[00:33] http://www.howtogeek.com/122891/what-are-the-windows-a-and-b-drives-used-for/ [02:08] alard: is there any chance to add support to make .idx with warc-proxy with .cdx files? [02:09] this is cause .cdx file will have all urls and i think where the data is in the .warc.gz [02:21] i'm starting to love warc-proxy [02:37] http://www.eph.co.uk/resources/email-address-length-faq/honeywellad.jpg [04:12] note: that java zero-day (its actually a combo of 2 zero-days) is in the wild and infecting thousands of users now; disable or uninstall java if you have it [04:12] oracle needs to issue an emergency out of band patch for this asap [07:27] godane: No, cdx is not a priority, for me at least. That would mean the warc-proxy would also have to generate cdx files, which includes more than url+offset. Some cdx files also include "canonicalized" urls instead of the true url as saved in the warc. [07:31] ok [07:31] i was more if a cdx exist to use it [07:32] the default was always going be to make it from warc.gz [08:00] Lord_Nigh: what are these 'sploits of which you speak? [08:02] Coderjoe: There's two Java sploits in the wild [08:02] Coderjoe: http://arstechnica.com/security/2012/08/critical-java-bugs-reported-4-months-ago/ [08:03] best part is they're 4 months old :D [08:03] and works on *ALL* platforms [08:03] even better is our finance software _needs_ java. [08:03] living up to Javas reason to exist :D Works everywhere! [08:03] and is online... [08:07] SmileyG: so disable java globally and whitelist it for your site only [08:11] hmmm [08:11] sadly that is "not of importance" to those higher up [08:11] I'd love to know how and have time to try it out etc etc. [08:16] are you in the IT dept at your company? [08:22] yup [08:22] :D [08:23] sad times, eh? [08:26] manager or underling? [08:45] "[03:10] sadly that is "not of importance" to those higher up" [08:46] All too familiar with that [08:47] and i also worked at a Financial Firm [08:47] I bailed this past january though [08:47] I just couldn't take it anymore. [08:51] why is it that the financial firms, who should be worried about leaking data, generally don't seem to care quite as much about keeping workstations secure? [14:19] http://vt100.net/robots.txt [14:19] * DFJustin shakes fist [14:22] http://i.imgur.com/GSjSy.png [14:24] DFJustin: I suggest emailing Paul [14:24] http://vt100.net/mirror/ seems to be missing too :( [14:25] hhmm... ftp://ftp.mrynet.com/os/DEC/vt100.net/mirror [14:34] I would but there's no contact email listed [14:34] probably just sic godane on it since it doesn't update much/at all anymore [14:41] instence: tbh we are small time [14:41] so.... makes life so much harder [14:41] I spent most of my time firefighting small things [14:42] also a security paranoid boss who doesn't really "get" it [16:17] I'm getting vt100.net [16:21] do you guys have a list of sites with ia_archiver banned in robots.txt [16:22] ? [16:23] godane are the command lines you use with wget on the archiveteam wiki anywhere [16:24] its mostly default stuff [16:24] some of it i have to do it customly [16:34] vt100.net is done [16:36] sweet [16:38] I notice the "manx" links go to a different domain, then link back to vt100.net for the pdf, may be an issue for wget [16:39] i may have to do it again anyways [16:39] there is www.vt100.net links i didn't pull [16:39] nevermind [16:39] maybe now [16:40] *not [16:54] i redownloading it with -H --domains=vt100.net,manx.classiccmap.org [16:56] should be manx.classiccmp.org [17:01] i must just typed wrong in irc [17:02] i have a manx.classiccmp.org folder where i'm downloading it [17:07] looks like i'm mirroring manx.classicmp.org now [17:28] i got all links out of manx.classicmp.org that point to vt100.net [17:29] funny thing is vt100.net links to some stuff in manx that links to textfiles.com [17:29] that and bitsavers [18:02] i'm getting vt100.net/mirror [18:02] or the mirror of that [19:07] is archive.org having problems for anyone? [20:02] godane: worksforme [20:53] ok oracle DID issue a patch today, jre 7u7 which covers at least one of the two bugs which the exploit uses [20:53] not sure if it covers both since people didn't even notice the second bug until 2 days ago [20:53] well, outside of that initial report that had been sent to oracle in april [20:53] which did describe both