DVI-VGA Adapter

Troma Night tonight could really do with a DVI-VGA adapter, like the one pictured to the right. I have two of them, somewhere. If you were part of the tidy-up squad and you remember seeing it, or if you have one that you can lend to me for the evening, it would be much appreciated.

Google Wants Your DIY Porn Videos

Got home videos? Send them to Google! That’s the message that Google co-founder Larry Page is trying to put out.

In anticipation of launching a “video search” system, Google wants a stack of material on which they can test their “video spider” – a program which will hunt for keywords (spoken, or on-screen) in video material, so that it’s searchable in much the same way as web pages already are.

Fucking weird.

Ceefax On Scatmania

Do you remember Ceefax, that wonderful service from the BBC that seemed so cool until you discovered the internet? Well I do. And so does a Dutch consultant who set up a system, on the web, for searching Ceefax pages.

Well; in any case; I thought that his site was fun (in a nostalgic kind-of way) but hard-to-navigate, so I’ve developed a sensible front-end that’s far more reminiscent of the way Ceefax works: Ceefax Browser On Scatmania. Give it a go.

Norfolk

Claire and I’s grand tour of the United Kingdom brought us yesterday to Terrington St. Clement, near Kings’ Lynn, in Norfolk, where Claire’s dad lives.

As I anticipated, this has resulted in me here, too, helping to repair computers. Claire’s dad’s PC was a mess – Ad-Aware reported 183 malware/adware programs, Norton Anti-Virus reported 10 threats (2 of which were actually installed viruses). I don’t know what the solution is to the problems caused by hundreds of thousands of new people – who do not know about the risks – appearing on the internet, but I hope that somebody works it out soon: even the BBC have started to take notice of the increasing problem of “zombie” networks, particularly in the UK, which lead to denial of service attacks, spam floods, breaches of privacy, and annoying pop-up ads.

And there’s no excuse, really – Windows users can get AVG (anti-virus), ZoneAlarm (firewall), Ad-Aware (anti-malware/adware), Firefox (web browser) and Thunderbird (e-mail client) and be safer by hundreds of orders of magnitude than they are with Internet Explorer and a wide-open pipe. And all of this software is free. With the increase of the awareness of this problem by mainstream news sources, you’d think it would spur people into protecting themselves (just like the coverage of the “War On Terror” by mainstream media made people paranoid about radiological/chemical/biological terrorist attacks). Ah well.

In any case: we’ve been traipsing around North Norfolk, meeting people and eating excessively. I’ve just about recovered from a minor leg sprain I sustained while ice skating in Preston earlier this week, and all is well.

Glad to hear that Sian‘s Troma Night went well (can’t remember where I heard that from). Missing all you Aberites. Hope to see you all soon.

Preston

Things achieved so far:

  • Got to Preston in three hours, which is pretty good going. We got stuck behind some idiots who seemed to think that “national speed limit” meant 30mph for awhile, but by the time we got to the big roads it was plain sailing. Without sails. Or a boat.
  • Fixed my dad’s wireless network. He has a wireless network comprising his desktop PC, each of my sisters’ desktop PCs, and an ADSL router. Having recently gotten a new laptop he wanted to connect this to the network, too, so he got an old USB wireless adapter he had and plugged it in. Hmm.. can’t seem to join the network: can see it, but can’t join it. So he goes and buys a new adapter – this time, one which was of the same brand as the ones of which his network was already composed. Nope, still nothing. Eventually, has patience at an end, he borrowed my sister’s adapter… and it worked fine.If you’re a network geek, see if you can think what the problem might be before you read on.

    The problem was that his network had been set up to use MAC address locking – preventing access to the router by anything but a list of particular hardware devices (or, for non-geeks: every piece of networking equipment has a supposedly globally unique number assigned to it when it is manufactured: my dad’s router had been configured only to allow particular numbers to connect to it ). So, it was a simple challenge to allow these new devices access to his network. The net result seemed to be that there was one useless wireless adapter.

    But here’s where things got really silly: it later turned out that his new laptop had a built-in wireless adapter, and he’d never known. All he had to do was actually install the drivers for it (to be fair, you’d think on a pre-built laptop they might have done that for him) and voila: he was on the network… two useless wireless adapters.

  • Installed Firefox as the default browser on all of the IE-default machines we’ve come across.
  • Met the puppies (4), the chickens (3½), the rabbit (1, with 3 others loose somewhere in the scrubland behind the house – kids on the neighbourhood sometimes catch one – at great risk and loss of blood [theirs’, not the rabbit’s] – and ransom it back), and the hermit crabs (2) for the first time. Re-met the dog (1), and the cats (4… 5…? 6??? who knows). My mum’s house is becoming quite the menagerie. I’ll try to get some pictures online before we leave here on Monday.
  • Taught my parents to play Fluxx. My dad turns out to be surprisingly… lucky… at it.
  • Drank mead from the holy isle of Lindisfarne, where my dad has recently been.

By the way – Paul: I’ve left a key to TheFlat with Bryn, so there’s no need to camp out at the cafe all day in anticipation of Troma Night tonight: have a good one, guys!

Right – off to watch Spongebob Squarepants.

Physical Device Fingerprinting Over TCP

A PhD student in San Deigo has written a fascinating paper which will spook internet anonymity freaks – Remote Physical Device Fingerprinting – which describes how a physical computer can be uniquely identified on the internet, regardless of operating system, IP address, or data sent, just by looking carefully at it’s TCP packets (which contain the data for a large amount – perhaps a majority – of the internet’s traffic, including all web and e-mail traffic).

The technique works by observing the deviation in the timestamps sent (in accordance with the widely-adopted RFC 1323: TCP Extensions for High Performance, specified back in 1992). Each computer’s hardware clock is made from a separate piece of quartz, and each quartz crystal is unique in it’s imperfections. By measuring these imperfections across the internet, it’s possible (with enough sample data) to identify a computer individually, which has implications both good (computer forensics) and bad (anonymity).

The paper itself [PDF] is well worth reading. And, for those that are paranoid about their anonymity online, here’s how to “turn off” this feature of TCP for Windows 2000, Windows XP, and Linux:

  • Windows 2000/XP – Run RegEdit; navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters; add (or edit, if already present) the DWORD “Tcp1323Opts” to 1. This disables TCP timestamps, but leaves Window Scaling (a really useful TCP/IP enhancement) enabled.
  • Linuxecho 0 > /proc/sys/net/ipv4/tcp_timestamps

Of course, the absence of timestamps from your machine may, if you’re in a small enough sample group, single you out even more, but at least you’re not globally unique any more; which from an anonymity perspective is a really good thing.

Things Bots Shouldn’t Learn

This afternoon, I’ve taught Iggy, the robot who looks after the RockMonkey ChatRoom:

  • How to play The Game. Damn – I’m out. He’s not very good at it, and, by proxy, neither am I.
  • Comprehension of facts expressed as “concept ARE fact”, rather than “concept IS fact”, and about knowing “who” people are (ask “Iggy, who is Ava_Work”, for example, or teach him who other people are…).

The by-product of this is that I’ve been learning to program in Tcl. And as a result, discovering why nobody writes in Tcl. Here’s a quote from bash.org, which I found in the bMotion source code:

<Procyan> is there like 1 person on earth that knows tcl/tk and is writing all of the apps?
<unSlider> procyan: no, there are a bunch of people who dont know tcl/tk but are writing apps for it anyway

Opera 8’s Solution To IDN Exploit

I’m sure you’ve all seen the recent Internationalized Domain Name exploit, which affects most web browsers (except for Internet Explorer – shocker! – because it doesn’t yet have the power to support internationalized domain names): if you haven’t, why not visit paypal.com – looks just like the real thing; doesn’t it: the browser bar says you’re at PayPal’s real site, but you’re not. That first ‘a’ in the name is an international character (actually the letter ‘a’ from the Cyrillic character set, which is just slightly different from a Western ‘a’, if you look closely. Of course, this leads to potentially thousands of dangerous phishing exploits, tricking users into exposing their bank account details to random Nigerians.

Opera, makers of a stunning web browser that I’m not quite sure I should be abandoning yet, have announced their solution to this problem (which isn’t actually a web browser problem at all, but a specification problem): IDN domain names from outside of places which are expected to need then (e.g. dot-jp, etc.) will be displayed longhand, and secure sites (https) will display their certificate holder’s name – longhand – alongside the domain name in the address bar.

Of course, unless you’re using Opera 8 beta, the only way to be sure you’re safe from this exploit is to manually type in every link you follow.

This Has GOT To Be Anti-Trust/FUD

This screenshot taken from Microsoft Anti-Spyware:

[screenshot removed – later turned out to be a fake]

MEng Dissertation – Hamster Music

No, I’m not talking about that god-awful de-da-de-da-de-do-do-do de-da-de-do do thingy: I’m talking about this ingenious MEng dissertation project, in which the student hooked up six hamsters to a MIDI device and, with some clever hardware and software, used their movements to compose music. If you look at the site, be sure to download the video clip or at least a sample of the music produced!

Now That’s Customer Service

Do you remember in the middle of last week I finally discovered that I could make Firefox have all the features I loved in Opera, using plugins? Well; I’m honoured to report that my comments haven’t gone un-noticed: I’ve recieved a comment on that post from Jonny Axelsson, dude who does standards-related stuff for Opera. To save you going back there, he writes:

In the meantime we’re getting out Opera 8, so it would be even harder to compete…

Not much to say on the matter, but hey. I tried Opera 8 beta, and it’s fab, but it’ll need to improve on the web developer and adblocking things if I’m to re-adopt it as my browser of choice. That said, I’m still using Opera at home, because I haven’t been bothered yet to download all those Firefox extensions that make it “as good as ” Opera for the things I need in a browser.

Right – Shrink is here – time to break the internet again.

Igneous bMotion

I’ve set up a chatbot called Igneous on the RockMonkey ChatRoom. I installed bMotion 0.09: emotions for bots, and some conversation topics (based on the RockMonkey site itself)… and it’s coming up with some classic lines. I lifted this exchange between Sian and Igneous from the log:

<chocorifi> Are you accusing me of sexual harassment Iggy?
<Igneous> only because my toaster ran off
<chocorifi> wtf?
<Igneous> what?
<chocorifi> why did your toaster run off Iggy?
<Igneous> entropy
<chocorifi> i don’t even know what that means, waa
<chocorifi> what does entropy mean iggy?
<Igneous> cycling

It’s good to see that it learns, though. Say anything enough times and it will take it as fact. For example:

<DanHuntle> iggy, what is Bryn_S?
<Igneous> a ginger welshman i guess

More quotes on the RockMonkey ChatRoomQuotes page.

Paul – Prepare To Drool

Back in 1979, Atari came up with a design for a next-generation console called the “Cosmos” (you’ll find it on this list of handheld games consoles. This remarkable device, planned for release in the early 80’s, would have used holographic games in order to give an illusion of 3D, all in a hand-held unit.

In any case; only five prototypes were ever built (and only two of those ever had their electronics put in)… but one of “the three” has come up for sale on eBay on Buy It Now. I kid you not. Price is just short of £10,000. Don’t you just want one?

There Goes Your Data Now…

Database copy progress dialog with an animation of an arrow getting mangled by some cogs.

Is it just me, or does this dialog box, which appears when using a particular part of Microsoft SQL Server 2000, present a very bad metaphor? One that says, “this arrow represents your data, and here it is being minced by some cogs”. Or maybe it’s just me that thinks that, and winces a little every time another animated grey arrow goes through the mangle.

Just a thought.

×