2010 Jun 25, 2:58"... all you need to do is specify the /W switch and the file or folder you want to overwrite—after you have already deleted it. cipher /W:C:\Path\To\Folder"technicalcmdprivacysecuritywindowscipherdelete
2010 May 24, 6:29Installable web apps makes total sense given the Google Chrome OS: "An installable web app is a normal web site with a bit of extra metadata. You build and deploy this app exactly as you would build
and deploy any web app, using any server-side or client-side technologies you like. The only thing that is different about an installable web app is how the app is packaged."technicalwebbrowserwebappgooglechrome
2010 May 24, 6:25FireBreath is a cross-platform web browser developement framework supporting ActiveX (for IE) and NPAPI (for everyone else).technicalwebbrowserpluginactivex
2010 May 23, 4:32"The ability to detect visitors' browsing history requires just a few lines of code. Armed with a list of websites to check for, a malicious webmaster can scan over 25 thousand links per second (1.5
million links per minute) in almost every recent browser."technicalprivacysecuritywebbrowser
2010 May 10, 8:59Iggy Pop interviews Shepard Fairey, including his Obama HOPE poster and AP lawsuit:
"... but the American public is generally pretty superficial, so an image like that just allows them to project whatever limited idea they have onto it. Obviously, not everyone is like that—I
actually think there were a lot of people who were bummed by the image because they felt it was shallow propaganda."
"If I spend time conceiving and making a piece of art and somebody else sees that it has market value and replicates it in order to steal part of my market, then that’s not cool. But the way I make
art—the way a lot of people make art—is as an extension of language and communication, where references are incredibly important. It’s about making a work that is inspired by something preexisting
but changes it to have a new value and meaning that doesn’t in any way take away from the original—and, in fact, might provide the original with a second life or a new audience." artlegallawipshepard-faireyobeyinterview
2010 May 10, 8:43Charles Stross on the intersection of ebooks and the publishing industry. Includes the answer to the misinformed question "why are you charging so much for access to the file your authors emailed
you?" Also includes this quote on Cory Doctorow "... Cory is a Special Snowflake with EFF superpowers and New York Times Bestseller mojo which make him immune to the normal laws of man and nature."charles-strosscory-doctorowebookdrmamazonpublishingkindleapplebook
2010 May 10, 7:23"Kevin Frei - Exception Hanlding Cost September 2006 meeting of the Northwest C++ Users Group. Discussion of the assembly language cost of exception handling on the x86 Windows and x64 Windows
platform"C++programminglanguageexceptionmicrosoftwindowsperformancetechnicalvideo
2010 May 7, 6:29UMP instead of CORS for cross-domain access control: "...a developer can read only UMP and ignore CORS, yet still create safe code. This code can successfully message with CORS resources that do not
require credentials. UMP is therefore a way of messaging with the credential-free subset of CORS resources."w3csecuritywebbrowsertechnical
2010 May 6, 7:25Another subset of javascript and DOM access to make a sandbox: "FBJS is Facebook's solution for developers who want to use JavaScript in their Facebook applications. We built FBJS to empower
developers with all the functionality they need, and to protect our users' privacy at the same time."sandboxwebbrowserfacebookhtmljavascripttechnicalsecurityweb-sandbox
2010 May 6, 7:22"Caja allows websites to safely embed DHTML web applications from third parties, and enables rich interaction between the embedding page and the embedded applications. It uses an object-capability
security model to allow for a wide range of flexible security policies, so that the containing page can effectively control the embedded applications' use of user data and to allow gadgets to prevent
interference between gadgets' UI elements."securitywebbrowserweb-sandboxcajagooglejavascripthtmltechnical
2010 May 6, 7:16"Today web gadgets, mashup components, advertisements, and other 3rd party content on websites either run with full trust alongside your content or are isolated inside of IFrames. As a result, many
modern web applications are intrinsically insecure, often with unpredictable service quality. Live Labs Web Sandbox addresses this problem."webbrowserweb-sandboxtechnicaljavascripthtmlwindowslivesecuritysandboxmicrosoftsilverlight
2010 May 6, 7:14"ADsafe defines a safe subset of the JavaScript Programming Language, and an interface that allows programs written in that language to usefully interact with a specific subtree of of the HTML
document."technicalajaxjavascriptjsonsecurityadvertisingadwebbrowserweb-sandbox
2010 May 6, 5:48New IDN TLDs are up. Try out http://xn----rmckbbajlc6dj7bxne2c.xn--wgbh1c/ (aka http://وزارة-الأتصالات.مصر/) in your favorite IDN implementing browser.idntlddnsicanntechnicalweblanguage
2010 May 4, 10:51Survey asks you for your gender and color blindness status and then shows you various colors one by one and asks you to type the name. The results of this survey are presented here. Very few
differences between genders but there's plenty of interesting results in this document.via:swannmansciencestatisticscolorpsychologyxkcdhumorart
2010 May 2, 3:14"This document contains normative guidelines for web applications built by the Interface Development practice of Isobar North America (previously Molecular)." Glad to see coding styles and best
practices for HTML, CSS, JS, associated HTTP headers etc etc etccodecsshtmlhtml5javascriptwebbrowserprogrammingdevelopmenttechnicalvia:kris.kowal