NetHack maildirpath Released

One of NetHack’s many features is checking your e-mail while you play. When you receive new e-mail, a mail demon delivers a scroll of mail to your character, and reading that scroll launches your e-mail reader.

Unfortunately, NetHack doesn’t understand maildir-style mailboxes, nor can it check multiple mailboxes. The maildirpath patch I wrote for NetHack corrects these shortcomings.

You can get the maildirpath patch here.
Read the rest of this entry »

YAAP – paul-Bar-Orc-Fem-Cha

NetHack is a hard game. So hard, in fact, that it’s common for the people who hang out in the rec.games.roguelike.nethack newsgroup to make a celebratory post after ascending (i.e., winning). Here’s the YAAP (“Yet Another Ascension Post”) I recently posted in honor of my latest victory.

Read the rest of this entry »

Comments Off

Windows 98 File Sharing: Broken By Design

Or, “what part of guest access don’t you understand?”
Read the rest of this entry »

Yay Laziness!

It turns out you can use the USPS web site to hold your mail. That saves me one trip tomorrow.
Read the rest of this entry »

Two Finals Down, Two to Go

It’s a bad sign when the first words out of your mouth after a final exam are “what the hell was that?!
Read the rest of this entry »

“Hmm. Maybe I should change my name to Oedipus.”

A brilliant parody of Neon Genesis Evangelion.

OK, it’s hardly new, and anyone who cares has probably already seen this years ago, but I just stumbled upon it recently, and I think it’s funny. So there.

Comments Off

Another One Bites the Dust

The trend of “moving parts on my computer breaking” continues. This time it’s the power button, of all things.
Read the rest of this entry »

Just a Bunch of Stuff That Happened

I’m too lazy to do longer writeups for stuff that’s been happening lately, so I’ll just write a bunch of paragraphs that don’t really have any common theme.
Read the rest of this entry »

Research Presentation Slides

Slides for tomorrow morning’s presentation on our research project on perverse incentives are up. My part of the presentation is on the Closed Form Analysis and Decision Tree models, in the middle of the presentation.
Read the rest of this entry »

Comments Off

Some People Have Too Much Time On Their Hands

Heck, why search for a cure for cancer when you can find ways to beat classic Nintendo games in a ludicrously short amount of time?
Read the rest of this entry »

Conversation

So my partner for the Evil Networking Project and I implemented a feature to our voice-over-IP application that lets you ignore an incoming call. We started talking about what the best way would be to inform the user that the other end hit “Ignore” without sounding insulting….
Read the rest of this entry »

Cause of Debian Server Compromise Found

The cause of the recent compromise of four of Debian’s servers has been identified to a then-unknown local root compromise in the Linux kernel that was fixed in the recently-released 2.4.23. A lack of bounds checking in the do_brk() function in the kernel allowed a malicious program to gain access to kernel memory, thus allowing it to elevate itself to root. At the time the bug was fixed (back in September), the security implications of the bug weren’t known.
Read the rest of this entry »