Aug. 10th, 2011

theweaselking: (Default)


Alternately: Hoverkitty is ready for her close-up now, Picture Monkey.
theweaselking: (Default)
Mormon Prophet gets life in prison.

He'll be eligible for parole, technically, when he's 100.
theweaselking: (Work now)
Is there an easy way to tell where a Linux environment variable is set? Like, which config file it was in, when you've got an incestuously complicated set of sub-references and called files, and the normal "new user" script involves pulling in the entire bunch?

(Oh, and there's roughly 20TB of teeny little files where this COULD be set. So "grep -r VARIABLE=VALUE /*" will take months.)

.bashrc calls three other scripts, each of which call other scripts in turn, and it all works out... in practice. But we can't seem to find out WHERE one specific environment variable gets set.

EDIT: Brute force FTW. Comment out each line in turn until the variable stops being set. Follow that file. Repeat.

Only took about 30 minutes, versus grep.

EDIT2: Oh, and if I *had* run that grep command, that would have totally sucked for me when, in October, I got my results and it had no useful lines in it - because "/*" will ignore hidden files. I more wanted "/.*", or maybe even "/\.*". The second is less thorough but would have worked since it *was*, finally, set in a .file.
theweaselking: (Science!)
MIT produces what appears to be a working broad-spectrum *antiviral*.

It works in trials against the common cold, H1N1 flu, dengue fever, polio, and several others.

"The drug works by targeting a type of RNA produced only in cells that have been infected by viruses. “In theory, it should work against all viruses,” says Todd Rider, a senior staff scientist in Lincoln Laboratory’s Chemical, Biological, and Nanoscale Technologies Group"
theweaselking: (Default)
GPRS: Cracked.

"Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base station and eavesdrop on information transmitted by users passing by. In some countries, they found that GPRS communications weren't encrypted at all. When they were encrypted, Nohl adds, the ciphers were often weak and could be either broken or decoded with relatively short keys that were easy to guess.

The group generated an optimized set of codes that an attacker could quickly use to find the key protecting a given communication. The attack the researchers designed against GPRS costs about 10 euros for radio equipment"

Profile

theweaselking: (Default)theweaselking
Page generated Aug. 1st, 2025 12:30 pm