I read somewhere that if you stare at the "grass" wallpaper long enough a hidden leopard will appear - any truth to this?
Not sure, but if you look at green long enough, you see a lot of red. Like whites will be red. I did that once. It was cool.
I read somewhere that if you stare at the "grass" wallpaper long enough a hidden leopard will appear - any truth to this?
How do you get to the .usr/share folder? I can't find it.
/usr/share/emacs/22.1/etc said:[Someone sent this in from California, and we decided to extend
our campaign against information hoarding to recipes as well
as software. (Recipes are the closest thing, not involving computers,
to software.)
The story appears to be a myth, according to the Chicago Tribune,
which says that Mrs Fields Cookies hoards the information completely.
Therefore, this recipe can be thought of as a compatible replacement.
We have reports that the cookies it makes are pretty good.]
Someone at PG&E called the Mrs. Fields Cookie office
and requested the recipe for her cookies. They asked
her for her charge card number, and she gave it to them
thinking the cost would be $15 to $25. It turned out
to be $200!
Therefore, this person is giving the recipe to anyone
and everyone she knows (and doesn't know) so that
someone can get use of her $200. Anyway, just keep
passing it on.
Cream together: 2 cups butter
2 cups sugar
2 cups brown sugar
Add: 4 eggs
2 tsp. vanilla
Mix together in
separate bowl: 4 cups flour
5 cups oatmeal (put small
amounts of oatmeal in blender until it turns to
powder. Measure out 5 cups of oatmeal and only
"powderize" that, NOT 5 cups "powderized" oatmeal)
1 tsp salt
2 tsp baking powder
2 tsp baking soda
Mix: All of the above
Add: 24 oz. bag of chocolate chips and
1 finely grated 8 oz Hershey bar (plain)
Add: 3 cups chopped nuts (any kind)
Bake on greased cookie sheet (make golf ball sized balls) and
bake about two inches apart. Bake at 350 degrees for 8 - 10
minutes. DO NOT OVERBAKE. Makes 112.
From: ucdavis!lll-lcc!hplabs!parcvax!bane@ucbvax.berkeley.edu (John R. Bane)
Subject: Re: free cookie foundation?
Hi! I "stole" your very expensive cookie recipe off the net. If you
want to send me your SnailMail address, I'll be glad to send you a
dollar (I would like to suggest this to the net, but I think there is
some netiquette rule against asking for money - or is that only money
for oneself?) to help defray the cost (it's not much, but if EVERYone
who took the recipe sent you a dollar, it would help).
Here also is another cookie recipe which I'm very fond of.
Makes 6-8 dozen
Bake at 375 degrees for ~10 min.
Cream together:
1 cup shortening (I use Weight Watcher's Reduced Calorie Margarine!)
1/4 cup peanut butter (I recommend the non-sugared kind)
1/2 cup sugar
1/2 cup brown sugar
2 eggs
1 teaspoon vanilla
Add:
1/2 cup flour
1 teaspoon soda
1/2 teaspoon salt
2 cups rolled oats (I use the 5-min variety)
1-2 cups chocolate chips (I use 2 cups semi-sweet - ummmm!)
1 cup nuts (I use pecan pieces - don't get them crushed, or the extra
oil will make greasy cookies)
1 cup shredded or flaked coconut
(The nuts were listed as optional and I added the coconut myself, but
I really love them there! You could also add things like m&m's, or
raisins (I don't care for raisins in cookies, but you might). I've
always wanted to try banana chips.)
Mix well. Drop by teaspoonfuls on greased cookie sheet (I use pam).
Bake at 375 degrees for approx. 10 min.
My aunt found this recipe in an Amish book called something like
"Eating Well When The Whole World Is Starving," and although I thought
a cookie recipe was a bit odd for a book like that, they are about the
healthiest a cookie is ever likely to get.
They are also very easy to make (no blending, sifting, rolling, etc.)
and extremely delicious. I get rave reviews and recipe requests whenever
I make them.
- rene
Chocolate Chip Cookies - Glamorous, crunchy, rich with chocolate bits & nuts.
Also known as "Toll House" Cookies ... from Kenneth and Ruth Wakefield's
charming New England Toll House on the outskirts of Whitman, Massachusetts.
These cookies were first introduced to American homemakers in 1939 through
our series of radio talks on "Famous Foods From Famous Eating Places."
Mix Thoroughly :
2/3 cup soft shortening ( part butter )
1/2 cup granulated sugar
1/2 cup brown sugar ( packed )
1 egg
1 tsp vanilla
Sift together and stir in :
1-1/2 cups sifted flour (*)
1/2 tsp soda
1/2 tsp salt
Stir in :
1/2 cup cut-up nuts
6 oz package of semi-sweet chocolate pieces ( about 1-1/4 cups )
(*) for a softer, more rounded cookie, use 1-3/4 cups sifted flour.
Drop rounded teaspoonfuls about 2" apart on ungreased baking sheet. Bake until
delicately browned ... cookies should still be soft. Cool slightly before you
remove them from the baking sheet.
Temperature: 375 F. ( modern oven )
Time: bake 8 - 10 minutes
Amount: 4 - 5 dozen 2" cookies
=====
Personal comments :
I find it tastes better with a mixture of shortening and butter, as they say.
You don't need << all >> of that sugar, and it can be whatever color you want.
The nuts are optional. Feel free to play with the recipe. I put oatmeal in it,
reducing flour accordingly, and sometimes cinnamon.
I also find it useful to grease the cookie sheets.
I think I'm going to go bake some now ...
-- richard
Censoring my Software
Richard Stallman
[From Datamation, 1 March 1996]
Last summer, a few clever legislators proposed a bill to "prohibit
pornography" on the Internet. Last fall, right-wing Christians made
this cause their own. Last week, President Clinton signed the bill,
and we lost the freedom of the press for the public library of the
future. This week, I'm censoring GNU Emacs.
No, GNU Emacs does not contain pornography. It is a software package,
an award-winning extensible and programmable text editor. But the law
that was passed applies to far more than pornography. It prohibits
"indecent" speech, which can include anything from famous poems, to
masterpieces hanging in the Louvre, to advice about safe sex...to
software.
Naturally, there was a lot of opposition to this bill. Not only from
people who use the Internet, and people who appreciate erotica, but
from everyone who cares about freedom of the press.
But every time we tried to tell the public what was at stake, the
forces of censorship responded with a lie: they told the public that
the issue was simply pornography. By embedding this lie as a
presupposition in their statements about the issue, they succeeded in
misinforming the public. So here I am, censoring my software.
You see, Emacs contains a version of the famous "doctor program",
a.k.a. Eliza, originally developed by Professor Weizenbaum at MIT.
This is the program that imitates a Rogerian psychotherapist. The
user talks to the program, and the program responds--by playing back
the user's own statements, and by recognizing a long list of
particular words.
The Emacs doctor program was set up to recognize many common curse
words, and respond with an appropriately cute message such as, "Would
you please watch your tongue?" or "Let's not be vulgar." In order to
do this, it had to have a list of curse words. That means the source
code for the program was indecent.
Because of the censorship law, I had to remove this feature. (I
replaced it with a message announcing that the program has been
censored for your protection.) The new version of the doctor doesn't
recognize the indecent words. If you curse at it, it curses right
back to you--for lack of knowing better.
Now that people are facing the threat of two years in prison for
indecent network postings, it would be helpful if they could access
precise rules via the Internet for how to avoid imprisonment.
However, this is impossible. The rules would have to mention the
forbidden words, so posting them on the Internet would be against the
rules.
Of course, I'm making an assumption about just what "indecent" means.
I have to do this, because nobody knows for sure. The most obvious
possible meaning is the meaning it has for television, so I'm using
that as a tentative assumption. However, there is a good chance that
our courts will reject that interpretation of the law as
unconstitutional.
We can hope that the courts will recognize the Internet as a medium of
publication like books and magazines. If they do, they will entirely
reject any law prohibiting "indecent" publications on the Internet.
What really worries me is that the courts might take a muddled
in-between escape route--by choosing another interpretation of
"indecent", one that permits the doctor program or a statement of the
decency rules, but prohibits some of the books that children can
browse through in the public library and the bookstore. Over the
years, as the Internet replaces the public library and the bookstore,
some of our freedom of the press will be lost.
Just a few weeks ago, another country imposed censorship on the
Internet. That was China. We don't think well of China in this
country--its government doesn't respect basic freedoms. But how well
does our government respect them? And do you care enough to preserve
them here?
If you care, stay in touch with the Voters Telecommunications Watch.
Look in their Web site http://www.vtw.org/ for background information
and political action recommendations. Censorship won in February, but
we can beat it in November.
Copyright 1996 Richard Stallman
Verbatim copying and distribution is permitted in any medium
provided this notice is preserved.
---------------- -*- mode: text; coding: utf-8; fill-column: 70 -*- --
-- --
-- Humor (sometimes unintended) on the Emacs developer's list --
-- --
-- The Free Software Foundation claims no copyright on this file, --
-- compiled from the public emacs-devel mailing list. --
-- --
----------------------------------------------------------------------
"Is it legal for a `struct interval' to have a total_length field of
zero?"
"We can't be arrested for it as far as I know, but it is definitely
invalid for an interval to have zero length."
-- Miles Bader and RMS
----------------------------------------------------------------------
Re: lost argument and doc string
I remember when I lost an argument. Boy did that hurt! ;-).
-- RMS
----------------------------------------------------------------------
"'Cowardly' is not an adverb, although it looks like one. It is an
adjective. It makes a statement about general temperament, rather
than a specific occasion. I don't think Emacs has a general
temperament."
"Mine does."
-- RMS and Eli Zaretskii
----------------------------------------------------------------------
"In order to bring the user's attention to the minibuffer when an
item such as 'Edit -> Search' is activated from the menu, I was just
thinking that we could draw a big rectangle around the minibuffer,
blinking (or zooming in-and-out) until some input is typed in."
"How about dancing elephants?"
"They don't fit in my office."
"Well once the elephants are done, your office will be much...
bigger."
-- Stefan Monnier, Miles Bader and Kai Grossjohann
----------------------------------------------------------------------
I remember these versions as yard-rocks (is that between inch-pebbles
and mile-stones?).
-- Kai Grossjohann
----------------------------------------------------------------------
"I think it depends on video drivers. I cannot reproduce it on my
home PC, but I can at work."
"Can you try to find a workaround at work? (I guess you don't need
a homearound at home. ;-)"
-- Jason Rumney and RMS
----------------------------------------------------------------------
By the way, I also really really hate this unibyte/multibyte problem.
Sometimes I think I should have opposed to the introduction of such a
concept more strongly.
imagine there's no unibyte
it's easy if you try
no bytes below us
above us only chars
imagine all the people living in multibyte
-- Kenichi Handa
----------------------------------------------------------------------
I try to uphold the ideals that I was taught to value as an American,
but every year I get less and less help from the United States.
-- RMS
----------------------------------------------------------------------
"If the terminfo entry is most likely wrong, and we know it, then it
doesn't make sense to follow it."
"Nevertheless, until now, we always did."
"So.... should we not fix old bugs?"
"Why fix an old bug if you can write three new ones in the same
time?"
-- Miles Bader, Eli Zaretskii and David Kastrup
----------------------------------------------------------------------
[...] As is well known, people who speak American English tend to
be more resource-conscious and try to avoid wasting precious bits
transferring those redundant "u"s.
Think of the number of occurrences of "color" and "behavior" in the
Emacs tarball, multiply that by the number of times it'll be
downloaded, stored on hard disks, archived, ...that's a substantial
saving.
-- Stefan Monnier
----------------------------------------------------------------------
Re: Parent of a derived mode's keymap.
"I can't decide whether the title of this thread is more fitting for
a blues song or a pulp fiction booklet. It certainly projects drama."
"Hey, it says derived, not deprived."
"Actually, for some keymaps 'depraved' would fit better."
"I knew it! You're one of them vi lovers! There is nothing wrong
with Emacs using escape, meta, alt, control, and shift!"
-- David Kastrup and Lute Kamstra
----------------------------------------------------------------------
"Aren't user-defined constants useful in other languages?"
"The only user-defined constant is ignorance. (With programmers,
this is a variable concept ;-)"
-- Juanma Barranquero and Thien-Thi Nguyen
----------------------------------------------------------------------
"Uh, 'archaic' and 'alive' is not a contradiction."
"Yes it is. 'Archaic' does not mean 'old' or 'early'. It means
'obsolete'."
"'He arche' in Greek means 'the beginning'. John 1 starts off with
'En arche en ho Logos': in the beginning, there was the word. Now of
course we all know that Emacs was there before Word, but this might
have escaped John's notice."
-- David Kastrup and RMS
----------------------------------------------------------------------
Re: patch for woman (woman-topic-at-point)
"Sorry for the long message. I wanted to make the problem clear
also for people not familiar with `woman'."
"Most hackers, I take?
For a moment there I thought you had a patch that you could put on
a woman, and it would make her come right to the topic at point
without attempting any course of action that requires an advance
course in divination.
There'd be quite a sensational market for that, you know."
-- Emilio Lopes and David Kastrup
----------------------------------------------------------------------
"[T]here may be a good reason since the code explicitly checks for
this; see keyboard.c:789 [...]"
"I think I understand, but I can't find the code in keyboard.c. Do
you really mean 'line 789'? Of which revision?"
"Sorry; by 789, I mean 3262"
-- Chong Yidong and Stefan Monnier
----------------------------------------------------------------------
"[...] In my opinion, your change does not either increase or
decrease readability. It's a tossup."
"Uh, setting tem to '', an artificial empty string, in order to have
j incremented once again before breaking out of the finished loop is
readable?
Is this kind of 'readable' synonymous to 'comprehensible with
serious effort', reminiscent of mathematicians' use of 'trivial' as
synonymous with 'provable with serious effort'?"
-- RMS and David Kastrup
----------------------------------------------------------------------
Re: New Emacs Icon and Tango
"What about using the 'happy face' with gnu horns?"
"It would make Emacs the object of ridicule until the end of time."
"Isn't it already?"
"It's the object of ridicule until the end of _tape_. The jury is
still out about that end of time thing."
-- Kim F. Storm, Miles Bader, RMS and David Kastrup
----------------------------------------------------------------------
"Despite being a maths graduate, I can't think of any other such
constants with anything like the universality of e and pi."
"42"
-- Alan Mackenzie and David Hansen
----------------------------------------------------------------------
"[...] So please do not delete anything."
"Done."
-- RMS and David Kastrup
CONDOM(1) EUNUCH Programmer's Manual CONDOM(1)
NAME
condom - Protection against viruses and prevention of child
processes
SYNOPSIS
condom [options] [processid]
DESCRIPTION
_condom_ provides protection against System Transmitted
Viruses (STVs) that may invade your system. Although the spread of
such viruses across a network can only be abated by aware and cautious
users, _condom_ is the only highly-effective means of preventing
viruses from entering your system (see celibacy(1)). Any data passed
to _condom_ by the protected process will be blocked, as specified by
the value of the -s option (see OPTIONS below). _condom_ is known to
defend against the following viruses and other malicious
afflictions...
o AIDS
o Herpes Simplex (genital varieties)
o Syphilis
o Crabs
o Genital warts
o Gonorrhea
o Chlamydia
o Michelangelo
o Jerusalem
When used alone or in conjunction with pill(1), sponge(1),
foam(1), and/or setiud(3), _condom_ also prevents the conception of a
child process. If invoked from within a synchronous process, _condom_
has, by default, an 80% chance of preventing the external processes
from becoming parent processes (see the -s option below). When other
process contraceptives are used, the chance of preventing a child
process from being forked becomes much greater. See pill(1),
sponge(1), foam(1), and setiud(3) for more information.
If no options are given, the current user's login process (as
determined by the environment variable USER) is protected with a
Trojan rough-cut latex condom without a reservoir tip. The optional
'processid' argument is an integer specifying the process to protect.
NOTE: _condom_ may only be used with a hard disk. _condom_
will terminate abnormally with exit code -1 if used with a floppy
disk (see DIAGNOSTICS below).
OPTIONS
The following options may be given to _condom_...
-b BRAND BRANDs are as follows...
trojan (default)
ramses
sheik
goldcoin
fourex
-m MATERIAL The valid MATERIALs are...
latex (default)
saranwrap
membrane -- WARNING! The membrane option is _not_
endorsed by the System Administrator General as an
effective barrier against certain viruses. It is
supported only for the sake of tradition.
-f FLAVOR The following FLAVORs are currently supported...
plain (default)
apple
banana
cherry
cinnamon
licorice
orange
peppermint
raspberry
spearmint
strawberry
-r Toggle reservoir tip (default is no reservoir tip)
-s STRENGTH STRENGTH is an integer between 20 and 100 specifying
the resilience of _condom_ against data passed to
_condom_ by the protected process. Using a larger
value of STRENGTH increases _condom_'s protective
abilities, but also reduces interprocess communication.
A smaller value of STRENGTH increases interprocess
communication, but also increases the likelihood of a
security breach. An extremely vigorous process or
one passing an enormous amount of data to _condom_
will increase the chance of _condom_'s failure. The
default STRENGTH is 80%.
-t TEXTURE Valid TEXTUREs are...
rough (default)
ribbed
bumps
lubricated (provides smoother interaction between
processes)
WARNING: The use of an external application to _condom_ in
order to reduce friction between processes has been proven in
benchmark tests to decrease _condom_'s strength factor! If execution
speed is important to your process, use the '-t lubricated' option.
DIAGNOSTICS
_condom_ terminates with one of the following exit codes...
-1 An attempt was made to use _condom_ on a floppy disk.
0 _condom_ exited successfully (no data was passed to
the synchronous process).
1 _condom_ failed and data was allowed through. The
danger of transmission of an STV or the forking of a child
process is inversely proportional to the number of other
protections employed and is directly proportional to
the ages of the processes involved.
BUGS
_condom_ is NOT 100% effective at preventing a child process
from being forked or at deterring the invasion of a virus (although
the System Administrator General has deemed that _condom_ is the most
effective means of preventing the spread of system transmitted
viruses). See celibacy(1) for information on a 100% effective program
for preventing these problems.
Remember... the use of sex(1) and other related routines
should only occur between mature, consenting processes. If you must
use sex(1), please employ _condom_ to protect your process and your
synchronous process. If we are all responsible, we can stop the
spread of STVs.
AUTHORS and HISTORY
The original version of _condom_ was released in Roman times
and was only marginally effective. With the advent of modern
technology, _condom_ now supports many more options and is much more
effective.
The current release of _condom_ was written by Ken Maupin at
the University of Washington (maupin@cs.washington.edu) and was last
updated on 10/7/92.
SEE ALSO
celibacy(1), sex(1), pill(1), sponge(1), foam(1), and
setiud(3)
ctrl-alt-cmd-8 inverts the colours - any practical reason for this? just looks cool to me.
On the Unibody MBP, only 15":
open your flat's window, throw the MBP out so that it spins. Some white angel wings will open and it will fly in a circle and come back to your flat![]()
It's fun browsing around in "/usr/share/emacs/22.1/etc/"
Take a look at "sex.6"![]()
That brought back memories from Spyro on the PS1. You would run off this one cliff, and these little fairies would grab you and bring you back to the ground, while spinning you around.
I don't, but a long time ago, I found a number of small images representing CPUs (G3, G4, G5) in some system folder. The weird thing was that there was also an image representing an Intel CPU. I had 10.3 back then.and there was something else I found a while ago... some audio file from a movie buried deep in some system folder. Does anyone know what I'm talking about?
I don't, but a long time ago, I found a number of small images representing CPUs (G3, G4, G5) in some system folder. The weird thing was that there was also an image representing an Intel CPU. I had 10.3 back then.
If you zoom into the preview.app icon, the boy on that picture looks scary. I cannot depict what they are trying to do with that icon...
I'm sorry, how the hell do you find this scary?
![]()
"usr/share/emacs/22.1/etc/COOKIES" is the file
Are people still falling for this one?
It's not true. The LCD screen has a backlight that doesn't shine any more or less bright if the display is showing black pixels. The only way you can make it shine less brght and save your battery is by simply reducing your brightness. The inverted colors is primarily present for people with impaired vision.
i cant open the condom or sex folder? says no app is default to open?
i could only find this in QuicktimeX not through finder
1. open QuicktimeX
2. go to Open File
3. when dialog appears search .mov in the search box
4. play cheeziPuffs.mov
very strange?![]()
10.6 says I DONT HAVE PERMISSIONcan a 10.5er post the contense of the file?
I found the cookie recipe! Here's how to get it:
1. Open Terminal and paste in this, no quotes: "defaults write com.Apple.Finder AppleShowAllFiles YES". Then type, without quotes, "killall Finder".
2. Open a Finder window and go to Macintosh HD, or what ever your HDD is and scroll down to the folder called "usr", no quotes.
3. Open "share" then "emacs" then "22.1" then "etc".
4. Look around at the neat stuff.
5. Open Terminal and paste in "defaults write com.Apple.Finder AppleShowAllFiles NO", no quotes
6. Type in Terminal "killall Finder", no quotes.
i cant open the condom or sex folder? says no app is default to open?
I can reset the slider by moving the mouse away from the slider while holding the mouse button pressed. THIS IS AMAZING!
Lots of fun things there! Like Condom.1 and Devel.Humor. Kudos Apple!