cidViscous

Members
  • Content count

    102
  • Joined

  • Last visited

Everything posted by cidViscous

  1. Two of the things you're curious about--polluting the std namespace and why you'd need makefiles--are hard to visualize right now, because you are working on small programs. As you begin working with sufficiently large bodies of code, it becomes much more of a challenge to keep it all in your head. It's easy to focus on a local block of code--a few lines, functions, or even classes. Eventually, though, you end up with lots of lines that you either haven't looked at in awhile or didn't write yourself. Developing good habits like not treading on std will save you headaches down the road, though it doesn't really matter for what you're doing right now. With makefiles, the same sort of thing applies. It's tough right now to see how they might be useful, but eventually, you might be working with more complex programs that are complicated to build. Makefiles let you establish relationships and script out an automated plan to control the build process. As far as int main() vs. void main(), the difference is the return type. The first function returns an integer, the second returns nothing. Returning an integer can be useful to indicate the state of completion--i.e. return a zero for success and something else to indicate failure (possibly different numbers for different error codes). There is some debate about the matter, but according to the standard, void main() is not allowed (in C++, anyway). http://homepage.ntlworld.com./jonathan.deboynepollard/FGA/legality-of-void-main.html
  2. So, today at 5 on the Mez still the plan?
  3. New to Eclipse and Java. I'm digging it so far, but I'm having trouble getting the plugin for Apache Derby up and running. This is the first time I've had to install a plugin for Eclipse and I'm not sure what I'm doing wrong. I downloaded both org.apache.derby.core and org.apache.derby.ui, unzipped them and dropped the folders into the eclipse/plugins folder. When I check the list of installed plugins under About Eclipse -> Installation Details -> Plugins, they both show up (albeit unsigned), but when I try an import org.apache.derby.core; I get a ClassNotFoundException. Either I can't get the plugin working, or it is working and I'm just not using it right. Anybody know what I'm doing wrong? System details: Intel OSX 10.6 | Eclipse build 20090920-1017 | Apache Derby Eclipse plugin
  4. I recently began having trouble with my primary user account on an Ubuntu 9.04 box. While working on the problem, I added another account of the type 'Desktop User' so I'd have a functional account to search from and try things. When I attempted to open the users-admin applet I was surprised to find that I couldn't. So I made another account and made sure that it included Administrative privileges. Again, no dice. I tried running gksu/gksudo users-admin but each time I get the same results. So, I started reading and discovered that Ubuntu gives special privileges to the initial user account created. So, even running gksudo, and even when a user group has been granted admin privileges, you still can't get into the system configs unless you are issuing the gksu commands from the initial user account. Running gksudo will bring up the users-admin applet, but with no power--the option to unlock or change settings is disabled. Seems like I'm missing a few things. What do you do when your initial user account is the one with the problems? How can you replace it? What's the point in being able to grant admin rights or use gksudo if things have to be run from the initial account? Is there no way to grant privs to a 2nd account? Why can I not recreate an account of the same name after it has been deleted? If someone can point me in the right direction, I'm having trouble finding clear information on the subject. I have found a number of people getting similar error messages, but I have yet to find any explanation of the differences in user privileges. I'll be happy to rtfm, but as of now, I have yet to find the correct fm to r. Any help will be greatly appreciated.
  5. Strike that. It refused to touch those aforementioned directories, but that didn't turn out to be a problem. The right configs were moved and new ones were generated solving the original problem. So, thank you very much Ohm. I still don't understand what the system uses to determine the privs of the special initial user account. Is it maybe the user number? Any account in the admin group can sudo because the sudoers list says so, but what difference would it make to lock out the graphical admin panels if you can still effect the same changes by command line? Anyway, I had no idea that Ubuntu treated the initial account any differently until this happened, so I guess I learned something new.
  6. When I use cp instead of mv it omits the same directories that it wouldn't mv in the first place. . , .. , .gconf , .gconfd , .mozilla. There's clearly something about this whole scenario that I'm missing. As a user in the admin group, I can sudo but it's not unlocking the users-admin panel. I can sudo adduser or sudo deluser just fine.
  7. I don't see wheel but I can sudo. Usually if you don't have sudo privileges and you try it you get the 'not on sudoers....this will be reported' bit. Sudo works to launch the applet, it just comes up neutered.
  8. Thanks for the quick reply Ohm. I tried both suggestions but to no avail. The usermod command seemed to work without a hitch but the 2nd account did not gain any privileges. When I tried to open the users panel I still got 'The configuration could not be loaded--You are not allowed to access the system configuration.' So I tried to move all the configs to an olddot dir but I got the error that some files couldn't be moved because they were in use. So I tried making sure I was logged out of the 1st account and then doing a sudo mv but it said it couldn't because the directories weren't empty. The initial problem with the primary account is that compositing quit working. I'm not sure exactly what I did to compiz (nothing as far as I could tell) but it quit compositing. Then as I was attempting to troubleshoot the problem I became aware of a lack of understanding regarding the user privileges on my system. If you need any more info I'll be happy to clarify as best I can.
  9. <backstory> Okay. I've been tinkering with linux for a little while now--started with live cd's and recently installed debian as my primary os. It's great, and for the most part very functional. There are a few things that I'm having trouble understanding/accomplishing, however, and so I thought I'd see if anybody here could shed a little light or point me in the right direction... I'm not looking for quick fixes, but rather to understand the underlying problems. </backstory> 1. Gnome - iPod Autostart AmaroK Upon plugging in an iPod, Gnome automatically launches Rhythmbox. I'd prefer an autolaunch of AmaroK, but I can't seem to find what's triggering Rhythmbox. I can't find anything under Gnome's Preferred Applications list or /etc/alternatives, but this doesn't seem like it should be complicated. Anybody know what I'm missing? 2. Reboot Issues a. USB - After rebooting (or booting to windows) I've noticed that the paths to my external usb hard drives change sometimes. This creates problems for things that point to files/folders on external drives (such as all the tracks in a media library suddenly not found--files are still intact, but the path to the library changed). Anybody know why my paths would change? b. ALSA - After rebooting sound no longer works until I re-run alsaconf.
  10. Almost forgot to answer your question Alk3. I recently upgraded from etch (which was solid as a rock) to lenny (which began all of my problems). I wanted updated versions of gimp, amarok, etc. and the 6.22 kernel (so I could use ntfs-3g). Unfortunately, this broke several things, and my attempts to understand what is happening (and fix it) have unfortunately broken several more. Now that I'm on lenny, I.... ...can't seem to get the proprietary nvidia driver installed. ...can't 'safely remove' an ipod until root unmounts it. ...cant start an xfce session. ...have to manually start metacity for a gnome session. ...have usb devices that hop mount points. I'm a mess, here.
  11. Thanks to everyone who's replied so far. Sound's working just fine now. I'm still having trouble understanding HAL and Fstab--I thought I understood them until my box started acting up. Hald is a daemon that queries hardware and maintains a list of attached devices, right? It acts as an interpreter between the kernel and userland to maintain a current and consistent way for userspace programs to discover and access hardware, yes? So, if I've got this right, then during the init script of the boot process, hald is started, and it scans the system for devices and builds a table, then periodically rescans to maintain it. Fstab seems to be nothing more than a conf file. During the init script, (some program?) looks at the fstab to see what /dev entries get mounted to what mount points, how they are to be mounted, and whether regular users can do the (un)mounting, right? When you call a mount command, mount checks the fstab to see what it's s'posed to do, yeah? So, how do the two correlate? Does hald use the fstab? Am I making this too hard? Rebooting the system changes where the external drives get mounted to, and root has to unmount an ipod (from a kde session, xfce lets users unmount it just fine--in fact, the AmaroK post-disconnect even accomplishes this). Again, thanks for all the help so far. Back to reading and tinkering....
  12. It's been quite awhile since I've used this service on a regular basis, so I don't know if anything's been changed, but I used to maintain a photo blog strictly from my cell on Blogger. You can register either your phone number or an email address with your account and then just send photos as if you were sending an MMS to another phone. The picture shows up, followed by whatever the message body is as the caption. It worked quite well, and was fast and easy. The downside, of course, is that you're limited in your message size to the length imposed by your phone, but you're prolly not trying to write too much at a time in this scenario anyhow. Like I said, I haven't used it in quite awhile, but it was quite a slick setup. I've gotta think that there are other similar services as well, but Blogger is the only one that I've had personal experience with. -cid
  13. Winamp and Media Monkey both seem to work fine for this (if you're using Windows), and on Linux you can grab Rhythmbox or AmaroK. AmaroK seems to be more polished, but both work for the purpose you're describing (they don't even care if it's synched with another library like itunes would). And, if the audio came from the itunes music store, then you'll also need to un-drm it as mentioned above. Just a couple more ideas... -cid
  14. Thanks for all the input, so far. To clarify what I mean about the changing paths.... From time to time, the mount points on the external hard drives change for no apparent reason (other than a reboot). For instance, when I first installed it, it was mounted to /media/usbdisk, then next time it came up as /media/usb, then /media/usb0, and now /media/disk. I need to read up on the difference between fstab and hald--I thought hald was the daemon actually talking to the hardware and the fstab was a config file to tell the initialization script where to mount what drives (and who can mount them, etc.). Maybe I've got that wrong, but occasionally, the mount points change and the only connection I've been able to find is reboots. Other usb storage devices have the same issue--the mount point for the ipod changed from /media/IPOD to /media/sdd2.
  15. Not sure how I missed that. Thank you. Now, I wonder if this is controlled by GConf or by a dot file.
  16. When you're talking about the 'speed' of a connection, there are a couple of things to think about. Speed can refer to bandwidth (i.e. 100Mbps, etc.) or latency (which is the time required to send/receive any piece of data, regardless of size). A bottleneck (speed limitation) can occur at any point between your machine and the box you're connecting to. Depending on what you're doing (i.e. what kind of traffic you're sending/receiving), latency or bandwidth could be the bottleneck. This is why, for example, you might click a link to a webpage and have to wait, but then all of a sudden the page snaps into existence. The bottleneck wasn't bandwidth (as the page was small), but rather latency (or, waiting for one of those hops in the middle--waiting for a server to respond or whatever). If this doesn't really answer your question, maybe you could give us a little more info about what you're trying to do/find out. It's just important to understand how packet switched networks function to understand the question you're asking. -cid
  17. Sifting through the dump is an interesting idea, but will anybody here have the kind of hardware to tackle that sort of thing? Also, I wonder how much of this stuff has ended up on archive.org. As far as the templates go, it's like Stank said--it's better to grab the data now and we can make it pretty later.
  18. By default, windows users are admin (root) instead of the other way around. About 99% of people never change this (or even think about it) and proceed to rock around the Interweb running with full privileges. By only using a privileged account for administrative tasks you can (hopefully) help mitigate any damage malicious code might try to cause (and limit it to your account instead of the whole machine). Unfortunately, this is not always successful (as there are ways to escalate the rights of a non-privileged account) and can also be a tremendous pain in the ass (when installing and configuring software), but many would argue it is a worthwhile effort as it creates one more line of defense. The link on operator's site looks like one of those web based a/v scans--the reason you might want to try this from safe mode (with network support, of course) is that in some circumstances (that is, if safe mode's working like it was intended), you'll be running off of a backup set of files and some kinds of malware will not be running. This is important because some types of malware seek to actively defend themselves. -cid
  19. I'm having a similar problem. I'm trying to setup a dynamic socks proxy to tunnel traffic over an unencrypted (or wep, which is close to the same thing) wi-fi router to a box on the wired portion of the same router. OpenSSH on the wired box seems to work fine--I can log in, browse files, issue commands, with ssh command or putty, just fine--but when I try to tell IceWeasel to use either one of them as a socks proxy, nothing happens. And if I tell it to use it as an HTTP proxy, it works, but traffic doesn't get forwarded out to the Internet, it just gets intercepted by OpenSSH--tells me what version it's running. I've been trying to follow IronGeek's great (and what I thought should be pretty fool-proof) tutorial on this, but I can only seem to get it working half-way. Now, I've been RTFM-ing it all day, and trying out different things, so sooner or later I'll probably get this figured out, but I also realize that using these tools improperly can lead to a false sense of security and get you in trouble real quick, so, with that in mind, I've got just a few questions... Is this even safe to use as a substitute for WPA (which hasn't worked for me with ndis_wrapper so far)? Would it be better as a supplement to WEP (or would that just be extra overhead)? Would Tor be a better solution to this problem (as it functions in a similar manner, but with onion layers of double blind separation)? Why does Iceweasel take it as an HTTP proxy, but not a SOCKS? Why is it not forwarding ports even after a successful login? Can you also use this type of thing to safely share directories and files between boxes? What steps should be taken to prevent your SSH server from being abused or becoming a vuln? If anyone knows what I'm doing wrong here, or has anything to contribute to the questions posed here, I'd greatly appreciate it. -cid
  20. If there were some constants you could rule out of the equation--known information, like maybe a song or known repetitive noise in the background--wouldn't it be possible to use destructive interference to filter out certain parts? Like how active noise canceling headphones work. Although, this would be dependent on knowing some relevant constants in the first place. Possible known constants: generator/compressor/fan noises, music, other known audio streams (tv/radio show), etc. Another problem you might run into with this sort of angle would be limits on the purity/accuracy of your data based on sampling rates/compression rates/etc. A thought, though.
  21. You can encrypt different parts of the process and hide different information from different people. From your laptop to the access point--hides data from wireless eavesdroppers --> WEP or WPA/2 -- Unless your equipment limits you to this, I would _NOT_ recommend using WEP--it has an underlying flaw and your key can be compromised in a matter of minutes. From your ip to an SSL enabled webserver (or other tunneled server)--hides data contents from everyone but the server you're tunneled into, but your isp (and likely any routers along the way) will know the destination of the tunnel --> Client running appropriate software, and an equipped server to tunnel into (SSH, SSL, ect.) From your ip to a Proxy, then out to the internet--Can be tunneled--hides data content (if tunneled), and isp can only see proxy as destination (thus, they can't see what happens to your packets after they get to the proxy) --> Appropriate Client/Server Software (for tunneling), appropriate Proxy settings on your client, and a proxy you can connect to -- NOTE that this process can be extended, from one proxy to the next, creating 'proxy chains' So, if you can encrypt each layer of encapsulation not everyone knows what's going where--the isp only sees the first proxy, and the server on the end only sees the last proxy, and if there are any middle hops, each of those can only see their respective buddies. Thus, someone would have to collect the knowledge of every box in this chain to see both the destination and the requestor. Now, this is kind of an oversimplification, as there are other packets flying around that might give away your secrets, but think of it as kind of a generalization. This is sort of how Tor/Privoxy (which should be used in conjunction) come into the picture--they encrypt the data, send it through double blind hops in the Tor cloud/layers, data comes out from a random peer in the Tor network to connect to the server, and then the data goes back through until it gets to you. So, your isp can't see what you're going for, the peer actually connecting to the server can't see who's requesting it, and none of the hops in the middle have enough info to give you away, either. Does this answer your question a little better?
  22. One of the cool things about linux is it's extensibility. Since you were asking about screen shots I'll assume you're talking about running in graphical mode. The way the environment looks and behaves is controlled directly by what window manager is running, so just bear in mind that just because you get a screen shot of a certain distro behaving a certain way, doesn't mean that it's stuck looking like that. Some of them are light and clean and fast--some are shiny and slick and laden with eye-candy. This can be changed after installation, and in some cases, people even run different wm's depending on what they're doing. If you're trying to choose a distro to start with, you might take this quiz. Another suggestion might be to simply try out several distros as live cd versions (that way you don't have to take the trouble/risk of installing things on your hard drive. Here is a pretty big list of live cds to try out.
  23. You'll need some kind of networking hardware, then, if you want to do it in the real (physical) world. This could range from a crossover cable and two boxes with nics to whatever you've got (switches/hubs/routers/wifi/bluetooth/etc). You can even do certain things using other computers on the internet to affect your own machine--i.e. proxies, public services (port scanners, virus scanners, etc.), and shell accounts. And there's also networking simulation software, where you can set up pretend networks and watch the interactions.
  24. When you say you want to encrypt your connection, what exactly do you mean? Do you want to encrypt _what's_ being sent, _who_ it's being sent to, or both? It sort of sounds like you're asking about tunneling--where you make an encrypted path between you and the server, shielding you from anybody down the length of the encrypted 'tunnel', but in this scenario the endpoint of the tunnel is still visible, so one can see what server you're talking with, just not what's being said. This is what happens every time you use ssl (https:// instead of http://). Now, you can also set up an encrypted tunnel to a proxy--advantages of this being that observers on your end of the network won't be able to see where your traffic is ultimately headed, but again that traffic's gotta come out somewhere, so if traffic from your proxy is observable (for example, the isp providing access), the destination will still be known. Tor/Privoxy take this concept, and add in layers of obfuscation--so, traffic's visible going into the tor cloud, and coming out, but it's tougher to make the correlations of who's sending/receiving what. All the hops in the middle are double blind--don't know who/what is going where. So, in the case of SSL-Explorer, you're making a tunnel into a server running the software, and for Enigma Exchange, it's the same--you're tunneling into the server (encrypted, but the server still knows where you're coming from and where the destination is). If this doesn't answer your question, then please try and give us a little more information.
  25. You've touched on it, my friend. They're not in it to provide as good a service as they can--they're in it to make as much money as they can.