d page 56 - Dave's Blog

Search
My timeline on Mastodon

Face.com - Facial recognition web API

2012 Mar 30, 2:38

First tier of their service is free.  Supports age, gender, glasses, and mood as well as where the face is in an image all over a REST-ful web API.

PermalinkCommentsuri web url rest technical facial-recognition

wilwheaton: laughterkey: You guys, the cast of every single...

2012 Mar 28, 11:23


wilwheaton:

laughterkey:

You guys, the cast of every single iteration of Star Trek is the best cast ever.

Trufax. 

I still can’t believe that this is a real thing that happened.

PermalinkCommentshumor star-trek tv wil-wheaton simon-pegg twitter

IAmA NASA Astronaut who recently returned to Earth and I am new to reddit (reddit.com)

2012 Mar 23, 2:08

Astronaut endorses destroying the moon!

The best exchange on the IAmA:

Ghostshirts it’s been a dream for a long time now, do you think that we’ll actually be able to blow up the moon in our lifetime?

RonGaran I truly believe that we can accomplish anything we set our minds on. We only need the will to do it

PermalinkCommentshumor nasa astronaut moon

Cache them if you can

2012 Mar 23, 1:19

New stats on HTTP caching on the web.

PermalinkCommentstechnical http cache statistics

Understanding Enhanced Protected Mode

2012 Mar 23, 1:18

Eric Lawrence describes the new security features of IE10.

PermalinkCommentstechnical ie10 security ie web-browser eric-lawrence

Why Did This Work?

2012 Mar 23, 7:05

Do we have a word or phrase to describe the following situation: You code up something complicated and it compiles and works on the first try. You then spend the next ten minutes trying to figure out what's actually broken because it shouldn't be this easy.

Or in meme form:

PermalinkCommentstechnical humor programming futurama

More Walking Dead macro photos.

2012 Mar 21, 2:56


More Walking Dead macro photos.

PermalinkCommentshumor meme walking-dead tv zombie

Photo

2012 Mar 20, 3:50


PermalinkComments

Recommendations for the Remediation of Bots in ISP Networks

2012 Mar 19, 3:11

recommendations on how Internet Service
   Providers can use various remediation techniques to manage the
   effects of malicious bot infestations on computers used by their
   subscribers.

Detection and notification recommendations.

PermalinkCommentstechnical isp ietf networking

Free Universal Construction Kit is a set of 3D models you can...

2012 Mar 19, 4:05


Free Universal Construction Kit is a set of 3D models you can print on a 3D printer that allow you to connect Lego to Duplo to Lincoln Logs, etc.

PermalinkCommentstoy video 3d-printer

Comedy Bang Bang preview and story.  Exciting!

2012 Mar 18, 1:57PermalinkCommentshumor comedy-bang-bang video ifc

Photo

2012 Mar 18, 5:45


PermalinkCommentshumor meme rainbow-cat wil-wheaton tng

Changing System Environment Variables on Windows

2012 Mar 16, 3:13

Is this really the right way to do this? Feels icky:

To programmatically add or modify system environment variables, add them to the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment registry key, then broadcast a WM_SETTINGCHANGE message with lParam set to the string “Environment”.

PermalinkCommentsprogramming techncial registry environment-variable windows

How to collect JavaScript performance data for Windows Metro apps on a device that does not have Visual Studio installed

2012 Mar 16, 2:27

Documentation for the VS JS profiler for Win8 HTML Metro Apps on profiling apps running on remote machines. 

PermalinkCommentswin8 programming technical js vs

Rob Reid: The $8 billion iPod.  5min TED talk on copyright math

2012 Mar 15, 6:25
an>
PermalinkCommentshumor video ipod music mpaa riaa ted copyright

(via Tron-Style Light Dance Performance by Wrecking Crew...

2012 Mar 15, 5:21


(via Tron-Style Light Dance Performance by Wrecking Crew Orchestra)

PermalinkCommentstron dance video music dubstep

European Parliament Blocks Copyright Reform With 113% Voter Turnout (falkvinge.net)

2012 Mar 15, 4:05

Hmmm

This rather embarrassing issue was pointed out to the committee, the fact that there were three votes too many, and that these three votes determined the outcome. When this was done, along with formally requesting a re-vote, that re-vote on the points in question was denied.”

PermalinkCommentscopyright legal europe law

Dave Weston on security best practices in Win8 HTML Metro Apps.

2012 Mar 14, 9:29PermalinkCommentssecurity technical video david-weston wwa win8 programming html javascript

Alternate IPv4 Forms - URI Host Syntax Notes

2012 Mar 14, 4:30

By the URI RFC there is only one way to represent a particular IPv4 address in the host of a URI. This is the standard dotted decimal notation of four bytes in decimal with no leading zeroes delimited by periods. And no leading zeros are allowed which means there's only one textual representation of a particular IPv4 address.

However as discussed in the URI RFC, there are other forms of IPv4 addresses that although not officially allowed are generally accepted. Many implementations used inet_aton to parse the address from the URI which accepts more than just dotted decimal. Instead of dotted decimal, each dot delimited part can be in decimal, octal (if preceded by a '0') or hex (if preceded by '0x' or '0X'). And that's each section individually - they don't have to match. And there need not be 4 parts: there can be between 1 and 4 (inclusive). In case of less than 4, the last part in the string represents all of the left over bytes, not just one.

For example the following are all equivalent:

192.168.1.1
Standard dotted decimal form
0300.0250.01.01
Octal
0xC0.0XA8.0x1.0X1
Hex
192.168.257
Fewer parts
0300.0XA8.257
All of the above

The bread and butter of URI related security issues is when one part of the system disagrees with another about the interpretation of the URI. So this non-standard, non-normal form syntax has been been a great source of security issues in the past. Its mostly well known now (CreateUri normalizes these non-normal forms to dotted decimal), but occasionally a good tool for bypassing naive URI blocking systems.

PermalinkCommentsurl inet_aton uri technical host programming ipv4

Dark Patterns are UI patterns used to trick users into doing...

2012 Mar 12, 7:05


Dark Patterns are UI patterns used to trick users into doing things they’d otherwise rather not: buy traveler’s insurance, click on ads, etc.  Covers the anti-patterns and how we as technical folk can help stop this.

PermalinkCommentstechnical ui programming dark-pattern
Older EntriesNewer Entries Creative Commons License Some rights reserved.