Quotulatiousness

May 10, 2011

IPv6 day is coming

Filed under: Technology — Tags: , — Nicholas @ 09:45

There’s been a short cycle of “we’re running out of internet addresses” articles over the last few months, as the available free blocks of IPv4 addresses are allocated. By now, we were all theoretically supposed to have moved on to the successor addressing scheme, IPv6:

On the 8 June, it’ll be World IPv6 Day — a coordinated effort by major services on the internet, including Google and Facebook, to provide their services using the new version of the Internet Protocol. It’s part of the plans to cope with internet addresses ‘running out’. But just what is IPv6 — and what does it mean for most users?

At its most simple, IPv6 is the successor to IPv4 which has become the de facto standard for both local and global connectivity. It includes many extra features, including processing speed-ups, and enhancements to security and to quality of service, but the one that’s really driving the need to change is that there are many more internet addresses available with IPv6.

Most Reg Hardware readers will be familiar with the look of an IPv4 address: it’s 32 bits long, and typically written as a series of four eight-bit decimal numbers, separated by full stops, like 10.0.0.1.

An IPv6 address is 128 bits long, and usually represented by groups of four hexadecimal digits, separated by colons. Each of those four digits represents 16 bits, so there are up to eight groups, giving IPv6 addresses that look like 2001:0470:1f09:1890:021f:f3ff:fe51:43f8.

It won’t be a simple case of turning on IPv6 and turning off IPv4, however, as there’s still huge numbers of devices that depend on IPv4. Over time, more and more devices (not just computers, or not only what we tend to think of as “computers”) will work natively with IPv6 addresses.

You won’t just get a single IPv4 address from your ISP anymore: you’ll get a huge block of addresses (“you’ll receive more addresses for your home network [than the] whole of the IPv4 internet”).

Typically, a broadband customer will be given a set of IPv6 addresses for their network, and the router will also provide an IPv4 address and NAT (Network Address Translation) for devices that can’t use the new protocol. The big change for many people is that all their IPv6 devices will be publicly available to the net. That will make setting up many devices much simpler, but also reinforces the need for a proper firewall in the router.

May 7, 2011

Comparing mouldy old tech with bright, shiny new tech

Filed under: Books, Economics, Media, Technology — Tags: — Nicholas @ 00:19

Dark Water Muse looks at competing technology from different eras:

The tech world is all a-buzz with reviews of eReaders and tablets capable of rendering eBooks, each of these device types purported to be candidates as the preferred host for future textual content to dethrone the lowly book as the natural media form readers turn to for reading textual content. Technical reviews focus solely on the merits of individual tablets and eReaders or line them up in comparative reviews. In DWM’s opinion these reviews completely miss the whole context of what is to be critiqued.

This tablet versus eReader battleground isn’t the real competitive landscape. Tablets and eReaders aren’t merely duking it out between themselves to win the hearts of readers. DWM views tablets as equivalent to eReaders when used to access published textual content such as books and magazines. Throughout the remainder of this piece DWM will refer to tablets, and other computer hardware which support eBook formats, and eReaders as simply eReaders.

As noted earlier, eReaders aren’t merely fighting amongst themselves for market share. The eReader, collectively, is fighting to displace the printed book. Read on as DWM explores exactly how that fight is going.

At the moment, I don’t really have any strong urge to purchase an ebook reader. I have a few dozen books on my iPhone, and it’s able to display the text acceptably well for casual reading (those few times I have to wait and for some reason don’t have a real book with me). My big concern with ebooks is less the reader and more the content: unlike a real book, you don’t own your copy of the content, and it can (and has) been remotely removed by the licensor in more than one case already. I have very great reservations about paying money to “buy” when it turns out that I’ve just paid a license fee that can be revoked at the licensor’s discretion without warning or compensation.

March 20, 2011

Hacking a secure WiFi connection not illegal, says Dutch court

Filed under: Europe, Law, Technology — Tags: , , , , — Nicholas @ 11:09

An interesting legal precedent may not be as far-reaching as the headline might imply:

Breaking in to an encrypted router and using the WiFi connection is not an criminal offence, a Dutch court ruled. WiFi hackers can not be prosecuted for breaching router security.

A court in The Hague ruled earlier this month that it is legal to break WiFi security to use the internet connection. The court also decided that piggybacking on open WiFi networks in bars and hotels can not be prosecuted. In many countries both actions are illegal and often can be fined.

[. . .]

The Judge reasoned that the student didn’t gain access to the computer connected to the router, but only used the routers internet connection. Under Dutch law breaking in to a computer is forbidden.

A computer in The Netherlands is defined as a machine that is used for three things: the storage, processing and transmission of data. A router can therefore not be described as a computer because it is only used to transfer or process data and not for storing bits and bytes. Hacking a device that is no computer by law is not illegal, and can not be prosecuted, the court concluded.

The key here is the definition of a computer under the law: I expect the Dutch to update this definition in response to the outcome of this case.

January 24, 2011

Introduction to NFC, Register style

Filed under: Technology — Tags: , , , — Nicholas @ 08:51

If you’re wondering what the buzz about Near Field Communications (NFC) might be, you’ll want to read The Register‘s Beginner’s guide to NFC:

Near-field communications (NFC) will take off very quickly — once it’s clear who can make money from it.

From the look of it, 2011 is the year that it will all become clear.

Mobile handset vendors are rushing to incorporate NFC into their roadmaps, with several high profile NFC-enabled handset launches pencilled to lauch mid-2011.

RIM recently hinted at incorporating the technology into new BlackBerry devices, the iPhone 5 is widely expected to include an NFC chip, and Samsung and Nokia are understood to be planning several NFC-enabled phones.

Mobile operators are gearing up too. In the UK, for instance, O2 is building out an NFC team and forecasts that near field communications will enter the consumer mainstream in mid-2011. Orange UK is equally bullish, forecasting sales of 500,000 NFC-enabled phones this year.

So what’s the fuss all about?

If they’re right, expect to start seeing this symbol on lots of things in the near future:

The N-Mark standard defines an embedded tag, which can communicate and provide encrypted authentication using power induced by the reader – such a tag can therefore be embedded in a credit card or key fob without needing its own power supply.

An N-Mark device, such as a mobile phone, incorporates a reader as well as a tag, to enabling communication with passive tags and other N-Mark devices. That communication takes place at 13.56MHz, but as the power is magnetically inducted the range is extremely limited – 200mm at best.

January 21, 2011

If you are finding Firefox to be much slower lately, uninstall the Skype toolbar

Filed under: Technology — Tags: , , , , — Nicholas @ 12:51

I’ve been using Firefox as my main browser for a few years, and it generally works well for me. In the last month or so, however, I’ve noticed it being much slower. Some of that problem may have been caused by the Skype toolbar:

Mozilla has blocked a Skype toolbar add-on for its Firefox browser, after blaming the extension for causing 40,000 crashes last week.

The open source outfit said it vastly slowed down webpage-loading times.

The crash-prone add-on downed Firefox 3.6.13 — which is the current stable version of the browser — far too much, grumbled Mozilla.

“Additionally, depending on the version of the Skype Toolbar you’re using, the methods it uses to detect and re-render phone numbers can make DOM [document object model] manipulation up to 300 times slower, which drastically affects the page rendering times of a large percentage of web content served today (plain English: to the user, it appears that Firefox is slow loading web pages),” it said.

I started using Firefox as my default browser around the time they introduced tabbed pages (which every browser has offered for years now). I also use Opera, Chrome, and (unwillingly) IE for specific purposes. If the Firefox performance issues aren’t resolved when they release the new version 4.0 next month, I’ll consider switching to Chrome as my primary browser instead.

January 20, 2011

Diagnosing USB issues

Filed under: Americas, Religion, Technology — Tags: , , — Nicholas @ 08:17

Having problems with your USB connections? Have faith! No, really:

A Brazilian Christian sect has allegedly sought to exorcise the Universal Serial Bus (USB) because its symbol resembles a pitchfork, favoured sinner-spiking implement of one Old Nick, esq.

Well, they do say the Devil has the best tines…

The cult in question, which calls itself Paz do Senhor Amado — “Peace of the beloved Lord” — says, not surprisingly, that this clearly Satanic symbol should be cast out. Or at least unplugged.

Bluetooth, however, is fine, Paz do Senhor Amado preacher Welder Saldanha, told Brazilian site Bobolhando, because blue is the colour of Jesus’ eyes.

January 13, 2011

Beer incoming!

Filed under: Randomness, Technology — Tags: , , — Nicholas @ 07:30

H/T to Lester Haines for the link.

Adobe finally gets the message

Filed under: Technology — Tags: , , — Nicholas @ 07:25

Ever wanted to delete all the tracking cookies that your browser collects? Most browsers provide ways to do that for ordinary cookies, but did nothing for the Flash cookies. Adobe seems to have heard the demands to fix this:

Adobe has finally fixed a privacy weakness that threatened users of its ubiquitous Flash Player: the software’s storing of cookie-like files that many websites used to track visitors’ behavior against their wishes.

So-called LSOs, or local shared objects, are useful for storing user preferences, such as the preferred sound volume when visiting YouTube, but the Flash feature comes with a dark side. Unscrupulous websites can use them to restore tracking cookies even after a user deliberately deletes them. Files that do this have come to be known as Flash cookies.

Now, developers at Adobe have worked with their counterparts at Mozilla and Google on a programming interface that allows LSOs to be deleted from within the settings panel of compliant browsers. The API, known as NPAPI ClearSiteData, has already been approved for implementation in Firefox. It will soon appear on the Google Chrome dev channel.

January 11, 2011

Amusing ad

Filed under: History, Humour, Technology — Tags: , — Nicholas @ 00:09

H/T to Megan McArdle for the link.

January 10, 2011

QotD: Geeks and Hackers defined

Filed under: History, Media, Quotations, Technology — Tags: , , , , — Nicholas @ 16:29

One of the interesting things about being a participant-observer anthropologist, as I am, is that you often develop implicit knowledge that doesn’t become explicit until someone challenges you on it. The seed of this post was on a recent comment thread where I was challenged to specify the difference between a geek and a hacker. And I found that I knew the answer. Geeks are consumers of culture; hackers are producers.

Thus, one doesn’t expect a “gaming geek” or a “computer geek” or a “physics geek” to actually produce games or software or original physics — but a “computer hacker” is expected to produce software, or (less commonly) hardware customizations or homebrewing. I cannot attest to the use of the terms “gaming hacker” or “physics hacker”, but I am as certain as of what I had for breakfast that computer hackers would expect a person so labeled to originate games or physics rather than merely being a connoisseur of such things.

[. . .]

All hackers are, almost by definition, geeks — but the reverse is not true.

Eric S. Raymond, “Geeks, hackers, nerds, and crackers: on language boundaries”, Armed and Dangerous, 2011-01-09

December 16, 2010

Bruce Schneier on Security in 2020

Filed under: Economics, Liberty, Technology — Tags: , , , — Nicholas @ 12:48

Aside from all the ugly new terms coined to describe the phenomena, the evolution of security is one of the most under-appreciated stories of the decade. The next decade is going to be even more important to how we live our lives:

There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something. In the next 10 years, the traditional definition of IT security — ­that it protects you from hackers, criminals, and other bad guys — ­will undergo a radical shift. Instead of protecting you from the bad guys, it will increasingly protect businesses and their business models from you.

Ten years ago, the big conceptual change in IT security was deperimeterization. A wordlike grouping of 18 letters with both a prefix and a suffix, it has to be the ugliest word our industry invented. The concept, though — ­the dissolution of the strict boundaries between the internal and external network — was both real and important.

So, that was then. This is now:

Today, two other conceptual changes matter. The first is consumerization. Another ponderous invented word, it’s the idea that consumers get the cool new gadgets first, and demand to do their work on them. Employees already have their laptops configured just the way they like them, and they don’t want another one just for getting through the corporate VPN. They’re already reading their mail on their BlackBerrys or iPads. They already have a home computer, and it’s cooler than the standard issue IT department machine. Network administrators are increasingly losing control over clients.

This trend will only increase. Consumer devices will become trendier, cheaper, and more integrated; and younger people are already used to using their own stuff on their school networks. It’s a recapitulation of the PC revolution. The centralized computer center concept was shaken by people buying PCs to run VisiCalc; now it’s iPads and Android smart phones.

I’ve certainly noticed this myself: it was forced to my attention a couple of years ago, when a change of employment required me to buy and maintain my own “business” computer and software. Without seriously stressing my wallet, I was able to buy far more capable equipment than my previous employer had provided. Being able to check my email on multiple devices was very important, and once I’d started doing that, I realized the need to do many other things regardless of the machine I happened to be using. There are, of course, trade-offs involved:

The second conceptual change comes from cloud computing: our increasing tendency to store our data elsewhere. Call it decentralization: our email, photos, books, music, and documents are stored somewhere, and accessible to us through our consumer devices. The younger you are, the more you expect to get your digital stuff on the closest screen available. This is an important trend, because it signals the end of the hardware and operating system battles we’ve all lived with. Windows vs. Mac doesn’t matter when all you need is a web browser. Computers become temporary; user backup becomes irrelevant. It’s all out there somewhere — ­and users are increasingly losing control over their data.

Anyway, there’s lots more interesting stuff. Go read the whole thing.

December 14, 2010

No surprises at all in Gawker’s 50 most-popular passwords

Filed under: Randomness, Technology — Tags: , , , , — Nicholas @ 12:23

An article in the Wall Street Journal has the 50 most popular passwords from the Gawker data heist:

Recognize the pattern? Here’s a word cloud from my last post on passwords:

Other posts on this topic: Passwords and the average user, More on passwords, And yet more on passwords, and Practically speaking, the end is in sight for passwords.

November 18, 2010

QotD: On the quality of writing, mediated through technology

Filed under: Humour, Media, Quotations, Technology — Tags: , , , — Nicholas @ 08:45

I own a computer. I don’t use the Internet very much. I’m not a technophobe. It just doesn’t help me very much. Writing is a slow and a difficult process mentally. How you physically render the words onto a screen or a page doesn’t help you. I’ll give you this example. When words had to be carved into stone, with a chisel, you got the Ten Commandments. When the quill pen had been invented and you had to chase a goose around the yard and sharpen the pen and boil some ink and so on, you got Shakespeare. When the fountain pen came along, you got Henry James. When the typewriter came along, you got Jack Kerouac. And now that we have the computer, we have Facebook. Are you seeing a trend here?

P.J. O’Rourke, “Very Little That Gets Blogged Is Of Very Much Worth”, Radio Free Europe/Radio Liberty, 2010-11-18

October 21, 2010

Aha! I knew there had to be a way!

Filed under: Bureaucracy, Humour, Technology — Tags: , , — Nicholas @ 12:54

Tech Support
Click image to see the whole strip.

October 14, 2010

Little Bobby Tables must speak Swedish

Filed under: Europe, Humour, Politics, Technology — Tags: , , , — Nicholas @ 13:19

By way of Bruce Schneier an opportunity to show another xkcd comic:

Exploits of a Mom

So, what’s the Swedish tie-in?

As you may have heard, we’ve had a very close election here in Sweden. Today the Swedish Election Authority published the hand written votes. While scanning through them I happened to notice

R;13;Hallands län;80;Halmstad;01;Halmstads västra valkrets;0904;Söndrum 4;pwn DROP TABLE VALJ;1

The second to last field is the actual text on the ballot. Could it be that Little Bobby Tables is all grown up and has migrated to Sweden? Well, it’s probably just a joke but even so it brings questions since an SQL-injection on election data would be very serious.

« Newer PostsOlder Posts »

Powered by WordPress