CVS Server on MacOSX 10.3 Server

After much pulling of (what’s left of my) hair, the CVS server on commons.ucalgary.ca is running again. Turns out that Panther handles password differently than 10.1.5 did (yes, our server was that out of date…), so the pserver barfed on authentication attempts.

Connecting to the CVS server via SSH works like a charm.

It’s a trivial change to make on the client side. Change your to

:ext:username@commons.ucalgary.ca:/Library/CVS

Really should have been running under SSH all along – pserver is a gaping security hole, with the plaintext passwords passed through the pipe…

Handy links for this process:

After much pulling of (what’s left of my) hair, the CVS server on commons.ucalgary.ca is running again. Turns out that Panther handles password differently than 10.1.5 did (yes, our server was that out of date…), so the pserver barfed on authentication attempts.

Connecting to the CVS server via SSH works like a charm.

It’s a trivial change to make on the client side. Change your to

:ext:username@commons.ucalgary.ca:/Library/CVS

Really should have been running under SSH all along – pserver is a gaping security hole, with the plaintext passwords passed through the pipe…

Handy links for this process:

The Perfect Virus Killing Machine

I was emailed a virus over the weekend, and didn’t even know it was malicious. It was rendered harmless by the Perfect Virus Killing Machine.

I run MacOSX. Windows virii are ineffective. I’ve never had a virus infect any of my macs. Ever. Sure, I’ve received copies of Windows virii, which I dutifully delete so they don’t infect those on Lesser Systems, but they’ve never managed to do anything other than clog my inbox for a second or two.

From ArsTechnica:

Just a heads up, there’s a new mass email virus filling up inboxes everywhere. I’ve had three of them already today, so I thought I’d try and get the word out. If you receive an email apparently from support@microsoft.com (the address is spoofed) with any of the subjects, “Re: My application”, “Re: Movie”, “Cool screensaver”, “Screensavers”, “Re: My details”, “Your password”, “Re: Approved (Red. 3394-65467)”, “Approved (Ref. 38446-263)” or “Your details”, delete it asap. It will contain an attached .pif, .ti or .uue file which is a trojan. The body of the email will read, “All information is in the attached file”.

When opened, the virus searches hard disks for more email addresses to send itself to. It also tries to spread via remotely shared startup locations on a network. Those of you with anti-virus software can protect yourselves by updating your definitions ASAP. The rest of us can use common sense and never open executable email attachments from unknown or unexpected sources. More information can be found here and here .

Wow. That could have been bad… I got the “Re: My application” variant. And I was hoping that Microsoft was hiring… 😉

I was emailed a virus over the weekend, and didn’t even know it was malicious. It was rendered harmless by the Perfect Virus Killing Machine.

I run MacOSX. Windows virii are ineffective. I’ve never had a virus infect any of my macs. Ever. Sure, I’ve received copies of Windows virii, which I dutifully delete so they don’t infect those on Lesser Systems, but they’ve never managed to do anything other than clog my inbox for a second or two.

From ArsTechnica:

Just a heads up, there’s a new mass email virus filling up inboxes everywhere. I’ve had three of them already today, so I thought I’d try and get the word out. If you receive an email apparently from support@microsoft.com (the address is spoofed) with any of the subjects, “Re: My application”, “Re: Movie”, “Cool screensaver”, “Screensavers”, “Re: My details”, “Your password”, “Re: Approved (Red. 3394-65467)”, “Approved (Ref. 38446-263)” or “Your details”, delete it asap. It will contain an attached .pif, .ti or .uue file which is a trojan. The body of the email will read, “All information is in the attached file”.

When opened, the virus searches hard disks for more email addresses to send itself to. It also tries to spread via remotely shared startup locations on a network. Those of you with anti-virus software can protect yourselves by updating your definitions ASAP. The rest of us can use common sense and never open executable email attachments from unknown or unexpected sources. More information can be found here and here .

Wow. That could have been bad… I got the “Re: My application” variant. And I was hoping that Microsoft was hiring… 😉

Services ROCK!

I was just poking around in the Services menu on MacOSX, and stumbled across the “Summarize” service. I’d seen it before, but never fired it up to see what it did.

What you can do is select any text in a Cocoa application, then hit the “Summarize” service. It will launch a mini app that will generate a summary of the selected text. You can even drag a slider widget to control the size of the summary (from complete, to very short). Extremely cool.

The abstract for this article was generated by the summarize service, on the body text of this article. It would be cool if iBlog could automatically fire off the contents of an entry to this service and transparently populate the Abstract field….

I was just poking around in the Services menu on MacOSX, and stumbled across the “Summarize” service. I’d seen it before, but never fired it up to see what it did.

What you can do is select any text in a Cocoa application, then hit the “Summarize” service. It will launch a mini app that will generate a summary of the selected text. You can even drag a slider widget to control the size of the summary (from complete, to very short). Extremely cool.

The abstract for this article was generated by the summarize service, on the body text of this article. It would be cool if iBlog could automatically fire off the contents of an entry to this service and transparently populate the Abstract field….