http://www.ncbi.nlm.nih.gov/pmc/articles/PMC100882/
20020416s00023p1056
-
Recent Posts
Archives
Categories
Meta
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC100882/
20020416s00023p1056
http://stackoverflow.com/questions/91071/emacs-switch-to-previous-window
adding the following lines to .emacs file
(global-set-key (kbd "C-x ") 'windmove-up)
(global-set-key (kbd "C-x ") 'windmove-down)
(global-set-key (kbd "C-x ") 'windmove-right)
(global-set-key (kbd "C-x ") 'windmove-left)
Like this part while reading some LISP doc
An even more impressive instance of remote debugging occurred on NASA’s 1998 Deep Space 1 mission. A half year after the space craft launched, a bit of Lisp code was going to control the spacecraft for two days while conducting a sequence of experiments. Unfortunately, a subtle race condition in the code had escaped detection during ground testing and was already in space. When the bug manifested in the wild–100 million miles away from Earth–the team was able to diagnose and fix the running code, allowing the experiments to complete.14 One of the programmers described it as follows:
Debugging a program running on a $100M piece of hardware that is 100 million miles away is an interesting experience. Having a read-eval-print loop running on the spacecraft proved invaluable in finding and fixing the problem.
http://www.gigamonkeys.com/book/lather-rinse-repeat-a-tour-of-the-repl.html
https://cryptoparty.org/wiki/CryptoPartyHandbook
This 392 page, Creative Commons licensed handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties. It is being continuously developed.
here how facebook ot twiiter could be blocked … alot of lies and disturbed mode
http://www.cyberciti.biz/tips/linux-iptables-examples.html
iptables -A OUTPUT -p tcp -d www.facebook.com -j DROP
iptables -A OUTPUT -p tcp -d facebook.com -j DROP
iptables -A OUTPUT -p tcp -d twitter.com -j DROP
iptables -A OUTPUT -p tcp -d www.twitter.com -j DROP
for flush of rules
iptables -F
EDIT
not always work 🙁
added some code
iptables -I FORWARD -m string --string 'facebook' --algo bm -j DROP
iptables -I INPUT -m string --string 'facebook' --algo bm -j DROP
iptables -I OUTPUT -m string --string 'facebook' --algo bm -j DROP
iptables -I FORWARD -m string --string 'twitter' --algo bm -j DROP
iptables -I INPUT -m string --string 'twitter' --algo bm -j DROP
iptables -I OUTPUT -m string --string 'twitter' --algo bm -j DROP