[03:10] <jthan> wake up. . .
[10:40] <JonathanD> Morning.
[10:50] <rmg51> morning JonathanD
[10:52] <JonathanD> hey rmg51
[11:18] <rmg51> o/
[11:18] <JonathanD> Whats up?
[11:19] <rmg51> us
[11:19] <JonathanD> indeed.
[11:19] <rmg51> just going through my usual morning routine
[12:29] <waltman> Rumor has it it's morning.
[12:52] <JonathanD> So it is.
[13:09] <teddy-dbear> morning
[13:29] <InHisName> morn, gents
[13:30] <InHisName> telnet localhost               Trying 127.0.0.1...                                  telnet: Unable to connect to remote host: Connection refused                   ---->Where to look for how it is shut off ?
[13:51] <jedijf> telnet localhost <port#>
[13:51] <InHisName> Yea, tried that as in above
[13:51] <jedijf> so 23 is closed
[13:52] <jedijf> netstat -plant
[13:52] <jedijf> to see what is open and listening/waiting
[13:52] <InHisName> So where to look to open it.  OK i'll run that
[13:52] <jedijf> start the service doh
[13:54] <InHisName> is it supposed to be in /etc/inti.d/  ?
[13:54] <InHisName> if so under what name ?
[13:56] <jedijf> ight havbe==e to install it...telnetd
[13:57] <jedijf> might have to install telnetd
[13:57] <jedijf> :)
[13:57] <InHisName> Ok, that might explain a lot.
[13:58] <InHisName> I'll skip that step.  Saves space.   Check my asterisk ti see if it has a telnet running.
[13:59] <InHisName> only ssh
[14:01] <jedijf> you can telnet to that
[14:01] <jedijf> if you just want to telnet to something
[14:01] <InHisName> 'k I'll try it.
[14:02] <jedijf> just to verify its open and a little banner grab
[14:03] <InHisName> protocol mismatch
[14:03] <jedijf> yes
[14:04] <jedijf> one is telnet, the other ssh ;)
[14:05] <InHisName> - S (tos)   type of service ?
[14:06] <jedijf> what are you wanting to do? just install and start telnetd if you want to telnet
[14:07] <InHisName> Testing a script,   I might just get by using ssh instead of telnet for the test and development.
[14:09] <jedijf> probably not, just install telnetd
[14:37] <Adom> morning everyone.
[14:37] <InHisName> morning Adom
[14:37] <Adom> anyone know how to put a watch "command" (with double quotes) in an alias?
[14:39] <Adom> alias myalias="watch "echo 'something' && commandthatoutputssomething && echo 'somethingelse'" <--doesnt work
[14:39] <Adom> cuz of the double quotes
[14:40] <InHisName> For nesting three layers deep, I might have used / or \ as third quote char.
[14:41] <InHisName> I'd have to dive into deep history of my notes to find what I really did.
[14:41] <Adom> dont bother. its not that important, just something was wondering. the alias itself isnt important.
[16:03] <ChinnoDog> I wish I could configure the swappiness in Windows
[16:27] <InHisName> Are there differences on how text is sent by diff telnet sessions ?
[16:28] <InHisName> I have one that one where a waitfor('text'); command sees the texts and works.
[16:30] <InHisName> Another site, the waitfor('text'); times out.   Manually checking each site, they BOTH throw their respective texts back to me.   Are they sent differently so that the waitfor is confused and times out in one of the examples?
[16:37] <MutantTurkey> what?
[16:37] <MutantTurkey> different sessions != different text.
[16:37] <InHisName> what's on 2nd
[16:37] <MutantTurkey> no
[16:37] <MutantTurkey> whats on second.
[16:37] <MutantTurkey> :)
[16:38] <InHisName> diff sessions ==> diff telnet sites
[16:38] <MutantTurkey> oh
[16:38] <InHisName> therefore diff text
[16:39] <MutantTurkey> hmm
[16:39] <MutantTurkey> well if there is different texts, whats the question?
[16:40] <InHisName> one is public at  telnet rainmaker.wunderground.com    enter,   BRD, to see Brainard MN.   The other is in my network at 192.168.101.115
[16:40] <MutantTurkey> pffft who uses telnet anyway
[16:40] <MutantTurkey> real men use netcat.
[16:41] <InHisName> The public works great with this scraper software.   The private one isn't playing fair.
[16:42] <InHisName> Its for monitoring software to monitor devices status and report conditions.   I am checking device if it is registered with VoIP provider.   Telnet is easy way to get that status, so I thought.
[16:56] <ChinnoDog> sup lamalex
[16:58] <InHisName> I found example using the telnet scraper and accessing ssh.  It uses a 2 stage process to get it all.  Trying to make that work and understand it.   May work for my 'funny' telnet session.
[17:29] <InHisName> Where is the RSA stuff kept when one uses ssh for first time ?   I want to see first time prompt again.  So I need to remove something.
[19:51] <Adom> so, my pc is playing music right now, and i dont know where from. i have a bunch of firefox windows/tabs open, but i cant find which page is the culprit, or if banshee or my google music frame is acting weird...
[19:51] <Adom> anyway to find out where audio is coming from? like something on the command line?
[19:53] <Adom> found it
[19:53] <Adom> was an autoloaded youtube vid embeded on a page. sneaky.
[20:11] <Sadin> lol
[20:18] <EvilResistance> pleia2, DO NOT UNDER ANY CIRCUMSTANCES OPEN UP ANY EMAILS FROM trekcaptainusa.tw@gmail.com!
[20:18] <EvilResistance> infact...
[20:18] <EvilResistance> BLOCK IT IMMEDIATELY
[20:18] <EvilResistance> it got hacked
[20:18] <pleia2> EvilResistance: I noticed
[20:18] <EvilResistance> pleia2, i've already dumped /dev/urandom into the passcode field
[20:19] <EvilResistance> so the likelihood it gets hacked again is extraordinarily low
[20:21] <ChinnoDog> That could make it hard to remember your password
[20:22] <EvilResistance> ChinnoDog, yes, i know, but i dumped the passcode into a text file first ;P
[20:22] <EvilResistance> so its on this machine
[20:22] <EvilResistance> which hasnt been turned on in 6 months
[20:22] <EvilResistance> :P
[20:37] <EvilResistance> pleia2, i enabled 2 step auth
[20:37] <EvilResistance> on google
[20:37] <pleia2> :)
[20:37] <EvilResistance> please do me a favor and contact mark@ubuntu regarding this...
[20:37] <EvilResistance> he might've been hit by the email spam
[20:37] <EvilResistance> :/
[20:37] <EvilResistance> since he was in one of the emails you sent me
[20:37] <pleia2> I think he's clever enough to ignore junk mail :)
[20:38] <pleia2> (I knew what it was when I saw it, he should too!)
[20:38] <EvilResistance> yeah well this spam script cleverly disguised the junk
[20:38] <EvilResistance> in some of the emails of course
[20:38] <EvilResistance> yep
[20:38] <EvilResistance> but in any case
[20:38] <EvilResistance> there's dedicated codes for each application i use
[20:38] <EvilResistance> so i can just go in and be like GO TO HELL and remove an application's access
[20:42] <Sadin> hey pleia2 you can add people to the planet right?
[20:42] <Sadin> i got new hosting so my url and stuff is different could you remove my old blog and add my new feed if its not to much trouble
[20:42] <pleia2> Sadin: yeah, what's your rss feed url?
[20:42] <Sadin> one sec
[20:46] <Sadin> pleia2 http://sadin.dallbee.com/?feed=rss2
[20:46] <Sadin> sorry for the wait
[20:48] <pleia2> ok, it'll update the next time the cron job runs
[20:48] <Sadin> thanks!
[21:53] <Adom> anyone know of a terminal-based chat program that supports Facebook chat? i know it sounds crazy, but id REALLY like one.
[21:54] <JonathanD> facebook supports XMPP
[21:55] <Adom> :/
[21:55] <Adom> k
[21:55] <JonathanD> tahts a bad thing?
[21:55] <ChinnoDog> bitlbee supports facebook chat
[21:55]  * Adom doesn't know how to use xmpp.
[21:55] <JonathanD> oh
[21:55] <Adom> bitlbee does?
[21:55] <Adom> oh
[21:55] <JonathanD> well yeah, via bitlbee
[21:55] <JonathanD> bitlbee does XMPP
[21:55] <JonathanD> therefore, facebook.
[21:55] <Adom> well alrightly
[21:55] <JonathanD> Adom: http://wiki.bitlbee.org/HowtoFacebook
[21:55] <ChinnoDog> But there is a caveat that I haven't taken the time to work around. I don't know how to pass their capcha
[21:55] <Adom> sweet, another project to absorp my nonexistent time
[21:57] <Adom> thanks for link
[21:57] <JonathanD> np
[21:58] <EvilResistance> if anyone got spammed by my emails, including the mailing lists, can someone do me a favor and fix any blocks or what not?
[21:58] <EvilResistance> because that was hackers
[22:14] <jedijf> pleia2: forward me your viagara coupon
[23:37] <ChinnoDog> ...
[23:52] <jedijf> nm, referring to EvilResistance spam