Here’s a FAQ on how to name your computer from 1990. Follow the link at the bottom to read all the “tips.”
Avoid alternate spellings.
Once we called a machine “czek”. In discussion, people
continually thought we were talking about a machine called
“check”. Indeed, “czek” isn’t even a word (although “Czech”
Purposely incorrect (but cute) spellings also tend to annoy a
large subset of people. Also, people who have learned English
as a second language often question their own knowledge upon
seeing a word that they know but spelled differently. (“I
guess I’ve always been spelling “funxion” incorrectly. How
By now you may be saying to yourself, “This is all very
silly…people who have to know how to spell a name will learn
it and that’s that.” While it is true that some people will
learn the spelling, it will eventually cause problems
For example, one day a machine named “pythagoris” (sic) went
awry and began sending a tremendous number of messages to the
site administrator’s computer. The administrator, who wasn’t a
very good speller to begin with, had never seen this machine
before (someone else had set it up and named it), but he had to
deal with it since it was clogging up the network as well as
bogging down his own machine which was logging all the errors.
Needless to say, he had to look it up every time he needed to
spell “pythagoris”. (He suspected there was an abbreviation,
but he would have had to log into yet another computer (the
local nameserver) to find out and the network was too jammed to
waste time doing that.)
In another stunning blow to the security and integrity of Diebold’s electronic voting machines, someone has made a copy of the key which opens ALL Diebold e-voting machines from a picture on the company’s own website. The working keys were confirmed by Princeton scientists, the same people who discovered that a simple virus hack on the Diebold machines could steal an election. Absolutely incredible and another example of how Diebold’s e-voting machines pose a great threat to the electoral process.
Using the “Reverse IP Domain Check,” you can see all of the other sites hosted on the same web server as a particular domain name. Try it.
These are plugins for Pidgin (the IM client formerly known as Gaim) that update the status message to show the currently playing track, retrieving it from your music player. Here’s what I’ve found so far, in what I think is no particular order…
To start out we need free space on a drive that isnâ€™t partitioned, or enough patience to resize an existing one. Just about everything here needs root privileges, since weâ€™re working with filesystems. It would be easiest to start a root terminal with su -, then enter your password.First, we install the tools to get the encrypted partition going: [apt-get/yum] install cryptsetup hashalot gparted
Next, we use gparted to create a 20GB partition at the end of my disk. Itâ€™s a dead simple drag nâ€™ drop application similar in function to Partition Magic or other GUI partition editorsâ€¦ hopefully you donâ€™t need instructions. Make sure to record the name of the new partition! Everything here that says /dev/sda2 is going to change based on your hardware and partitioning scheme.
After that completes (which can take some time if any resizing or moving of an existing partition happens), we need to set a password.
cryptsetup --verbose --verify-passphrase luksFormat /dev/sda2
This command will create a device called /dev/mapper/sda2 and give us access to the encrypted volume after verifying the password:
cryptsetup luksOpen /dev/sda2 sda2
By now weâ€™re knee deep in waist-high water. Iâ€™m not quite sure what that meansâ€¦ I just made it up. Say it out loudâ€¦ rolls off the tongue. Sorryâ€¦ where was I? Ah right. Iâ€™ll try to explain where weâ€™re at right now, for my benefit as well as yours.
Actually, it’s just a simple (well, somewhat simple) set of bash functions all put together in one script with a menu (of sorts) to help you work on batches (entire directories) of images, all at once. I do some web design, and I like to take digital pictures, and have thousands of them. While uploading images to some fancy photo gallery software is fine for a few images, I wanted to harness the power of Linux and Imagemagick to create something that could be run from a command line on images on a server that didn’t use X, and that could run very fast and without interaction if I wanted it to, or that could accept user input.
Why bash? Well, because I like bash, and am still learning how to use it, and it seemed like a good idea at the time. So, while I know of other projects that do this, I don’t know of any that use bash. I could be wrong, there very well could be a bash script that does all this already, but it’s good practical experience anyway. I’ve seen some that use perl, some that use c and some that use python, but never anything very large using bash. Bash comes installed with almost every major Linux system, so there wouldn’t be the need for php, perl, python, or even the use of a compiler to run it. Just about the only needed application is Imagemagick. Talk about simple
To protect yourself from security threats, you have to at least know what security threats that happens and how it could harmful to you. In what network environment, you are susceptible to hackerâ€™s attack, spoof, phishers. You have to understand what attacks they can performs, what tools they have used and experience the same tools and techniques that are used against you.
ARP (Address Resolution Protocol)
ARP is a network protocol that use to queries MAC address of an IP, so that data packets can be send across the network through data link layer.
We usually Identify a host through IP, that is under network layer of OSI, but the actual communication between hardware devices (in this case, network adapter) are identify by MAC address. IP is susceptible to change, but MAC address are usually unique (this is actually not the case, so many network cards with no-license are selling everywhere).
Therefore, in order to communicate to a host with only IP known, we need to broadcast the ARP request to the networks, and the one with that specified IP will response back. Let say:
Host A wants to talk to Host B, will broadcast ARP request with Host A MAC address, Host A IP address and also Host B IP address. When host B receives the ARP request, it will response back itâ€™s MAC address to Host A.
While receiving the ARP response, Host A will map the Host IP and MAC to ARP cache table. Lets try to command to experience the process of ARP.
So my girlfriend tells me that I need to download several large image files from a photographer’s website. I manage her online portfolio/website so I’m used to these types of requests… but this time I was going to find a better way to “leech them all.” So anyway, she IM’s me the URL for her most recent shoot…
I was greeted by a nice default Apache index page (and the Photog spelled her name wrong, ugh).
How am i going to grab about 70, five or seven megabyte, image files?
I could click each one and then save it or I could use the Unlinker Firefox Add-On to convert all the links to images. The latter would load all 350MB of photos on the one page. Most certainly my FX-55 single core processor and 1gb of DDR RAM wouldn’t appreciate that very much.
Being the huge open source fan that I am I decided to write a Bash script to accomplish this without hogging up all my computer’s resources. If you manage to know the first image filename and the last image filename in a particular folder, you can download them using seq command with a Bash do loop. Let’s say the first image and the last image’s name is in this format:
we can assume the images between them should be 0020, 0021, 0022, and so on, until 1214. Therefore a simple Bash script will looks like this:
for i in `seq -f"%04g" 19 1214`
wget -c "http://photographer.com/jenn_thomas/full_size/JT_$i.jpg"
Seq allows you to define printf-like formating by specified with -f”%04g” is actually tells seq I got four digits, fill the blank digits with 0, and the range is from 19 to 1214. After that, use wget to download them. That’s how I got JT_0353.jpg at the top of this post. Pretty simple isn’t it?
You can run Bash scripts under a windows platform too if you have Cygwin installed. But bare in mind, not all images are download-able with this technique. Certain site pad the image’s filename with some random characters, that prevent downloads by this simple script.
UPDATE: A reader suggested using Curl as an alternative:
curl -o JT_01_#1 http://photographer.com/jenn_thomas/full_size/JT_[0019-1214].jpg
A government program set up to remove innocent people from terrorism no-fly and watch lists has been ineffective and riddled with problems, travelers and congressional leaders say.
The Department of Homeland Security’s Traveler Redress Inquiry Program, or TRIP, was started almost a year ago to clear people routinely subjected to extra airport-security screening and even detention simply because their names were confused with those on the government’s voluminous terrorism watch lists. The lists now contain more than 700,000 records and include many names as common as John Thompson and James Wilson.
But travelers say TRIP has done little to ease their security hassles. They complain that government officials have been unresponsive and offer little information even when they do answer inquiries. And travelers who have been told they have been placed on a “cleared” list find themselves still subjected to added security procedures, unable to pre-print boarding passes for airline flights or use kiosks at airports, for example. Then, after waiting in line to check in, they find themselves trapped in a Catch-22 of long waits while supervisors probe their identity and status on the “cleared” list — just to avoid the delay of being selected for additional screening at checkpoints.
New research shows that people with blue eyes have a single, common ancestor. A team at the University of Copenhagen have tracked down a genetic mutation which took place 6-10,000 years ago and is the cause of the eye colour of all blue-eyed humans alive on the planet today.
â€œOriginally, we all had brown eyesâ€, said Professor Eiberg from the Department of Cellular and Molecular Medicine. â€œBut a genetic mutation affecting the OCA2 gene in our chromosomes resulted in the creation of a â€œswitchâ€, which literally â€œturned offâ€ the ability to produce brown eyesâ€. The OCA2 gene codes for the so-called P protein, which is involved in the production of melanin, the pigment that gives colour to our hair, eyes and skin. The â€œswitchâ€, which is located in the gene adjacent to OCA2 does not, however, turn off the gene entirely, but rather limits its action to reducing the production of melanin in the iris â€“ effectively â€œdilutingâ€ brown eyes to blue. The switchâ€™s effect on OCA2 is very specific therefore. If the OCA2 gene had been completely destroyed or turned off, human beings would be without melanin in their hair, eyes or skin colour â€“ a condition known as albinism.
Of course, Ron opposed the Bush administration’s latest police-state powergrab. He said: “Mr. Speaker I rise in opposition to the extension of the Protect America Act of 2007 because the underlying legislation violates the US Constitution.
“The misnamed Protect America Act allows the US government to monitor telephone calls and other electronic communications of American citizens without a warrant. This clearly violates the Fourth Amendment, which states: ‘The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.’”
No wonder he is called the Champion of the Constitution.
This might be interesting. I’m eager to see the outcome of this.
Upcoming Changes to Feedback changes in 2008
eBayâ€™s Feedback system continues to evolve as community makeup and the online marketplace dynamics change.
The eBay Feedback system was originally designed to provide a simple, honest, accurate record of the buyer’s and seller’s online experience to ensure safe and satisfactory trade. It was driven by two factors: transparency and accountability. Over time, we found that the transparency of the existing Feedback system makes some members reluctant to hold others accountable. For example, buyers fear retaliatory Feedback from sellers if they leave a negative.
Therefore, we’ll be making a few significant changes to eBay’s Feedback system to continue to improve accuracy and accountability. Within six months, these changes should help to differentiate and reward sellers who provide a positive buying experience on eBay.
“Following Google’s crackdown on ‘domain tasters’, ICANN has voted unanimously to eliminate the free period that many domain buyers have been taking advantage of. At the same meeting they also discussed Network Solutions’ front running but took no action on it.”
I was scribbling a note onto a piece of paper yesterday when I paused to think about the spelling of a word I was about to write.
I haphazardly wrote the word incorrectly, expecting – for just a moment – that I could use spellcheck to fix it.
Sean Moss-Pultz was kind enough to answer a few questions with fsckin w/ linux. Heâ€™s got some pretty interesting answers to questions plaguing geeks and non-geeks alike, such as the eternal debate on which is better – Ninjas or Pirates? Keep reading for some candid responses from the CEO of the company behind the Dash Express GPS device and the in-development OpenMoko phone. Dash was recently named one of the top 10 startup companies to watch in 2008 by Wired Magazine.
He also discusses his AE86 restoration.
“I was at Wal*Mart recently with a few friends, and before we left one of my friends wanted to pick up some cigarettes. We went to the one lane where you could make such a purchase and the lady asked to see ALL of our IDs.
Annoying and pointless, sure, but I didnâ€™t mind showing her my ID. She claimed she was just following the rules, so it was no big deal.
My friends handed over their drivers licenses, and I hand over my concealed weapons permit. She looked at it for a moment and handed it back saying â€œIâ€™m sorry this isnâ€™t valid ID.â€
Oh really? So a license to drive is valid, but a license to carry a weapon is not valid? Both are government issued, and neither are required to have by law.
The lady at the checkout said she could not sell my friend cigarettes unless I could produce a â€œvalid IDâ€ according to her definition, which seemed to only include driverâ€™s licenses. I told her I donâ€™t drive and didnâ€™t have a drivers license. This is a lie, of course, but she was being a pain and I wasnâ€™t willing to give in.
Queue the gasp! Google is out to get you!
Here’s a very good read from the Gthing science blog. Gets you thinking about the rates our mobile phone carriers charge us with.
“I just found out that AT&T (A-fee&fee?) is raising their text message pricing. When I first signed up for AT&T 6 or so years ago it cost 10 cents to send an SMS message, and it was free to receive them.
When AT&T switched to Cingular the price of sending a message dropped to 5 cents, but they started charging for incoming texts – also 5 cents. Assuming you send a message for every message you receive, this works out at about the same price as before.
AT&T came back online and phased out the CIngular brand name, and prices were again changed. This time to 15 cents each way.
More changes have taken place that I canâ€™t quite remember. At one point text messages were 10 cents either way, and at another point they even included MMS (multimedia messages) at the same price as SMS.
As of March SMS messages on AT&T will cost 20 cents and MMS will cost 30 cents – both to send a receive.
So letâ€™s do some math here, and figure out how much this simple transmission is actually costing us.
The following is a decent article about when “Ethan” hacked into the MediaDefender company, at the end of 2006…
From: Ty Heath [MediaDefender]
Sent: Wednesday, June 6, 2007 7:02 p.m.
The 184.108.40.206 pm webserver has been compromised [â€¦]
Subject: pm webserver
As a side note, please do not ever use the old passwords on anything.
“The first time Ethan broke into MediaDefender, he had no idea what he had found. It was his Christmas break, and the high schooler was hunkered down in the basement office of his family’s suburban home. The place was, as usual, a mess. Papers and electrical cords covered the floor and crowded the desk near his father’s Macs and his own five-year-old Hewlett-Packard desktop. While his family slept, Ethan would take over the office, and soon enough he’d start taking over the computer networks of companies around the world. Exploiting a weakness in MediaDefender’s firewall, he started poking around on the company’s servers. He found folder after folder labeled with the names of some of the largest media companies on the planet: News Corp., Time Warner, Universal.
Since 2000, MediaDefender has served as the online guard dog of the entertainment world, protecting it against internet piracy. When Transformers was about to hit theaters in summer 2007, Paramount turned to the company to stop the film’s spread online. Island Records counted on MediaDefender to protect Amy Winehouse’s Back to Black album, as did NBC with 30 Rock. Activision asked MediaDefender to safeguard games like Guitar Hero; Sony, its music and films; and World Wrestling Entertainment, its pay-per-view steel-cage championships and pudding-wrestling matches.
MediaDefender’s main stalking grounds are the destinations that help people find and download movies and music for free. Sites such as the Pirate Bay and networks like Lime Wire rely on peer-to-peer, or P2P, software, which allows users to connect with one another and easily share files. (See what movies, television shows, and music are most downloaded.) MediaDefender monitors this traffic and employs a handful of tricks to sabotage it, including planting booby-trapped versions of songs and films to frustrate downloaders. When the company’s tactics work, someone trying to download a pirated copy of Spider-Man 3 might find the process interminable, or someone grabbing Knocked Up might discover it’s nothing but static. Other MediaDefender programs interfere with the process pirates use to upload authentic copies. When Ethan hacked into the company, at the end of 2006, MediaDefender was finishing an exceptional year: Its revenue had more than doubled, to $15.8 million, and profit margins were hovering at about 50 percent.”