unixronin: A somewhat Borg-ish high-tech avatar (Techno/geekdom)
Friday, September 3rd, 2010 03:00 pm

One of the things that's always been a minor peeve to me on LiveJournal (and then, later, on Dreamwidth) is the Forrest Gump box-of-chocolates nature of the Quote button.  (You never know quite what markup you're going to get.)  For LiveJournal, I long ago found a Greasemonkey script called LiveJournal Blockquote, which made the Quote button consistently generate a <blockquote> tag.  But it doesn't work on Dreamwidth (and appears to have vanished from userscripts.org anyway).

That's why I wrote an improved version today, called LJ Quote Fix.  It works on both LiveJournal and Dreamwidth, should work on any site based on the LiveJournal codebase, and has provisions for customizing and styling your quote markup using CSS (though at this time there isn't a UI for it, other than Greasemonkey's 'Edit' button.)

By default, it formats quotes like this.  (Well, mostly like this, anyway.  If you're reading this in my style, the light-blue background comes from my journal's custom CSS.)
Tags:
unixronin: A somewhat Borg-ish high-tech avatar (Techno/geekdom)
Friday, September 3rd, 2010 08:28 am

Via Bruce Schneier:  A team of cryptologists at the University of Trondheim, Norway, have developed a successful attack that works against both currently-deployed existing quantum cryptographic systems, IDQ and MagiQ.

The attack, which allows an eavesdropper (traditionally "Eve") to completely recover all quantum-encrypted data sent over the link, completely invisibly to the recipient (traditionally "Bob"), is brilliantly simple:  Eve simply blinds Bob's quantum detector with a 1mW laser, preventing it from operating as a quantum device capable of detecting single-photon polarization, then intercepts all the entangled photons and reads them herself.  Eve then resends every 1 bit to Bob as a bright laser pulse, which Bob's detector, blinded for quantum events, responds to in classical mode and reads as a 1.  Bob's detector — and Bob — cannot tell the difference.

"We have exploited a purely technological loophole that turns a quantum cryptographic system into a classical system, without anyone noticing," says Makarov.

Quantum encryption has been widely considered, and widely touted as, unbreakable because the laws of physics guarantee that you cannot measure any property of a quantum system without detectibly disrupting the system.  Thus it has been taken as gospel that you cannot eavesdrop on a quantum communication channel without leaving clear evidence that you have done so.  This inspired piece of lateral thinking is a Kobayashi Maru strategy — faced with an unwinnable game, Makarov's team have simply changed the rules of the game to one that they can win.

unixronin: A somewhat Borg-ish high-tech avatar (Techno/geekdom)
Wednesday, September 1st, 2010 09:09 am

Bruce Schneier is one of eight designers of Skein, an entrant for the NIST SHA-3 competition.  It's extremely robust, and has proven very difficult to attack.

Which is why a group of very clever cryptanalysts invented a completely new type of cryptanalytic attack to use against Threefish, the block cipher underlying Skein.  The crypto community is still trying to figure out how the new attack changes the crypto landscape.

Brilliant as it is, though, the new "known-key distinguisher attack" still didn't really work.  It was able to distinguish between a reduced-round — 57 of 72 rounds — Threefish ciphertext and a random permutation, but doesn't actually recover any key bits, requires that the attacker be able to manipulate both plaintexts and keys "in a structured way", and is only marginally faster than a brute-force attack.  Even then, it can only distinguish Threefish ciphertext, and doesn't actually affect Skein itself (yet).  Further, Schneier and the other Skein designers were able to identify a way to block the new attack by changing a single constant in Threefish's key schedule, which prevents the attack from being able to distinguish between Threefish ciphertext and random permutation beyond 33 of 72 Threefish rounds, and have made that change as a second-round tweak permitted by the NIST.

Still, it illustrates a point:  Both cryptography and cryptanalysis only get better over time.  When you run into a problem where none of the existing tools work, the truly clever cryptologist devises a new tool.

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Monday, July 26th, 2010 01:51 pm

Flash has always been ... risky to run on Linux, because Adobe/Macromedia has historically treated Linux as the red-headed stepchild and, as a result, the Flash plugin for Linux has been unstable at best.  Not only did it not work at all, but for much of its history, roughly one in every two to four Flash objects would crash the Flash plugin, which would take Firefox down with it.

I had an opportunity this morning to try out the new plugin sandboxing feature in Firefox 3.6, which runs QuickTime, Flash and RealPlayer plugins in a sandbox environment to protect Firefox in the event that the plugin crashes.  I tried, unsuccessfully, to watch a YouTube video preview of Halo: Reach.  But instead of Firefox locking up, wedging my CPU at 100%, becoming unresponsive, or dying altogether, all that happened was that instead of a video, I got a lego-block-like icon and an advisory message, "The Flash plugin crashed."  Having so informed me, Firefox simply went unconcernedly on with its business as though nothing had happened.

"Sah!  The Flash plugin crashed, Sah. No casualties, Sah."

"Very good, Sergeant.  Carry on."

"Sah!"

Tags:
unixronin: Sun Ultrasparc III CPU (Ultrasparc III)
Saturday, July 10th, 2010 05:35 pm

Finally, things have progressed from bang-head-on-wall to ... well, progress.

First of all, I've solved PART of the issues with the Mayhem G3 laptop.  I'd previously checked the fans and heatsinks, and they looked fine ... from the outside.  Yesterday, at the suggestion of a friend, I partially disassembled the laptop in order to replace the heatsink themal compound.  (A good call; what was there was mostly gone.  It's now been replaced with a fresh layer of Arctic Alumina.)  And, so long as I had the heatsink assembly out anyway, I disassembled it for a thorough cleaning.

The Mayhem's CPU heatsink is basically a fan-pressurized plenum assembly with fine copper-fin heat exchangers at either end, connected via heat pipes to the CPU.  The inside surfaces of both heat exchangers were totally blocked by a layer of dust so thick and dense that it had formed what amounted to a 1/8" layer of solid felt.  NO WONDER the previous owner had reported that it had begun "crashing" at increasingly-short random intervals; it had no cooling airflow whatsoever, and was going into emergency thermal shutdown to avoid destroying its CPU.

With its heat exchanger cleaned and new thermal compound, the Mayhem is now stable running Windows XP Pro, and has been up for two days without a hiccup; I even stress-tested it playing Halo for about twenty minutes, which was driving it into thermal shutdown within about two minutes prior to the cleanup.  (I will note, however:  If you value your sanity, don't ever try to play Halo — or probably any FPS — with a trackpad.  Just don't.).  So, one problem licked; I know the hardware is sound.  Next, I get to re-tackle the problem of getting it to boot under Linux with ACPI enabled.  (Which may now be a solved problem — it is entirely possible that what was happening was it was getting as far as loading the ACPI code, detecting thermal overtemperature condition, and immediately halting.)  With a 100GB hard disk (well... about 94 real GB), I have it partitioned 45GB and 45GB with a roughly 4GB swap partition, and I'll be leaving the XP installation in place and installing Gentoo dual-boot.

Given this success, I went on to also disassemble the M5309 laptop, which I'd been trying to reinstall for the Dread Pirate Bignum (who has decided to name it Post-Dated Check Loan) until it became unable to successfully compile anything, and replace its heatsink thermal compound as well.  (Which turned out to also be a good call; it was that horrible grey waxy stuff, and very little of it was still between the heatsink and the die.)  I then set out to try a new clean install, which not only exhibited no further problems with failed compilations, but successfully recompiled gcc on the very first try — always a good stresstest of a system.  But it still wouldn't build glibc.

And this was where things REALLY got interesting.

Beware; here be deep geekery. )

Now, with that all figured out, Post-Dated Check Loan is happily compiling away, installing a complete clean system from scratch.  So Pirate is going to have her laptop after all in another day or two.  (We should probably buy her a new battery at some point though; the one we got with the laptop is down to 29% of its original 4400mWh capacity.)

Then, assuming I can sort out the processor speed control issue on the Mayhem laptop, I just need to source a screen from it somewhere.  (It requires a Quanta QD15LT01 15.4" WXGA active-matrix TFT LCD.  I can find one for about $60 used and asserted to be in good condition, about $77 for a "100% compatible" knockoff with a high-glare gloss surface, or $95 for the genuine article.  Saving $18 for a knockoff screen that I already know will have a glare problem just doesn't seem like a good idea.  But whichever I buy, it's going to have to wait on budget.)

unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Wednesday, June 16th, 2010 12:45 pm

This outfit and this domain are in cahoots, signing up PHP robots to mailing lists in order to archive those mailing lists, and publish the archives, without the knowledge or permission of the list members or maintainers.

Sure, there is no legal expectation of privacy in email.  But to publish an archive of someone else's mailing list without even telling them you're doing so, let alone asking permission, is damned rude at best.  One assumes the intended business model is to monetize other people's content via targeted advertising (and, some reports allege, by harvesting addresses off the lists for sale to spammers).

If you run a Mailman-based mailing list, and don't want Answerpot leeching your list, here's how you slam the door on their sockpuppets:  Simply go to each affected list's management page, go to the Privacy screen, and enter ^@zeusmail.org into the banned-addresses list.  This is a wildcard regular expression that will match any zeusmail.org address.  Then you'll probably want to go through and delete any zeusmail.org addresses.  The easy way to do that is from the command line:

# cd [Mailman list directory]
# for f in * ; do list_members $f | grep "zeusmail\.org$" | xargs remove_members -n $f ; done

(Note:  This example assumes that all Mailman tools are in your PATH.)

Tags:
unixronin: Sun Ultrasparc III CPU (Ultrasparc III)
Friday, May 28th, 2010 11:37 am

A few months back, Gentoo added a BRL-CAD 7.16.6 package, and after a few tries I got it to builkd and install.  I worked my way through the tutorial, then bame back to it next week and ... it wouldn't run.  Updates had broken it and it would neither run nor rebuild, and hasn't since.

Until yesterday, that is, when the Gentoo package was updated to BRL-CAD 7.16.8.  Yay!  It builds again!  So I have a working BRL-CAD again.  Unforetunately it's been not working for so long I've forgotten much of what I learned in the tutorial, and will have to get back up to speed again.

Next project:  Use BRL-CAD to model the planned rebuild of my computer desk.  I still don't have the money to spare to actually DO it, but with luck one or the other of us — maybe even both — will have a job again in another month or two.  I'm planning to construct a new top out of two solid-core doors, and new kick panels out of 3/4" plywood.


On the hardware front, I should have whitestar's disk back Monday, and babylon5's LCD monitor back next Friday.  Hannspree failed to surprise me at all by finding a fault on the main board, and replaced the board.  I got babylon5's third RAM stick back last night ... but the brand-new module exhibited the same problem.  I plugged it in, powered back up, ran a heavy compiler, and immediately started getting gcc internal compiler errors and kernel oopses.

Fortunately, I think I now know the REAL problem.  It's only a theory as yet, suggested to me last night by a Bitminer, but thinking about it, it seems highly probable:  babylon5's power supply simply isn't adequate to drive the full 3GB of RAM.  I've never had a problem with the power supply before, but on the other hand, it's a no-name power supply that could well be significantly optimistic on its output rating, and it's only rated 420W to start with.  According to Thermaltake's power requirements calculator, babylon5 may be drawing as much as 390W when it's working at full load, which means if that rating plate is even as little as 5% optimistic, I'm right on the ragged edge.

Unfortunately, I don't have a spare power supply — let alone a bigger one — to test this theory with, right now.  But when I can, I'll drop in a current-tech high-efficiency 600W-650W power supply and see if the problem goes away.  Doing so will also give me enough extra power to replace babylon5's (excellent at the time, but now rather antiquated) Matrox G450 graphics card with something several generations newer and more capable, with DVI or HDMI out, which should dramatically improve desktop responsiveness and video playback.

There's just that pesky money thing...

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Wednesday, May 26th, 2010 11:29 am

I currently have two Microsoft Natural 4000 ergonomic keyboards.  That's this one:

This keyboard has a few minor functional glitches, but has one major, glaring flaw:  Rather than proper double-shot key caps that will outlast the keyboard, the Chinese company that manufactures it for Microsoft marks the key caps using cheap, poor-quality decals.  There isn't even any kind of protective coating over them.  These decals wear off completely in a matter of a few months of normal use, a problem which Microsoft initially covered under warranty, but — presumably after learning that it wasn't just a few isolated cases, it was happening on ALL OF THEM — has now ingeniously and permanently solved by simply declaring it to be normal expected wear.  (Bite me, Microsoft.)

(Suggestion, by the way:  If you buy one of these keyboards anyway, which I wouldn't advise, you might want to do something like give all the key caps a couple of coats of lacquer clearcoat or polyurethane before using it for the first time.)

Now, I've been looking around online for replacement key cap label sets.  And sure enough, I found two different types, one of which looks perfect for the purpose.  That would be this product:

Only $9.95 per set!  Keyboard restored to full usability, and better than new contrast and visibility, expecially in low light!  Win!

There's just one problem.  No domestic shipping options except UPS.  MINIMUM $11.24 shipping for a $9.95 non-fragile item that probably weighs under two ounces, from New Jersey to New Hampshire.  LOSE.

Two or three of those would probably fit into a USPS Priority Mail flat-rate box or envelope, and ship anywhere in the US for $4.95.  The store even offers USPS Priority Mail shipping, and even, for that matter, USPS First Class.  But only on international orders.

At a shipped cost of $21.19, it would be more cost-effective for me to go and buy one of these Adesso ergonomic keyboards brand new from Amazon.com, for $33.24 with free shipping, and have a brand new keyboard AND a still-usable spare.

Shipping fail:  You have the right product, at the right price, but it's not worth your customers' money to buy it because you don't offer a realistic shipping option for it, because after all, one size UPS carton fits all.  Except that it doesn't.


UPDATE:  I now have to add that when I contacted the vendor, Baron Bob, to ask why there were no domestic USPS shipping options, they responded that they were actually one of the trial businesses chosen by the USPS to beta the flat-rate "If it fits, it ships" service before USPS officially announced the service.  However, they ended up choosing not to offer USPS shipping on domestic orders because, in their words, "it sucked", not least the fact that — as probably anyone who has tried to use package tracking on a USPS Priority Mail item knows — USPS package tracking is all but completely useless.  Not only do you not get any tracking progress updates while your USPS package is in transit, you're lucky if they even update it after delivery to show that your package was delivered.

"Trust me when I tell you this," Paul told me, "customers do not like the answer "I can't really tell you where your package is.""

Given this information, I'm assuming that they offer USPS shipping on international orders only because for international shipping, FedEx and UPS are an even worse nightmare.

Anyway, I will declare that the folks at Baron Bob are stand-up guys.  Not only did Paul, the office manager there, offer to ship an order of key cap stickers via USPS for me to make the purchase cost-effective, he gave me a (completely unrequested and unexpected) coupon code for a 15% discount on the order.  That's called good customer service, folks.

(Are you paying attention here, Microsoft?  Among other companies I could name?)

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Tuesday, May 25th, 2010 09:18 am

LittleDog goes through its paces.  (I'd embed the video, but experience says LiveJournal will bugger up the YouTube link if I do that.)

Ah, what the heck ...

If this is the correct video on Dreamwidth but the wrong one on LiveJournal, well, something's screwy somewhere, innit?

(Update:  The result — Dreamwidth post, correct video.  LiveJournal post viewed in my journal or on its own, correct video.  LJ post viewed on my Friends page, video is screwed up.)

I, for one, welcome our new walking robotic masters er, servants.

unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Monday, May 24th, 2010 09:42 am

As if mass cybersquatting, monetizing its customers' domain name ideas through its shell subsidiary Domains By Proxy, locking customers' domains to keep them from transferring to other registrars, actively conspiring in the theft of its own customers' domains, intentional violation of ICANN rules and regulations in order to extort additional money from customers, or many other complaints (some of which probably qualify as fraud) weren't sufficient reasons to avoid GoDaddy, it is now reported that GoDaddy stores customer account passwords in clear and will use them, without your knowledge or consent, to access private servers hosted with them.

Further, it transpires that GoDaddy just got hit with a class action suit by its own employees, alleging theft of employee bonus commissions, defrauding employees of overtime pay, violation of federal Fair Labor wage and hours standards, and wrongful termination of whistleblowers.

Just as an aside, it seems GoDaddy isn't the only hosting company storing customer passwords in the clear.  Rackspace does it too.

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Wednesday, May 19th, 2010 05:43 pm

Microsoft has launched a pilot program for governments and critical infrastructure providers to gain access to in-depth technical information about operating system patches before they are released on the second Tuesday of each month.

I find this bothers me.  What makes the government so special that they should get this information but I shouldn't be able to access it?

Make the information available, or not.  But making it available just to the government and "critical infractructure providers" Because They're Somehow Special is silly.  My infrastructure is crucial to me.  How come I don't rate access to the information?  Who gets to decide whose infrastructure is "crucial"?

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Monday, May 17th, 2010 10:12 am

...that having temporarily switched back from a 28" 1920x1200 LCD monitor (Hanns.G HG281DP) to a 20" 1600x1200 CRT (Sony GDM500PS) while my LCD monitor gets sent back for repair under warranty, I am realizing that I had really lost touch with how much better the LCD monitor is.  By comparison, the Sony is dim and fuzzy, has poor contrast and too much screen-face glare, and seems to take forever to warm up from sleep mode.  I need to see if I can get the refresh rate up, too; the 60Hz that is optimal for the LCD produces subliminal flicker on the CRT.

(Of course, really I need a more capable video card in this machine too.  When I built it, the Matrox G450 was one of the best video cards available for what I needed.  That's now rather far from true.  And when money permits, I really need to continue phasing out all of our CRTs for LCDs...)

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Saturday, May 15th, 2010 11:59 am

Further to the previously mentioned saga, by last night the restored whitestar was acting erratically again, and by this morning it's unbootable.  My initial suspicion was correct; the disk is definitely losing data.

So now I get to figure out if there's any way I can run Seagate's requested seatools on it (I'm guessing not, because I'm guessing the tool is Windows-only and requires MSIE), and get the drive RMA'd.

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Tuesday, May 11th, 2010 01:27 pm

Security researchers at Matousec have discovered an attack which defeats almost all existing Windows antivirus software.

The method, called an argument-switch attack, can be used against Windows security programs that use a technique called System Service Descriptor Table (SSDT) hooking.  All of the 35 applications tested by Matousec featured this technique, including products from BitDefender, F-Secure, Kaspersky and Sophos, as well as McAfee and Trend Micro.

"We tested the most widely used security applications and found out that all of them are vulnerable," Matousec said in a paper outlining its research, published on Wednesday.  "Today's most popular security solutions simply do not work."

SSDT hooking is used by many — though not all — antivirus programs as part of their mechanism for detecting and blocking attacks already running on the system.  The technique involves modifying the contents of the SSDT.  The company's research focused on kernel-mode hooks, though the attack is also effective against user-mode hooks, Matousec said.

"The results can be summarised in one sentence: if a product uses SSDT hooks or another kind of kernel-mode hook on a similar level to implement security features, it is vulnerable," the company said.

[...]

The bypass does not have a 100 percent success rate.  However, if a system is running multiple processors or multicore processors, the attack is more reliable, according to Matousec.

"Today, multiprocessor (systems) or multicore processors are very common hardware in desktop computers," the company said in a statement.  The attack can be run successfully from restricted user accounts, it added.

Tags:
unixronin: Closed double loop of rotating gears (Gearhead)
Friday, May 7th, 2010 11:33 am

The Freenode IRC network recently changed over from Hyperion ircd to ircd-seven, a fork of charybdis.  As a result of the ircd change, while the protocol implementation of Freenode's IDENTIFY-MSG capability has not changed, the method used to invoke it has.  I have just, somewhat belatedly (Freenode changed over to ird-seven ad the end of January), posted an update to my patches for SIRC to bring them up to date for ircd-seven.

Tags:
unixronin: Closed double loop of rotating gears (Gearhead)
Tuesday, May 4th, 2010 02:47 pm

My main server has two ZFS disk pools, one consisting of a pair of mirrored 80GB boot disks, the other an array containing (currently) eleven 300GB disks.  (There were twelve, but one failed.  This is why hot spares are your friend.)  Today, I decided to move my MySQL databases from the main array onto the mirrored boot pair to get better database performance.  So I shut down the required daemons and started tarring up the databases ready to move them.

...Then, part-way through, I changed my mind about how I wanted to do it, killed the job, and killed it the wrong way, inadvertently blowing away half the /var/mysql directory.  Including the grant tables.

"Oops."

Now, fortunately, being a prudent and careful sort except for the times when I shoot myself in the foot, I have backups.  In particular, I have a full backup of all the databases, including the grant tables, current as of 0330 this morning, except for the Bacula catalog, which is current as of 0950.  But I can't use Bacula to restore them, because the Bacula catalog is blown away.

Here's how to fix a blunder like this one. )

Tags:
unixronin: Closed double loop of rotating gears (Gearhead)
Tuesday, April 27th, 2010 01:37 pm

Once again, a question has come up on the Bacula users' list about restoring just the registry of a Windows box that has corrupted its SOFTWARE registry hive to the point that it won't boot.

I put it to you that of all the "innovative" ideas that Microsoft has built into Windows over the years, the Windows Registry is the worst.  It is opaque, it is fragile, it is difficult to back up, clean out or repair, you can pretty much only repair it from Windows itself which means that it's almost impossible to repair it when — not if — Windows corrupts it, and all kinds of noxious things can be buried inside it by malware.  Not only does Windows periodically outright corrupt the registry, but from the first time you boot a new Windows installation the registry starts accumulating cruft and droppings that gradually bog the machine down and introduce cryptic malfunctions with no readily determinable cause.  Things that worked yesterday just stop working for no apparent reason.

Combine with opaque hexadecimal-string registry key names created by various things, so that you can't even tell what some random leftover registry key belongs to or whether it's still in use, and it's a recipe for disaster.  That disaster has been ongoing for fifteen years now, and there's no end in sight.

The saddest part about the whole thing is that Microsoft actually believed that this massive, opaque, monolithic, unmaintainable monstrosity would be an improvement.

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Monday, April 26th, 2010 09:45 pm

Recently I was given 3GB of DDR333 memory for babylon5, my Linux workstation, which has been getting by with 768MB for the past eight years or so.  There's no disputing it was much zippier with the new memory, except that ... well ... stability issues appeared.  The machine started locking up or crashing periodically for no apparent reason.  Compiles started randomly failing.  I rebooted the machine and ran memtest86+ on it for half a day, but mermtest86+ didn't find anything wrong.  Then I found that I couldn't recompile BRLCAD, which had stopped working — a major annoyance, because I'd been intending to use it to create a 3D model for the planned rebuild of my desk.  (It's a really nice steel-framed desk that would have been around $1200 new if I'd paid full price for it — which I didn't; I paid $200 — but the current top, made of several pieces of 1" particle board that don't actually fit together all that well, has been gradually deteriorating over the fifteen years I've owned it and is starting to get into fairly bad shape.)  Then I tried to update gcc from 4.3.4 to 4.4.3, to see if it would compile BRLCAD, and discovered that I couldn't bootstrap gcc.  The build kept dying with internal compiler errors.

Now, gcc has always been a sensitive indicator of memory problems.  It's one of the best memory subsystem stress-testers you'll ever find, because it really bangs hard on the memory.  It won't specifically locate problems, but it'll show up the existence of memory problems that normal diagnostics won't find because they don't stress the memory subsystem enough.

So I shut down babylon5, pulled all the memory, and examined it closely.  I made the interesting discovery that the three modules are not precisely identical.  All three are Crucial 1GB DDR333 DIMMs, but two are part number CT12864Z335.Y16TY, while the third is part number CT12864Z335.K16TY.

I don't know (and haven't been able to find out) what the difference is, but acting on a hunch, I put only the matching two modules back in and fired back up.  Today, gcc-4.4.3 bootstrapped on the first try without a hitch.  Shortly after, BRLCAD recompiled on the first try using the newly-built gcc-4.4.3.  So now, I guess I get to contact Crucial and see if I can get the third memory module replaced under its lifetime warranty.

Unfortunately, BRLCAD still won't start.

(I have at least figured out that the problem appears to be DRI-related, though.  BRLCAD is dying with the error "mged: ../common/texmem.c:936: get_max_size: Assertion `log2_size != 0' failed", if that's familiar to anyone.  driconf also dies on startup, with the same error, implying it's something that both BRLCAD and driconf call — possibly something in MesaGL.  Any suggestions for fixing it would be welcomed.)

(Update:  I've traced it as far as glxinfo/glxgears.  It looks to be an OpenGL/dri problem with x11-drivers/xf86-video-mga.  I really need to get a newer video card into this machine, something with a more current — and better supported — chipset and DVI or HDMI out.)

Tags:
unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Thursday, April 22nd, 2010 12:07 pm

... Does anyone among you know any way to configure Thunderbird 3.x so as to get the old Thunderbird 2.x on-the-fly message searching functionality back?  Type in the search box and have the filter applied right there and then to the open folder?  The improved-to-the-point-of-not-working search feature in Thunderbird 3.0 is driving me nuts.

Tags: