Archive 16.2.2006 - 25.2.2006

Wow.

Nerdcore - A Blog about very cool Stuff. And so.

Imagine all the gray men in their suits in their lofts had no power over the sound in our ears, over the surfaces of our cities, over the things we read. Market analyses would not count, because the market, just like us, is a swarm of flies that cannot be predicted. The street would be full of unemployed lawyers. They would wander around, bleeding for their view of everything, together with their buddies, the business economists, the marketing guys, the bankers, the insurance Heinzes. Because they do not understand what it means when we come together and network, talk to each other. The human being is the smallest economic unit? Fuck you, the human being is all we have. And that is really a lot, if you just dare to think about it once.

Alleged Weather Manipulation?

Lightning strike reports alleged weather manipulation - Hoax? Joke? Or perhaps too much consumption of possibly not entirely legal means? The German Meteorological Society's information sheet also mentions this. So is there something to it after all? The report from Lightning strike sounds serious. Weather manipulation itself is indeed a real topic - and, for example, in the USA, it is indeed used in some areas, albeit on a relatively small scale (e.g., to activate weather fronts prematurely to avoid greater disadvantages for agriculture in certain regions). So should someone actually be experimenting with such things over Germany?

Democracy Player - an RSS aggregator that expects BitTorrent files in enclosures and automatically downloads them. Many features, essentially implements TV-on-Demand.

Google Macintosh Dashboard Widgets - what you see is what you get. Google Dashboard Widgets for Google.

Growl! - everyone knows it by now, visually appealing info windows, can also be used from scripts.

Live Thumbnails: Watch 'em Grow - interesting article about creating large images directly from thumbnails without changing pages. However, due to the invented attributes, it is not valid HTML4.

The Little Calculist: JavaScript language level - JavaScript as a language directly supported in DrScheme. This gives the brilliant tools of DrScheme for editing JavaScript as well.

Water: the structure and properties of liquid water - everything you want/should/know about water (yes, that H2O stuff).

iWeb and its Output

I recently tested two different editors for easy website creation: Sandvox and Rapidweaver. Now I've also created a site with iWeb. Sandvox was out of the question due to its gigantic memory requirements, Rapidweaver already showed some nice and interesting features and was especially fast. But the styles were not as professional as those from Sandvox. How does iWeb perform?

Well, take a look at the site. Right away, I noticed a whole series of problem points:

  • The style in iWeb looks much "slicker" than in the rendered output. Font rendering is not really good on websites with every browser.
  • The idiotic redirection and rather unusual folder names. Sure, I can name my site differently - but why the hell should I rename my site just because iWeb makes a folder name out of it directly?
  • The URLs are anything but beautiful - and I generally find redirection on the start URL stupid, you can really proceed more intelligently and use the default document meaningfully. And take a look at the blog pages, see what URLs they get. Disgusting.
  • With Lynx, you can't use the whole thing at all. The redirects are wrong and the links are no longer displayed.
  • Even if the HTML code is validated, it is still not really semantic. Headings are not set as Hx, but simply made larger by styles.
  • Layouts are not made with tables, but DIVs are misused as tables through inline styles. Sorry, but just changing the tag does not make a layout beautiful.
  • The source code is completely unreadable and shit.
  • The basic pages constantly contain JavaScript for various purposes. And no, iWeb has definitely not informed about this in the editor. How can you expect Mac users to then also think about the problems of JavaScript-based elements later?
  • Why a company that programs its own text-to-speech software, builds its own spell-check solutions and otherwise handles text relatively well, makes the shortening of blog post texts in such a way that it is cut off in the middle of a word, only Apple knows.
  • Accessibility? We don't need no stinking Accessibility.

I hope Apple will improve this significantly. I mean, semantic layout and source code that complies with accessibility guidelines is really nothing new. Why Apple produces such lousy HTML code is a real mystery to me.

Nikon D200 Full Review

Now at DPreview there is the complete review of the Nikon D200. When I look at the technical data and especially the measurements, Nikon has definitely landed a top device. In my opinion, this absolutely competes with the Canon devices. And when I also look at this cute macro from Nikon, it warms my heart - a 2.8 aperture, 150-degree angle of view with image stabilizer - that would definitely be something fine. Then, combined with the Zeiss lenses for Nikon F and the Katz Eye focusing screens (which do not change the displays in the viewfinder on the Nikon - unlike Canon cameras - and also do not cause a strong change in exposure measurement), this could almost mean photographic nirvana for me. Especially since the camera felt very good in my hand when I last held it at the photographer of least suspicion.

Ok, now I just have to figure out which lenses for the Nikon bayonet really have a usable bokeh - because what I have seen so far in the Nikon environment was not very convincing. Ok, the Zeiss lenses should be pretty great (I already have them for my Contax RTS III), but a few AF lenses would be nice. The macro would of course be at the top of the wish list, as I have learned to appreciate such a macro on my Canon (among other things because of the mercilessly good image quality compared to normal lenses).

In addition, I then have to find someone who buys my Canon equipment at an acceptable rate, or alternatively win the lottery or rob a bank ...

But it's strange, this is the first time a Nikon camera really triggers a "want to have" reflex - Nikon has never achieved that before, at most a "would be nice to have" effect was observable. And those who know me know that I hardly shy away from anything if the incentive is great enough.

Patent Office Idiocy in the USA

Software patents are indeed a wonderful thing, so none of the proponents of this brainchild will likely have any objections to the patent on every kind of Internet-rich client. If this holds, soon in the USA, Ajax applications will be considered patent infringements, and a small company without real products will then extort firms simply because they have a patent on something they themselves have not developed or even promoted in the slightest.

RubyForge: Ruby Port to Nokia 770 Internet Tablet: Project Info - Ruby is now also available on the Nokia 770. With Python and TCL, that's quite a number of on-board programming languages.

Scsh PhotoBase - is a photo management software like iPhoto, but written in Scheme and for use over the web. So far only an announcement, but the source will definitely be released.

How to rip off customers

RWE makes high profits at the expense of customers:

The energy company is boasting. The operating result exceeds the expectations of experts and even the slight decline in sales is not surprising. The main reason for the windfall was the high electricity prices.

Of course, the electricity price increase was solely determined by external factors and had nothing to do with RWE simply exploiting its regional monopoly. In this context, the statement from the NRW Ministry of Economic Affairs, which might want to cut the extortion by 25%, is rather laughable - because the entire electricity price increase simply serves to enrich the RWE corporation.

Tomato Torrent - a nice BitTorrent client for OS X.

Tor GUI Competition

I didn't know about the GUI Competition for Tor - a good tool for securing the privacy of internet users. I've been using Tor for a while now - and at one point I even ran a Tor router - but the use, especially with dynamic network connections, is still a bit clunky for regular end users. Of course, I also hold the opinion that end users should learn more about their computer and therefore the installation and use of Tor should also be feasible for these people - but if we really want Tor to be a sign against state data espionage, then we definitely need graphical interfaces for activation, use, and configuration. Only then will regular users also think about whether they should use it after all.

For this reason, I am also particularly pleased that the competition has now moved into the next phase - the actual programming of the GUIs. And as a stupid Mac mouse pusher, I of course also wish for an OS X interface for this.

By the way, there is a very practical - and in my opinion obvious - application of Tor: public WLAN hotspots. Communication usually takes place unencrypted on them. This makes all accesses directly visible to others - unusable for accessing sites for which you have a password, if these do not also offer SSL immediately. And particularly problematic with all the other unencrypted services with which one likes to play around on the Internet - IRC for example (a private chat is not all that private if you conduct it over a public WLAN hotspot ...). Tor can help here very easily - a local Tor installation on the computer and the client software configured accordingly and you already have a kind of super-VPN.

This is also a reason why I wish for a Tor port to the small Nokia 770 tablet.

I myself do not use Tor for all services - but I generally have a network configuration ready on the Mac, in which Tor and Privoxy are activated by selection (I would like to be able to toggle the socks-forward in Privoxy via a Privoxy-GUI - then I could keep the Privoxy environment generally active and only switch on Tor when needed). This way I can quickly and easily switch on Tor on the go. For Jabber I use Psi, for which I have the Tor service generally activated. For IRC I use XChat-Aqua, which can be easily equipped with various server configurations, so that I can activate or deactivate Tor (many IRC networks do not allow IRC use via Tor).

In my opinion, a GUI on the Mac should integrate into the network environments on the Mac, so that it makes corresponding changes when activated, just as the environment switch does. And you should be able to easily slip new configs under other programs, as was the case with the old Mac Locations, for programs for which the proxy must be entered manually.

Contaminated Cook

Koch advocates for a longer operating period for the "most unsafe" nuclear power plant:

The Hessian Prime Minister Roland Koch, on the other hand, spoke out in favor of an extension of the operating period. It is in the interest of the state to keep the power plant in operation for as long as possible, especially if the operator RWE is willing to upgrade the reactor, said the CDU politician in the state parliament.

What, this thing is one of the most failure-prone and unsafe power plants in Germany? What, the power plant has repeatedly been involved in incidents and the operator has repeatedly been involved in attempting to cover up these incidents? But of course, we simply believe the operator when he says he is upgrading and securing the power plant. Just as we believe him when he says that the whole increase in electricity prices is not simply intended to increase his profit at the expense of the citizens.

Wasabi Systems has a quite useful analysis of what the GPL actually means for companies. Furthermore, there is also a chapter that deals with binary kernel modules - and why these represent a GPL violation.

To the Content Thieves

Once again, as described at Blogbar, there are content thieves around. Here's a preventive explanation of what a CC license with Share-Alike condition and Non-Commercial means: no ads on the pages. No commercial site - for example, paid accounts or similar. And yes, I mean Non-Commercial seriously. Share-Alike also has a simple explanation: a site that reproduces my content must be under the same license as my site.

Those who cannot meet the two conditions (we won't talk about the explanation of Attribution) will have to ask. And this does not mean that a lack of response is a silent consent - those who do not have explicit permission from me and cannot comply with the CC license must keep their hands off my content.

And those who think I can't do anything to them: those who are stupid enough to automatically pull content from RSS feeds should consider that the pulling machine is recognizable (especially for "stationary" services) - and that appropriate feeds can be provided for individual servers if you program your software like I do. And believe me, dear content thieves: the content you would then pull would definitely not please you.

Babylonian Explanation for the Nebra Sky Disk?

The Nebra Sky Disk is an astronomical clock:

A Babylonian cuneiform script from the seventh century BC and the detective work of a Hamburg astronomer have solved the mystery of the Nebra Sky Disk: Rahlf Hansen deciphered a leap month rule that can be read from the 3600-year-old bronze disk.

With the rule, the lunar year and the solar year are resynchronized - the lunar year is slightly shorter than the solar year and therefore runs out of sync over time, with the rule on the disk the owners knew when they had to reset the lunar calendar by inserting a leap month.

It's quite amazing to consider that the disk is from the Bronze Age. And Babylonia and Saxony are not really close to each other (although the records are almost a thousand years younger, making the achievements of the disk's manufacturers even more interesting).

Clim-Desktop project - first approaches for an integrated Common Lisp development environment based on the free CLIM implementation.

IBM is now gaining momentum

Does anyone remember this ongoing court case between SCO and IBM? GROKLAW brings a series of documents with IBM's demands to various companies. Microsoft, Sun, HP, Baystar - with a lot of very interesting questions. Hey, the procedure could slowly become interesting again.

The music industry is getting dumber and dumber

They now want to ban "Intelligent Recording Software" - without revealing what that is supposed to be. But they naturally want to restrict private copying, limit recording from the radio, restrict broadcasting rights for radio, and do everything to degrade themselves to insignificance - because if no one has free access to music anymore, people will eventually find free access elsewhere. Ultimately, the absurd demands of the music industry only promote the illegal distribution of music in the long run rather than curbing it.

The problem, however, is that the Prolethikers in Berlin have been letting the music industry pull the wool over their eyes for a long time and are implementing more and more of the demanded nonsense. And so we can probably look forward to even more absurd and mindless laws until perhaps the Constitutional Court finally has enough and puts a stop to the nonsense. But then the Prolethikers will probably ignore this decision just like other decisions from Karlsruhe ...

Net Neutrality at Risk

Deutsche Telekom demands money from content providers - and in doing so, they are echoing the same tune as US telecoms:

Telekom CEO Kai-Uwe Ricke announced that the Telekom plans to charge providers like Google, Yahoo, Amazon, and eBay in the future. It cannot be, he told the "Wirtschaftswoche," that the customer alone pays for the broadband network.

And who guarantees that this will only affect large content providers? And who guarantees that small customers, private sites, etc., will still receive the same service as the big players? Because that's exactly what network neutrality means: that the service is the same for everyone involved. Even if Ricke acts as if he were the customers' advocate, it's really just about the backbone operators wanting to make more money, especially those in the telecommunications sector.

Heise makes it clearer what this demand from the telecoms means: ultimately, the providers will pay multiple times for the same service. First, they pay their host or provider for connectivity. Then they pay again for the same bytes to the backbones. And then the visitor also pays for the same bytes to their provider. This is classic telecoms rip-off (and by that, I mean more than just Deutsche Telekom).

Backbones actually finance themselves through peering agreements with other backbones (where there is asymmetric load distribution) and through their own direct connections to providers and users. Now they want money from parties with whom they do not even have contracts - but only through third-party contracts do they use the services of the telecoms. And that is simply extortion.

Phollowing the Phlopping Phish

Who wants to know more about the embarrassing mishap at Geotrust: Phollow the Phlopping Phish describes the phishing attack from a user's perspective. With screenshots and documentation of how well the site was faked and how little a normal user could see through it.

The Linux Kernel Driver Interface - why the Linux Kernel has not designed its internal kernel interfaces as a "stable binary interface" (or even as a "stable interface").

virtual Bluetooth keyboard

I now have an i-Tech Bluetooth Virtual Keyboard (stupidly pulled the link from the sources - the site is otherwise not sensibly usable and without JavaScript there are no direct product links - clear case of "stupid designer syndrome"). Very nice - the keyboard is projected onto the table and then scanned using an infrared barrier above it. The virtual keys work excellently.

I bought it from Expansys, but they sent me a UK version - the power supply doesn't fit German sockets. The layout is of course always English, but I would like to have the power adapter in the appropriate version (that's why the strange links to adapters from English to Schuko).

Integration with the Nokia 770 is very simple - you just get the Bluetooth Keyboard Plugin and install it. Warning: if the bar with the icons at the top of the display is already full, the Bluetooth icon may no longer be displayed. Then you have to part with one of your status bar plugins.

After that, you just have to go to the plugin settings and, with the keyboard turned on (and reset for safety), select it from the list of available devices and pair it. After that, the plugin automatically recognizes the keyboard when it is turned on - you don't have to connect manually, just restart the tablet, turn on the keyboard and off you go. Turning off the keyboard is also properly recognized by the tablet as a disconnect.

Oh, and this laser-projected keyboard is not only extremely practical, but also absolutely cool.

Signs of Crisis

BASF posts record year:

The world's largest chemical company, BASF, ended 2005 with a record result. As the company announced, sales rose by 14 percent to 42.7 billion euros. The annual surplus increased by 50 percent to 3 billion euros. And BASF also sees itself well equipped for the current year.

Oh, yes, the profit in the field of nutrition and plant protection has a declining profit - well, the politicians will certainly provide BASF with record profits with an increasing trend with the seed regulation, if the industry has finally succeeded in tying farmers to their seeds, fertilizers, and poisons.

Also cute are the high profits in the oil and gas sector. Of course, the price increases in these areas are solely due to the high costs and have nothing to do with the fact that oil and gas companies want to increase their profits. (Yes, BASF is also busy in the natural gas sector - for example, through Wintershall, a company of the BASF Group).

What do the 3,600 BASF employees in Ludwigshafen, whose positions were cut in 2004, think of this corporate development? Especially those who were not pushed out through severance packages or partial retirement, but through transfer to a temporary employment agency?

#4G European Grounded "Shuko" Adapter. Walkabout Travel Gear (tm) - Adapter for a bunch of plug formats on Schuko. Could be my savior if Expansys does not have the power supply for the i-Tech keyboard available in Schuko version ...

8-p.info - Creammonkey - something similar to Greasemonkey, but for Safari.

Bluetooth Security - Bluetooth Security - what's possible, what's being done, what's behind it.

Migrate apps from Internet Explorer to Mozilla - interesting article that covers a series of pitfalls when switching between IE and Mozilla.

PlayDeluxe Shop - Online-Shop - there's also an English-to-German adapter. Much cheaper. Search for "adapter englisch".

Browsers are not program starters

Apple Safari automatically executes shell scripts - more precisely, a whole range of techniques come into play. The trigger, however, is the stupid habit of Safari to automatically start the appropriate viewer for certain file types - and sometimes incorrectly assign file types. In general, it is simply a bad idea when a browser tries to classify downloads as safe or unsafe and then passes them on to an external program - because this external program is usually in no way prepared to receive unsafe content. As soon as the browser misjudges, the trojan is functional.

So people: turn off the "execution of safe file types" in Safari. And Apple could take this as an opportunity to finally remove this function from Safari. The few extra clicks won't kill the user ...

Update: and here's the reason why I get a bit pissed off about such bugs - sorry, but this is Microsoft-World, not Unix-World. Please pull yourself together and don't do such nonsense

confused face

Know Your Enemy: Learning with VMware - how to build a virtual honeynet with VMware and see what and how is being hacked.

Snowball - finds word stems in various languages. Algorithms in a specially developed language. Practical for classic word lists.

Stéphane Ducasse :: Free Online Books - a whole series of free books about Smalltalk. Some are only scanned, some are real text PDFs. A whole series of classics are included.

ZNC - RottenBoy - interesting IRC bouncer (proxy) for multiple users. Significantly more powerful than the Muh I have used so far.

Bush and Nuclear Power

Bush calls for increased use of nuclear power:

"Our plan is to increase the use of safer and cleaner nuclear energy," said Bush, who a few weeks ago called for a reduction in oil dependence. The development and use of new technologies for solar and wind energy are also to be intensified.

But the fact that the raw material uranium is also limited, meaning that it is not a real alternative to oil at all, and that the issue of the final disposal of nuclear waste is not solved at all in the case of nuclear power, all this does not interest him at all.

The patent solution of the complete idiots - instead of relying on oil as a slowly depleting raw material, one chooses another depleting raw material that is much more dangerous and dirtier. Great strategy.

angry face

Of course, he also doesn't care that he just had his crisis with Iran because the nuclear program there may not be used solely for power generation. And that in the USA, for good reasons (costs and dangers), nuclear power has not been actively promoted and expanded since the 70s.

The actually more obvious vision for the future - the increased use of renewable energy sources - is once again completely ignored. It would be too simple if one were to address the problem of non-renewable energy sources, namely the non-renewability ...

United States of Absurdity

According to National Public Radio, severely ill patients were killed with a lethal injection during the Katrina evacuation because they could not have been evacuated in time. Yes, Europe must urgently emulate the American social model that makes such things possible (and other absurdities like the suspension of small children in elementary school for allegedly sexually harassing other children or dismissal of a nurse for alleged incitement to hatred - because she criticized the Bush administration for its Katrina mismanagement). We are not yet stupid enough here.

And to those who will again accuse me of salon anti-Americanism: sorry, but this is no longer salon-like. For me, the USA is a collective case for the madhouse. And don't tell me that one must distinguish between the people in America and the respective government and administration - a not entirely insignificant part of this supposedly defensible population has elected the supreme moron.

And yes, I am fully aware of the irony of the whole thing in view of the current brainless Berlin occupation. We are not far from the same madness.

Cocoa for Bracket Fetishists

There is actually an Objective-C Bridge for the second best Scheme in the world. And I hadn't seen it before. It looks very interesting, the author has a nice tutorial online where he controls his iTunes with Scheme. And a lot of other source samples for Chicken-Scheme, including the obligatory currency converter. However, you need a newer Chicken-Scheme version (i.e., a current snapshot), otherwise the -objc switch is not supported.

If they keep being this productive, Chicken will soon displace the best Scheme from its place.

The installation is quite hairy, so here are some notes on how I did it:

  • Chicken Scheme 2.3 is the minimum
  • Install libffi from Darwinports: sudo port install libffi
  • Install objc Egg:

sudo chicken-setup -c "-I/opt/local/include -L/opt/local/lib" objc

Gauche:ObjectiveCBridge - there is also an Objective-C Bridge for Gauche Scheme. However, with fewer sophisticated examples.

HOC: A Haskell to Objective-C Binding - even for Haskell there is an Objective-C Bridge that I didn't know about.

The Real Reason Behind Hartz IV?

When you see 1-Euro-Jobbers being used as strikebreakers against VERDI, you might start to have some strange thoughts:

1-Euro-Jobbers are now being used as strikebreakers against the strike in the service sector. In the Lower Saxony city of Osnabrück, Hartz IV recipients are being forced by the public employer to drive the municipal garbage trucks. At the beginning of the week, this had to be enforced by a massive police operation against the strikers.

But of course, the 1-Euro-Jobs are only about preparing people for work and motivating them. What they are supposed to be motivated to do through such actions, however ...

Dresdner was the "SS Trust Bank"

A study commissioned by Dresdner Bank itself documents the bank's involvement in the Nazi regime, which went far beyond the involvement of Deutsche Bank and Commerzbank. These three banks were also the ones whose dissolution was recommended in the OMGUS reports (which, however, was not implemented).

Nokia 770 and Virtual Bluetooth Keyboard - how to connect the Laser Keyboard with the 770.

OpenVPN on Maemo - Porting OpenVPN to the Nokia Pad. Could be quite interesting, as you are now a bit too visible to others over free WLAN hotspots.

Showing off testosterone-damaged proletarians

Isn't it cute how the defense minister puffs up about completely theoretical scenarios?

Since the Constitutional Court has overturned the so-called shoot-down paragraph, there is not even a legal basis for the shoot-down of unmanned or exclusively terrorist-occupied aircraft in the event of terrorist threats. This would only be possible in self-defense in the event of a state of emergency beyond the law. "In that case, I would also issue a corresponding order." As defense minister, he is obliged to protect citizens from such an attack.

The poor guy - so far there has not been a single terrorist attack with drones or exclusively terrorist-occupied aircraft, nor has there been any indication of plans in that direction, but it certainly sounds very manly when you let the big macho out.

What an inflated blowhard.

Bavarian Ministry of the Interior against the Basic Law

How was that about discrimination again? Bavaria wants to deny passports to those seeking naturalization who support the PDS:

In addition to the long-standing practice of routinely inquiring with the domestic intelligence agency, Bavaria plans to ask every person seeking naturalization in the future whether they are a member of or support any of the organizations classified as extremist by the Munich Interior Ministry. The basis for this is a list of all organizations monitored by the Bavarian domestic intelligence agency, which has included the PDS since 1990. In individual cases, as confirmed by the spokesperson of the Bavarian Interior Ministry, Thomas Ziegler, on Wednesday to junge Welt, non-German members of the Left Party may therefore be denied naturalization. Even purchasing publications from the Left Party.PDS or attending party events could be interpreted as "support."

Article 1, Paragraph 3: No one may be disadvantaged or privileged because of their gender, descent, race, language, homeland and origin, beliefs, religious or political views. No one may be disadvantaged because of their disability. - but Beckstein certainly wants to change that too.

Firewall providers, sharpen the fillers!

Since Basel II becomes law - and thus it may be that the banks will ask your customers for documentation of IT security before a loan is granted (since IT security is part of the risk assessments in credit scoring):

The operational risks of a company also include the risks arising from the use of information technology in business processes. An active IT risk management is required, which deals with all aspects of IT security for the respective company. Important IT systems must be redundantly available, availability must be ensured, attacks on IT systems from inside and outside must be effectively repelled, contingency plans should be developed, and so on.

And since customers usually do not create their own documentation (which always fascinates me, because actually they should take care of security themselves, so they should also maintain their own documentation), they then demand such documentation from the service provider. Usually one day after they have been asked about the topic (e.g. when the auditor is about to refuse them the seal of approval because the documentation is missing).

Hey, that's a whole new form of corporate extortion: be cooperative, or your next IT security audit for the new loan will go down the drain.