Yasuoka's hack log

[ 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 ]

コメントはこちら

2011-12-27

2011-12-26

2011-12-24

Filesystem     Size    Used   Avail Capacity  Mounted on
/dev/wd0a     1005M    143M    812M    15%    /
mfs:15305      124M    150K    118M     0%    /tmp
/dev/wd0e      9.8G    372M    9.0G     4%    /var
/dev/wd0f      2.0G    527M    1.4G    28%    /usr
/dev/wd0g     1005M    182M    773M    19%    /usr/X11R6
/dev/wd0h      9.5G    1.5G    7.5G    17%    /usr/local
/dev/sd2a      148G   42.4G   98.1G    30%    /home
/dev/wd0l     98.4G   13.4G   80.1G    14%    /source
/dev/sd1a     19.7G    8.9M   18.7G     0%    /home/yasuoka/iij
bioctl -l /dev/wd0n -c C softraid0 && fsck -p /home && mount /home
% sudo sh ~/iij.sh mount
*** bioctl -l wd0m -c C softraid0
Passphrase: (パスフレーズを入力)
*** fsck -p /home/yasuoka/iij
/dev/sd1a (17f5d2522e5dce62.a): file system is clean; not checking
*** mount /home/yasuoka/iij
OK
%

2011-12-23

% dmesg | grep wd0
wd0 at pciide1 channel 0 drive 0: <Hitachi HTS547575A9E384>
wd0: 16-sector PIO, LBA48, 715404MB, 1465149168 sectors
wd0(pciide1:0:0): using PIO mode 4, Ultra-DMA mode 6
root on wd0a (5ecc213ba70e75a7.a) swap on wd0b dump on wd0b
%
% df -h
Filesystem     Size    Used   Avail Capacity  Mounted on
/dev/wd0a     1005M    152M    803M    16%    /
/dev/wd0e      9.8G    375M    9.0G     4%    /var
/dev/wd0f      2.0G    527M    1.4G    28%    /usr
/dev/wd0g     1005M    182M    773M    19%    /usr/X11R6
/dev/wd0h      9.5G    1.5G    7.5G    16%    /usr/local
/dev/sd0d     73.5G   63.9G    5.9G    91%    /home
%

2011-12-21

2011-12-13

2011-12-12

2011-12-05

Section "InputClass"
       Identifier  "Touchpad defaults"
       MatchIsTouchpad "on"
       Option      "TapButton1" "1"

2011-11-28

2011-11-21

% mkdir ~/.rdesktop/keymaps/
% cp /usr/local/share/rdesktop/keymaps/en-us ~/.rdesktop/keymaps/
% cat >> ~/.rdesktop/keymaps/
map 0xe0010411
Kanji 0x29
Alt_R 0x38
% rdesktop -k ja-us

2011-11-17

2011-11-16

2011-11-14

2011-11-12

run0 at uhub0 port 1 "Ralink 802.11 n WLAN" rev 2.00/1.01 addr 2
run0: MAC/BBP RT3070 (rev 0x0201), RF RT3020 (MIMO 1T1R), address 4c:e6:XX:XX:XX:XX

2011-11-08

Nov  6 23:44:16 stm0 relayd_yasuoka[25298]: fatal: relay_dispatch_parent: imsg_read error: Message too long

2011-11-05

2011-10-28

2011-10-26

2011-10-25

images/virtio.jpg

2011-10-24

2011-10-22

2011-10-21

2011-10-19

2011-10-17

Authorizer: "POLICY"
Conditions: app_domain == "IPsec policy" -> "false";

Authorizer: "POLICY"
Licensees: "passphrase:PRESHARED-KEY"
Conditions: app_domain == "IPsec policy" && esp_encapsulation == "transport"
    -> "true";

2011-10-15

2011-10-13

2011-10-12

2011-10-10

2011-10-05

2011-10-03

2011-10-01

2011-09-30

453  #define PACKET_TAG_PIPEX                0x0400 /* pipex context XXX */

2011-09-29

2011-09-28

2011-09-27

2011-09-22

$ uptime
  3:16AM  up 30 days, 18 mins, 2 users, load averages: 0.14, 0.11, 0.09

2011-09-21

2011-09-19

2011-09-18