ws page 23 - Dave's Blog

Search
My timeline on Mastodon

Defenestration

2010 Feb 22, 8:27Its a building with the furniture escaping through windows... artPermalinkCommentsart san-francisco building window furniture

HTML 5 Video Element for Internet Explorer

2010 Feb 22, 3:19Cristian Adam has created a HTML5 Video plugin for IE. Cool!PermalinkCommentshtml html5 video plugin ie7 ie8 ie technical web browser cristian-adam

The Old New Thing : Advantages of knowing your x86 machine code

2010 Feb 19, 2:27Raymond's tips for modifying x86 assembly code while debugging.PermalinkCommentstutorial debug debugging technical assembly x86 windows raymond-chen tips

Annotated x64 Disassembly

2010 Feb 19, 2:26A short tutorial on debugging amd64 assemblyPermalinkCommentsmicrosoft tutorial msdn debug debugging technical assembly x64 amd64 windows documentation

Annotated x86 Disassembly

2010 Feb 19, 2:25A short tutorial on debugging x86 assembly code.PermalinkCommentsmicrosoft tutorial msdn debug debugging technical assembly x86 windows documentation

Methods of Watching TV

2010 Feb 3, 1:09If you've got cable, Internet, and Netflix you end up with a large number of TV viewing options. Its nice to have the options but is there some way to collect and summarize my available options at any one time?

TV PC
Comcast TV Xbox 360 + Windows Media Center Windows Media Center
Comcast OnDemand Cable box Fancast
Hulu Xbox 360 + PlayOn + Windows Media Center Hulu
Netflix Watch Instantly Xbox 360 + Netflix App Netflix Watch Instantly
Netflix DVDs Xbox 360 PC
PermalinkCommentstv xbox 360 wmc dvr

YouTube - Charlie Brooker - How To Report The News

2010 Jan 30, 2:26Similar to the "This is the title of a typical incendiary blog post" (http://faultline.org/index.php/site/item/incendiary/) except this is a typical news report. "...and this is a lighthouse keeper being beheaded by a lighthouse beam."PermalinkCommentsbbc humor video via:waxy satire journalism tv news

Thought Experiments and Design Principles

2010 Jan 29, 3:54

Raymond Chen has some thought experiments useful for discovering various kinds of stupidity in software design:

Tim Berners-Lee's principles of Web design includes my favorite: Test of Independent Invention. This has a thought experiment containing the construction of the MMM (Multi-Media Mesh) with MRIs (Media Resource Identifiers) and MMTP (Muli-Media Transport Protocol).

The Internet design principles (RFC 1958) includes the Robustness Principle: be strict when sending and tolerant when receiving. A good one, but applied too liberally can lead to interop issues. For instance, consider web browsers. Imagine one browser becomes so popular that web devs create web pages and just test out their pages in this popular browser. They don't ensure their pages conform to standards and accidentally end up depending on the manner in which this popular browser tolerantly accepts non-standard input. This non-standard behavior ends up as de facto standard and future updates to the standard essentially has had decisions made for it.

PermalinkCommentstechnical design principles software development

Panopticlick

2010 Jan 29, 10:28"Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies." Examines HTTP headers and browser features and reports if your configuration is unique (mine is). Good info for anyone looking at creating an anonymous browsing plugin or servicePermalinkCommentsweb security privacy eff education identity surveillance cookies cookie anonymity anonymous technical

Bring On Firefox Mobile For Android | Android Phone Fans

2010 Jan 29, 10:16Talk of Firefox on Android. Sounds good to me!PermalinkCommentsmobile google android firefox web browser technical

msnbc.com: Obama, Republicans spar in Q&A

2010 Jan 29, 10:16PermalinkCommentsvideo politics news obama debate

Chromium Blog: Security in Depth: New Security Features

2010 Jan 27, 9:56Some of the new security features in Chrome: XSS filter, HTTPS only, HTML5 origin header, and HTML5 postMessage function.PermalinkCommentshtml5 html script xss csrf chrome browser google security web technical

The WHATWG Blog » Blog Archive » What’s next in HTML, episode 2: who’s been peeing in my sandbox?

2010 Jan 26, 2:00The sandbox attribute for the iframe element sounds like a big pit of issues. Includes a new mime type text/html-sandbox to put on content that shouldn't be rendered as html in browsers that don't support the sandbox attribute.PermalinkCommentshtml html5 sandbox security web browser iframe mime mimetype html-sandbox technical

michaelv.org

2010 Jan 25, 7:47Windows 3.1 done in HTML and Javascript. Memories...PermalinkCommentswindows windows31 humor web microsoft javascript html

How Flash Drives and Social Engineering can Compromise Networks

2010 Jan 22, 1:44"He seeded the customer's parking lot with USB flash drives, each of which had a Trojan horse installed on it. When the employees arrived for work in the morning, they were quite excited to find the free gadgets laying around the parking lot. Employees eagerly collected the USB drives and plugged them into the first computers they came across: their own workstations."PermalinkCommentsvia:ericlaw security usb windows social-engineering computer technical

Vampire Prevention Fail - FAIL Blog: Epic Fail Pictures and Videos of Owned, Pwnd and Fail Moments

2010 Jan 21, 4:25You cannot argue with his logic.PermalinkCommentshumor video garlic vampire news fail fail-blog

McAfee Security Insights Blog » Blog Archive » Operation “Aurora” Hit Google, Others

2010 Jan 20, 8:26McAfee on the China v Google attack.PermalinkCommentshack hackers security google browser web ie china microsoft malware ie6 technical

DMTHEATRICS announces the exclusive NYC premiere of THE TWO GENTLEMEN OF LEBOWSKI

2010 Jan 13, 9:35A live stage performance of The Two Gentlemen of Lebowski.PermalinkCommentsshakespeare the-big-lebowski play performance humor nyc

Google and China: the attacks and their aftermath

2010 Jan 13, 6:35Ars Technica rounds up links on the recent Google threatening to stop censoring itself in China including quotes from Secretary of State Clinton, and the EFF and info on the hacks.PermalinkCommentsgoogle china arstechnica news politics security censorship

Understanding and Working in Protected Mode Internet Explorer

2010 Jan 12, 7:10Info on writing apps to work with low rights mode in IE7 and IE8. Includes info on elevation policy for applicationsPermalinkCommentstechnical programming ie ie7 ie8 security elevation msdn microsoft windows
Older EntriesNewer Entries Creative Commons License Some rights reserved.