22 May 2015
[wikipedia] Death means a lot of bureaucracy on Wikipedia … ‘When someone dies, on their Wikipedia article a diligent editor is supposed to update the following things…’
22 May 2015
[wikipedia] Death means a lot of bureaucracy on Wikipedia … ‘When someone dies, on their Wikipedia article a diligent editor is supposed to update the following things…’
8 May 2015
[tech] Conversation With a Tech Support Scammer … fascinating transcripts of how a tech support scam happens … ‘“Take a look down here. See where it says processes?” he prompted. “That’s the problem. That’s why you’re getting the message popping-up. You see right here at the bottom?”
“46 processes? So that’s 6 more than normal?” I asked.
“Yes, right. What this means is, your computer is doing 46 different things at the moment,” he explained.’
2 May 2015
[web] Inventing Favicon.ico… the story of how the Favicon was created at Microsoft … ‘I still remember telling my friend Michael Radwin at Yahoo about favicon.ico. He was looking at Yapache logs for fun as he does, and he had noticed an unusual spike in HTTP requests for http://www.yahoo.com/favicon.ico. He said, what the hell is favicon.ico? And I explained it to him. He was so excited that he slammed a favicon.ico onto the server, which might have been one of the first official favicons in existence.’
22 April 2015
[google] What does Google need on mobile? … a look at Google’s mobile strategy from Benedict Evans… ‘Google has gone from a world of almost perfect clarity – a text search box, a web-link index, a middle-class family’s home – to one of perfect complexity – every possible kind of user, device, access and data type. It’s gone from a firehose to a rain storm. But on the other hand, no-one knows water like Google. No-one else has the same lead in building understanding of how to deal with this. Hence, I think, one should think of every app, service, drive and platform from Google not so much as channels that might conflict but as varying end-points to a unified underlying strategy, which one might characterize as ‘know a lot about how to know a lot’.’
2 April 2015
[mac] Plugging a 1986 Mac Plus into the modern Web … It’s surprisingly difficult to plug a vintage computer into the modern web … ‘So, with the Raspberry Pi, MacTCP, and MacWeb all in place, it was time to surf the Web! Right? Right?! No. No surfing yet. The MacWeb developers apparently took a look at the HTTP 1.0 spec, decided, “Who would ever need name-based virtual hosting?” and left out the feature that 99 percent of the sites on the modern Web relied on. No support for virtual hostnames meant you got whatever you saw when you used the server’s IP address alone in the HTTP request, and for most sites, that was jack squat. Oh, and HTTPS, cookies, and CSS hadn’t been invented yet. AAARGH!!!’
14 March 2015
[email] Emkei’s Instant Mailer … When you absolutely have to send fake email from a tooth fairy I recommend Emkei’s Instant Mailer. Accept no substitutes.
8 March 2015
[tech] This guy’s light bulb performed a DoS attack on his entire smart house … the downside to smart-houses: more technology in your life means more tech support problems … ‘He realized that his light fixture had burned out, and was trying to tell the hub that it needed attention. To do so, it was sending continuous requests that had overloaded the network and caused it to freeze. “It was a classic denial of service attack,” says Rojas. The light was performing a DoS attack on the smart home to say, ‘Change me.’” Rojas changed the bulb, which fixed the problem.’
1 March 2015
[tech] How To: Some Basic (And Not-So-Basic) Photo Management … a useful guide to dealing with a large messy collection of digital photos … ‘I recently consolidated and organized my photo library. At the start of the project, I had 13,000 photos dispersed between a number of locations: DVDs, an external drive, an android phone (and Google plus/android instant backup), a Macbook Air, a Windows desktop’s hard drive, another internal hard drive, and Dropbox. It was what anyone would call a “cluster.” Also, it was more than a little daunting since photos were duplicated across several locations with various names, states of Exif data (present, corrupted, or not present). This is the evolving story of how I got it together…’
21 February 2015
[tech] How “omnipotent” hackers tied to NSA hid for 14 years-and were found at last … a fascinating look at the NSA’s collection of malware … ‘Beyond the technical similarities to the Stuxnet and Flame developers, Equation Group boasted the type of extraordinary engineering skill people have come to expect from a spy organization sponsored by the world’s wealthiest nation. One of the Equation Group’s malware platforms, for instance, rewrote the hard-drive firmware of infected computers-a never-before-seen engineering marvel that worked on 12 drive categories from manufacturers including Western Digital, Maxtor, Samsung, IBM, Micron, Toshiba, and Seagate. The malicious firmware created a secret storage vault that survived military-grade disk wiping and reformatting, making sensitive data stolen from victims available even after reformatting the drive and reinstalling the operating system. The firmware also provided programming interfaces that other code in Equation Group’s sprawling malware library could access. Once a hard drive was compromised, the infection was impossible to detect or remove.’
12 February 2015
[tech] $10,000 Ethernet cable promises BONKERS MP3 audio experience … does anybody actually believe this audiophile nonsense? … ‘Pay close attention to how you plug in the “ultra-performance RJ45 connector made from silver”, because these are directional Ethernet cables (apparently in ignorance that in the digital sphere, frames travel both way on the cables).’
28 January 2015
[games] The Untold Story Of The Invention Of The Game Cartridge … the little-known history of an huge innovation in video gaming technology …
Inserting and removing socketed electronic assemblies had, until then, been an activity reserved for trained technicians, engineers, and military personnel. Taking a sensitive circuit board and putting it into the hands of a consumer-who might be prone to stepping on it, dunking it in the toilet, or leaving it baking in the sun-posed a considerable design challenge. Obviously, the board needed a protective shell of some kind. 3 January 2015
[fails] 11 Spectacular 3D Printer Failures … ‘Just because you have a 3D printer doesn’t mean you’re going to make anything remarkable. It doesn’t even mean you’re going to wind up with what you set out to produce. Believe it or not, 3D printing requires some skill. And when you don’t have it, things go delightfully askew.’
2 December 2014
[religion] God’s Lonely Programmer … fascinating story of a man who has crafted his own computer operating system inspired by God … ‘ The words pour out on TempleOS.org, a torrent of verified random numbers, news links, YouTube videos, and scriptural exegesis. It’s the dense work of a single, restless mind writing ceaselessly without an audience. After two months of emails and phone conversations, I know more than when I began; specifically, I’ve accumulated more raw data, more facts about his life and experience. But I suspect I’ve only sketched a shadow. The full reality remains unreachable, an irreducible mystery.’
27 November 2014
[war] A new report shows nuclear weapons almost detonated in North Carolina in 1961 … Eric Schlosser discusses various nuclear weapon accidents …
The Goldsboro bomb that almost detonated was known as Weapon No. 1. As the plane was spinning and breaking apart, the centrifugal forces pulled a lanyard in the cockpit–and that lanyard was what a crew member would manually pull during wartime to release the bomb. This hydrogen bomb was a machine, a dumb object. It had no idea whether the lanyard was being pulled by a person or by a centrifugal force. Once the lanyard was pulled, the weapon just behaved like it was designed to. 1 November 2014
[tech] 100 Technical Things Non-Technical People Can Learn To Make Their Lives Easier … ‘PDFs are Portable Documents. They are made by Adobe and work pretty much everywhere. This is a good format for Resumes. You can often Save As your document and create a PDF. Also, note that PDFs are almost always considered read-only. Word has doc files and newer docx files. When working with a group, select a format that is common to everyone’s version of Word. Some folks may have old versions!’
19 October 2014
[tech] The Internet Is Losing Interest in Computers … Alexis Madrigal analyses some stats from Google Trends and wonders if the internet is losing interest in technology… ‘So what’s really going on here? I have a couple thoughts: One, heavy users of technology used to have to search for ways to find software, to make software work, and the like. Now, especially on mobile platforms, the software is simpler and pretty much does what it’s supposed to. All the searches to discover software are happening in the App Store, and less troubleshooting in now required. One small bit of evidence for this theory is that searches for “Games” have declined. It’s not that people are playing less games, they’re just not looking to Google to find them.’
18 October 2014
[ios] Schrödinger’s Shift Key … a look at why the shift key in iOS 7.1 and 8 is an appalling piece of design … ‘Since 7.1, this confusing shift key has been the subject of instructional articles, mockery, and even an entire web site: IsMyShiftKeyOnOrNot.com. A whole OS release later, many of us boneheads still find ourselves wrestling an inscrutable toggle, trying to somehow, somehow type a lower-case letter.’
12 October 2014
[www] The Secret History of Hypertext … interesting look at some pre-computer visions of the World Wide Web … ‘Paul Otlet, a Belgian bibliographer and entrepreneur who, in 1934, laid out a plan for a global network of “electric telescopes” that would allow anyone in the world to access to a vast library of books, articles, photographs, audio recordings, and films. Like Bush, Otlet explored the possibilities of storing data on microfilm and making it searchable, with a web of documents connected via a sophisticated linking system. Otlet also wrote about wireless networks, speech recognition, and social network-like features that would allow individuals to “participate, applaud, give ovations, sing in the chorus.” He even described a mechanism for transmitting taste and smell.’
2 October 2014
[tech] Londoners Give Up Eldest Children In Public Wi-Fi Security Horror Show … seems like a reasonable deal to me! … ‘The experiment, which was backed by European law enforcement agency Europol, involved a group of security researchers setting up a Wi-Fi hotspot in June. When people connected to the hotspot, the terms and conditions they were asked to sign up to included a “Herod clause” promising free Wi-Fi but only if “the recipient agreed to assign their first born child to us for the duration of eternity”. Six people signed up.’
21 September 2014
[tech] These Two Guys Tried to Rebuild a Cray Supercomputer … recreating a 1976 supercomputer as a small computer using modern hardware … ‘The thing that turned out to be tricky, actually, was the software. No one had preserved a copy of the Cray operating system. Not the Computer History Museum. Not the U.S. government. It was just gone. Fenton searched high and low, eventually finding an old disc pack that contained a later version of the Cray OS…’
8 September 2014
[tech] Who wrote the text for the Ctrl+Alt+Del dialog in Windows 3.1? … another interesting titbit of Windows history from Raymond Chen.
4 September 2014
[loremipsum] Lorem Ipsum: Of Good & Evil, Google & China … the strange story of finding hidden messages in Google Translate with Lorem Ipsum filler text as input … ‘It all started a few months back when I received a note from Lance James, head of cyber intelligence at Deloitte. James pinged me to share something discovered by FireEye researcher Michael Shoukry and another researcher who wished to be identified only as “Kraeh3n.” They noticed a bizarre pattern in Google Translate: When one typed “lorem ipsum” into Google Translate, the default results (with the system auto-detecting Latin as the language) returned a single word: “China.” Capitalizing the first letter of each word changed the output to “NATO”…’
22 August 2014
17 August 2014
[tech] Browsing speeds may slow as net hardware bug bites… BBC News on the 512K routing bug … ‘This may come as a surprise to non-specialists who view the internet as a high-tech affair comparable to the bridge of the USS Enterprise of Star Trek fame, in actuality, the internet is more akin to an 18th century Royal Navy frigate, with a lot of running about, climbing, shouting, and tugging on ropes required to maintain the desired course and speed.’
2 August 2014
[tech] Why does Outlook map Ctrl+F to Forward instead of Find, like all right-thinking programs? … ‘And then a bug report came in from a beta tester who wanted Ctrl+F to forward rather than find, because he had become accustomed to that keyboard shortcut from the email program he used before Exchange. That beta tester was…’
22 June 2014
[war] America’s Nuclear Arsenal Still Runs Off Floppy Disks … ‘The control room was not what Stahl-or I-expected: There’s no “big button,” but there are floppy disks. Like the old, big 8-inch floppy disks. Like the kind, […] that are often featured in a computer history museum or found in your attic, beneath old DOS manuals. Like, not even the newer, 3.5-inch model of floppy disk. That’s how they control our nuclear missiles. At 23 years old, the deputy missileer said she had never even seen a floppy disk before finding one that can help wreak untold carnage on planet Earth.’
8 May 2014
[tech] Wat HiFi? … amusing collection of reviews for high-end HiFI equipment … ‘This [$600] USB cable is simply revelatory in its combination of ease and refinement on one hand, and resolution and transparency on the other. Although capable of resolving the finest detail, Diamond USB has a relaxed quality that fosters deep musical involvement.’
7 May 2014
[tech] How Steve Wozniak Wrote BASIC for the Original Apple From Scratch … ‘The problem was that I had no knowledge of BASIC, just a bare memory that it had line numbers from that 3-day high-school experience. So I picked up a BASIC manual late one night at HP and started reading it and making notes about the commands of this language. Mind that I had never taken a course in compiler (or interpreter) writing in my life. But my friend Allen Baum had sent me xerox copies of pages of his texts at MIT about the subject so I could claim that I had an MIT education in it, ha ha. In my second year of college I had sat in a math analysis class trying to teach myself how to start writing a FORTRAN compiler, knowing nothing about the science of compiler writing.’
2 May 2014
[security] 4 Simple Changes to Stop Online Tracking … some great tips from the Electronic Frontier Foundation … ‘Get Adblock Plus. After it is installed, be sure to change your filter preferences to add EasyPrivacy.’
26 April 2014
[tech] Previously Unknown Andy Warhol Works Discovered on Floppy Disks from 1985 … another story of digital archeology … ‘It was not known in advance whether any of Warhol’s imagery existed on the floppy disks-nearly all of which were system and application diskettes onto which, the team later discovered, Warhol had saved his own data. Reviewing the disks’ directory listings, the team’s initial excitement on seeing promising filenames like “campbells.pic” and “marilyn1.pic” quickly turned to dismay, when it emerged that the files were stored in a completely unknown file format, unrecognized by any utility. Soon afterwards, however, the Club’s forensics experts had reverse-engineered the unfamiliar format, unveiling 28 never-before-seen digital images that were judged to be in Warhol’s style by the AWM’s experts. At least eleven of these images featured Warhol’s signature.’
25 April 2014
[tech] The Hackers Who Recovered NASA’s Lost Lunar Photos … a wonderful story of digital archeology …
The photos were stored with remarkably high fidelity on the tapes, but at the time had to be copied from projection screens onto paper, sometimes at sizes so large that warehouses and even old churches were rented out to hang them up. The results were pretty grainy, but clear enough to identify landing sites and potential hazards. After the low-fi printing, the tapes were shoved into boxes and forgotten. 22 March 2014
[tech] Spring Cleaning Who Has Access to Your Social Media Data … useful tips for managing Facebook, Twitter and LinkedIn … ‘Just like the spring cleaning rule that says, “If you haven’t worn it in six months, throw it out,” you should use the same edict with your online data: “If you haven’t logged in to an app or site in six months, revoke its access.”’
14 March 2014
[tech] Good advice from a Fortune Cookie … ‘You will never get back the years of your life you spent pointlessly rolling your own CMS.’
21 February 2014
[power] U.K. National Grid status … Statistics about the UK’s electicity supply in near real time … ‘Gridwatch was born, first of all to scrape the data off the BMreports site every 5 minutes and inject it into an SQL database where it would be easy to perform specific searches and do statistical analysis. Then, in a rather retro and humorous way, to display the data in terms of analogue instruments and moving graphs. This is pure personal amusement, I like dials and graphs.’ [via As Above]
19 January 2014
[web] Have I Been Pwned? … a service that allows you to check if any of your usernames or passwords been compromised in recent website security breaches.
13 January 2014
[tech] Source Code in TV and Films … an amusing look at where the Source Code displayed in TV and movies is really from … ‘In the film Terminator, the HUD shows a listing of 6502 assembly language which appears to have been taken from an Apple II.’
20 December 2013
[tech] 11 parental IT support issues you can expect if you go home this Christmas … ‘No, change the screen resolution back, please. I prefer all my windows to be blurry and weirdly elongated.’
9 December 2013
[mobiles] The Second Operating System Hiding in Every Mobile Phone … all your worst fears about computer/phone security are true … ‘So, we have a complete operating system, running on an ARM processor, without any exploit mitigation (or only very little of it), which automatically trusts every instruction, piece of code, or data it receives from the base station you’re connected to. What could possibly go wrong? ‘
14 November 2013
[work] Hyperemployment, or the Exhausting Work of the Technology User … Whatever happened to Keynes idea of a Leisure Society? ‘The economic impact of hyperemployment is obviously different from that of underemployment, but some of the same emotional toll imbues both: a sense of inundation, of being trounced by demands whose completion yields only their continuance, and a feeling of resignation that any other scenario is likely or even possible. The only difference between the despair of hyperemployment and that of un- or under-employment is that the latter at least acknowledges itself as an substandard condition, while the former celebrates the hyperemployed’s purported freedom to “share” and “connect,” to do business more easily and effectively by doing jobs once left for others competence and compensation, from the convenience of your car or toilet.’
13 November 2013
[retro-computing] Google BBS Terminal … How Google search would behave if it had been created in the 1980’s.
25 June 2013
[security] Anatomy of a Hack: How Crackers Ransack Passwords Like “qeadzcwrsfxv1331” … A fascinating look at how easy it is to crack passwords … ‘Even the least successful cracker of our trio-who used the least amount of hardware, devoted only one hour, used a tiny word list, and conducted an interview throughout the process-was able to decipher 62 percent of the passwords. Our top cracker snagged 90 percent of them.’
6 May 2013
[windows] Solitaire.exe … a real life pack Windows Solitaire playing cards … ‘Solitaire.exe is a physical pixel-for-pixel recreation of the popular computer card game included in the Windows 98 operating system.’
4 April 2013
[tech] The Never-Before-Told Story of the World’s First Computer Art (It’s a Sexy Dame) … the first computer art was apparently created by an anyonymous IBM employee … ‘A young man used a $238 million military computer, the largest such machine ever built, to render an image of a curvy woman on a glowing cathode ray tube screen. The year was 1956, and the creation was a landmark moment in computer graphics and cultural history that has gone unnoticed until now. Using equipment designed to guard against the apocalypse, a pin-up girl had been drawn. She was quite probably the first human likeness to ever appear on a computer screen. She glowed.’
19 March 2013
[tech] It’s OK to Be a Hater Because Everything Is Bad … amusing rant about the awfulness of technology … ‘Tablets are a complete luxury item-PURE luxury-and owning one makes you an asshole, instantly, categorically. It’s a wonderful toy. But a toy. A big boy toy. Nobody needs an iPad. Nobody. Not a single person, unless you’re literally so stupid and/or infirm that you can’t use a keyboard and mouse like the rest of the industrialized (or barbaric) world. iPads are a status symbol, a second computer that’s built expressly for convenience. You’re spending hundreds and hundreds of dollars to make your cushy life even cushier by carrying a beautiful computer you don’t need that you can use while flopped down on the couch or leaning against an airplane window like the bourgeois brat idiot you are. You don’t need this thing, and you know you don’t need it. You need a PC-yes. You need a PC to be part of modern society. But you don’t need an iPad, and the entire notion of the luxury device is noxious and offensive…’
12 March 2013
[drink] What Coca-Cola Contains … ‘The number of individuals who know how to make a can of Coke is zero. The number of individual nations that could produce a can of Coke is zero. This famously American product is not American at all. Invention and creation is something we are all in together. Modern tool chains are so long and complex that they bind us into one people and one planet. They are not only chains of tools, they are also chains of minds: local and foreign, ancient and modern, living and dead – the result of disparate invention and intelligence distributed over time and space.’
6 March 2013
[tech] How Qihoo 360 Won the Browser War in China … a look at how a virus company leveraged it’s position to create China’s most popular web browser … ‘When a user tries to uninstall the 360 browser, they are presented with three choices: Repair, Change to IE9, or uninstall directly. If they choose to change to IE9, after installation another popup occurs and when you click “Next”, it reinstalls the 360 browser and makes it the default.’
5 March 2013
[books] The Book-Writing Machine … What was the first book ever written on a word processor? … ‘It was 1968, and the IBM technician who serviced Len Deighton’s typewriters had just heard from Deighton’s personal assistant, Ms. Ellenor Handley, that she had been retyping chapter drafts for his book in progress dozens of times over. IBM had a machine that could help, the technician mentioned…’
1 March 2013
[tech] The Restart Page … Re-experience the thrill of watching your favourite retro operating systems reboot.
11 December 2012
[google] The best way to use Gmail and Google Calendar on your iPhone … useful guide to using Google services with the iPad and iPhone … ‘The trick here is combining the Gmail app with two syncing protocols called CardDAV and CalDAV (don’t worry, you’ll never actually need to know what these are to get them to work). You’ll need an iOS device running version 5.0 or above to take advantage of these, but each offers better and more powerful integration with Google’s services than just tapping “Gmail” when you first set up your email accounts on your phone. Much like the momentary pain of digging into your Facebook privacy settings, the five or ten minutes spent setting up this system will save you email stress for months to come.’
15 November 2012
[web] The Hacking Of A General’s Mistress … a look at how long it takes to hack a password used by General Petraeus’ girlfriend … ‘Using oclHashtcat, it’ll take 17 hours to crack her password using a GPU accelerator trying 3.5-billion password attempts per second, trying all combinations of upper/lower case and digits. After doing this, you’ll discover the original password is “vsKLVg8L”. This is a fairly strong password, consisting of random upper/lower case letters and numbers, which is why it takes 17 hours to crack.’
|