Kyle Leslie wrote:
Any suggestions on a set up. I have seen some things about TikiWiki and
MediaWiki.
Mediawiki (the one that came out of Wikipedia) is in some sense the
standard. It used to be a pain to setup but at least on Ubuntu it is
now pretty easy to do. I would recommend it.
-
Dan Ritter wrote:
About once a year someone will need to spend a fair amount of time
refiling items, cleaning up dead projects and links, and otherwise
performing maintenance.
Good warning. It is easy to put cool stuff in a wiki, and it is easy
for that stuff to get stale and inconsistent.
Shirley Márquez Dúlcey wrote:
And an absurd one in an age when a lot of faxes are sent from
computers. A fax is actually easier to forge than a digital document
because of its relatively low resolution; it's trivial to pass off a
Photoshopped document as an original fax scan. Yet another case o
Tom Metro wrote:
Anyone planning to buy the Google's Nexus 7 tablet?
I got one at Google IO, and it is a very nice device.
Seeing as how I never filled up my little 8GB SD card in my old Nexus
One, I think I will be able to survive in 8GB. Were I buying one, yes,
16GB for $50 seems worth
The form-factor question is a real one. I don't quite understand the
Ipad size, yet they are wildly successful. I have used Ipads a fair
amount and carried them around, and they are fun and even useful, but
they are not a trivial thing to haul. What is the use case? I guess they
are displacing
Jack Coats wrote:
I did a transition to Palm when they were the rage, and was pretty good
at their scribbling dialect. To bad it isn't available on the current
wave of tablets.
I used a version of Graffiti on my previous Android phone, and it was
fun, but then they added the "Network commu
Chris O'Connell wrote:
I've never once said "I wish this device were
bigger!"
The keyboard on an Ipad is certainly nicer for being bigger, but last
night I was filling in a web form on the Ipad 2 and the keyboard was in
the way!, and the only way I could figure out how to get rid of it was
Richard Pieri wrote:
A smaller screen would compromise that enjoyment. A 7" tablet is all
compromise. Apple doesn't do compromise on the user-facing stuff.
That is why it will be fun watching Apple watch the Nexus 7 be
successful and take market share as Apple fights with the Ghost of Steve
Richard Pieri wrote:
It doesn't matter how much better Jellybean is to either iOS
or prior versions of Android because the technical superiority of the OS
has never been a factor in the public's eye.
But price *does* matter and Jelly Bean is good enough that someone's Mom
will be able to figu
Shirley Márquez Dúlcey wrote:
One of the nice things about the Amazon Appstore is that it has a full
record of all the apps you have bought including free ones. It would
be nice if the Google Play store had the same kind of record. At least
then you would have a central place to see what apps y
Kent Borg wrote:
If you want all the cool stuff that Android and Iphone have, but don't
want clouds, you are in for a tough fight.
Actually, with Apple being slow to the cloud, the Itunes model of a
backup really is pretty close to what you want, except you say it is
broken and too li
Edward Ned Harvey wrote:
The ones you pay for will reappear. But the free ones don't.
I *did* get free apps installed automatically installed on my new phone,
but not all of my free apps. I don't know why some got installed, but
many free apps did. (Maybe it had something to do with when
Matt Shields wrote (privately, but I think it is of general interest and
not confidential):
Just an FYI for anyone who uses iTunes and buy's apps and music from
Apple. If you have lost your content for whatever reason, iTunes
allows you to redownload load all your content again. I believe they
John Abreau wrote:
I've had apps disappear from my iPad after an OS update. When I tried
reloading them from the iTunes backup, I discovered that the apps were
apparently not compatible with the updated OS.
Perhaps your missing apps went missing for similar reasons?
Maybe, though I think I
>
Doug wrote:
>Can it be done? Should it be done? I saw a 36" Sony WEGA HDTV 1080i
>available on Craigs list. My 28" Hanns-G probably roasted a capacitor
>somewhere and now the screen washes out for large sections. BIG is
>good, but computer monitors stop in the the 28" range. Anyone using
> HDTV 1080i
Interlace is not good. Computer will want progressive.
-kb
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss
So I am waiting for Linux to install on my new computer. If I am
successful, I will have a dual-boot machine, Windows 7 Professional and
Ubuntu 12.04 (with full disk encryption).
[Um, er, just realized I made a mistake in my partitioning: I did *full*
disk encryption, including /boot, which m
Jerry Feldman wrote:
Why not install Ubuntu 12.04 as the primary OS, with Windows 7
Professional in a Virtual Machine, The X230 is a 64-bit processor with
the Virtualization assist available on the CPU, and the setting can be
done through the BIOS.
I turned on the virtualization bits in the
isk's backups, in the clear.
If you only use your Google credentials for Google Voice, or keep a separate
account for Voice, whatever parts of your life that you have let Google have,
can leak through another hole, a hole that is hard to secure.
-kb
--
Kent Borg
___
On Sun, 29 Jul 2012 18:16:34 -0700
Rich Braun wrote:
> Actually, Google is by far the best free public site in terms of
> authentication technology. They provide 2-factor auth in a couple
> different ways (RSA in a mobile app, plus a fairly cool text-back
> method).
> [...]
> (A burglar who tak
(I
> don't use it.)
>
> For actual call handling. the Obi device talks directly to GV. It isn't
> proxied through Obitalk servers.
Interesting, I'll have to look at these gizmos more closely.
Thanks,
-kb
--
Kent Borg
___
Quite awhile ago I set up Linux clients on a Linux host, and looking
for greater disk performance I gave the clients disk partitions
directly. I do not know if it made things faster, but I do know that
it makes things a pain in general. File systems are nice, they offer
lots of features.
Unl
On 08/04/2012 12:54:50 PM, Guy Gold wrote:
> Xen is no longer the 'hypervisor of choice' for most Linux Disotros
Xen is an odd beast. I played with it once and I didn't like the tight
coupling between the guest and host (upgrade host kernel and guest
doesn't boot I think happened to me), but th
A trio of late-in-the-thread observations:
- There is a trade-off between simple and powerful, but one can always
make both worse by adding a serving of "stupid", conversely, one can
always make something both simpler *and* more powerful by removing some
of the unnecessary "stupid" (eventuall
On 01/15/2013 09:55 AM, Mark Woodward wrote:
This is why I think people get confused about computers. Computers are
not DVD players. Yes, they *can* play DVDs, but they can also do
almost anything else. You can't think of a general purpose computer as
an appliance. You can think of a particular
On 01/15/2013 01:55 PM, John Abreau wrote:
Also, the difference in quality is not something I can just dismiss.
The photos from every iOS device and every smartphone camera that I've
ever seen have been total crap in comparison to what the DSLR provides.
Ah, I was talking about the little came
On 01/30/2013 09:31 AM, Edward Ned Harvey (blu) wrote:
mount mynfs:/someexport /home/someexport
cd /home/someexport
touch foo
ln foo bar
Can you hard link a NFS mounted file to another NFS mounted file on the same
NFS system?
Works for me on (what I think is) a Netapp.
-kb
_
On 03/01/2013 08:31 AM, Mark Woodward wrote:
I think I was the last human being above the age of 16 to get a smart
phone. Android, of course. I think the people who claim that they are
"life changing" are using more than a bit of hyperbole.
But then you go on to describe how life changing it
On 03/01/2013 10:10 AM, Rich Pieri wrote:
It's a dopamine gadget. It's not life-changing.
Except really good dopamine gadgets (and dopamine drugs) ARE life-changing.
Don't underestimate some of the change we might take for granted. A ton
of practical stuff has changed in the last couple decad
On 03/01/2013 11:47 AM, Rich Pieri wrote:
But again, the nature of the activity hasn't changed, just the tools
used to perform them.
You make sense, but at the expense of being sensible.
By your logic electric power and telegraph and trains and cars and radio
and TV and lasers and maybe even
On 03/01/2013 12:52 PM, Daniel Barrett wrote:
You're not the last. I still don't own one and perhaps never will. My
days are already jam-packed with technology; the last thing I desire
is to carry more technology around with me.
I keep my phone on silent almost always, I pull it out when I wa
On 03/04/2013 02:51 PM, Greg Rundlett (freephile) wrote:
The costs of smart phones are ridiculous.
Old timer that I am, if you had told the teenage edition of me that a
device like my Galaxy Nexus would be available in my lifetime, I would
have been rather wide-eyed with tons of questions abo
On 03/05/2013 01:34 PM, Rich Braun wrote:
Sometime last year a major news organization (I think it was ABC)
announced that the build cost of an iPhone is US$8
That isn't plausible. Someone might have said it, but that doesn't make
it true.
-kb
___
On 03/05/2013 02:10 PM, Bill Bogstad wrote:
I believe that was actually the labor charges to assemble the iPhone
from parts/subassemblies. I'm pretty sure that I remember reading
something like that at the time. A quick google search finds at least
one estimate of $15 for cost to manufacture.
On 03/21/2013 11:58 AM, Drew Van Zandt wrote:
trying to figure out what our cheapest AWS setup to handle things for ~3500
users is.
What do the different options cost per month?
-kb
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mail
On 05/23/2013 02:41 PM, Richard Pieri wrote:
> If I need a brute force, bulk copy then I still don't use cp. I use tar
>
> cd source; tar cSf - . | ( cd dest; tar xpf - )
I remember once doing that as a way to preserve hard link
relationships. It might be as old as Unix utilities can get, but
Note that rsync can handle sparse files:
-S, --sparsehandle sparse files efficiently
-kb
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss
I wish there were a finer-grained permission that was "serve ads" and
not "use internet connection freely". The "serve ads" might still have
invasive properties, but it couldn't be worse than completely open
internet access.
Interesting question would be what would "serve ads" mean, Google wou
On 07/23/2013 11:52 AM, Greg Rundlett (freephile) wrote:
The data breach was only for Ubuntu Forums.
And so long as people didn't their forums password on other (important)
accounts, what it the big deal?
Oh, wait, everyone *does* reuse passwords. That is the bigger problem.
Keep a list...
On 07/23/2013 12:08 PM, Greg Rundlett (freephile) wrote:
Yep. A quick search through my KeePassX database and my login for
Ubuntu forums was cryptographically strong, and (for me) unique to
that website. *Every* login I have is unique. I have a simple tool
(KeePassX) to mind them all. And I
On 07/23/2013 11:16 PM, Bill Horne wrote:
the hashes allow a "Dictionary attack", where they just run every word
in the dictionary through a hash function, and see what matches.
It depends. Unsalted hashes are vulnerable to dictionary attacks with
rainbow tables. But the right (non-Microsoft)
On 07/23/2013 06:29 PM, Tom Metro wrote:
Good idea, if 1. you have an old phone to dedicate to this, and 2. you
don't mind carrying around a phone that is otherwise useless. (I
suppose you might be able to make emergency calls on it.)
I actually bought a new phone from geekbuying.com. Cost le
On 07/24/2013 09:56 AM, Edward Ned Harvey (blu) wrote:
I am a great fan of BioWallet. You "sign" the screen with your finger. Your
name, a random word, whatever. It works best for handwritten words, and doesn't work so
well for geometric shapes, drawings, patterns. It performs bioinformatic
A recently discovered bug allows malware to alter other apps on an
Android device. And evil apps have been found in the wild that exploit
that. Google has issued a patch, but has your cell carrier pushed an
update?
http://it.slashdot.org/story/13/07/24/1223227/first-apps-targeting-android-ke
On 07/24/2013 01:40 PM, Rich Braun wrote:
most people have just plain given up trying to follow best-practices
The whole term "best practices" annoys me. It is so much like a school
yard taunt: "MY practices are better that yours!" "No they are not! Mine
are Best Practices."
(Who the hell s
On 07/29/2013 05:08 PM, Tom Metro wrote:
I'm guessing the feature is underutilized not because it is viewed as
insecure, but because 1. developers just aren't aware of it,
I was once working on a project for an embedded device and part of the
layers of security was a client certificate that n
On 07/25/2013 07:44 PM, Richard Pieri wrote:
Tom Metro wrote:
So what's the objective of this exercise? Are you looking for practical
answers or are you just looking for reasons to shoot down the idea of
password safes?
Just to demonstrate how frustrating it is to have strong
authentication o
On 07/25/2013 07:19 PM, Tom Metro wrote:
What's especially dangerous is dismissing an email account, like the
one at Gmail you might use for mailing list correspondence, as unimportant
Even more important because the fact that people are already logged into
their gmail accounts means they are
The indictment yesterday of the foreign crooks who stole millions and
millions of credit card numbers? Computers made that stealing possible.
Finding one piece of paper with some handwritten passwords on it
(possibly further obfuscated beyond bad handwriting) doesn't scale well
for those crook
On 07/27/2013 03:24 AM, Tom Metro wrote:
That's a consideration, but for now you can also apply the philosophy
that you don't need to be able to outrun the bear, you only need to be
faster than the other guy also trying to outrun the bear. The default
behavior around password hygiene is so poor
On 07/28/2013 11:41 PM, Tom Metro wrote:
Kent Borg wrote:
For example, "8e53-arrow-spell-genetic" is pretty easy to type and
remember, yet it has 48-bits of entropy in it. Not enough entropy for
en encryption key, but plenty for a password. Entropy doesn't have to
be h
On 07/28/2013 11:49 PM, Tom Metro wrote:
Elsewhere today there was a thread mentioning StarSSL. They take an
interesting approach to site security. They don't use passwords. As part
of the process of getting your SSL certificate, they generate a
client-side SSL certificate that you install in you
On 07/29/2013 08:31 AM, Edward Ned Harvey (blu) wrote:
There are two use cases for passwords: online and offline.
Absolutely. I was making the distinction between a password and en
encryption key. Passwords can be quite short and still quite secure.
(ATM PINs, because of the slow and limi
On 08/05/2013 11:30 AM, Richard Pieri wrote:
S/MIME is that it depends on a certificate authority to issue X.509
certificates.
And we know that they can't be trusted. But, a big realization I had
recently is that even flawed crypto is valuable.
Okay, maybe ROT-13 isn't worth much. But ROT
On 08/05/2013 02:07 PM, Richard Pieri wrote:
Flawed cryptography is useless. Good cryptography may be useless when
one of your foes is responsible for approving and endorsing the
encryption systems you use.
Flawed crypto is of little use if they are specifically after *you*
(particularly if
On 08/05/2013 02:49 PM, Richard Pieri wrote:
What harm? The NSA has an effectively unlimited budget.
For what values of "effectively"? Even the NSA needs to get money
appropriated. Make them put extra zeros on the end and it matters.
If your foes include lesser organizations then maybe you
On 08/05/2013 04:26 PM, Edward Ned Harvey (blu) wrote:
Their budget is not large enough to crack really good crypto (256 bit
with truly random key, and no other way to expose the key).
You overstate what it takes. No one has the budget to count on cracking
a truly random 256-bit key, not by
On 08/05/2013 04:45 PM, Richard Pieri wrote:
You're assuming that the NSA needs to crack everything. I'm assuming
that they have master keys for the public certificate authorities.
That doesn't give them session keys for communications. And they don't
have a private key that they don't have.
On 08/05/2013 09:06 PM, Derek Martin wrote:
If your enemy is the NSA and you are not a crime syndicate with the
deep pockets and motivation to fight them (and even then, maybe), you
loose. But then, most of us aren't even on the NSA's radar. It's much
more likely your foe is some Russian kid tr
On 08/06/2013 10:48 AM, Edward Ned Harvey (blu) wrote:
I didn't overstate anything. Your statement agrees with mine.
Sorry.
My point is that the crypto doesn't have to be as good as 256-bits to
cause them very real headaches. And if it *is* as good as 256-bits it
is no longer a question of
Ladar Levison and Lavabit probably concluded that an insecure e-mail is
worse than no e-mail service.
In this case, where the e-mail service was apparently advertised as
being secure (I don't know the details), I agree and admire Lavabit's
integrity and guts.
Security should not fail silentl
On 08/09/2013 03:05 PM, Edward Ned Harvey (blu) wrote:
They say they encrypt messages upon receipt before saving to disk
(which sounds silly, considering the attacker would be more likely to
just sniff the inbound network traffic rather than try gaining access
to the disk of the recipient serve
On 07/24/2013 10:32 AM, Kent Borg wrote:
I don't know current estimations, but I would use the following
guidelines for an encryption key:
32-bits of entropy: stops a naive individual with a day-job
80-bits of entropy: stops a small organization
100-bits of en
On 08/13/2013 10:43 AM, Jack Coats wrote:
Guess that is why I like the idea of 4096 bit keys.
At 4096 I think you are talking about RSA or similar asymmetrical keys.
Symmetrical keys are far smaller for similar strength. The strength of
symmetrical keys are also far easier to estimate, and
On 08/13/2013 09:36 AM, Richard Pieri wrote:
The NSA has computing facilities measured in acres.
I feel like you want me to draw a conclusion. Are you saying 80-bits is
not "pretty dang good"? Or are you saying Snowden's "trillion a second"
was wrong? Or something else?
Maybe Snowden's "
On 08/13/2013 01:29 PM, Richard Pieri wrote:
If I did my math right, a facility like that can brute-force any
80-bit key in about 32 hours.
I'll accept your math, and it makes my point. You describe a facility
that can only brute-force a couple hundred 80-bit keys a year. Which
means brute-
On 08/14/2013 06:34 AM, Jerry Feldman wrote:
Agreed. But, breaking the session key only works for a single message
or a single session. If they want to target a specific individual,
breaking the RSA/DSA keys will give them access to all encrypted
messages. (within the context is that a sent mes
On 08/13/2013 05:04 PM, Jerry Feldman wrote:
The real issue is determining who and what to monitor.
That is the key. For years the idea is that the NSA is selective and
decides what traffic to analyze, what messages to try to decrypt, what
targets to actively attack (with such things as a ma
On 08/13/2013 04:47 PM, Jerry Feldman wrote:
Let's take the situation: NSA is watching you.
They can intercept your email, crack your RSA or DSA key, and then
they can discover the session keys. They are not interested in
everybody's random encrypted emails, so if they focus on individuals
who
On 08/13/2013 04:30 PM, Daniel Barrett wrote:
In the absence of the 4096-bit private half of my key, how hard is it
to decrypt the session key by brute force and thereby decrypt file
Foo? Do the time arguments from this KeePass discussion apply?
There are three approaches they can take, sorted
On 08/14/2013 09:38 AM, Edward Ned Harvey (blu) wrote:
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss-
bounces+blu=nedharvey@blu.org] On Behalf Of Kent Borg
Bruteforcing
128-bits is impossible. Bruteforcing 256-bits is 128-bits times as
impossible.
Careful here. Someday
On 08/14/2013 10:03 AM, Richard Pieri wrote:
Certificate + handshake = session key => decrypted session in real
time. Any user, any session, any time, any reason. No cryptanalysis
needed. No brute force needed.
Yes, if the communications uses a broken (lack of) key exchange.
Stupidly, SSL onl
On 08/14/2013 12:45 PM, Richard Pieri wrote:
Do you finally get what I've been on about?
You have good points.
But I still return to my harping that anything that bends the cost curve
up for the NSA ruins their idea of snooping on everything. For example,
the third of SSL traffic with good k
On 08/15/2013 06:35 PM, Edward Ned Harvey (blu) wrote:
[...] That's why I only *use* cryptography and don't *create* it. I
read a book and took a class on how to *use* cryptography. I am
utterly unqualified to create ciphers and hashes.
You make such a valuable point.
No one should think the
On 08/16/2013 11:14 AM, Edward Ned Harvey (blu) wrote:
Read Cryptography Engineering (surprisingly a quick read)
I am at work right now, but I think I already have a copy at home.
Looking at preview pages from Google Books everything looks terribly
familiar.
(But "terribly familiar" doesn't
On 08/16/2013 11:36 AM, Richard Pieri wrote:
You need to know how to attack ciphers if you want to critique them.
That's why you need a formidable enough reputation, and even possibly an
AES-style competition, to get enough public crypto talent beating on
your algorithm.
And even that isn'
On 08/16/2013 10:54 PM, Bill Bogstad wrote:
Any advice on cord cutting or good HDTV antennas?
The good news is that tuners in recent TVs are a *lot* better than the
first ones. Also, you only need a decent antenna. Nothing HD about
it. I have a VHF/UHF root-top antenna, I bought from Radio
On 08/17/2013 08:20 AM, Bob Dunphy wrote:
I went the Silicondust HDHomeRun PRIME route.
I also have an HD Homerun, but I don't have it hooked up at the moment.
It works, though my box did need power-cycling occasionally.
Turns out the user interface on a real TV is (or can be) so much
bett
On 08/28/2013 09:07 PM, Matthew Gillen wrote:
Check ubuntu's bug reports for issues with that particular RAID
controller's driver.
Somewhat off-topic response...
Though RAID can do great redundancy in your disk drives, we wary of
having a single-point-of-failure in your RAID card.
- What q
On 08/29/2013 08:45 AM, Daniel Barrett wrote:
I like it too, but this is a dual-boot machine with Windows 7. The
vendor (endpcnoise.com) told me they could not set up a dual boot
machine with software RAID.
Certainly Windows won't implement Linux software RAID. If you have room
in the box, e
On 08/30/2013 08:26 AM, Edward Ned Harvey (blu) wrote:
You have 32G of ram on a 32bit OS.
That is one confused and perverse installation. Maybe some other odd
thing was also done in the install.
-kb, the Kent whose money is on everything working much better with a
sensible OS version.
_
On 08/30/2013 08:30 AM, Kent Borg wrote:
That is one confused and perverse installation.
Seriously, I doubt that PAE kernels are getting much testing these
days. All the kernel folks fortunate enough to have 32GB are going to
be running the 64-bit kernel they worked so hard on. Aren't
On 09/13/2013 07:20 AM, Jerry Feldman wrote:
but I you really can't set up a development environment for Python,
and there is no general USB port. So for that reason I would not
recommend any tablets.
There is, or at least was, a Python that ran under Android. It was a
naked package file t
On 09/18/2013 04:18 PM, Gordon Marx wrote:
http://www.brother-usa.com/Printer/ModelDetail/1/HL2270DW/spec#.UjoKQBYYQwE
Wow, laser printers have come down in price since last I looked.
Is there still the split between printers with competitive cartridges
and those with DMCA-locked-down cartrid
On 09/19/2013 10:45 AM, Eric Chadbourne quoted ma...@mohawksoft.com:
> (4) It is quite likely there are multiple backdoors in Linux.
Because it is open source it is harder to put in explicit backdoors.
But because it is software there are bugs, and some likely have security
implications.
I b
On 09/25/2013 05:29 PM, Rich Braun wrote:
Richard Pieri wrote:
Anyone can tap the lines without Comcast knowing it. By encrypting the
signals and controlling the decryption side they can lock out the moochers.
Bingo. A few years ago I went to my exercise room in the basement to find the
TV si
My employer is doing a network switch upgrade over the weekend, it seems
to support a new VoIP system.
Why, I wonder? We have $40 phones that seem to work, why replace them
with $400 phones? (Or whatever they will cost.)
I *did* use my desk phone yesterday--for a personal call, because my
On 11/07/2013 09:09 AM, Richard Pieri wrote:
Kent Borg wrote:
Why, I wonder? We have $40 phones that seem to work, why replace them
with $400 phones? (Or whatever they will cost.)
The $400 smartphone is the new, "improved" pager. The idea is that if
you're always connec
On 11/08/2013 06:15 AM, Stephen Adler wrote:
I'm thinking of upgrading my linux system by adding an SSD drive to
use as my system disk. Has anyone done this? Any pros and cons
regarings using SSD's? I'm more intrested in the cons.
I have been wondering the same thing, I have an empty msata slo
On 11/08/2013 09:08 AM, Daniel Feenberg wrote:
Do we know the form of SSD failures?
My impression and experience is they go from working to brick.
-kb
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss
On 11/08/2013 02:47 PM, Mike Small wrote:
Others have discussed performance and longevity issues but what do
people think of SSDs and what wikipedia calls data remanence (your
data remaining visible on the drive despite your (modest and not
involving sledge hammers or demagnetization) efforts)?
On 11/08/2013 04:00 PM, Richard Pieri wrote:
Kent Borg wrote:
Part of why I run full disk encryption is to not worry about that. Don't
destroy the disk, just destroy the encryption key.
There are reasons why this does not pass muster at the DoD.
Me? I use an industrial drill press.
I
On 11/10/2013 10:59 AM, Richard Pieri wrote:
The only reliable defense against these is to maintain good physical
security.
Correct.
But as I think about it, I don't think putting your machines in a co-lo
means you are completely doomed.
For example, say you are renting some physical spac
Mark Woodward wrote:
> I think svn's lack of tagging makes it a deal breaker.
>
Amazing that a source code control system can leave out tagging, isn't it?
> Is git any good?
> What about Mercurial? Bazaar?
>
Depends...
How about this suggestion: Leave your CVS server alone for the moment.
David Miller wrote:
> I've always been under the impression that Subversion supported Tags.
> http://svnbook.red-bean.com/en/1.1/ch04s06.html
>
[Religious dispute warning...]
No, svn support only supports copies. However, if you design your
directory tree carefully, and exercise discipline in
Edward Ned Harvey wrote:
> Uggh.
Just because I criticize Subversion, don't think I don't have any gripes
about git.
The commands are roughly divided into "plumbing" (low-level) and
"porcelain" (higher-level).
On that analogy, I am looking forward to someone building a
full-featured "bathroo
markw wrote:
> For me, or at least how I use a version control system is to just keep
> track of my changes
Something I recently realized works easily with git:
# cd /etc
# git init
# chmod 700 .git
# git add .
# git commit -m "initial /etc contents"
Now if an update changes some /etc
Greg Rundlett (freephile) wrote:
> You just described "etckeeper"
Except simpler and not as automatic, no extra features beyond git of /etc.
-kb, the Kent who also has started manually using hard links to backup
his /var/cache/apt/archives/*.deb files so he can manually revert an
upgrade if ne
Steven L. Kleiman wrote:
> Is the membership largely a scam or does the foundation actually
> further the use of Linux?
I went to their Linuxcon conference this summer and learned useful
things, so that's worth something. They seem to put their conference
proceedings online, for free.
I am pret
Jerry Feldman wrote:
> The only negative I have seen on the Color Nook is the battery life in terms
> of 8
> hours vs. days for the Kindle and B&W Nook.
>
Battery life, yes, but also with the e-paper Kindle you can "take it to
the beach": thin, light, great in bright sunlight. And unlike the
1 - 100 of 339 matches
Mail list logo