ai page 22 - Dave's Blog

Search
My timeline on Mastodon

Android App Aims to Allow Wiretap-Proof Cell Phone Calls « The Firewall - Forbes.com

2010 May 27, 8:53
PermalinkCommentsandroid cellphone security encryption privacy cryptography technical google

Senators call for end to anonymous, prepaid cell phones

2010 May 27, 8:52Time to stock up on prepaid anonymous cell phones before its too late! Or just use the call encryption Android application...PermalinkCommentsprivacy security cellphone anonymous politics government technical

Google Code Blog: Introducing the Google Font API & Google Font Directory

2010 May 19, 1:56Google offers up a directory of fonts available for use in your css.PermalinkCommentsgoogle font technical css typography

A quote from Sacramento Credit Union

2010 May 14, 8:52It really is an actual quote from the Sacramento Credit Union's website: "The answers to your Security Questions are case sensitive and cannot contain special characters like an apostrophe, or the words “insert,” “delete,” “drop,” “update,” “null,” or “select.”"

Out of context that seems hilarious, but if you read the doc the next Q/A twists it like a defense in depth rather than a 'there-I-fixed-it'.PermalinkCommentstechnical security humor sql

Shepard Fairey - Interview Magazine

2010 May 10, 8:59Iggy Pop interviews Shepard Fairey, including his Obama HOPE poster and AP lawsuit:

"... but the American public is generally pretty superficial, so an image like that just allows them to project whatever limited idea they have onto it. Obviously, not everyone is like that—I actually think there were a lot of people who were bummed by the image because they felt it was shallow propaganda."

"If I spend time conceiving and making a piece of art and somebody else sees that it has market value and replicates it in order to steal part of my market, then that’s not cool. But the way I make art—the way a lot of people make art—is as an extension of language and communication, where references are incredibly important. It’s about making a work that is inspired by something preexisting but changes it to have a new value and meaning that doesn’t in any way take away from the original—and, in fact, might provide the original with a second life or a new audience."
PermalinkCommentsart legal law ip shepard-fairey obey interview

CMAP #9: Ebooks

2010 May 10, 8:43Charles Stross on the intersection of ebooks and the publishing industry. Includes the answer to the misinformed question "why are you charging so much for access to the file your authors emailed you?" Also includes this quote on Cory Doctorow "... Cory is a Special Snowflake with EFF superpowers and New York Times Bestseller mojo which make him immune to the normal laws of man and nature."PermalinkCommentscharles-stross cory-doctorow ebook drm amazon publishing kindle apple book

INTERCAL -- the Language From Hell

2010 May 10, 5:21An old article by Charles Stross on INTERCAL the satirical programming language. It contains great features such as 'come from' the inverse of 'goto'.PermalinkCommentsc programming humor technical language software charles-stross intercal goto

Comparison of CORS and UMP - Web Security

2010 May 7, 6:29UMP instead of CORS for cross-domain access control: "...a developer can read only UMP and ignore CORS, yet still create safe code. This code can successfully message with CORS resources that do not require credentials. UMP is therefore a way of messaging with the credential-free subset of CORS resources."PermalinkCommentsw3c security web browser technical

google-caja - Project Hosting on Google Code

2010 May 6, 7:22"Caja allows websites to safely embed DHTML web applications from third parties, and enables rich interaction between the embedding page and the embedded applications. It uses an object-capability security model to allow for a wide range of flexible security policies, so that the containing page can effectively control the embedded applications' use of user data and to allow gadgets to prevent interference between gadgets' UI elements."PermalinkCommentssecurity web browser web-sandbox caja google javascript html technical

Fair Use Economy (pdf)

2010 May 4, 10:49PermalinkCommentsvia:felix42 fair-use economics pdf legal law copyright todo system:filetype:pdf system:media:document

Code Standards | Isobar

2010 May 2, 3:14"This document contains normative guidelines for web applications built by the Interface Development practice of Isobar North America (previously Molecular)." Glad to see coding styles and best practices for HTML, CSS, JS, associated HTTP headers etc etc etcPermalinkCommentscode css html html5 javascript web browser programming development technical via:kris.kowal

Download A Piece of Internet History | The Changelog

2010 Apr 29, 11:53"I wrote Gopherbot, a spidering archiver for Gopherspace. I ran it in June 2007, and saved off all the documents and sites it could find. That saved 40GB of data, or about 780,000 documents." Now available as a compressed 15GB torrent.PermalinkCommentstorrent gopher internet web technical history archive

Hitler tries a DMCA takedown | Brad Ideas

2010 Apr 21, 1:47So... There's Downfall a 2004 film about the final days of Hitler's life. Then folks take the most dramatic scene and parody it with new subtitles having Hitler yell about various things like his cell phone or Burning Man. It becomes a meme and meta Downfall parodies show up with Hitler yelling about the Downfall parodies. Now the studio producing the film has sent DMCA takedown notices to Youtube and many of the videos are disappearing. In response is a new Downfall parody in which Hitler issues DMCA notices to Youtube...PermalinkCommentscensorship hitler humor copyright dmca eff legal youtube video fairuse meme web internet technical

RFC 5849 - The OAuth 1.0 Protocol

2010 Apr 21, 6:49"OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end-user). It also provides a process for end-users to authorize third-party access to their server resources without sharing their credentials (typically, a username and password pair), using user-agent redirections."PermalinkCommentsoauth authorization security privacy internet web rfc standard technical

NOVA | The Pluto Files | Hate Mail from Third Graders (non-Flash) | PBS

2010 Apr 15, 2:52Scans of some of a few instances of hate mail Neil deGrasse Tyson received from elementary school students after demoting Pluto to non-planet status.
PermalinkCommentshate-mail mail humor cute children neil-degrasse-tyson science pluto space planet astronomy

Ajaxian » Drag and drop file uploads in Gmail using just the specs

2010 Apr 15, 1:52Gmail now allows you to drag and drop files to make them attachments. This is HTML5 drag and drop plus file API. AwesomePermalinkCommentshtml html5 gmail google file drag-and-drop technical

Schneier on Security: The Effectiveness of Air Marshals

2010 Apr 11, 3:51"In fact, more air marshals have been arrested than the number of people arrested by air marshals." Its easy to get awesome stats like this when talking about lawlessness on airplanes given its great infrequency.PermalinkCommentsstatistics humor security bruce-schneier airplane

Palimpsest by Charles Stross

2010 Apr 6, 5:06"Palimpsest by Charles Stross, 2009. This version made available for 2010 Hugo Award voters by kind permission of the publishers."PermalinkCommentscharles-stross palimpset fiction scifi todo time-travel hugo-award

Incompetech

2010 Apr 5, 4:08Kevin MacLeod licenses all his music under Creative Commons Attribution 3.0 license and available for free on his site. Seems like lots of good instrumentals for background video game music or podcast intros etc.PermalinkCommentsmusic creativecommons cc creative-commons free download archive kevin-macleod mp3

Childrens' Hospital: Watch Full Episodes on TheWB.com. Starring Hot Tub Time Machine's Rob Corddry

2010 Apr 5, 10:41A satirical hospital drama TV show starring tons of humorous people like Rob Corddry, David Wain, Jason Sudeikis and many many more people who you will recognize but not necessarily know their name.PermalinkCommentshumor tv hospital satire rob-corddry
Older EntriesNewer Entries Creative Commons License Some rights reserved.