policy page 6 - Dave's Blog

Search
My timeline on Mastodon

A The New York Times ‘Vows’ series entry parody from Jena...

2011 Nov 14, 12:40


A The New York Times ‘Vows’ series entry parody from Jena Friedman.

PermalinkCommentshumor video youtube jena-friedman new-york-times

PowerShell Script Batch File Wrapper

2011 May 22, 7:20

I'm trying to learn and use PowerShell more, but plenty of other folks I know don't use PowerShell. To allow them to use my scripts I use the following cmd.exe batch file to make it easy to call PowerShell scripts. To use, just name the batch file name the same as the corresponding PowerShell script filename and put it in the same directory.

@echo off
if "%1"=="/?" goto help
if "%1"=="/h" goto help
if "%1"=="-?" goto help
if "%1"=="-h" goto help

%systemroot%\system32\windowspowershell\v1.0\powershell.exe -ExecutionPolicy RemoteSigned -Command . %~dpn0.ps1 %*
goto end

:help
%systemroot%\system32\windowspowershell\v1.0\powershell.exe -ExecutionPolicy RemoteSigned -Command help %~dpn0.ps1 -full
goto end

:end

Additionally for PowerShell scripts that modify the current working directory I use the following batch file:

@echo off
if "%1"=="/?" goto help
if "%1"=="/h" goto help
if "%1"=="-?" goto help
if "%1"=="-h" goto help

%systemroot%\system32\windowspowershell\v1.0\powershell.exe -ExecutionPolicy RemoteSigned -Command . %~dpn0.ps1 %*;(pwd).Path 1> %temp%\%~n0.tmp 2> nul
set /p newdir=
PermalinkCommentspowershell technical programming batch file console

draft-hammer-hostmeta-14 - Web Host Metadata

2011 Apr 17, 12:51"Web-based protocols often require the discovery of host policy or metadata, where "host" is not a single resource but the entity controlling the collection of resources identified by Uniform Resource Identifiers (URI) with a common URI host [RFC3986]."PermalinkCommentshost rfc reference metadata technical

Part2 - browsersec - Browser Security Handbook, part 2 - Project Hosting on Google Code

2010 Mar 10, 5:19Covers same origin policy and how it applies to different HTML and HTTP features.PermalinkCommentstechnical web browser javascript csrf ajax html security xss XMLHttpRequest

Understanding and Working in Protected Mode Internet Explorer

2010 Jan 12, 7:10Info on writing apps to work with low rights mode in IE7 and IE8. Includes info on elevation policy for applicationsPermalinkCommentstechnical programming ie ie7 ie8 security elevation msdn microsoft windows

Issue 9860 - chromium - ChromeHTML URI handler vulnerability - Google Code

2009 May 3, 10:26Seems very similar to that ShellExecute/Firefox app URL protocol handler exploit last year. "A vulnerability in the ChromeHTML URI handler allows an attacker to bypass the Same Origin Policy for any site and also enumerate victims files and directories. When loaded in Internet Explorer, a specially crafted HTML page can launch Google Chrome with an arbitrary URI without requiring any user interaction."PermalinkCommentsexploit security google chrome browser web url protocol

Voices without Votes | Americans vote. The world speaks.

2008 Sep 8, 10:23"Voices without Votes opens a window on what non-Americans are saying in blogs and citizen media about US foreign policy and the 2008 presidential elections."PermalinkCommentsvia:sambrook vote politics government blog

Facebook Profile Views Application - Failed Idea

2008 Aug 21, 11:24

I had an idea for a Facebook app the other day. I wondered who actually looked at my profile and thought I could create a Facebook app that would record this information and display it. When I talked to Vishu though he said that this wasn't something that Facebook would be too happy with. Indeed the Platform Policy explicitly disallows this in section 2.8. This explained why the app didn't already exist. Its probably for the best since everyone assumes they can anonymously view Facebook profiles and would be irritated if that weren't the case.

On the topic of assumed anonymity, check out this article on the aggregation and selling off of your cell phone data including your physical location.

PermalinkCommentstechnical facebook privacy cellphone extension

WERBLOG - Blog Archive - Response from Michael Powell on McCain's tech plan

2008 Aug 14, 5:04"Former FCC Chairman Michael Powell sent me this response to my criticism of John McCain's technology policies." Michael Powell helped draft McCains technology policy and is responding to Kevin Werbach who helped draft Obama's technology policy.PermalinkCommentsmccain technology policy politics michael-powell kevin-werbach

Blown to Bits - Blog Archive - John McCain's Technology Policy

2008 Aug 14, 5:01Thoughts on McCain's technology policy. '...Example: (a) "John McCain will focus on policies that leave consumers free to access the content they choose"; (b) "He championed laws that ... protected kids from harmful Internet content"; ... BUT the "policy" fails to note that the laws referred to in (b) have been overturned by federal courts because they unconstitutionally make (a) impossible.'PermalinkCommentspolitics mccain internet policy

One-on-one with FCC Commissioner Jonathan Adelstein: Page 1

2008 Jun 10, 3:34ArsTechnica has an interview with FCC commissioner Jonathan Adelstein. Talks about policy in general with an eye towards net neutrality.PermalinkCommentsinterview fcc jonathan-adelstein arstechnica article
Older EntriesNewer Entries Creative Commons License Some rights reserved.