Category: ‘Geeky Stuff’

piracy.jpg

Сижу и тупо ржу :grin: :lolishe:

——

Microsoft, which released a feature-complete beta of Internet Explorer 8.0 on its website yesterday, has revealed that two of the main design goals of the product were backwards compatibility and total compliance with web standards.

“The core web rendering engine in IE8 is compliant with web standards, but we have also tried to maintain compatibility with sites written specifically for older versions of IE,” says Ryan Servatius, senior product manager at Microsoft’s Internet Explorer division.

The new browser will come with a ‘compatibility button’, which users can click if they stumble across a site that was designed for older versions of the software. Once pressed, the page will reload in ‘compatibility mode’.

Sounds fair enough, but this quote from David Mitchell, senior vice-president for research at Microsoft, must be, I assume, a mistake, because otherwise it’s quite surreal.

“Sites that are specifically written for IE will not display properly. Many people probably will not ever use the compatibility button that Microsoft has built into IE8, which means some sites will not work and the user will get a message saying the site needs Internet Explorer.”

So let’s get this straight – the new version of IE will not support some sites that were written specifically for Internet Explorer, and that the software will then display an error page and tell users to download Internet Explorer?

That’s going to go down like a riot with the boys at Mozilla.

© GeeksAreSexy.net

There’s been an upsurge in ASCII spam in the last week…It’s quite effective in getting through filters,” said Chris Boyd, director of malware research at messaging management firm FaceTime Communications.

But earlier efforts to use ASCII art for spam have proven to be duds, he added. “The downside is that 9 times out of 10, it’s completely useless because it’s almost impossible to read, or it’s a really bizarre picture of a naked lady that’s not clickable,” Boyd said.

Evasive maneuvers

Spam filters can detect the word “Viagra” and suspect Web addresses of sites trying to get rich quick by catering to the demand for the drug. But it’s another thing altogether to detect an ASCII art version of the same word. Indeed, an ASCII art spam e-mail reading “Viagra-$1.15” and “Cialis-$1.99” made it past the spam filters of my Yahoo Mail and Gmail accounts.

Google declined to comment specifically on ASCII art spam. “We expect spammers to use every means possible to try to send spam. That’s why we have a very robust spam-fighting effort at Google,” the company said in a statement. Yahoo didn’t respond to a request for comment.

Here’s why it’s clever. One line of the e-mail is “78 46 60 11 04 75 300 38 0348 18 61 55171″–gibberish that hardly resembles part of the word “Viagra” or a suspect URL. But reading it on my screen as part of the overall text, its meaning was clear to me in a flash. And a spam generation program could evade spam filter fingerprinting by randomly substituting other numbers into the text art.

© CNET.com

ooooo          .oooooo.   ooooo        oooooooooooo   .oooooo.    
`888'         d8P'  `Y8b  `888'        `888'     `8  d8P'  `Y8b   
 888         888      888  888          888         888           
 888         888      888  888          888oooo8    888           
 888         888      888  888          888    "    888     ooooo 
 888       o `88b    d88'  888       o  888       o `88.    .88'  
o888ooooood8  `Y8bood8P'  o888ooooood8 o888ooooood8  `Y8bood8P'   

Joerg Seyfferth’s ASCII text generator

assorted-benchmarks.png

Компания Mozilla разработала технологию TraceMonkey, позволяющую в несколько раз увеличить скорость работы JavaScript и веб-приложений при использовании браузера Firefox, сообщается в блоге разработчиков Mozilla.

TraceMonkey уже включена в альфа-версию браузера Firefox 3.1. Однако по умолчанию технология TraceMonkey не доступна, так как еще не полностью отлажена и работает нестабильно. В будущем TraceMonkey станет частью бразуера Firefox, что позволит значительно ускорить его работу.

В частности, в ряде тестов Firefox 3.1 с TraceMonkey работает с JavaScript почти в 40 раз быстрее, нежели Firefox 3. Также тесты показали, что TraceMonkey делает новый браузер Firefox более чем в два раза быстрее Apple Safari при работе с JavaScript.

Ожидается, что TraceMonkey позволит значительно ускорить работу браузера со сложными специализированными веб-приложениями. В частности, было продемонстрировано, что TraceMonkey делает обработку изображений через веб-интерфейс более быстрой.

В настоящее время альфа-версия браузера Firefox 3.1 доступна для скачивания на сайте Mozilla. Разработка TraceMonkey заняла у Mozilla около двух месяцев.

:giggle:

A poster-sized calendar with a bubble to pop every day.

www.bubblecalendar.com

www.bubblecalendar.com

Долго лежал этот пост в draft-ах.. все никак дописать не мог..

Bookmarklet, в двух словах, это JavaScript, который прописываеться в поле “Location” у Bookmark-a или вместо адреса внутри тэга <a>, и который выполняет какое-то одно действие. Но это лично моё “понимание” того, что они такое. http://en.wikipedia.org/wiki/Bookmarklet – там, впринципе, тоже самое написано.

new-bookmark.gif
Resize Не трудно, думаю, догадаться, меняет размеры окна на 1024 х 768
Другие (если надо): 800×600 , 1152×864 , 1280×1024
Resize to… – универсальный resize boolmarklet.

* Эти bookmarklet-ы работают только при default-ном значении для “dom.disable_window_move_resize”“false”

Как сохранять bookmarklets?

1. Просто "перетянув" в "Bookmark Toolbar" (Left click & Hold -> Move to Bookmark Toolbar & Release)
2. Right click -> Bookmark This Link...

Почему именно “Bookmark Toolbar”? Потому что так ими удобней всего пользоваться. По крайне мере, мне так удобней всего. Когда что-то надо – делаю toolbar видимым, когда нет в них надобности – прячу.
Read more »

CGI remake of the epic fight between Optimus Prime and Megatron as was seen in the classic movie. Excellent sequence, even though the animation is a little stiff, its still an amazing sequence.

Буагага! )))

We all have to admit it, this year’s Olympic opening ceremony was of epic proportions… but there was only one thing that wasn’t so epic.

bsod-1.jpg

Right at the moment when Chinese gymnast Li Ning was flying to light up the giant Olympic torch, someone took this picture. And if you think that this was Photoshopped, other people were able to take the shot from other angles.

bsod-2.jpg

© Geeksaresexy.net

Если коротко и по-русски: Американские спецслужбы получили право изымать на неопределенный срок ноутбуки и другие электронные устройства у путешественников, пересекающих границу США. Для конфискации не требуется никаких оснований.

С террористами они так бороться, аха..

Susan Gurley, executive director of the Alexandria, Va.-based ACTE, said that international travelers need to be aware of and prepared for such border searches, even though they are relatively rare. This is especially true because so far little is known about the DHS’s policies relating to the practice and what it does with the information collected during searches of electronic devices, she said.

“We think people should know that they basically are leaving their right to privacy at the door when they cross the U.S. border. There is no assumption of privacy [at a port of entry].”
said Gurley.

“This is by far not an epidemic of any sort,” Gurley said. “But we think people should know that they basically are leaving their right to privacy at the door when they cross the U.S. border. There is no assumption of privacy,” at a port of entry, she said.

Here are five factors Gurley says travelers should know about:

1. No evidence needed to take your laptop

Border agents do not need any evidence or suspicion of illegal activity to examine a laptop or other electronic device.

Every time you cross the border, customs officials have the right to look at anything in your possession, including the content on your laptop, handheld device, cell phone, USB memory stick and digital cameras, Gurley said. They have the right to both view that information and to download or mirror it if they think it’s necessary, she said.

2. Anything can be searched

Everything on an electronic device is open to search. This includes personal photographs, personal banking, any business documents and stored or unopened e-mail, Gurley said.

3. Your PC might not be returned right away

Seized devices may be kept for an indefinite period of time. Carry only a laptop or electronic device you can afford to lose or hand over for an unspecified period of time.

Sensitive data should be sent by e-mail before crossing the border in case the data becomes unavailable if the device is seized, she said.

4. Don’t take anything you don’t want to share

Don’t carry anything on these devices that could potentially embarrass you or that you don’t want others to see, Gurley said.

If it’s information you don’t want to share, don’t carry it. That includes data such as personal banking information, photos, correspondence, health and password information. If the device is a company-owned computer, don’t carry proprietary business information or personnel records on it, the ACTE advised.

5. Be cooperative

Cooperate with customs officials. Ask for a receipt and a badge number if your computer is seized. Try and get whatever information you can on the reason why it was seized.

© PCWorld.com

Comment and Win a Userpic!

Recommended Stuff

This is a random selection from a list of stuff/posts I personally enjoyed a lot. Some sort of "My Favorites" or "Bookmarks"...

  • Angelina Jolie – Neil Kirk
  • SNL – Nick Burns – Company Computer Guy!
  • Jessica Alba (Movie Awards ’06)
  • Slayer – Bloodline
Bookmark and Share