ir page 25 - Dave's Blog

Search
My timeline on Mastodon

Feasibility and Real-World Implications of Web Browser

2010 May 23, 4:32"The ability to detect visitors' browsing history requires just a few lines of code. Armed with a list of websites to check for, a malicious webmaster can scan over 25 thousand links per second (1.5 million links per minute) in almost every recent browser."PermalinkCommentstechnical privacy security web browser

Google Code Blog: Introducing the Google Font API & Google Font Directory

2010 May 19, 1:56Google offers up a directory of fonts available for use in your css.PermalinkCommentsgoogle font technical css typography

Listen To House - Hacked IRL- Culture Jamming Graffiti

2010 May 19, 1:29Is it ever lupus?
PermalinkCommentshumor ad cultural-disobediance graffiti house

Mike Phirman

2010 May 19, 7:17A creative-commons released comedy album. Heard him on the Nerdist podcast where he played live several of the songs you'd imagine someone having a tough time playing live. Humorous and is that Weird Al I hear in Street Meat?PermalinkCommentsmusic humor mike-phirman cc creativecommons

"The Horde" - Halloween, Zombies T-shirt by Aled Lewis

2010 May 18, 12:22
PermalinkCommentszombie tshirt shirt via:boingboing

Shepard Fairey - Interview Magazine

2010 May 10, 8:59Iggy Pop interviews Shepard Fairey, including his Obama HOPE poster and AP lawsuit:

"... but the American public is generally pretty superficial, so an image like that just allows them to project whatever limited idea they have onto it. Obviously, not everyone is like that—I actually think there were a lot of people who were bummed by the image because they felt it was shallow propaganda."

"If I spend time conceiving and making a piece of art and somebody else sees that it has market value and replicates it in order to steal part of my market, then that’s not cool. But the way I make art—the way a lot of people make art—is as an extension of language and communication, where references are incredibly important. It’s about making a work that is inspired by something preexisting but changes it to have a new value and meaning that doesn’t in any way take away from the original—and, in fact, might provide the original with a second life or a new audience."
PermalinkCommentsart legal law ip shepard-fairey obey interview

INTERCAL -- the Language From Hell

2010 May 10, 5:21An old article by Charles Stross on INTERCAL the satirical programming language. It contains great features such as 'come from' the inverse of 'goto'.PermalinkCommentsc programming humor technical language software charles-stross intercal goto

Comparison of CORS and UMP - Web Security

2010 May 7, 6:29UMP instead of CORS for cross-domain access control: "...a developer can read only UMP and ignore CORS, yet still create safe code. This code can successfully message with CORS resources that do not require credentials. UMP is therefore a way of messaging with the credential-free subset of CORS resources."PermalinkCommentsw3c security web browser technical

FBJS - Facebook Developer Wiki

2010 May 6, 7:25Another subset of javascript and DOM access to make a sandbox: "FBJS is Facebook's solution for developers who want to use JavaScript in their Facebook applications. We built FBJS to empower developers with all the functionality they need, and to protect our users' privacy at the same time."PermalinkCommentssandbox web browser facebook html javascript technical security web-sandbox

google-caja - Project Hosting on Google Code

2010 May 6, 7:22"Caja allows websites to safely embed DHTML web applications from third parties, and enables rich interaction between the embedding page and the embedded applications. It uses an object-capability security model to allow for a wide range of flexible security policies, so that the containing page can effectively control the embedded applications' use of user data and to allow gadgets to prevent interference between gadgets' UI elements."PermalinkCommentssecurity web browser web-sandbox caja google javascript html technical

Fair Use Economy (pdf)

2010 May 4, 10:49PermalinkCommentsvia:felix42 fair-use economics pdf legal law copyright todo system:filetype:pdf system:media:document

The State of Web Development 2010 – Web Directions

2010 Apr 29, 11:51Stats from the State of Web Development 2010 web survey including: "Few respondents use any form of Internet Explorer for their day to day web use, but IE8 is the number one browser developers test their sites in. Google Chrome has jumped dramatically as the browser of choice for developers, to rank 3rd, at 17% just behind Safari at 20%."PermalinkCommentsie web browser chrome statistics development html technical system:filetype:pdf system:media:document

HotelChatter's Annual Hotel WiFi Report 2010 || HotelChatter

2010 Apr 29, 11:45"...Well guess what? The demand for hotel WiFi has not gone away, quite the opposite, a growing number of hotel guests not only demand the hotel they book have proper wireless access but most will consider *not* staying at a hotel that can't meet their basic access needs."
PermalinkCommentshotel wifi technical statistics travel network internet wireless via:boingboing

HTML 5 Video Seeking and Redirects

2010 Apr 26, 3:09Firefox developer on the topic of HTML5 video and the issues of using HTTP range requests to seek within an HTML5 video.PermalinkCommentshtml html5 http range technical video firefox web browser bug code programming

What data does Facebook publish about you? - Boing Boing

2010 Apr 26, 3:03"Find out what personal data Facebook publishes about people by entering their Facebook username here: zesty.ca/facebook."PermalinkCommentsfacebook privacy technical

Hitler tries a DMCA takedown | Brad Ideas

2010 Apr 21, 1:47So... There's Downfall a 2004 film about the final days of Hitler's life. Then folks take the most dramatic scene and parody it with new subtitles having Hitler yell about various things like his cell phone or Burning Man. It becomes a meme and meta Downfall parodies show up with Hitler yelling about the Downfall parodies. Now the studio producing the film has sent DMCA takedown notices to Youtube and many of the videos are disappearing. In response is a new Downfall parody in which Hitler issues DMCA notices to Youtube...PermalinkCommentscensorship hitler humor copyright dmca eff legal youtube video fairuse meme web internet technical

RFC 5843 - Additional Hash Algorithms for HTTP Instance Digests

2010 Apr 21, 6:51Adds SHA 256 & 512 to HTTP instance digest: 'The IANA registry named "Hypertext Transfer Protocol (HTTP) Digest Algorithm Values" defines values for digest algorithms used by Instance Digests in HTTP. Instance Digests in HTTP provide a digest, also known as a checksum or hash, of an entire representation of the current state of a resource. This document adds new values to the registry and updates previous values.'PermalinkCommentshash cryptography http instance-digest sha security technical ietf rfc standard

RFC 5849 - The OAuth 1.0 Protocol

2010 Apr 21, 6:49"OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end-user). It also provides a process for end-users to authorize third-party access to their server resources without sharing their credentials (typically, a username and password pair), using user-agent redirections."PermalinkCommentsoauth authorization security privacy internet web rfc standard technical

Microsoft throws its weight behind Web Open Font format

2010 Apr 21, 6:48"The Web Open Font Format, already backed by Mozilla and many type foundries was accepted by the World Wide Web Consortium yesterday, marking the first stage in its standardization. The submission included a surprising new sponsor: Microsoft."PermalinkCommentsfont microsoft web internet typography arstechnica browser technical

Ars Colloquium: the official ACTA treaty draft and your reactions

2010 Apr 21, 6:47"After years of secrecy (and the occasional leak), a draft of the Anti-Counterfeiting Trade Agreement (ACTA) treaty has finally been released by negotiators. We've delved deep into the treaty, highlighting its numerous problems. Indeed, there's a lot not to like about the treaty: Internet disconnections, anticircumvention prohibitions, and even the ability for rightsholders to get injunctions if they can show infringement is imminent."PermalinkCommentsarstechnica acta privacy internet todo government politics piracy technical
Older EntriesNewer Entries Creative Commons License Some rights reserved.