I'm not that familiar with bash. I usually use tcsh, and in tcsh (and probably csh) if you define the alias cwdcmd, the command you aliased will be run after every cd command.
Y'all are being too literal. Historically, when someone uses the phrase "security through obscurity", they mean using using non-mainstream, or custom-made platforms. I.e., with regard to OS's, this means using something other than Windows, Unix/Linux, or Mac OS. Like my suggestion of OpenVMS...
Nah, usernames and passwords are faily common. I guess the ultimate security through obscurity would be to make your own OS. Then you can make one that doesn't use usernames or passwords. That is a much better example of STO (security through obscurity (look, I made a new TLA!)).
One other thing: Make sure your motherboard is not touching somewhere metal on your case. I'm not that familiar with your case, so I don't know if that's a problem.
Also, $80 for a PSU seems really cheap for an Opteron based system. I'd definitely check that out too.
Although they may...
For Win2K I used a little systray program called IconDesk to make my Desktop Icon labels transparent. It does other stuff, but making the desktop icon labels transparent was one of its options.
I like this answer the best. I was taught programming using Ada 83 on VAX VMS. There is nothing wrong with Ada. Try out GNAT, the free Ada 95 complier (you need to have gcc installed already).
I've heard of some students around here (New Orleans) taking college freshmen-level courses during their junior year in HS. Those courses counted as credit for their senior year in HS, and their first year of college at the same time, so they ended up skipping two years of school (senior year...
I'm not sure if this is the right place to post this, but here goes:
There is a problem with the News Archives on hardocp.com. When you go to the News Archives page, then click on a link to show the archives for a certain month, all the HTML links in the old posts are f'ed up. In Firefox...
I use FVWM, I guess because it was already used here at work. I've used it on Digital/Compaq Tru64 Unix, Solaris and Slackware. I have the FVWM Cygwin install, but haven't tried it on Cygwin yet.
Where I work, we use GeoTrust. They charge a lot less than Verisign for multiple certs. I'm not sure what they charge for a single domain-wide cert, but you could check them out.
You could also try the free VMWare Browser Appliance. There is a link on that page to download the free VMWare player, which you need to run the Browser Appliance. It is a virtual instance of Ubuntu Linux 5.10 running Firefox 1.0.7 and 1.5. Here's an article, An Approach to Safer Browsing...
My first computer was a C64 (no hard drive). When I first went to college, they had Zenith Z100's in a lab with 5MB Winchester drives (they chirped when reading/writing). Beat that.
Congradulations. I'm a Unix server admin at a local commuter university (20000+ students, 5000+ faculty/staff/other) since 12/2000.
The other Unix admin here has been a systems admin for around 30 years, and he's a Unix purist. Because of that he prefers Slackware Linux. In his opinion...
Sorry if this has already been posted, but I don't have time to read this entire thread.
I always wondered why the people who created a game didn't also do the voice acting? Then we can try and figure out which programmer/designer voiced which character...
Well, you got a lot of advise about Linux. If you want to learn a little about Unix, check out the bible: "The UNIX Programming Environment" by Kernighan and Pike (Prentice Hall publisher). Any decent library should have a copy of it. It also shouldn't be that hard to find used. There...
You need to do a "make config" or "make menuconfig" but I prefer "make xconfig". Then you do a "make dep" and then "make bzImage". Then you copy/move the compressed kernel image to the boot area, and run lilo, or whatever your boot manager is. I could be wrong, though. This was the procedure...
Check out this article for items to search using Google. Or just do searchs on "Roguelike", "Moria", "Angband", and "ADOM". Nethack was already listed above.
The Lord of the Flies is a reference to my analogy about killing the pig. You wouldn't understand, I guess, unless you read the book (or the Cliff Notes).
Anything worth learning to do is worth learning to do well. It's only hard the first time if you learn how to automate.
And you don't...
The gotcha is you have to catch and kill the pig for the ham and make the mayo and bread from scratch and grow your own lettuce and tomato and make your own cheese. It's only hard the first time.
Don't listen to the Gates. It's not Lord of the Flies.