Updated: 2014-03-09 12:20 EDT
cat, more, less
Check the due date for each assignment and put a reminder in your agenda, calendar, and digital assistant.
The worksheets are available in four formats: Open Office (ODT), PDF, HTML, and Text. Only the Open Office format allows you “fill in the blanks” in the worksheet. The PDF format looks good but doesn’t allow you to type into the blanks in the worksheet. The HTML format is crude but useful for quick for viewing online.
Do NOT open the ODT files using any Microsoft products; they will mangle the format and mis-number the questions. Use the free Libre Office or Open Office programs to open these ODT documents. On campus, you can download Libre Office here.
Take notes in class! Your in-class notes would go here.
Turn on “show file extensions” in Windows! No more
Finish off absolute and relative pathnames.
GLOB patterns match file names.
As of Sunday the following students have not Read All The Words in Assignment 1 and will not be getting marks:
xxxxxxxx: Bad file name: assignment01.txt.txt xxxxxxxx: Text found in Blackboard submisssion box (ignored) xxxxxxxx: Bad file name: assignment.txt xxxxxxxx: Bad file name: Assignment 1.txt xxxxxxxx: Text found in Blackboard submisssion box (ignored)
UK’s security branch says Ubuntu most secure end-user OS: “while no end-user operating system is as secure as they’d like it to be, Ubuntu 12.04 is the best of the lot.”
Quebec creates a new Centre of Expertise in Free/Open Source Software
UK Government now has a clear preference for open source software:
Use open source software in preference to proprietary or closed source alternatives, in particular for operating systems, networking software, Web servers, databases and programming languages.
Problems which are rare, or specific to a domain may be best answered by using software as a service, or by installing proprietary software. In such cases, take care to mitigate the risk of lock-in to a single supplier by ensuring open standards are available for interfaces.
For unique needs and common problems which have yet to be solved well elsewhere, develop software by coding in the open and publish under an open source licence.
I log attacks on my machines. I compared the yesterday attack logs from home (TekSavvy – hit by 32 attack addresses) and my school desktop machine (Algonquin – hit by 50 attack addresses) and found three common attack addresses, two in China and one in India. These three addresses tried to use an SSH login to both my home and my Algonquin machines. Should I worry?
22.214.171.124 196.214.iconpln.net.id 126.96.36.199.dial.wz.zj.dynamic.163data.com.cn
$ whois 188.8.131.52 netname: CHINANET-JX descr: CHINANET Jiangxi province network descr: China Telecom descr: No.31,jingrong street descr: Beijing 100032 $ whois 163data.com.cn Domain Status: inactive Registrant: 中国电信集团公司 Registrant Contact Email: firstname.lastname@example.org Sponsoring Registrar: 北京万网志成科技有限公司
Author: | Ian! D. Allen - email@example.com - Ottawa, Ontario, Canada | Home Page: http://idallen.com/ Contact Improv: http://contactimprov.ca/ | College professor (Free/Libre GNU+Linux) at: http://teaching.idallen.com/ | Defend digital freedom: http://eff.org/ and have fun: http://fools.ca/
Author Ian! D. Allen