgrade/overwritten by malware/...) then Zone Alarm will ask the user again if network access should be granted. It also notes that the executable has previously asked for access and that the file has changed since the last access. L7 filtering is a good start, but it's the user interaction at the time of network access that makes Zone Alarm really useful.

When you are working hard, get up and retch every so often.