2010 Jan 26, 1:46Intro to TOR the onion router.
tor censorship privacy internet web tool tutorial technical 2010 Jan 22, 1:44"He seeded the customer's parking lot with USB flash drives, each of which had a Trojan horse installed on it. When the employees arrived for work in the morning, they were quite excited to find the
free gadgets laying around the parking lot. Employees eagerly collected the USB drives and plugged them into the first computers they came across: their own workstations."
via:ericlaw security usb windows social-engineering computer technical 2009 Dec 11, 5:13"A real true history lesson: Before there were laptops, everyone had to carry entire desktop computers to class. Before there were desktops, they had to lug typewriters. Before that, everyone just
tried real hard to remember stuff. Ask your grandparents!"
humor typewriter satire laptop college 2009 Oct 16, 5:34A few shots of the Hand From Above's internals. It messes with street passers-by on a giant video screen
video humor bbc interactive art hand computer-vision 2009 Sep 12, 3:57"An introduction to Apple's Hypercard... Originally broadcast in 1987."
history apple hypercard mac computer programming video 2009 Aug 28, 3:39
I built timestamp.exe, a Windows command line tool to convert between computer and human readable date/time formats
mostly for working on the first run wizard for IE8. We commonly write out our dates in binary form to the registry and in order to test and debug my work it became useful to be able to determine to
what date the binary value of a FILETIME or SYSTEMTIME corresponded or to produce my own binary value of a FILETIME and insert it into the registry.
For instance, to convert to a binary value:
[PS C:\] timestamp -inString 2009/08/28:10:18 -outHexValue -convert filetime
2009/08/28:10:18 as FILETIME: 00 7c c8 d1 c8 27 ca 01
Converting in the other direction, if you don't know what format the bytes are in, just feed them in and timestamp will try all conversions and list only the valid ones:
[PS C:\] timestamp -inHexValue "40 52 1c 3b"
40 52 1c 3b as FILETIME: 1601-01-01:00:01:39.171
40 52 1c 3b as Unix Time: 2001-06-05:03:30:08.000
40 52 1c 3b as DOS Time: 2009-08-28:10:18:00.000
(it also supports OLE Dates, and SYSTEMTIME which aren't listed there because the hex value isn't valid for those types). Or use the guess
option to get timestamp's best guess:
[PS C:\] timestamp -inHexValue "40 52 1c 3b" -convert guess
40 52 1c 3b as DOS Time: 2009-08-28:10:18:00.000
When I first wrote this I had a bug in my function that parses the date-time value string in which I could parse 2009-07-02:10:18 just fine, but I wouldn't be able to parse 2009-09-02:10:18
correctly. This was my code:
success = swscanf_s(timeString, L"%hi%*[\\/- ,]%hi%*[\\/- ,]%hi%*[\\/- ,Tt:.]%hi%*[:.]%hi%*[:.]%hi%*[:.]%hi",
&systemTime->wYear,
&systemTime->wMonth,
&systemTime->wDay,
&systemTime->wHour,
&systemTime->wMinute,
&systemTime->wSecond,
&systemTime->wMilliseconds) > 1;
See the problem?
To convert between these various forms yourself read The Old New Thing date conversion article or
Josh Poley's date time article. I previously wrote about date formats I like and dislike.
date date-time technical time windows tool 2009 Jul 19, 4:00
Inspired by one of Penn's (of Penn & Teller) articles in which he mentions he has his computer tell him
what he wrote in his journal that day the previous year, I've wanted to implement a similar thing with my blog. Now that, as I mentioned previously, I've updated my blog such that its much easier to implement search and such,
I've added date range filtering to my site's search. So now I can easily see what on Delicious and my blog I was doing last
year.
I've also otherwise updated search on this site. You can now quote terms to match an entire string, stick 'tag:' in front of a term to only match that term against tags as opposed to the title and
body of the entry as well, and you can stick '-' in front of a term to indicate that it must not be found in the entry.
blog search homepage 2009 Jun 22, 7:00"...computer technology has made it to the late sixth century AD, at best. In the olden days, you see, the upper classes were able to read and write, but they generally preferred not to. They left it
to people who had to do it, like scribes and clergymen."
literature paper history literacy religion 2009 Jun 19, 3:27You must wonder if Bruce Schneier is having trouble selling his laptop just because he's Bruce Schneier and he announced his sale on his blog. I thought his description was funny though: "But I still
want to sell the computer, and I am pissed off at what is essentially a denial-of-service attack." A scam or attack to you or me is at worst a DoS to Bruce Schneier.
bruce-schneier ebay fraud security dos 2009 Jun 12, 12:20"We have discovered remotely-exploitable vulnerabilities in Green Dam, the censorship software reportedly mandated by the Chinese government. Any web site a Green Dam user visits can take control of
the PC. According to press reports, China will soon require all PCs sold in the country to include Green Dam. This software monitors web sites visited and other activity on the computer and blocks
adult content as well as politically sensitive material."
censorship china hack security internet greendam 2009 Jun 1, 11:07
When I heard that
Live Search is now Bing one of my initial thoughts was how'd they get that domain
name given
the unavailability of pronouncable four letter .COM domain names. Well, the names been used in the past.
Here now, via the
Wayback Machine is a brief, somewhat speculative, and ultimately anticlimactic
history
of bing.com:
-
2003 July: The first archived version of bing.com features "bing! is a small device (e.g., possibly even a small
Band-Aid(R)-like sticker!) that vibrates when a person's cell phone rings." I can't recall 2003 cell phones, were they big enough to require this device?
-
2004 August: Site for the same device is rewritten and looks much better, IMHO.
-
2006 June: The domain is now parked by easyDNS. I guess the "bing!" device didn't work out?
-
2006 November: Its now "BING*" and they won't say what they're working on ("we're still in stealth mode") but they are
hiring C#/.NET developers.
-
2007 January: And they're gone. Without even exiting stealth mode. Too bad, I liked their logo. Their domain is now for
sale...
-
2007 February: Looks like EasyMail buys the domain and offers a physical mailing service in Australia: "By simply clicking
a button on your computer, mail is beamed electronically to a bing post office. Your mail is automatically printed, folded, enveloped and dispatched into the Australia Post network the very same
day."
-
Present: Now its the new home for Live Search of course.
The new name reminds me of the show Friends. Also, I hope they get a new favicon - I don't enjoy the stretched 'b' nor its color scheme.
microsoft technical domain history search archive dns bing 2009 May 28, 1:12A homemade CPU and computer. I love the primary colors on the mess of wires. The close up shot is lovely.
howto diy hardware computer electronics cpu homemade maker-faire 2009 May 25, 3:02
Checking out at a grocery store to which I rarely go, the cashier asks me if I want an
Albertson's card. I respond sure and she hands me the form on which I give up my personal information. I ask if I need to fill this out now, and she says yeah and it will only take two minutes,
which surprised me because at QFC they just hand me a new card and send me on my way. I fill in my phone number as the first ten digits of pi so I don't have to worry about getting phone calls but
its something I can remember next time I'm there and don't bring the card.
I turn to leave and the cashier asks me is that a '759' or '159' in my phone number. I stop for a second because I only know the digits as a sequence from the start and pause long enough reciting
it in my head that its clear its not my phone number. And she calls me out on it: "Is that your real phone number?" I sigh, "No, does it have to be? Are you going to call me?" "Yeah," she says,
"I'll call you." (ha ha) "Well I'll try entering this number," she says doubting the computer will accept the fake phone number. "On the number's already registered," she says, "So you already had
a card." "No," says the manager who had walked up during for this exchange, "It means someone else used that same number." So the moral of the story is, try your fake phone number before trying to
use it to get a new card.
personal2 pi albertsons 2009 May 3, 10:03"Architectural Styles and the Design of Network-based Software Architectures - DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Information
and Computer Science by Roy Thomas Fielding 2000"
http rest paper web architecture development api webservices roy-fielding 2009 Apr 1, 9:32'To help stem the downward spiral of the United States economy Congress has proposed a new dollar symbol. "Updating fonts on the world's computers and devices would be a huge economic stimulus" said
one representative after a late night session of the newly formed House Subcommittee - Font Economic Stimulus Technology Relief (FESTR). "The dollar is a shadow of its former self and the new design
reflects this."'
art design humor font dollar-sign typography government economics 2009 Mar 22, 11:03'Speaker are high-quality multimedia speakers that plug directly into your computer or MP3 player. Their iconic shape put the "speak" in speakers. Set includes a left and right speaker and power
adapter.'
speaker purchase design shopping gadget comic 2009 Feb 7, 10:39
On my laptop at work I often get mail with attached files the application for which I only have installed on my main computer. Tired of having to save the file on the laptop and then find it on the
network via my other computer, I wrote remoteopen two nights ago. With this I open the file on my laptop and remoteopen sends it to be opened on
my main computer. Overkill for this issue but it felt good to write a quick tool that solves my problem.
technical boring remoteopen tool 2009 Jan 20, 11:40"But, when police searched his computer, they found Google searches from a couple days after the accident like, "auto parts, auto dealers out-of-state; auto glass, Las Vegas; auto glass reporting
requirements to law enforcement, auto theft," according to the prosecutor. The coup de grace? He searched for "hit-and-run," which he followed to a page about the hit-and-run he committed."
privacy google internet crime 2009 Jan 12, 12:27The game is "You Have To Burn The Rope" with the description: "Computer games are getting so hard these days..." Take a minute to play this game and then enjoy the end game song.
humor game flash computer parody music