The need for a “good” email address!

Thursday, May 18, 2006

Permit me to offer some unsolicited advice?
I'd like to share something I wrote a while ago. I think it is even more true now. And easier to implement.

People sometime judge you by your email address.

I see that you have changed from Yahoo to Hotmail. IMHO I don’t think that’s a good change. People want to do business with people they can trust. Hotmail is associated with kids. Free services don’t engender confidence.For example, which would you trust more ReinkeFJ AT reinke DOT cc or ReinkeFJ AT hotmail dot com or supernerd @ gmail dot com?

I have two hosting companies I use at a very modest cost that I can recommend. If you’re interested?

Jasper Jottings is hosted by http://www.1and1.com/?k_id=9113251 and YAG is hosted by http://www.aplus.net/ (AP2297627204). I prefer 1and1 but either is good. And cheap. You can lock in a good deal for between 120 to 240 per YEAR! I think that is a minimal investment for a professional image.

FWIW

===

04/30/04

<snip> 

You should learn form the mistakes of others. You are not obligated to make EVERY mistake yourself into order to acquire wisdom.

IMHO the gold standard solution is to attach it to your own website with a hosting company. For example, me@mydomain dot com. When you buy your domain name mydomain dot com with a hosting company, they usually throw in email addresses with the deal. At least the good ones do. You MUST choose a good domain name for job search purposes. Use your name if you can get it. Mine was not available. Who ever heard of the Reinke Pivot Irrigator Company? But I did get reinke dot cc. But that is another story.

The silver standard is to buy your own email separately from a well-known financially sound company like Yahoo. AOL make you look like a kid. The bronze solution is to purchase or use a free redirector. Bigfoot has a pay service. For a while when email wasn't common and anyone would ask about the funny name, I used the lock in story in interviews to advance my value proposition. ("I minimize lockins personally and can do it for you"). Alumni associations and groups like IEEE all have free redirectors for their memberships. Anything is better than allowing an ISP to lock you into to "your" email address.
The bronze standard is use an ISP based account.

The lead standard is to use a free service like HotMail, or such. 

 <snip>

Your mileage can, and will, vary.

Good Luck,
fjohn

###


Yahoo Phone: It had a hard start this morning!

Thursday, May 18, 2006

It took three cycles this morning before I could get YIM to open a phone line this am. That's not good. To compete with a land line, it has to be seven 9's reliable AND cheap. Just cheap doesn't cut it.

Hmm? 


Yahoo wants to get you interested in registering a domain. Why bother?

Wednesday, May 17, 2006

Received an email from Yahoo offering a domain name for 2.99! 

***Begin Quote***

How long will you wait to get that domain for your business, hobby, family, or anything else that interests you? For only $2.99 for the first year, you'll get your domain name plus:

>  24-7 toll-free support: Get help if you have questions.
>  Bonus starter web page: Establish your web presence in minutes.
>  Domain forwarding: Easily send traffic from your other sites.

Your domain name is out there. Go get it. 

***End Quote***

 But, I've read GoDaddy's description of the add drop scheme.

http://www.bobparsons.com/index.php?/archives/116-guid.html

***Begin Quote***

Millions of good .COM domain names – on any given day over 3.5 million and climbing — are unfairly made unavailable to small businesses and others who would actually register and use them in ways for which the names were intended. Many times businesses accidentally let their domain names expire. When they go to renew them, they find they have been snapped up – and taken away with a huge expensive hassle to follow – by an add/drop registrar.
***End Quote***

So it's a waste to even bother looking for "good" domain names. They're all tied up by these phony registrars.

So Yahoo don't waste my time. 


LUG running wxp sp2 seems to “disconnect” every night?

Wednesday, May 17, 2006

Seems like at midnight or there abouts, LUG "disconnects" from my home network. Interesting because nothing will convince it to reconnect but a reboot. Interesting?


Karen’s Replicator is a straight-forward backup utility that copies individual files and folders to another location

Wednesday, May 17, 2006

http://www.karenware.com/powertools/ptreplicator.asp

Karen's Replicator is a straight-forward backup utility that copies individual files, folders and even entire drives to another location. Its key feature is to schedule automatic backups. Simple, effective and … … free!

I use it to backup my luggable to my home desktop and my old laptop. While not precisely the same, if luggable would die unexpectedly, then I could take my oldlap laptop and not miss too much data wise. I would really like to be in the position of having two identical platforms but who can afford that? If I ever do it again, then that's what I'd do. It would be interesting since one would know what fouled up the environment. Sigh. Till then, I'll be using Karenware's replicator to duplicate data directories.

Of interest, the only trick I had to use was to define the other machines on the network to LUGGABLE so that they would each have drive letters. 

Hmm, other ideas?   


Spammers kill Blue Frog! Now we know who runs the internet!

Wednesday, May 17, 2006

http://www.broadbandreports.com/shownews/74524

Spammers Defeat Blue Security
Shutting down operations after Russian DDoS attack
Posted 2006-05-17 11:44:57

**Begin Quote***

Anti-Spam outfit Blue Security posted a statement on their currently off-line website stating they were ceasing their war on spam and shutting down, after a Russian spammer essentially DDoS'd the company to death. The outfit had some half-a-million of their members recently bombard spammers with e-mails requesting they cease operations. While some spammers complied, one outfit launched a denial of service attack on the company they simply couldn't overcome, claims the company in a statement:
"Over the past few months we were able to leverage the power of the Blue Community and convince top spammers responsible for sending over 25% of the world's spam to comply with our users' opt-out list. We were making real progress in eliminating spam from the lives of our users.

However, several leading spammers viewed this change as a strategic threat to their spam business. The week before last, these spammers launched a series of attacks against us, taking down hundreds of thousands of other websites via a massive Denial-of-Service attack and causing damage to ISPs, website owners and Internet users worldwide. They also began a relentless campaign of email intimidation against many members of the Blue Community.

After recovering from the attack, we determined that once we reactivated the Blue Community, spammers would resume their attacks. We cannot take the responsibility for an ever-escalating cyber war through our continued operations."
The Washington Post has a good read on the company's lost battle against spam.
***End Quote***

Well, I think we now know who runs the internet. It's not the ISPs, the gummamint, or the users. It's the spammers!

We have to very quickly get a strategy that works — verified senders, a mail "tax", or whatever. 


Visual Basic version of the confederate coding mechanism

Monday, May 15, 2006

*** Begin Quote ***

Recently read the frontpage story of breaking the confederate code 137 years late… Figured I would write a visual basic version for fellow VB nerds to play with on digg.

*** End Quote ***

Adds on to the interesting story with a resurgence in private cryptology. Like brain surgery for amatuers. :-)

read more | digg story


Cracking an old code! AND an implication in today’s news.

Monday, May 15, 2006

http://rz1.razorpoint.com/index.html

How I Broke The Confederate Code (137 Years Too Late)

*** Quoted from DUGG *** 

A very interesting read about a former NSA cryptologist cracking a confederate code from the Civil War. Rather topical in light of the recent cracking of some WWII enigma codes, the current NSA stories in the news and, of course, all the "cryptography" in the imminent release of the Da Vinci Code. Interesting stuff.

*** End Quote ***

Having certified as crypto geek at NSA, I thoroughly enjoyed reading this crack. Note the extensive use of history, knowledge, geography, feel, emotion, and hunches. This demonstrates how far we have come. Once has to be extremely careful in any crypto operation. I am amused that PA has adopted eNotary. I'd be much more circumspec about the widespread deployment of cypto.  

*** Begin Quote ****

Electronic Notarization Comes to Pennsylvania!On January 3, 2006, the Secretary of the Commonwealth of Pennsylvania began accepting applications from currently commissioned notaries in the state for becoming approved electronic notaries (eNotaries). eNotaries are permitted to engage in electronic notarizations after receiving approval from the secretary. An application may be filled out online and printed from the secretary's Web site at http://www.dos.state.pa.us/bcel. Complete instructions and more information are also available on the Web site. 

*** End Quote **** 

HMmmm? 


Taking Inventory of Program Files

Monday, May 15, 2006

Easy to start

Open dos window

cd /program files

dir *.* > /dirprog.txt

edit dirprog.txt

trim the extra

CNTL-A CNTL-C

Open excel CNTL-V 

Add some headings

Then the hard work begins.

Categorize: Huh?, Utility, Application

Arghh! 


Strange things happen to my linksys network this moring

Sunday, May 14, 2006

When I arrived on duty this morning (i.e., got up and went to check my email), I discovered that LUGGABLE was disconnected from my wifi net. First thing I did a repair and opened up wifi icon. My faithful OREGON wasn't there. Hmm. I wnt to OLDLAP and it do was disconnected. Now I know Comcast is in their Mother's Day freeze so it's unlikely that it was them. SO I went and restarted the linksys wap.

I checked my UDP forwards that Azureus was griping about while I was there. They all were all their as I thought. udp 5000 – 5099 maps to 100, 5100 – 5199 maps to 101, you get the idea.

WAP restarts and I see the blinking lights on the WAP, the WAN, and the cable modem. SO I return OLDLAP is now connected. AND now to LUGGABLE, it too has reconnected.

Sort of. Look around and everything seems OK but it's running like mud. Lookout seems to be taking all the cycles. Blue Frog is offline and won't come back. Azureus is griping about UDP settings. No choice reboot. Argh! Reboot takes for ever because nothing is shutting down. Everything has to be closed out. Rebooted.

All coming up OK. Except blue frog. It takes a runtime error and says call hq. Call hq and they are offline for maintenance. Good service blue frog! There's a strike against them. Argh.

Everything else seems RTN (returned to normal) but how can you ever know with windows.

Takeaway: I would like to find a Flight Data Recorder for the PC. Something as trivial as ping a know good site (i.e., yahoo, google) say every 15 minutes and record the results. It runs routinely and logs when external connectivity is lost. If I had that on all my boxes, I might be able to trace the culprit. By know precisely when connectivity was lost, you'd at least have a fact. Now all I know is that it dies between bedtime and wakeup. Arghh, arghh!

Takeaway: Blug Frog still down. 

Comments? Ideas? 


If you can’t afford a T1, maybe you can get by with two residential services?

Saturday, May 13, 2006

http://t1rex.blogspot.com/2006/05/when-cheap-broadband-becomes-too.html

***Begin Quote***

The professional Internet service you want, regardless of whether your office is a spare bedroom or a storefront, is called T1 Internet or Dedicated Internet.
 
***End Quote***

Thought I might contribute an anecdote and an idea.

Anecdotally, I ran a home based consulting business twice – first time for four years and the second time for two years – I used cable residential service and a dial account for backup. While I’m not consulting now, I have moved from the dial account to verizon wireless broad band.

An idea for some one who needs a better (i.e., cheaper) solution than that a 500 $ per month T1, which sounds great, might be — if available — two combine TWO high speed residential services (e.g.: DSL and Cable) for say 200 $ month. Not the greatest solution, but it would be cheaper that a T1. You’d have to put in a real router and do some configuration to ensure that you’re not becoming a peer in between two isps. BUT, 300 $ per month  might be good enough.

That doesn't solve your disaster recovery issues. What happens if you lose power? A "Katrina" might force you to abandon your location, what happens then?

I think that servers belong in datacenters; not homes. When I look at pricing, it seems cheap enough.

Comments?


Homeland Security took this fellow’s site and whole bunch more

Saturday, May 13, 2006

http://grigorioneurope.wordpress.com/2006/05/13/homeland-security-stole-my-site/

***Begin Quote***

I go to my web host's site – 2MHost; after this ordeal I won't give them the honour of a direct link – and look for a phone number. None to be found. I suddenly lose all my faith in the up until now fairly reliable host. I get onto their Live Chat, wait for about 10 minutes for the guy to tell me what the hell has happened. Then get a canned response to the effect that the US Department of Homeland Security (there it is, oh {Expletive Deleted}!) has confiscated their hard drives. 'Objectionable material'. Possibly terrorist documents? 'We don't think we will get them back in a timely manner so we have restarted all logins with blank accounts …. 3 months free hosting to compensate'. Oh thanks. Three months hosting what? I have no files.

*** AND ***

Thanks for that watercooler. It does look like that Democrats site was hosted by the same company, 2M Host.

Hopefully they can put some pressure on the DHS or ask some questions. I completely agree with what those guys said about giving reasons for the seizure. Of course I understand what needs to be done needs to be done – if it was some kind of terrorist data or child porn – but a reason would be nice.

***End Quote***

See Big Government Law#3, "Big Government Programs create new problems (aka Unintended Consequences)"!

For anyone involved in technology as a provider or user, backup, backup, and then backup again. For content creators not to have all their content stored all over the place, local and onnet and offsite and in lots of places is inexcusable.

See in my mind the villians of this piece is into DHS or whatever unnatural disaster that happened. No the bad guys are the author and the service provider. Either or both could have made this a non-event.

In my mind, you would think that one service provider would have a reciprocal agreement with another for recovery.


What is a blog and why should I care?

Saturday, May 13, 2006

What the {expletive deleted} is a “BLOG”?

A blog is an easy-to-use web site, where you can quickly post thoughts, ramblings, rantings, and just about anything else you can tap out with your fingers. Akin to writing on the stall in a public bathroom, and some of them are that crude, it has evolved into a Jay Leno-esque medium. A monologue with some interaction with readers. It’s like Anne Frank's 1944 diary, Samuel Pepys’ in 1660, or George Washington’s. Well ok nothing that great but it is collective knowledge of the great unwashed. As a noun, it’s the diary. As a verb, it’s the act of writing. As an adjective, adverb, or other part of speech: egotistical mental mas … … let’s just say self satisfying waste of time … and let it go at that. Bear in mind that like webpages, blogs tend to be forgotten.

You should care for two reasons: (1) The inet has the memory of an elephant. Once you cast the electrons out into cyberspace, they can never be recalled, canceled, edited, modified, or deleted. So if you says something on the net, be prepared to have it come back and smack you upside the head when you least expect it and at the most inopportune time (i.e., job interview; legal proceeding; unauthorized biography; Fiftieth Wedding Anniversary; Retirement Party; Funeral Eulogy). (2) It can be useful for establish your expertise or brand in the market place. You can use it to advance you Unique Value Proposition or your Unique Selling Proposition.

If you want to read a blog, you can just go to their webpage. Blogs can be annoying to read from a web browser. You have to remember to check them regularly check for new content and find nothing. Most blogs offer RSS feeds that can be read with an RSS reader. You can avoid the “I forgot” or “visit for nothing” problems by using a webpage such as MYYAHOO, or install free software like RSSBANDIT.

If you are interested in starting to BLOG, you can your own one FREE at http://wordpress.com/ or http://www.blogger.com/start.

I have always thought that many of my efforts would be best done as a series of BLOGS based on topical areas so that the readers ship could subscribe based on “channels” of interest. But, I have never put the effort in to make that happen. Too much heavy thinking, planning, and lifting. Any volunteers?

Yell if you need help.


Planning my next reinstall

Friday, May 12, 2006

Having been forced by winrot into rebuilding luggable, I am thinking it would be wise to plan for the next reinstall.

Last time, I was lucky because the was essentially nothing wrong with the hard drive. It was windoze that was screwed up. At least one program was lost that I know of (i.e., the Intel Wireless Configuration utility). Data and applications were duplicated. Clean up is a mess.

Why do programs have to be installed?

So my thinking is I need to identify all applications. Catagorize them as: those I can reinstall because I have media and those I can't. For the ones I can't what is my plan?

So I need to create a data strategy. That is somewhat easier. During the reinstall, I found that Windows, certain Applications, and some slovenly habits on my part allowed data to be scattered across the directory structure. I need to come up with a plan for data. Some data is by the nature of the application is automagically off-sited. For example, Corex's Cardscan saves its data on the Corex site. In recovery, it can, after the application is reinstalled, be brought down from the cloud. It's questionable if it MUST be brought down form the cloud (i.e., restoring is useless because it has to be brought from the cloud to be syncable back to the cloud). So it has it's own gotcha. Data could be restricted to a data drive and backup to something like that book drive. Or off-site service like Streamload or such?

So there are lots of apps and lots of data that all needs work.

There is also a class of stuff that needs consideration. Drivers, configurations, and other things need to be accounted for.

Keyboarding everything stinks. So there has to be scripts, batch files, or other ways to recover and minimize the amount of time and effort to do it.

So I have a lot of work cut out for me.

Since I won't move to Vista, I need to identify how I can stay behind until my move to Linux.

My thought is that ideally I'd like to get a base that I could image and then that would always serve as a jumping off point.

One idea would be to create images as I begin to beat this into shape.

So where do I start?


A Technology Strategy for email and a desire to go paperless with crypto

Friday, May 12, 2006

I use lots of email addresses. One for immediate attention. But each of my other email ids has a specific purpose. Politics, professional job search networking, techie stuff, Manhattan College alumni aka Jaspers, Manhattan Prep aka my high school alums, one for work, and lots of secret ones for personal use. All it costs me is setup time! Outlook can poll lots of mailboxes pretty quickly; most only get looked at once per day.

;-)

Many of the email addresses are just a random string (e.g. HJPP 0S9L C9AW EBTY  @ gmail or W363 N93A DPO8 POAS @ gmail). I have several, probably a dozen, dedicated email addresses for different purposes.

I have “lost” a lot of addresses to spammers.

In one case, I know they used an alpha progression to eventually “discover” every address.  I wised up to it when some dumb spammer had “reinke @ att.net, reinkea@, reinkez@ reinkeaa@, …” in the To field. I noted that he quit at 12 so I went to 16 character names. So, I have adopted the long random strings as the “user” part.  Since 99% of the email use is “reply”, no one cares. Also since no one invests any time in the “name”, I can change it when needed (i.e., if it starts to be spammed). 

I have many ways for people to keep in or get back in touch, so it seems to work for me. For eample, http://public.2idi.com/=reinkefj or Plaxo or LinkedIn or Corex Cardscan or … …

It makes for compartmentalizing one’s email. AND, it makes spam and phishing laughable (i.e., a financial institution coming in on the manhattan prep account can be discarded without further adieu). Each financial institution has it’s own gmail account that is never used elsewhere. Hence, an email on the proper account has a high degree of reliability.

You might want to think about what strategy would work for you.

I really really want the financial institutions and every business to truncate paper. I always seemed to be buried in it. If they offer it, I have them discontinue the paper mail. No one does yet but one can only hope they will pick the idea up.

Having a background in cryptology, public key crypto should make this trivial.

The institution could accept my public key and give me theirs. Then they could encrypt my paper (e.g., a statement; bill; receipt) with their private key. Then, they encrypt it with my public key. And put it in the public email to my registered address. I could then decrypt it by using my private key and then decrypt it by using their public key. It is worthless to anyone without my private key.

Note the order of which they do it — SEQUENCE ONE their private key first then my public key; or SEQUENCE TWO my public key then their private key — doesn't matter.

They'd have to register my public key in their keyring somewhere. But when you consider the cost of mailings, they would have to save money. And, I'd be happier.

Wonder when?


TECH: “SYNCURA” online

Friday, May 12, 2006

20060512 @ 133 zulu

I see that it's back. It don't need it right now but one has to remember it's a free beta. Can't depend on what you don't pay for.


TECH: When the internet slows down (Frustration!)

Thursday, May 11, 2006

Around 2200 zulu 10MAY tonight, all sorts of strange stuff began happening. The cable burped. Then the inet slowed down. I was so frustrated I actual shifted to vwbbie and it was slow. So I don't know what was going on. I'd rant but I don't know who to rant at? About 0030 zulu 11MAY, everything began to flow normally again. So I dropped down off vwbbie and back to wifi. Hmmmm, it certainly seems that this points to the thin client with inet versus fat client with everything local. It pointed out the flaws with RSSBANDIT that refreshes from the net. I'd have liked it if it cached the pages locally. Hmmm squared.


TECH: Using MEDIAWIKI, the same software that drives WIKOPEDIA to form up a “database”

Thursday, May 11, 2006

As an avid "alumni collector" (i.e., I run an ezine for my fellow alums at http://www.jasperjottings.com), I have tried to "collect" their information using a variety of ever changing strategies. Corex Cardscan, Text Files, Plaxo, LinkedIn, Excel, Access just to name a few. Several proprietary databases like yahoo Groups, Listbot, and several I have forgotten. I've been doing this for a bunch of years. Nine to be exact. And, I STILL to this day don't have a good methodology, strategy, tactic-ology, or technology for dealing with it. But, I am now getting close. First rule is I'm not putting data into anything that doesn't give it back EVER AGAIN. So a wiki is perfect. Since it is entirely under my control. I have been working on getting my files into a form that MEDIAWIKI likes. It's pretty restrictive but it looks like HTML is OK. More when I have a break thru, or a break down.


TECH: “SYNCURA” offline

Thursday, May 11, 2006

20060511 @ 1437 zulu

Just when I wanted to use it. Argh! Their website isn't responding either?


TECH: Yahoo Instant Messenger now installs on LUGABLE (Finally!)

Wednesday, May 10, 2006

http://download.yahoo.com/dl/msgr75/us/ymsgr75us.exe

Yahhhoooo, Yahoo Help finally supplied an executable that will install. I installed and it's running.

It was wireless wednesday. And, as planned, I have the loveable LUGGABLE up on vwbbie (i.e., the Verizon Wireless not so Broad Band service). I was able to make one out call from it to home that was acoustically unusable. The called party could hear me but it was delayed badly. I abandoned it and went to a landline. Of interest was that it did charge me two cents for the failed call. That's a bad omen.

I want to have an incall to test. Maybe I'll try it from my cell to laptop. 

Arghhhh!


TECH: It finally came to me. My problem with web-based programs is … …

Tuesday, May 9, 2006

… based on my problems with the new version of Yahoo Messenger …

… … is that you are not in control of your computing environment. You have the illusion that you are but you're not!

 If I was, I could fall back to an old version of Yahoo Instant Messenger. I have the old version. At one time, I felt that I'd always wanted to keep what I was installing locally. Remember my winrot experience. But, now neither YIM version installs.

Reported earlier, LinkedIn changed their UI which disrupted my modus operendi.

It just seems that I keep losing control.

That loss of control wastes my time. Which is the most critical resource to me.

So officially declare me "not a fan of web based apps"!


TECH: BLUE FROG is getting more results … (i.e., spammer’s admins “inconvenienced”!)

Tuesday, May 9, 2006

http://www.wired.com/news/technology/security/0,70831-0.html

***Begin Quote***

"Blue Security is indeed hurting our business, but not by taking down our websites," the purported spammer wrote. "Instead, they create a daily nuisance to our server administrators."

***End Quote***

Awhhh, poor spam server administrators … have … daily nuisance. They better not make their identities known or they will have a hard time finding work in the industry.

Already, when they pop out of their rat hole, they get pounded.

A spammers website got "dug", (i.e., equivalent to slashdotted) and their link collapsed under the traffic (i.e., ping times a grazillion people tends to abosorb your bandwidth). Akin to Dlink's NTP fiasco. Only this time it was deliberate.

***Begin Quote***

There is a great discussion going on about BlueSecurity and the jerks at specialham.com. (Search for Spammers in Digg). 544 comments when I checked a few minutes ago. There's a lot of good tech info on how the bad guys jump around the globe hourly to avoid detection.

The Digg effect and the Digg Army did a great job of bringing specialham.com to its knees. Even though Alexa is not the most reliable source of information, you can see there was a huge increase in activity on Sunday at the specialham.com site. Here is a link to the most recent Alexa chart. The daily reach went from 25 million to 450 million in one day. That is a big RED FLAG for their advertisers and sponsors. http://www.flickr.com/photos/jbenson2/143175992/ 

***End Quote***

And one digg commentator summed it up nicely:

***Begin Quote***

A MESSAGE FOR THE BLUE SECURITY SPAMMER…

Since I've seen plenty of evidence that you're trolling anywhere on the web that people are discussing Blue Security and your deeds, I'm absolutely certain that you will read this.

Some things I need you to consider:

1) It's ridiculous for you to say "If you want to be removed from our mailing list, please opt out first." We tried that. You didn't listen. Blue Frog seems to make a concerted effort to *make you listen*. Seems to have worked. You're reading this right now, aren't you?

2) It's even more ridiculous for you to say "The point of it is to get Blue Frog software to stop turning its subscribers' computers into zombies that attack our servers". Why? Because you use botnets / zombies to do a bulk of your spamming. And you used them again to give Blue Security fits for a few days. The difference between Blue Security and you is that their software is on our computers by *our choice*. I don't think you can say the same of your vast botnet that sends spam.

3) The threats and lies you spread are so outrageous, I wonder how you think anyone is going to believe them — or for that matter — your whole facade of "I'm the the good guy" and "what these Blue Security people are doing is illegal." What you fail to understand, Mr. Spammer, is that this is a very sophisticated community of people you are dealing with; the early adopters of Blue Frog. We've put up with your Spam for years and years, we're mad as hell and we're not going to take it anymore.

4) It really doesn't matter if you have my email addresses. If my email addresses were so unbelievably private and well-guarded then I wouldn't have a Spam problem, now would I? So how do you think you can threaten me? Do you really think that I'm going to notice an increase in Spam as a result of your efforts when I routinely filter 500 a day? Think again.

5) The more attacks you pull on Blue Security and especially ** read this ** on regular guys like me, the more you draw attention to yourself and increase the possibility that the real big guns of the Net will get involved and squash you. And at the same time, you make Blue Security even more powerful and well known. Everyone I know is installing Blue Frog now.

I guess your threats had the reverse effect than you intended.

***End Quote***

DITTO!

Come on inet, let's get mad!


TECH: Google has Google Reader for RSS feeds … … (interesting?)

Monday, May 8, 2006

http://www.google.com/reader/things/intro

***Begin Quote***

Welcome to Google Reader

Spend your time reading what you care about most.

***End Quote***

Nifty! 

Plug in https://reinkefj.wordpress.com/feed/ to read my feed in it.

You need a signon so if you need a gmail invite, drop me a note. I have lots of them. As does most GMail users. It is important to play with all these gems. Just to know what is in Web2.0. Or whatever the hyped name for the future of the web is being used today.


TECH: BLUE FROG engaged in heroic battle!

Monday, May 8, 2006

***Begin Quote***

Reference number: LTK6904419311X Please use this ticket number in any correspondence with us.
Subject: from email
Dear reinkefj,

Thank you for joining Blue Security community.

Unfortunately, because of a major DDos attacks, we are currently focusing on maintaining our facilities, therefore your Blue Frog will not post opt out requests in the next few days and the spam reporting may fail. Please report us your spam messages only after the service will start function properly again. Thank you for your patience.
Thank you again for your support.

Should you require further assistance or information, please do not reply to this message, but simply use this Support form.

Best regards,

Idan Liron
Support Team
www.bluesecurity.com  

***End Quote***

Go get 'em guys. This is one of the first offensive strikes back at spammers. I think they deserve our support. It doesn't surprise me that at least one spammer doesn't want to lose his revenue stream.

I would think that those interested in cyber-defense of the USA would be watching this epic struggle as a prototype of what could happen to our national infrastructure.


TECHNOLOGY: Using freedownlodmanager, mp3split-ght, and some batch files to make life easy

Sunday, May 7, 2006

To compensate for a cheap mp3 player which doesn't remember where in an mp3 it left off (i.e., it always starts at the beginning of a "song" arghh) and its lame fast forward function (i.e., hold down a button forever), I engineered my own solution.

I like to listen to the fellows over at http://www.freetalklive.com, who while sometimes a tad "juvenile" about what they are interested in and talk about, do have a show that talks about liberty. It does challenge one's assumptions. And, even for a cranky old Libertarian like me, it has developed my thinking. It's a good use of my commute time. And, they put their show out as a podcast, which means I can time shift. They rapidly wormed their way into my commute and become my favorite podcast. And, the podcasts are free unlike almost every other talk show like Rush, Bob Brinker, or such. Many talk shows don't even have a podcast for you to time shift with. From time to time, I listen to IT Conversations, but it's too much like work where I'm going to or coming from.

Any way back to compensating for the cheap mp3 player. The freetalkwebsite has the last six days of podcasts available as an http download. More than a year's worth are available by BitTorrent. So every Sunday, I get the last week's for my next week's drive time.

FreeDownloadManager http://www.freedownloadmanager.org/ is a download accelerator and manager. Free! Using this software you can easily download files from any web site. With FDM, I do my usual "save as" and FDM takes over from there. So I do six right clicks on the web site, select the right destination directory, first time takes a few more clicks, and FDM does the dirty work. It gets each one in turn; two at a time.

Then, I fire up mp3split-ght http://mp3splt.sourceforge.net/ and get ready to surgically split the nominally 3 hour mp3 from FTL into 12 ten minute segments. I experimented with 24 fives and that was OK; ten seems to be "better". SO I set my output destination the first time; it remembers after that. Select 600 minute blocks. And, select my input file. Usually by this time, FDM has all the files. So I run mp3split-ght and it creates my 12 ten minute mp3s.

Here's the tricky part, if I just went ahead an split the next file, it gives them the same name. (I haven't figured out that different name stuff in the program. Must have a feature. Just too lazy!) So I run a trivial batch file to rename the parts to Monday1 to Monday12. Yes, I have six batch files, one for each day.

I proceed to iterate. Split and rename five more times.

Then I use MusicMatchJukebox http://www.musicmatch.com/home.htm to nuke everything on the mp3player from last week and stuff this week's stuff on it.

The whole process takes less than 20 minutes. And which doesn't require my full attention all the time.

FWIW YMMV just in case you were interested in a cheap and lazy way to do it.


TECHNOLOGY: wordpress appears to have posted something four times

Saturday, May 6, 2006

Maybe it's me?