----------------------------------------------------------------------
Boing Boing Blog
----------------------------------------------------------------------
|
1. |
Slashdot troll speaks. Tom Coates has been discussing technical tricks for coping with message-board trolls on his Everything in Moderation blog, and, surpisingly, an avowed Slashdot troll has shown up to explain why he undertakes extreme technical measures to disrupt Slashdot's message baords.
..i believe that the people who must be treated with the most public, forthright, and open methods of censure are those who offend us the most. i do not believe that trickery is ever as effective as open methods because trickery is, at its core, dishonest to both the person being tricked and the online community you have secretly enacted policy for.
i believe that secret punishments inevitably lead to abuse and combativeness, that they lead to an arms race against people of equal intelligence and unlimited free time.
Link
(via Oblomovka) |
2. |
Post-circuit-switched voicemail. Nice rant on how "circuit-switched" thinking is holding back advancement in telephony:
Assume a phone call requires an (extremely generous) 3Kb per second of audio. One hour of stored audio is about 10Mb of data. This is a pretty modest amount by the standards of modern flash memeory. Your mobile phone is perfectly capable of storing all your voicemail. The network is perfectly capable of transmitting the data in a sensible amount of time. Unlike email, most voicemail is listened to -- the amount of wasted download is small...
You should be able to listen to voicemails on your plane journey home. You should be able to reply to them on a store-and-forward basis, even when you're not connected to the network. And most of all, you shouldn't have to use a clunky telephony user interface to navigate a message queue. And you shouldn't be restricted to one device for accessing your own data.
Link
(via Werblog) |
3. |
Spidering Hacks. The latest book in the O'Reilly Hacks series, "Spidering Hacks," (written by Kevin "Morbus Iff" Hemenway and Tara "ResearchBuzz" Calishain) is out. It's the site-scraper's bible, with 100 tips and tricks for sucking in data from the Web.
Spidering Hacks takes you to the next level in Internet data retrieval--beyond search engines--by showing you how to create spiders and bots to retrieve information from your favorite sites and data sources. You'll no longer feel constrained by the way host sites think you want to see their data presented--you'll learn how to scrape and repurpose raw data so you can view in a way that's meaningful to you.
Written for developers, researchers, technical assistants, librarians, and power users, Spidering Hacks provides expert tips on spidering and scraping methodologies. You'll begin with a crash course in spidering concepts, tools (Perl, LWP, out-of-the-box utilities), and ethics (how to know when you've gone too far: what's acceptable and unacceptable). Next, you'll collect media files and data from databases. Then you'll learn how to interpret and understand the data, repurpose it for use in other applications, and even build authorized interfaces to integrate the data into your own content.
LInk
(via Ben Hammersley) |
4. |
Bluejacking: anonymous Bluetooth messaging. Bluejacking is the art of sending a message to a nearby stranger's Bluetooth phone, having first encoded the message as the "Name" field of an address-book entry, i.e., "Name: I have bluejacked you, I 0wn l0l0l0l0l." BluejackQ is a new community site for posting bluejacking experiences.
Ellie and I were just outside a shopping centre in town and she was searching for a victim near where we were sitting. She came up with a contact; some Nokia, I'm not sure which one. We found out a few minutes later that our victim (who showed an un-canny resemblance to Alan Ford) was sitting in Starbucks with his wife.
After they'd left Starbucks, we followed the couple all over town for about 30mins. He couldn't understand what was happening to him and was looking around all over the place for his bluejacker! We went up and down, around in circles, dodging his stare; quite literally, up in lifts, down on escalators!
Link
(via Smartmobs) |
5. |
NYC event tonight: The Art of Gwar. Gwar, the blood-spewingest band in the history of punk/metal/comic book chic, is an ensemble of musicians, artists and performers with stage names like Oderus Orungus, Jizmak Da Gusha and Flattus Maximus. Tonight in NYC, Fuse Gallery launches an exhibit of THE "ART" OF GWAR, and a launch party takes place at Lit Lounge with a live performance by members of the band. Show runs through mid-December.
Kiss, Alice Cooper, Marilyn Manson. When it comes to onstage theatricality and over the top rock and roll antics, these are the names that come to mind. However, to a loyal army of fanatical fans, known affectionately as "Slaves", none hold a candle to Gwar, the undisputed kings of the theatrical concert-performance. The Richmond, Virginia based band is infamous for their heavy but humorous music, pornographic alien-barbarian costumes and outrageous stage props which include huge squirting phalluses, rubber fetuses and gallons of stage blood. Link |
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
|
6. |
British Library to Archive Electronic Resources |
7. |
AMD Optimal BIOS settings + Overclocking Guide |
----------------------------------------------------------------------
SecurityFocus
----------------------------------------------------------------------
|
8. |
BugTraq: Re: New Varient Of Irc Worm Spreading. Sender: bob [hackerbob at cox dot net] |
9. |
BugTraq: BRS WebWeaver 1.06 remote DoS vulnerability. Sender: d4rkgr3y [d4rk at securitylab dot ru] |
10. |
BugTraq: Memory-leak vulnerability in EServ/3.00. Sender: d4rkgr3y [d4rk at securitylab dot ru] |
11. |
BugTraq: Re: WU-FTPD 2.6.2 Freezer. Sender: Luca Berra [bluca at comedia dot it] |
12. |
Vulnerabilities: TelCondex SimpleWebserver HTTP Referer Remote Buffer Overflow Vulnerability. TelCondex SimpleWebServer is a Web server designed for use with the Microsoft Windows operating systems.
A vulnerability has been reported to exist in the software that ... |
13. |
Vulnerabilities: Apple Mac OS X Multiple Vulnerabilities. Apple Mac OS X 10.3 (Panther) has been released to address multiple new and previously known vulnerabilities. These issues may cumulatively allow an attacker to cause den... |
1:29:50 PM
|
|