 |
Tuesday, September 10, 2002 |
My Trackback attempts are continuing. Seems David Watson likes the stuff. He points out Trackback and Radio are a
political issue
There are to be several implementations for sending pings (see this tutorial, too).
But I want the pings to be
send automagically.
There
is
much
talk
about
it
but no code/a>.
So I hacked a Python script which connects to radio via the Meta Weblog XML-RPC API, iterates through the latest posts, gets all the liks in each posts, downloads the pages referenced by this links, extracts traceback-RDF information, compares them with if they match the links we were expecting and if so sends out the trachback pings. I will give this thing a test run for one or two more days to be sure it does not break the internet or something like this and then post it here.
23:14
#
G!
| |
... wenn er Fisch sieht, sagt er "hmmm, lecker". Seufz.
18:22
#
G!
| |
Wegen Neal-Weh habe ich eben in Holland angerufen. Eigentlich hatte ja meiner Zeit f[florin]r mich, weill Essen angesagt war, aber zwischen den Bissen hatte Neal f[florin]r das eine oder andere Wort Zeit: als ehr "Heimweh" h[ring]rte, hat er das nachgesprochen - obwohl er gar nicht nach Heimweh klang - auch die Nicky identifizierte er korrekt als "Mama" und ans Rose erz...hlte er habe Schrims gegessen wurde auch das nachgesprochen. Im hintergrund rief er immer "nochmal", ich vermute damit war F[florin]tterung gemeint. Und zum Abschied sagte er korrekt "Tsch[florin]§". Wortgewantes Kind.
18:02
#
G!
| |
Maybe I should start the freedom to tinker comment weblog. Edward Felten is again poking arround in the Berman-Coble bill inviting me to get back to my favorite rants. Felten now looks Part B of the p2p Definition in the bill, which says somethong like this:
'peer to peer file trading network' means two or more computers which are connected by computer software that--
(A) [is designed to support file sharing]; and
(B) does not permanently route all file or data inquiries or searches through a designated, central computer located in the United States;
Felten argues that no significant centralized system would use a single server but for load balancing reasons a cluster of many machines. He is right, but before talking about this we must find out what constitutes a computer. A single CPU? So a IBM zSeries Machine would be more than a single computer. Processing units in a single Case? No, my Siemens MX-300 comes in two cases. As a working thesis I would define a computer in the context of this bill should be defined as "closely coupeled computing resources under single administrative control". While we might argue if two webservers behind a load balancer are "closely coupeled" stuff like the AIM servers could be subsumed under this term for computer if one really wants to.
Just for the record: This restriction to central servers in the US strange, too. Th US government might create laws which forces citizens of their nation to endure attacks by the RIAA. But they can't to that to foreigeners not on their soil. In fact if the US government encourages private eintities from the US to attack people in other countries, this might be considered an attack carried out by the US government - which might considered as act of war.
Germany should not pick on the US for this: When the german minister for interior affairs realized that he couldn't sue away german Nazi pages on US servers he declared in an interview that this servers should be hacked by german law enforcement to get rid of the Nazi hate pages.
17:07
#
G!
| |
Der eco macht mit dem "CCC" die gleiche Konferenz, wie die LfM einen Tag sp...ter. Am Wochenende davor gibt's was ...hnliches von der Naumann Stiftung. Es geht rund im Rheinland!
"IMGccc" Anscheinend hat der Spass keine Webseite, daher hier die Mail:
Liebe eco Interessenten, liebe Mitglieder,
nachfolgend m[ring]chten wir Sie auf eime Veranstaltung des CCC (unter Beteiligung von eco) am 16.09.2002 in D[florin]sseldorf aufmerksam machen. [integral]ber Ihre rege Teilnahme w[florin]rden wir uns freuen!
Konferenz zu Informationsfreiheit, Kontrolle von Inhalten und Zensur im Internet -Eine Veranstaltung des Chaos Computer Club e.V., Montag 16.09.2002 D[florin]sseldorf, Forum im Finanzkaufhaus
10:00 - 10:45 Inhaltliche Kontrolle des Internets [florin]ber das Domain Name System, Referent: Andy M[florin]ller-Maguhn, Sprecher Chaos Computer Club e.V., Benutzergew...hlter Direktor f[florin]r Europa, ICANN, http://www.ccc.de/~andy/
10:45 - 11:30 Insert Coin - Manipulation von Internet-Inhalten als Experiment Alvar Freude, Betreiber ODEM.ORG http://www.odem.org/
11:30 - 11:45 Kaffeepause
11:45 - 12:15 (working title), Internetfreedom in France after the "yahoo" court decision, Meryem Marzouki http://asim.lip6.fr/~marzouki/perso/index.gb.html
12:15 - 13:00 Internet-Zensur in Nordrhein-Westf...len, B[ring]ssow gef...hrdet die Informationssph...re (Arbeitstitel), Referenten: Jens Ohlig, Sprecher Chaos Computer Club e.V, Lars Weiler, Chaosdorf D[florin]sseldorf e.V. http://www.ccc.de/censorship/
13:15 - 14:30 Mittagspause, (gesondert angek[florin]ndigt: Pressekonferenz um 13:30 - 13:50)
14:30 - 15:15 Die Internet-Zensur in NRW aus Providersicht, Referenten: Harald A. Summa, eco Forum e.V. , http://www.eco.de/ , sowie vorr. ein Vertreter eines betroffenen ISP
15:15 - 15:30 Kaffeepause
15:30 - 16:15 Verpflichtet die deutsche Gestzeslage Internet-Service Provider, inhaltliche Angebote des Netzes zu sperren? Europ...ische Rechtsanw...ltin Dr. Irini E. Vassilaki, Universit...t G[ring]ttingen
16:15 - 16:30 Kaffeepause
16:30 - 17:00 Gesellschaftlicher Umgang mit extremen Inhalten im, Internet ,
Prof. Dr. Thomas Hoeren,
Harald A. Summa,
Irini Vassilaki,
Andy M[florin]ller-Maguhn
ca. 17:00 Ende der Veranstaltung
Die Veranstaltung findet statt im Forum im Finanzkaufhauses D[florin]sseldorf, Bilker Alle (Hausnummer befindet sich noch in der Ermittlung)
Eine Anfahrtsbeschreibung gibt es unter http://www.forum-duesseldorf.com/forum_duesseldorf_anfahrt.htm
Mit freundlichen Gr[florin]§en
...
16:01
#
G!
Translate
|  |
immunitysec: unmask. Immunitysec.com has released Unmask, a script that claims to help
identify the authors of anonymous texts, using statistical analysis to
record signatures. It's released under the GPL.
Unmask is a python script that allows you to break the anonymity of
e-mail or other text. It works by doing basic statistical matching
against stored "signatures." It may require some tweaking to fit your
particular use to it (un-anonymizing IRC chats, email, web pages on
FreeNet,... [bplog]
14:23
#
G!
| |
A proposed new Victorian law seeks to impose increased jail terms for
acts of sabotage, including "cyber crime". The legislation is not yet
available for review.
The Government is planning to introduce new legislation in State
Parliament this week under the Crimes (Property Damage and Computer
Offences) Bill.
[...]
The laws are likely to receive bipartisan support and will give specific
powers to prevent cyber crime, such as hacking into the police computer
network.... [bplog]
14:22
#
G!
| |
MANILA (Reuters) - The Philippines said on Monday it had cracked a 100 million peso ($1.9 million) computer hacking ring that had gained access to telephone company lines and sold off cheap phone calls.
The hacking ring was cracked after the country's main phone company, Philippine Long Distance Telephone Co, asked for help to stop the scam, police said.
The hackers tapped into computers controlling long-distance phone calls, then sold calls to their clients at prices around half the normal rate.
Immigration officials said two of those arrested were Jordanians and the third was a Filipino. The ring had amassed about 100 million pesos from their hacking operations since last year.
If convicted, those arrested face up to six years in jail and a fine of up to 100,000 pesos ($1,923) each.[Moreover - moreover...]
7:29
#
G!
| |
(ISC)2 is working with federal and state law enforcement authorities on the case. The consortium's own investigation has led to a suspect who recently failed the CISSP exam and then physically threatened the proctors if they didn't grant his credentials. While he declined to identify the suspect, Johnston says the person lives in an English-speaking country that will cooperate in his prosecution and, if warranted, extradition. Johnston, who doubles as (ISC)2's CISO, says they initially couldn't pinpoint where the spam was coming from, but were eventually able to determine that the suspect was using a spam server in China. (ISC)2 says its membership lists and network weren't compromised by the spammer. Most of the messages are being sent to people who have never heard of the accreditation consortium, the group says. [Security News Portal]
7:23
#
G!
| |
I want trackback. I want it transparent and I want it now. Seems I have to do it myself.
First I want to accept incomming trackback 'pings'. Installing standalone trackback on md.hudora.de ig no problem. Now get trackback links under my Radio items.
I dropped a extremly quick and dirty thing named trackBack.txt in my Macros folder and added < %trackBack(< %itemNum% >)% > in #itemTemplate.txt . That's it. Get the trackBack Script and modify the URLs to suit your server:
on trackBack(postid, trackbackUrl = "http://md.hudora.de/cgi-bin/tb.cgi") {
local (adrblog = radio.weblog.init ());
local (adrpost = @adrblog^.posts.[string.padwithzeros (postid, 8)]);
local(permaLink = "http://radio.weblogs.com/0112292/");
try {radio.weblog.getUrlForPost (adrpost, @permaLink, adrdata:adrblog)};
if defined (adrpost^.title) {
local(ptitle = string (adrpost^.title))}
else {
local(ptitle = "")};
return ("<a href=\"" + trackbackUrl + "?__mode=list&tb_id=" + postId +"" onclick="window.open(this.
href, 'trackback', 'width=480,height=480,scrollbars=yes,status=yes'); return false">TrackBack</a>n<!-- <rdf
:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"\nxmlns:dc="http://purl.org/dc/elements/1.1/"
>n<rdf:Description about="" + trackbackUrl + "?tb_id=" + postId + "\"ndc:title="" + ptitle + "\"
dc:identifier="" + permaLink+ "\" /></rdf:RDF> -->")}
Tomorrow: how to use Radio, Python, XML-RPC and some hacking to send trackback pings from your Radio Weblog without user intervention.
0:27
#
G!
| |
Maximillian Dornseif, 2002.
|
|
|