Bookmarked via del.icio.us: TinyApps.org.
Really tiny, really useful applications
This is a repost promoting content originally bookmarked via del.icio.us. See more del.icio.us imports or more things Dan's reposted.
This is a repost promoting content originally bookmarked via del.icio.us. See more del.icio.us imports or more things Dan's reposted.
Yesterday, as Claire and I ate our lunch, we had an idea. It was a gorgeous Sunday, warm like Easter break should be, so we thought – why not gather those folks who remain in town for a big game of hide & seek in Aberystwyth Castle. This was great fun last Autumn and the easter before: childish fun, running, hiding, diving over rocks and injuring oneself… fab.
We were surprised at how many people were able to join us: Matt, Katie, Sundeep, Bryn (until he was called away by the prospect of a barbeque with some friends in Llanbadarn), Liz, Andy K (recently discharged from A&E after burning his hand with a frying pan, the idiot), Faye, Andy R, Sian, and a mystery girl called ‘DD’.
We played until the sun went down, which always makes the game extra-fun and challenging, then retired to Kanes’ for beer (or whiskey) and chit-chat. By the end of the evening, the pub was ours alone.
Other people have things to say about the evening, too:
Well, the plans are set now.
On Thursday night (or Friday), Claire and I will be travelling up to Preston to spend the weekend with my folks. Hopefully my gran will be able to make it down, too. We’ll also get a chance to look at the new puppies (pic 1, pic 2, pic 3), who’ll be barely two weeks old by that point.
Then, on Monday, we’ll travel down the country to Norfolk and spend a few days with Claire’s dad, returning to Aber on Thursday (31st March).
Of course, this means that we won’t be around for Geek Night on Friday (which is cancelled) or Troma Night on Saturday (which Paul is taking charge of).
By the way – you’re (probably) looking at the new ‘style’ of my weblog. Comments welcome.
Is this actor real? Seymore Butts (say it out loud) is listed on the IMDb, director of such films as Anal Surprise Party, Female Ejaculation Review, and Tongue In Cheeks, as well as over 60 other films. Also performed in 50 films… most of which don’t have an IMDb score…
…so it’s an anonymous pornstar with a thing for doing it up the arse, big deal. But here’s the interesting thing: he was most recently in a film called Slaughter Party, which also starred… Lloyd Kaufman.
The world is a funny place.
In related news, you can read the full story of Will Keenan‘s appearance on the Troma Night bulletin board, including a video we sent back to him and Lloyd, thanking them, on a special thread we set up. Have fun!
If you come to Troma Night tonight, I’ll explain the above picture (click for a larger version). It’s got something to do with this new account on the web site.
Fucking marvellous.
I have a hard time believing that this story is true: it’s just too crazy – but the photos are good and hard to forge without more resources than your average internet prankster. So, here’s the tale as it was told to me…
There’s a company in the States that sells automatic car washers as a complete solution, including the washing system, cash box, installation of the building, etc. These are completely automated: you drive up, put your money into the machine, then drive through.
In any case; after the installation of a particular one of these machines, the owner noticed that the return from the machine was not so much as should be expected. Diagnostics were run and the cash processor seemed to be okay, so everybody was at a loss. The owner even went so far as to accuse the supplier’s staff of having keys to his cashbox, and returning to the scene to steal the money.
Eventually, at his wits end, the owner set up security cameras to try to catch the thief in the act. Here are some stills from the footage:
The first image. Yes, that’s a starling that’s just landed on the coin return slot.
And there’s the starling, wriggling in to the coin return slot, where, presumably, it’s pushing it’s way up into the cash box through the return chute.
The starling with some coins!
The starling’s dropped a couple of coins, but is still wriggling to get free of the slot with it’s remaining prize.
Apparently, they later determined that it was not one, but several, birds who were robbing the car wash. Following them discovered a cache of loose change on the roof of the car wash and beneath an exposed root of a nearby tree.
So; what do you think – real or fake?
A PhD student in San Deigo has written a fascinating paper which will spook internet anonymity freaks – Remote Physical Device Fingerprinting – which describes how a physical computer can be uniquely identified on the internet, regardless of operating system, IP address, or data sent, just by looking carefully at it’s TCP packets (which contain the data for a large amount – perhaps a majority – of the internet’s traffic, including all web and e-mail traffic).
The technique works by observing the deviation in the timestamps sent (in accordance with the widely-adopted RFC 1323: TCP Extensions for High Performance, specified back in 1992). Each computer’s hardware clock is made from a separate piece of quartz, and each quartz crystal is unique in it’s imperfections. By measuring these imperfections across the internet, it’s possible (with enough sample data) to identify a computer individually, which has implications both good (computer forensics) and bad (anonymity).
The paper itself [PDF] is well worth reading. And, for those that are paranoid about their anonymity online, here’s how to “turn off” this feature of TCP for Windows 2000, Windows XP, and Linux:
echo 0 > /proc/sys/net/ipv4/tcp_timestamps
Of course, the absence of timestamps from your machine may, if you’re in a small enough sample group, single you out even more, but at least you’re not globally unique any more; which from an anonymity perspective is a really good thing.
Total three to six players wanted for pre-Geek Night rules exploration and playtest of The Settlers Of Catan, this evening. Usual rules apply.
This is a repost promoting content originally bookmarked via del.icio.us. See more del.icio.us imports or more things Dan's reposted.
This is a repost promoting content originally bookmarked via del.icio.us. See more del.icio.us imports or more things Dan's reposted.
Bookmarked via del.icio.us: World Jump Day.
If we all jump at the same time, we’ll move the earth: 20th July 2006
This is a repost promoting content originally bookmarked via del.icio.us. See more del.icio.us imports or more things Dan's reposted.
Bookmarked via del.icio.us: Building your own PBX.
This is a repost promoting content originally bookmarked via del.icio.us. See more del.icio.us imports or more things Dan's reposted.
Bookmarked via del.icio.us: How To Destroy The Earth.
This afternoon, I’ve taught Iggy, the robot who looks after the RockMonkey ChatRoom:
The by-product of this is that I’ve been learning to program in Tcl. And as a result, discovering why nobody writes in Tcl. Here’s a quote from bash.org, which I found in the bMotion source code:
<Procyan> is there like 1 person on earth that knows tcl/tk and is writing all of the apps?
<unSlider> procyan: no, there are a bunch of people who dont know tcl/tk but are writing apps for it anyway
I’m sure you’ve all seen the recent Internationalized Domain Name exploit, which affects most web browsers (except for Internet Explorer – shocker! – because it doesn’t yet have the power to support internationalized domain names): if you haven’t, why not visit paypal.com – looks just like the real thing; doesn’t it: the browser bar says you’re at PayPal’s real site, but you’re not. That first ‘a’ in the name is an international character (actually the letter ‘a’ from the Cyrillic character set, which is just slightly different from a Western ‘a’, if you look closely. Of course, this leads to potentially thousands of dangerous phishing exploits, tricking users into exposing their bank account details to random Nigerians.
Opera, makers of a stunning web browser that I’m not quite sure I should be abandoning yet, have announced their solution to this problem (which isn’t actually a web browser problem at all, but a specification problem): IDN domain names from outside of places which are expected to need then (e.g. dot-jp, etc.) will be displayed longhand, and secure sites (https) will display their certificate holder’s name – longhand – alongside the domain name in the address bar.
Of course, unless you’re using Opera 8 beta, the only way to be sure you’re safe from this exploit is to manually type in every link you follow.