RE: [OT] symlinks to symlinks
> > If it's a symlink you should be able to readlink it (see > perlfunc) to get > the thing that it points at > (although you'll have to do some file concatenation logic > based on whether > it's absolute or relative) > And then you can test that (and work your way along the symlink chain, > but make sure you put a trap in after a some large number of > steps else > you will be gotcha'd by symlinks looping back to themselves) > > You could catch that by recording which inode's you'd already visited in the chain. If it's one you've already seen, then it's a loop. Mike.
RE: (OT-ish) whois microsoft.com
> > >>APPLE.COM.IS.THE.CHOICE.OF.ALL.SELF.RESPECTING.TERRORISTS.NET > > Server Name: WHITEHOUSE.GOV.HAS.THE.BEST.TERRORISTS.NET TERRORISTS.NET.IS.SO.FUCKING.31338.NET
RE: (OT-ish) whois microsoft.com
> > On Thu, Jan 18, 2001 at 11:22:45AM +, Robin Houston wrote: > > > MICROSOFT.COM.IS.SECRETLY.RUN.BY.ILLUMINATI.TERRORISTS.NET > > > > but > > > > MICROSOFT.COM.INSPIRES.COPYCAT.WANNABE.SUBVERSIVES.NET > > > > is quite a good explanation of what's happened :-) > > Yeah, this was NTKed some time ago. The names may have > changed but the > principle is the same. > APPLE.COM.IS.THE.CHOICE.OF.ALL.SELF.RESPECTING.TERRORISTS.NET Anyone spotted any others? Mike.