show me the money
everywhere !
thanks for the link: Biddy.
I think it’s fair to say that GWB leeoryed this whole middle east thing.
January 2004
and the internet was in uproar about this.
Those dev kits Apple ships now don’t look that different. OK, they skipped the green light …
over at arstechnica we read:
… the ongoing psychological effect of having a clean, elegant, technologically advanced RISC architecture at the heart of the Mac platform was a far more important factor in Apple’s competitiveness than the Mac’s actual benchmark numbers at any given moment.
so true.
this suggests that turning off IPv6 might increase performance.
So I tried it. And in a gigE configuration I could not find a difference.
with IPv6:
PowerBook G4 A15 SGI Tezro
[ 3] 0.0-10.0 sec 863 MBytes 724 Mbits/sec
[ 3] 0.0-10.0 sec 760 MBytes 638 Mbits/sec
[ 3] 0.0-10.0 sec 708 MBytes 594 Mbits/sec
PowerBook G4 A15 Linux x86
[ 3] 0.0-10.2 sec 484 MBytes 397 Mbits/sec
[ 3] 0.0-10.0 sec 584 MBytes 490 Mbits/sec
[ 3] 0.0-10.2 sec 568 MBytes 467 Mbits/sec
without IPv6:
PowerBook G4 A15 SGI Tezro
[ 3] 0.0-10.0 sec 788 MBytes 661 Mbits/sec
[ 3] 0.0-10.0 sec 744 MBytes 624 Mbits/sec
[ 3] 0.0-10 0 sec 872 MBytes 731 Mbits/sec
PowerBook G4 A15 Linux x86
[ 3] 0.0-10.0 sec 581 MBytes 487 Mbits/sec
[ 3] 0.0-10.2 sec 608 MBytes 500 Mbits/sec
[ 3] 0.0-10.0 sec 598 MBytes 502 Mbits/sec
Your Mileage May Vary
An easy way to run things on remote machines in unix has been the ‘rsh’ command.
For instance:
rsh -l guest remote-machine command-to-run-on-that-machine
would execute the command on the other machine. Of course things need to be set up for that. It used to be simple, but the default installs
for redhat redhat (and possible other installs) need a bit of tweaking. Here a quick and dirty recipe. This openes the machine to the public,
so don’t do it on any computer exposed to the internet or a bunch of untrustworthy users.
useradd guess
(remove !! from /etc/shadow for user gues)
A user guest with no password exists. Cool and scary. Up to you.
rpm -i rsh-server-0.17-21.i386.rpm
Versions might be different, check if it does already exist
(set disabled="off" to disabled="on" in /etc/xinetd.d/rsh)
killall -HUP xinetd
Tell xinetd that it is allowed to start rshd if an incoming connection is being made.
cp /etc/pam.d/login /etc/pam.d/rsh
This is a true hack for people that don't know what they are doing. I have no idea what
the side effects are of this. It worked for what I had to do, but it might be completely
inapproiate.
From now on you can do things on that machine as the user 'guest'.
Citigroup looses tapes with the records
of 3.7 million clients. What _would_ have be cool would be if they would have not have copies.
That would teach them.
Right now all those 3.7 million people can hope for is that UPS lost the tapes real good. They can loose things so good that nobody can find them.
Really, only fedex and UPS can do that.
Finally the stack overflow exploits handcrafted for intel CPU might start work on Macs!