Skip to content

The hyponatremic patient: a systematic approach to laboratory diagnosis

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC100882/
20020416s00023p1056

Couchdb Search

Like that part about games under PC :)

From http://ia700401.us.archive.org/29/items/linuxawydairy/linuxawydairy.pdf
كتاب يوميات لينكساوى
Selection_001

Just welcome back msg

Just welcome back message for my blog

Emacs switch between frames using its geometry

http://stackoverflow.com/questions/91071/emacs-switch-to-previous-window
adding the following lines to .emacs file
(global-set-key (kbd "C-x ") 'windmove-up)
(global-set-key (kbd "C-x ") 'windmove-down)
(global-set-key (kbd "C-x ") 'windmove-right)
(global-set-key (kbd "C-x ") 'windmove-left)

Lisp remote debugging

Like this part while reading some LISP doc

An even more impressive instance of remote debugging occurred on NASA’s 1998 Deep Space 1 mission. A half year after the space craft launched, a bit of Lisp code was going to control the spacecraft for two days while conducting a sequence of experiments. Unfortunately, a subtle race condition in the code had escaped detection during ground testing and was already in space. When the bug manifested in the wild–100 million miles away from Earth–the team was able to diagnose and fix the running code, allowing the experiments to complete.14 One of the programmers described it as follows:

Debugging a program running on a $100M piece of hardware that is 100 million miles away is an interesting experience. Having a read-eval-print loop running on the spacecraft proved invaluable in finding and fixing the problem.

http://www.gigamonkeys.com/book/lather-rinse-repeat-a-tour-of-the-repl.html

The CryptoParty Handbook

https://cryptoparty.org/wiki/CryptoPartyHandbook

This 392 page, Creative Commons licensed handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties. It is being continuously developed.

blocked twitter and facebook

here how facebook ot twiiter could be blocked … alot of lies and disturbed mode

http://www.cyberciti.biz/tips/linux-iptables-examples.html

iptables -A OUTPUT -p tcp -d www.facebook.com -j DROP
iptables -A OUTPUT -p tcp -d facebook.com -j DROP

iptables -A OUTPUT -p tcp -d twitter.com -j DROP
iptables -A OUTPUT -p tcp -d www.twitter.com -j DROP


for flush of rules

iptables -F

EDIT
not always work 🙁
added some code

iptables -I FORWARD -m string --string 'facebook' --algo bm -j DROP
iptables -I INPUT -m string --string 'facebook' --algo bm -j DROP
iptables -I OUTPUT -m string --string 'facebook' --algo bm -j DROP
iptables -I FORWARD -m string --string 'twitter' --algo bm -j DROP
iptables -I INPUT -m string --string 'twitter' --algo bm -j DROP
iptables -I OUTPUT -m string --string 'twitter' --algo bm -j DROP

Visting Alaareesh

http://www.facebook.com/ayman.salem.589/photos_albums

will upload photos in other host ISA

 

Hello World

Hello World Post Test