[1424] in Central_America
New quotes for Sat Apr 15
daemon@ATHENA.MIT.EDU (daemon@ATHENA.MIT.EDU)
Sat Apr 15 01:25:06 1989
Date: Sat, 15 Apr 89 01:28:32 EDT
From: Initializer.SysDaemon <root@CHARON.MIT.EDU>
To: ca-mtg@bloom-beacon.mit.edu
---------------------------------------------------------------------------
amgreene (Andrew Marc Greene):
\parskip=10pt
\parindent=0pt
\nopagenumbers
\font\sc=cmcsc10
\centerline{``\TeX{}reation --- Playing Games with \TeX's Mind''}
\centerline{Andrew Marc Greene}
\centerline{Project Athena}
\centerline{and Student Information Processing Board}
\centerline{Massachusetts Institute of Technology, Cambridge, MA 02139}
\TeX{} can be used to write applications that have little or no
connection with document preparation. Games such as {\sc Animals} and
{\sc Battleship} are just a few of the recreational uses to which
\TeX{} can be put --- mostly to show that it {\it can} be done, but
also to provide an entertaining medium for both experimentation and
presentation of programming techniques that can be used in more
serious macro packages. Database management is exemplified by the
program {\sc Animals}, and array handling is developed in {\sc
Battleship}.
\bye
---------------------------------------------------------------------------
athelas (Susan J. Landsman):
I am hoping to become better, bit by bit.
---------------------------------------------------------------------------
bjaspan (Barr3y Jaspan):
/mit/bjaspan%make dinner
Make: Don't know how to make dinner. Stop.
Drat. I was hoping for some chicken soup...
---------------------------------------------------------------------------
capsalad (Dave Schulman):
There is nothing we can do to make us happier than you.
---------------------------------------------------------------------------
celine (Adam Weishaupt):
What's the fastest way to change the entire direction of one's life in
a day? Pick a card, any card...
---------------------------------------------------------------------------
eichin (Mark W. Eichin):
SleepTime is a tremendous waste, but no one can
safely advise you to avoid sleep completely.
The best way to schedule SleepTime is to com-
press it. That is, work without sleep until you are
exhausted, and then rest until your energy is
restored. Some One Minute Maniacs I know go for
20 days or more without sleep and then book a few
days in their community hospital to recover. This
simple technique makes them more productive than
many Third World nations.
--- The One Minute Maniac
The Fanatics' Guide to Time Management
Jeffrey Book & Garrett Soden
---------------------------------------------------------------------------
eth (Evan T Hurlburt):
Atlas Shrugged
The Fountainhead
We the Living
Anthem
Introduction to Objectivist Epistemology
The Virtue of Shelfishness
Capitalism: The Unknown Ideal
The Romantic Manifiesto
The New Left: The Anti-Industrial Revolution
Philosophy: Who Needs It?
The Voice of Reason
The Ominous Parallels
The Objectivist
The Objectivist Newsletter
The Ayn Rand Letter
The Intellectual Activist
Read 'em.
Evan
---------------------------------------------------------------------------
jtkohl (John T Kohl):
Off to Talbot House...whee!
---------------------------------------------------------------------------
needle (Zanzibar B. McFate):
A limerick of classic proportion
should have meter and rhyme and a portion
of humor quite lewd
and a frightfully crude
impossible sexual contortion.
---------------------------------------------------------------------------
rosencra (Raoul Duke):
I would not sleep here if I could...
_JB_ by Archibald Macleish
---------------------------------------------------------------------------
rrkasegu (Rick R. Kaseguma):
This is where I would put a plan if I had one.
---------------------------------------------------------------------------
tytso (Theodore Y. Ts'o):
Security Digest Volume 1 Issue 18
From: oconnor@sccgate.scc.com (Mike O'Connor)
Subject: Security hole in 386i login
The login program supplied by Sun for its 386i machines accepts an argument
which bypasses authentication. It was apparently added in order to allow
the Sun program "logintool" to do the authentication and have login do the
housekeeping. This allows any user who discovers the new argument to the
login program to become root a couple of ways.
ps: Mike Rigsby (rigsby@ctc.contel.com) tells me that at a 386i SOS
administration class he attended, he was informed that this access path
was a design feature put in for forgetful administrators but that the
class was told to keep it a secret. I find this surprising, if true,
since this is the OS that Sun claims "meets the spirit of C2
specifications." Then again, maybe I understand even less of the C2
specs than I thought I did.
---
setenv TEDPATH x3-7788:x3-4261:x5-6367:x3-7787
--- End of Central America ---