2010 Apr 6, 11:17A thread on HTTPBIS concerning about how one might standardize hotels and other such proxies that inject redirects to their own payment or T&C agreement sites.
http httpbis reference ietf network 2010 Mar 31, 7:54"Summary: Exploring cross-domain threats and use cases, security principles for cross-origin requests, and finally, weighing the risks for developers to enhance cross-domain access from web
applications running in the browser."
technical msdn microsoft security xss XMLHttpRequest web browser 2010 Mar 26, 5:16Interesting point that web browsers block HTML FORMs from submitting to some ports in order to avoid malicious servers from getting clients to do their dirty work. Of course it requires the host on
the other side of that port to be able to interpret the HTTP request as something relevant to the protocol they actually expect.
security web browser ie http html form technical 2010 Mar 12, 10:03Eschuk has fairly detailed strategy for last person on Earth scenario. Humrous comments follow.
itdest1983: "I hate to be a debbie downer and question this incredibly awesome and very intelligent plan, but my question is: Why? Other than sustaining life simply to avoid death, why? ..."
Eschuk : "Then someones got some existential shit to hash out. ..."
humor reddit strategy apocalypse 2010 Mar 12, 8:58Various sometimes entertaining or humorous tshirt designs available from purchase all from Chow Hon Lam. I enjoy the ginger bread men shirt
shirt humor tshirt design purchase gift 2010 Mar 5, 10:21Document explaining the relationship between the various web storage APIs coming out of HTML 5. To summarize:
Web Storage (aka DOM Storage) - simple key/value pairs API.
WebSimple DB API - now called Indexed Database API.
Indexed Database API and Web SQL Database - competing database APIs.
Application Cache - Storage of HTTP resources for offline apps.
DataCache API - A programmatically modifiable Application Cache.
html html5 standard programming technical wiki w3c database storage web 2010 Feb 26, 10:12Interesting stuff about Google determining synonyms based on folks changing their search queries.
google search synonym machine-learning english language technical 2010 Feb 25, 4:10Comcast is running an opt-in DNSSEC trial for all Comcast customers. Their FAQ covers the incompat. of DNSSEC with their Comcast Domain Helper (typo DNS redirects to Comcast ads... bleh!): "What
happens to Comcast Domain Helper, which offers DNS redirect services, when you fully implement DNSSEC? We believe that the web error redirection function of Comcast Domain Helper is technically
incompatible with DNSSEC. Comcast has always known this and plans to turn off such redirection when DNSSEC is fully implemented." Yay!
dns dnssec comcast faq internet ip security technical 2010 Feb 22, 1:26"Internet Explorer Six, resident of the interwebs for over 8 years, died the morning of March 1, 2010 in Mountain View, California, as a result of a workplace injury sustained at the headquarters of
Google, Inc."
humor internet ie ie6 web browser funeral microsoft 2010 Feb 22, 5:52Analysis of Facebook friend connections by US cities to determine partitioning of the US.
blog visualization facebook social map geo network graph 2010 Feb 22, 4:25Wired's concept for a digital version of their magazine to run on tablets. Looks pretty but of course its running on Flash or somesuch Adobe product.
video wired web adobe magazine 2010 Feb 19, 2:43A Googler's thoughts on tuning TCP params for better perf.
google performance network tcp technical 2010 Feb 18, 4:59"At TED2010, Bill Gates unveils his vision for the world's energy future, describing the need for "miracles" to avoid planetary catastrophe and explaining why he's backing a dramatically different
type of nuclear reactor."
ted bill-gates video environment energy 2010 Jan 29, 3:54
Raymond Chen has some thought experiments useful for discovering various kinds of stupidity in software design:
Tim Berners-Lee's principles of Web design includes my favorite: Test of Independent Invention. This has a thought experiment containing the construction of the MMM (Multi-Media Mesh) with
MRIs (Media Resource Identifiers) and MMTP (Muli-Media Transport Protocol).
The Internet design principles (RFC 1958) includes the Robustness Principle: be strict when sending and tolerant when receiving. A good one, but applied too liberally can lead to interop issues. For instance, consider web browsers.
Imagine one browser becomes so popular that web devs create web pages and just test out their pages in this popular browser. They don't ensure their pages conform to standards and accidentally end
up depending on the manner in which this popular browser tolerantly accepts non-standard input. This non-standard behavior ends up as de facto standard and future updates to the standard
essentially has had decisions made for it.
technical design principles software development 2010 Jan 22, 1:44"He seeded the customer's parking lot with USB flash drives, each of which had a Trojan horse installed on it. When the employees arrived for work in the morning, they were quite excited to find the
free gadgets laying around the parking lot. Employees eagerly collected the USB drives and plugged them into the first computers they came across: their own workstations."
via:ericlaw security usb windows social-engineering computer technical 2010 Jan 20, 5:19Stop motion animation in paper of Mario Bros. 3.
mario video videogame nintendo youtube animation paper stopmotion 2010 Jan 20, 3:26"I just found out they made a Ninja Turtles TV movie where the Turtles from the relatively dark 2003 cartoon meet the Turtles from the goofy 1987 cartoon"
cartoon humor teenage-mutant-ninja-turtles movie tv 2010 Jan 14, 2:51Its Tetris on the Nintendo (sort of) from the perspective of the piece (sort of).
humor tetris game videogame nintendo flash 2010 Jan 13, 6:35Ars Technica rounds up links on the recent Google threatening to stop censoring itself in China including quotes from Secretary of State Clinton, and the EFF and info on the hacks.
google china arstechnica news politics security censorship