Tag: software

  1. Some thoughts on how to announce one's presence.

    24 March 2013

    A while back I wrote an article about web applications that can live wherever you can store a file and not necessarily on a web server out of your control. I probably should have posted a link to Google Group dedicated to unhosted applications, but that's neither here nor there. To recap briefly, what I discussed in the previous article are called unhosted communications applications, like social networking or instant messaging software. This begs a crucial question: Assuming that you're running an unhosted application in your web browser, how do you tell other people how to connect to you with …

    Read more...

  2. A new way to write web applications.

    14 March 2013

    It's almost taken for granted these days that your data lives Out There Somewhere on the Internet. If you set up a webmail account at a service like Gmail or Hushmail, your e-mail will ultimately be stored on a bunch of servers racked in a data center someplace you will probably never see. Users of social networks implicitly accept that whatever they post - updates, notes, images, videos, comments, what have you - will probably never touch any piece of hardware they own ever again. Everything stays in someone else's server farm whether or not you want it to, and while there …

    Read more...

  3. The DC Cryptoparty was a success!

    17 October 2012

    A couple of weeks ago I announced that a cryptoparty would be held at HacDC in the first half of October. If you haven't been watching hashtags on Twitter, a cryptoparty is a party where people get together to eat pizza and learn how to install and use strong cryptographic software (like GnuPG and Truecrypt) safely. These parties began in Australia as a result of the government there passing a bill which requires mandatory recording and storage of all net.traffic, just in case someone living in Australia is doing anything illegal. Almost immediately cryptoparties began springing up around the …

    Read more...

  4. Catching up on everything else.

    08 September 2012

    I suppose I should talk about work a bit.

    I don't ordinarily do that, because I think there's a conflict of interests between writing in a personal blog and talking about things I get paid to do, but sometimes it can't be helped. The last couple of weeks have been spent preparing for a fairly major server migration (e-mail service for a couple of offices and a couple of dozen employees), which for once didn't involve significant hardware wrangling (though that's going on in other areas) but does take a fair amount of time (most of it spent writing documentation …

    Read more...

  5. Well, that worked.

    21 January 2012

    A couple of days ago, a few "Hey, are you still alive?" messages hit my inbox, and just now have I had the opportunity to post an update.

    I've been busy as hell since 2012 started and it shows no signs of letting up. When you work in IT and you take a vacation for 10 days, whether or not something blew up at work isn't the question. The relevant question is actually, "How many things blew up at work?" and the answer is usually a number that can be comfortably counted on one hand... in hexadecimal. Lots of long …

    Read more...

  6. Potential side effects of SOPA.

    23 December 2011

    Note: Updated January 4 2012 in response to a comment by Jamie Zawinski, proprietor of the DNA Lounge.

    I haven't been writing about SOPA (the Stop Online Piracy Act) or PIPA (the PROTECT IP Act) because, frankly, I've been too busy trying to fight them. To keep abreast of them following the #SOPA hashtag on Twitter is really the best way to go about it because things are changing so rapidly. Between the people watching the live stream of the markup hearings and people who are actually attending the hearings and livetweeting (I'm looking at you, @EFFlive) things are changing …

    Read more...

  7. HTTP Log Messenger v1.0

    23 July 2011

    One of the problems hacktivists ran into when trying to disseminate useful information to people in Syria and Egypt was how to get through to people when DNS and web access are being filtered or outright blocked. Putting up web pages containing phone numbers of ISPs volunteering dialup access was something of a crapshoot because there was no guarantee that people would be able to view them. Someone (I don't remember whom) hit on the idea of contacting sysadmins in the Middle East by leaving messages in the access and error logs of their web servers. This works but pumping …

    Read more...

  8. Not even time to breathe.

    02 July 2011

    Most of my posts lately have been terse, to say the least. When I've had time to sit and write it's been in fits and spurts over a period of hours or days when I've felt up to it. My queue of things to write about has broken two pages, which means that it's time to delete the older stuff and move on. In Internet time, that's a long while, plus there is more important stuff to worry about. It's not ADHD, it's simple practicality. The "when I've felt up to it" means just what you think it does, I …

    Read more...

  9. "Open?"

    16 April 2011

    The other day I'd gotten sufficiently comfortable with my cellphone (an HTC Hero) to take the next step and root it (which is to say, I used the z4root exploit to get admin privileges). I mentioned it in passing to Lyssa last night and she made an observation that caught me off guard: "If you had to jailbreak your phone," she said, "how can you call Android 'open'?"

    How indeed.

    Let's set up an example. The Android OS is based on the open source Linux kernel as well as a suite of applications and systemware different from those of your …

    Read more...

  10. A day late and a dollar short, but we're the ones who'll pay.

    19 February 2011

    For nearly twenty years in the United States a law called CALEA (Communications Assistance for Law Enforcement Act of 1994) has been on the books. To summarize, CALEA set the federal requirement that telecommunications companies (phone companies, long distance companies, cellular carriers, and so forth) had to modify their infrastructures such that various forms of wiretapping of customers had to be possible upon presentation of a warrant. Contrary to popular belief, there are methods of surveillance other than recording a conversation. The simplest involves making a list of every phone number that a particular number calls, when the calls were …

    Read more...

4 / 6