Thursday, February 12. 2004
The Doors - Break on through
No time for blogging... must... browse... on... orkut...
Wednesday, February 11. 2004
Orkut is fun. Martin Piskernig invited me, and now I've got an Orkut account, too. What I find extremely interesting how social groups form, and how social networks get bigger and bigger. And what I could observe immediately is that surfing on Orkut is making addictive. It's 2 am, I have classes starting at 7:50 am, and I should have gone to bed more than two hours ago. Well, let's see whether I survive the following day at school.
Tuesday, February 10. 2004
Today's "highlight" of the classes was during the lessons where we learnt about relational databases. We walked through an example with (besides others) a customer table, which was not conforming to the third normal form, as it both contained the postal code and the city name (they're both non-key-attributes and they're functionally depending on each other). I pointed that out to the teacher, and all I got as an answer was that it would be OK. I then asked for a reason, and the teacher replied that it would be an exception, and she read that on the internet. I said that I couldn't accept the answer but I'll leave it as is.
That really made me angry, not only because the teacher couldn't give me a reasoned answer, but also because of this "because the internet says so" type of answer. Ms. Teacher, the internet is not the ultimate source of knowledge, and could probably contain false information. What is also suspicious is the generic term "the internet". No reference to a specific website, no nothing.
IMHO, that teacher has to go. Incapable of teaching correct content, incapable of actually completely understanding what she teaches, and incapable of giving reasoned answers.
Monday, February 9. 2004
See here. This is really first-class fascist state police violence and repression.
Sunday, February 8. 2004
Yesterday and today, I configured my internal network to be IPv6-capable. First, I got an IPv6 tunnel via freenet6.net, which I can really recommend: I've tried out several IPv6 tunnel providers, and failed with all of them, but freenet6 was really easy to configure. It even provides integration with the radvd, the router advertisment daemon. Router advertisment is a nice feature of IPv6 where the router advertises its own services of providing a default route for IPv6 packets. The client can take an address on its own, it already knows the router, so it's basically auto configuration.
After installing the IPv6 tunnel, I first checked the other computers whether they had auto-configured themselves for IPv6. The iBook running Mac OS X did so, and worked flawlessly immediately. My Linux-based file/mail/newsserver still needed an IPv6-capable kernel, but after recompiling one, it worked flawlessly, too.
The next thing was to make sshd IPv6-capable. The sshd on Mac OS X already was IPv6-ready, but not the ancient OpenSSH 3.4p1 from Debian Woody that is running on both my gateway and the file/mail/newsserver. And getting sshd is a bit tricky: the comments in the configuration file pretend that the installed sshd was actually supporting IPv6, but when enabling :: as ListenAddress and restarting sshd, it was complaining about unsupported protocols. The solution is to modify the Debian package: remove the --with-ipv4-default from the debian/rules file and rebuild the package, then install it and set ListenAddress :: as the only ListenAddress directive in the /etc/ssh/sshd_config configuration file. Then connections both via IPv4 and IPv6 work.
What I still need to find out is how Safari can be forced to prefer IPv6 to IPv4 if available. So, I hope to find that out ASAP, so that I can see the dancing turtle on www.kame.net. But using w3m, I already got the page saying that I was connecting via IPv6. But w3m is not really capable of displaying animated GIF files.
Of course, many of you may ask yourself "why the heck does this guy configure IPv6 although virtually nobody has this deployed so far?". Well the reason is that new IPv6 users are still early adopters. Using IPv6 is still 31337 (elite). And you can be 31337, too, by simply deploying IPv6 at your office or home network.
Friday, February 6. 2004
"Dieses Weblog ist tot. Bereits den zweiten Tag. Libertad!"
Not this time, Mr. Bartolich.
For those who wonder why this blog was offline for a few days: the server where it is hosted moved from Vienna back to Linz. That's all. And nobody missed anything, everything that happened to me in the last few days was boring as hell.
Tuesday, February 3. 2004
I got a rather disturbing movie showing the recordings of an Apache helicopter's nightvision camera. What you can see is an Apache shooting 3 soldiers (I don't exactly know, but these pictures seem to be from Iraq, since one of the soldiers is waving with a typical scarf) with the Apache's 30 mm chain gun. This video even shows evidences of war crimes (I marked it bold in the transcript). Here my transcript of the radio communications you can here:
[can't understand] and roger.
laser range arm. outta range. fuck. range auto. right, got all the range on it.
roger. hit it.
good.
second one. hit the other one. the truck.
right, he was moving by the truck.
hit the truck, sir? is there anybody in the truck, waitin' (?) or moving?
not seein' any.
store that, auto range store.
oh, there's a guy moving right there.
firing. hit it.
target four. we'll take the other truck.
roger. wait [can't understand] by the truck.
right there.
roger.
he's wounded.
hit it.
hittin' the truck.
the truck and him! go forward and hit it.
roger.
They were shooting at a wounded enemy soldier. War is dirty, but does it have to be so dirty that US-american soldiers have to shoot at wounded soldiers using 30 mm bullets, literally letting them explode?
I'm getting forced into drawing Nassi-Shneiderman diagrams for the bubblesort algorithm. It somehow makes me feel like 15. About 5 years ago I had to do that the first time, and here in vocational school, it's not getting any better.
Currently I'm experiencing how a teacher can teach relational databases the wrong way. It's virtually impossible to explain how to bring a table into the first normal form without explaining what a primary key and a foreign key is. So nobody understood what it's actually about (except for those who knew what relational databases are all about), no, it confuses them more than it actually helps.
Her style of drawing entity relationship diagrams is also really strange, just like Access does it. That really sucks IMHO. I wish she'd use the style that I learned a few years ago at HTL Leonding. She also praises Visio to be the best tool around for drawing ERDs. I simply cannot agree. Unfortunately OmniGraffle only supports this strange "crow foot" notation for relations, which I don't like, either.
Monday, February 2. 2004
Today I had my first day at vocational school, and it totally sucked. Everything is totally boring, all the teachers are stating obvious things, and so on. The schedule is way to much (43 hrs per week!), and contains so many useless subjects. And the worst thing is that this goes on until April 23rd. But well, I have to go through that, and after that one more time for about 5 weeks, and then it's over. Forever.
Sunday, February 1. 2004
On Saturday I was in the cinema, watching the new movie Underworld. Oh, well, it's 100 % trash. Actually, that's what I expected. But the plot is totally wicked: werewolves and vampires originate from one man who survived the plague in the 5th centuy (huh? wasn't the plague around the 12th century?), and who somehow absorbed genetic properties of the virus and thus got invincible (strange, eh? . So, at some point there was a big dispute between werewolves and vampires, because a (male) werewolf was in love with a (female) vampire, but wasn't allowed to marry her, because the vampires wanted to have their race pure. And that started a big war between werewolves and vampires that lasts for more than 600 years.
What is funny is what they use for fighting each other: the vampires try to kill the werewolves using silver bullets and silvernitrate bullets (which get liquid when they enter the werewolves' body, and thus can't be removed), and the werewolves fight the vampires using bullets that illuminate ultraviolet light as soon as they enter the vampires' bodies. Anyway, I don't want to spoil more, but so far, this is the background story, and as you can see, really strange.
The staging itself was relatively boring at some points, and the end was so open that a second part can be expected in case Underworld is a success (financially). A lot of shooting (why the heck can they shoot bullets after bullets from their fully automatic handgun for several minutes without any reloading?), a few really bad bullet-time-like effects, and a really bad story: this is really 100 % trash.
One highlight of the movie was the actor Erwin Leder, the Johann from the classic WW II submarine movie Das Boot. He played some kind of doctor or researcher werewolf, and I almost instantly recognized him, although he changed a lot compared to 1981. BTW: I can really recommend into having a look into Erwin Leder's filmography, it's really interesting (and sometimes funny) which roles he played so far.
Saturday, January 31. 2004
Enciclopedia Virus reports that the FBI confiscated SCO servers and workstation. These seizures are, according to an IBM employee, both in connection with the SCO vs. IBM lawsuit about the copyright of certain IBM-contributed Linux source files, and with the spread of the MyDoom/Novarg worm. So, SCO seems to be suspected of having brought this worm into the wild by itself (or by one of its employees) to spin-doctor the public opinion about the Linux and open source community.
If you can't read the article because you don't speak Spanish, don't worry, the fish and some basic knowledge of Latin vocabulary helps a lot in understanding the text.
Thursday, January 29. 2004
IE(1) BSD General Commands Manual IE(1)
NAME
ie - Microsoft Internet Explorer
SYNOPSIS
ie [-acfghkp] [-m alternate-passwd-file] [-length of time]
DESCRIPTION
Ie is the web browser. The only web browser. Netscape is irrelevant.
Opera is irrelevant. Ie is your master. Kneel.
There are two ways to use ie: non-executed binary and insecure mode. The
non-executed binary is the mode ie ships in. There are no flags or direc-
tions for use in this mode.
...
You can download the complete manpage here.
Wednesday, January 28. 2004
Bastards!
Oh, I really love this kind of Google hacks.
One idea that is floating around in my mind is a way of combining HTTP and LDAP. Usually, the virtual directory tree that is accessible via HTTP is mapped to some directory tree in the filesystem. But why always the filesystem? LDAP directories also provide a hierarchical tree, similar to the filesystem (well, Unix filesystems aren't actually trees, but DAGs). So, why not map the virtual HTTP directory tree to an LDAP directory? This would look something like this:
http://somehost.com:80/o=foo/ou=bar/cn=baz would be mapped to cn=baz,ou=baz,o=foo,port=80,dc=somehost,dc=com in the LDAP directory. The cn=baz,... entry could be of some special object class that is yet to be defined, but it could be a text file, an HTML file, an image, a reference to an external program that should be called (CGI could be implemented this way), whatever. Such an object could also contain the right MIME type or access permissions, so there would be a better transparence for such kind of information.
But currently, this is only a vague idea, with nothing written down (except for this weblog entry), and absolutely no existing code. Feedback is welcome, better (or additional) ideas too, and if anybody wants to work on this, send me preview code.
|