1 page 63 - Dave's Blog

Search
My timeline on Mastodon

Internet Archive: Free Download: Hypercard

2009 Sep 12, 3:57"An introduction to Apple's Hypercard... Originally broadcast in 1987."PermalinkCommentshistory apple hypercard mac computer programming video

Bear Flag Wine Bottle

2009 Sep 12, 3:55

sequelguy posted a photo:

Bear Flag Wine Bottle

Bear Flag wine has a cool label and has the barcode wrapped around the neck of the bottle.

PermalinkCommentsbottle wine bearflag

Careers for Girls Board Game Box

2009 Sep 12, 3:51

sequelguy posted a photo:

Careers for Girls Board Game Box

Wtf? For more see the 'Most Condescending Game Ever' thread on www.boardgamegeek.com/thread/33357

PermalinkCommentswtf boardgame parkerbrothers careersforgirls

RFC 1951 - DEFLATE Compressed Data Format Specification version 1.3

2009 Sep 3, 7:17"This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding." Also see RFC 1950 zlib, a wrapper compression format that can use deflate, and RFC 1952 gzip, a compressed file format that can use deflate.PermalinkCommentstechnical rfc ietf compression http deflate gzip zlib

Birthday Cookies and Cupcakes

2009 Aug 28, 9:12

sequelguy posted a photo:

Birthday Cookies and Cupcakes

Cookies and cupcakes mysteriously appeared in my office. (Actually not mysterious -- thanks Eric!)

PermalinkCommentsbirthday chair cookie cupcake

Parents, Carl, Jeannie on Roof

2009 Aug 28, 9:12

sequelguy posted a photo:

Parents, Carl, Jeannie on Roof

PermalinkCommentsseattle family friends parents jeannie wa

Old Veterinary Related Tool

2009 Aug 28, 9:12

sequelguy posted a photo:

Old Veterinary Related Tool

Saw this at the Fremont Market. The tag read along the lines of Veterinary related tool -- three guesses.

PermalinkCommentsseattle wa tool veterinary

James Bond's Jetpack

2009 Aug 28, 9:12

sequelguy posted a photo:

James Bond's Jetpack

James Bond's jetpack found at the Three Lions pub in Redmond, WA

PermalinkCommentspub redmond wa jamesbond jetpack

Time/Date Conversion Tool

2009 Aug 28, 3:39

I built timestamp.exe, a Windows command line tool to convert between computer and human readable date/time formats mostly for working on the first run wizard for IE8. We commonly write out our dates in binary form to the registry and in order to test and debug my work it became useful to be able to determine to what date the binary value of a FILETIME or SYSTEMTIME corresponded or to produce my own binary value of a FILETIME and insert it into the registry.

For instance, to convert to a binary value:

[PS C:\] timestamp -inString 2009/08/28:10:18 -outHexValue -convert filetime
2009/08/28:10:18 as FILETIME: 00 7c c8 d1 c8 27 ca 01

Converting in the other direction, if you don't know what format the bytes are in, just feed them in and timestamp will try all conversions and list only the valid ones:

[PS C:\] timestamp -inHexValue  "40 52 1c 3b"
40 52 1c 3b as FILETIME: 1601-01-01:00:01:39.171
40 52 1c 3b as Unix Time: 2001-06-05:03:30:08.000
40 52 1c 3b as DOS Time: 2009-08-28:10:18:00.000
(it also supports OLE Dates, and SYSTEMTIME which aren't listed there because the hex value isn't valid for those types). Or use the guess option to get timestamp's best guess:
[PS C:\] timestamp -inHexValue  "40 52 1c 3b" -convert guess
40 52 1c 3b as DOS Time: 2009-08-28:10:18:00.000

When I first wrote this I had a bug in my function that parses the date-time value string in which I could parse 2009-07-02:10:18 just fine, but I wouldn't be able to parse 2009-09-02:10:18 correctly. This was my code:

success = swscanf_s(timeString, L"%hi%*[\\/- ,]%hi%*[\\/- ,]%hi%*[\\/- ,Tt:.]%hi%*[:.]%hi%*[:.]%hi%*[:.]%hi", 
&systemTime->wYear,
&systemTime->wMonth,
&systemTime->wDay,
&systemTime->wHour,
&systemTime->wMinute,
&systemTime->wSecond,
&systemTime->wMilliseconds) > 1;
See the problem?

To convert between these various forms yourself read The Old New Thing date conversion article or Josh Poley's date time article. I previously wrote about date formats I like and dislike.

PermalinkCommentsdate date-time technical time windows tool

WHEN ZOMBIES ATTACK!: MATHEMATICAL MODELLING OF AN OUTBREAK OF ZOMBIE INFECTION

2009 Aug 25, 7:10Research paper modelling zombie infection. "The key difference between the models presented here and other models of infectious disease is that the dead can come back to life." Also, love the references section with "Snyder, Zack (director), 2004 Dawn of the Dead" next to things like "Bainov, D.D. & Simeonov, P.S. Impulsive Differential Equations: Asymptotic Properties of the Solutions. World Scientific, Singapore (1995)."PermalinkCommentshumor zombie research via:schneier math science health apocalypse system:filetype:pdf system:media:document

Fight Against 1-day Exploits: Diffing Binaries vs Anti-diffing Binaries

2009 Aug 24, 9:52Notes on how bin diff'ing tools work and thoughts on defeating them. "We call the threat "1-day exploits". Just few minutes after the release of patches, binary diffing technique can be used to identify the vulnerabilities that the security patches are remedying."PermalinkCommentsexploit security binary diff tool research technical system:filetype:pdf system:media:document

Scalable Vector Graphics (SVG) 1.1 (Second Edition)

2009 Aug 24, 4:57"This specification defines the features and syntax for Scalable Vector Graphics (SVG) Version 1.1, a modularized language for describing two-dimensional vector and mixed vector/raster graphics in XML."PermalinkCommentssvg graphic web xml reference w3c technical

Schneier on Security: Non-Randomness in Coin Flipping

2009 Aug 24, 3:11"It turns out that flipping a coin has all sorts of non-randomness", includes link to research paper and blog post with gems like: "If the coin is tossed and caught, it has about a 51% chance of landing on the same face it was launched"PermalinkCommentssecurity random coin coin-toss

Dynamic CSRF White Paper Posted — Portal

2009 Aug 21, 3:13"At Black Hat USA 2009 and Defcon 17 Nathan Hamiel and Shawn Moyer introduced an attack called Dynamic Cross-Site Request Forgery (CSRF). This white paper discusses the attack and discusses several Dynamic CSRF attack vectors." Seems to require sites trying to secure CSRF scenarios using session IDs in their URLs.PermalinkCommentssecurity csrf research browser web technical

Fake Zombies attacking an innocent driver

2009 Aug 17, 8:39Laughed for this comment on the zombie photo used in the Wired article: 'Funny, the Wired article attribution ... says, "Fake Zombies attacking an innocent driver." I don't know who decided on that caption, but it made me immediately want to ask 1. How do you know they're FAKE zombies? 2. How do you know the driver is INNOCENT?'
PermalinkCommentshumor zombie photo flickr wired

Offworld Gallery: The games factory, how Mario, Tetris, Sonic, Pong were made | Offworld

2009 Aug 14, 9:58Photos of "...the smelting of Sonic's rings, the chiseling of the 1-Up mushroom, and the rubber-pressed rebounding blocks of Arkanoid."PermalinkCommentsvideogame mario tetris factory photo

DSC04581 on Flickr - Photo Sharing!

2009 Aug 13, 9:46An awesome health care protest sign. I've made a huge mistake.
PermalinkCommentshumor photo obama politics television arrested-development sign protest

The Longest Way 1.0 - one year walk/beard grow time lapse on Vimeo

2009 Aug 6, 8:06"Man shaves head, walks across China for a year, grows beard & crazy hair, and takes daily photos and short videos of himself along the way". Like the hair and the ska!PermalinkCommentsvia:kottke hair photo video timelapse china travel ska

DSpace@MIT : Parallel and Distributed Computation:Numerical Methods

2009 Jul 27, 5:27"Parallel and Distributed Computation:Numerical Methods", Bertsekas, Dimitri P.; Tsitsiklis, John N., 2003-11-21PermalinkCommentsprogramming mit pdf algorithm distributed parallel math todo technical

IE8 Search Providers, Accelerators, and Local Applications Hack

2009 Jul 25, 3:23

There's no easy way to use local applications on a PC as the result of an accelerator or a search provider in IE8 but there is a hack-y/obvious way, that I'll describe here. Both accelerators and search providers in IE8 fill in URL templates and navigate to the resulting URL when an accelerator or search provider is executed by the user. These URLs are limited in scheme to http and https but those pages may do anything any other webpage may do. If your local application has an ActiveX control you could use that, or (as I will provide examples for) if the local application has registered for an application protocol you can redirect to that URL. In any case, unfortunately this means that you must put a webpage on the Internet in order to get an accelerator or search provider to use a local application.

For examples of the app protocol case, I've created a callto accelerator that uses whatever application is registered for the callto scheme on your system, and a Windows Search search provider that opens Explorer's search with your search query. The callto accelerator navigates to my redirection page with 'callto:' followed by the selected text in the fragment and the redirection page redirects to that callto URL. In the Windows Search search provider case the same thing happens except the fragment contains 'search-ms:query=' followed by the selected text, which starts Windows Search on your system with the selected text as the query. I've looked into app protocols previously.

PermalinkCommentstechnical callto hack accelerator search ie8
Older EntriesNewer Entries Creative Commons License Some rights reserved.