Category: Technology

SPOILER… it’s obvious.. Buffy never loses… This video is up for a Webby Award in the mashup section. GO VOTE and support this BRILLIANT piece of Video!

The Original

The Remix

A couple of people who commented on the Remix in the webby awards illustrated a very specific point that I have unable to put into proper words. I want to quote them directly.


“The main characters in Twilight seemed to embody antiquated, sexist gender stereotypes. Edward Cullen…spies on Bella, he stalks her (for “her own good”), he sneaks into her room to watch her sleep (without her consent) and even confesses to a deep, overpowering desire to kill her…


“Before you start talking about domestic violence maybe you should read Twilight or watch the books – sure it isn’t great to encourage violence but it is certainly better than encouraging millions of young women to embrace the idea that the most perfect relationship includes threats of violence and stalking, as Edward commonly does with Bella.”

It’s one thing to write a book based around vampires, it’s another thing to make them abusive to people they are supposedly completely enraptured and in love with. Yes, Spike and Drew were abusive to each other, but that was their nature! They were vampires! Joss didn’t humanize and romanticize them! They were mean horrible, Brutal and soulless creatures! Stephanie Myers has created and romanticized the idea that being a woman and being abused is perfectly acceptable for “the perfect relationship” where he has flaws that are “enduring and charming”, and the poor man can’t control himself despite his best efforts. Shame on you Myers. Seriously.

Read the notes of the guy who created it, the answer to the question What would Buffy Do?

Google hack was successful?

Credit goes to Wired.

Report: Google Hackers Stole Source Code of Global Password System

* By Kim Zetter Email Author
* April 20, 2010 |
* 1:06 pm |
* Categories: Breaches, Crime

The hackers who breached Google’s network last year were able to nab the source code for the company’s global password system, according to The New York Times.

The single sign-on password system, which Google referred to internally as “Gaia,” allows users to log into a constellation of services the company offers — Gmail, search, business applications and others — using one password.

The hackers, who are still unknown, were able to steal the code after gaining access to the company’s software repository, which stores the crown jewels for its search engine and other programs.

Because the hackers grabbed the software, and do not appear to have grabbed customer passwords, users aren’t directly affected by the theft. But the hackers could study the software for security vulnerabilities to devise ways to breach the system that could later affect users.

Google announced in January that it and numerous other companies had been hacked in a sophisticated attack. The hackers had targeted source code repositories at many of the companies, including Google.

According to the Times, the theft began when an instant message was sent to a Google employee in China who was using Windows Messenger. The message included a link to a malicious website. Once the employee clicked on the link, the intruders were able to gain access to the employee’s computer and from there to computers used by software developers at Google’s headquarters in California.

The intruders seemed to know the names of the Gaia software developers, according to the Times. The intruders had access to an internal Google corporate directory known as Moma, which lists the work activities of every Google employee.

They initially tried to access the programmer’s work computers and “then used a set of sophisticated techniques to gain access to the repositories where the source code for the program was stored.”

The Times doesn’t elaborate on the set of sophisticated techniques the hackers used to access the source code, but in March, security firm McAfee released a white paper in relation to the Google hack that describes serious security vulnerabilities it found in software configuration management systems (SCMs) used by companies that were targeted in the hacks.

“[The SCMs] were wide open,” Dmitri Alperovitch, McAfee’s vice president for threat research told Threat Level at the time. “No one ever thought about securing them, yet these were the crown jewels of most of these companies in many ways — much more valuable than any financial or personally identifiable data that they may have and spend so much time and effort protecting.”

Many of the companies that were attacked used the same source-code management system made by Perforce, a California-based company, according to McAfee. The paper didn’t indicate, however, whether Google used Perforce or had another system in place with vulnerabilities.

According to McAfee’s earlier report, the malicious website the hackers used in the Google hack was hosted in Taiwan. Once the victim clicked on a link to the site, the site downloaded and executed a malicious JavaScript, with a zero-day exploit that attacked a vulnerability in the user’s Internet Explorer browser.

A binary disguised as a JPEG file then downloaded to the user’s system and opened a backdoor onto the computer and set up a connection to the attackers’ command-and-control servers, also hosted in Taiwan.

From that initial access point, the attackers obtained access to the source-code management system or burrowed deeper into the corporate network to gain a persistent hold.

According to the paper, the hackers were successful at accessing source code because many SCMs are not secured out of the box and do not maintain sufficient logs to help forensic investigators examining an attack.

“Additionally, due to the open nature of most SCM systems today, much of the source code it is built to protect can be copied and managed on the endpoint developer system,” the white paper states. “It is quite common to have developers copy source code files to their local systems, edit them locally, and then check them back into the source code tree…. As a result, attackers often don’t even need to target and hack the backend SCM systems; they can simply target the individual developer systems to harvest large amounts of source code rather quickly.”

Alperovitch told Threat Level his company had seen no evidence to indicate that source code at any of the hacked companies had been altered.

Read More

Twitter getting a legecy?

You know social media has taken a new meaning to it’s existence when the library of congress decides that twitter needs to be archived.

I can see some valid points to this, but I’m not so sure that this is a wise idea. On one hand, there are millions of tweets of people saying that perhaps that they just got a blowjob. People have been getting blowjobs through the beginning of time. This isn’t a surprise to anyone and isn’t worth saving, because in 100 years, people will still be getting blow jobs. On the other hand, if someone announced that they have the cure for cancer that would be worth saving. However, something of that magnitude would be done through different channels and wouldn’t likely make it to twitter until after the fact. That data would be archived in history books. So would the after effect, where everyone turned into creatures that ate others humans leaving only will smith alive to redeem humanity.

I’m not saying that twitter is worthless, but as one news reporter put it. it’s a big segment of our digital Heritage, and we’ve already lost so much of it. While I agree that it is a huge part of our global digital heritage I’m not sure that most of twitter is worth saving. If twitter was mostly legitimate I could more easily understand that, but it’s not. it’s millions of people bitching about their day to day activities. The only other reason I could see that The Library of congress would want this would be to be able to track criminal activities through time. At which point this is a government move and not one really intended for the purpose of humanity.

Either way, I’m going to start filling my twitter with messages about blow jobs in 140 characters or less. I must fulfill my part of what’s worth saving in our digital Heritage!
How tweet it is!
Library of congress twitter

In recent weeks I’ve become more and more discontent with my iPhone, with the introduction of the iPad and what it does and doesn’t do, a whole slew of new skeletons have come out of the closet. Lee Brimelow is a Platform “evangelist” for Adobe. He recently posted in his Flash blog. How Apple is slapping developers in the face, by limiting what language they are allowed to program in to make applications for their devices. Now this shouldn’t come a surprise really, Apple to me has always come off as a discontent controlling child who wants to control media at large, by allowing what we do and don’t view. They do it by making people spend a ton of money for their products, which in turn people feel like they need to use it because they spent so much on it. This seems like a really ridiculous notion for this economy. Whenever I’ve pointed this out to apple enthusiasts they insist it’s worth it by saying that Apple quality is superior. Seeing I’m now on my 2nd 3G iphone which has another malfunction that I again have to replace it; so I’m inclined to disagree. I’m citing that some have good luck, and those that have bad luck, anticipated the possibility of it and bought the extra warranty and therefore aren’t inclined to argue very hard. These people are happy to go back to their old devices and methods.

In addition to that most windows freaks went into it knowing that they stepped into a possibly unreliable world. Face it. Wither or not you’re an iphone freak, or a mac head; despite the fact that Apple may have a massive chunk on the Smartphone segment, they’re still a tiny blip on the map, that only survived because of Adobe. Because Of risc Processors, because Microsoft bought most of your stock and gave you a shit ton of money, to keep you afloat so they would not become a monopoly on the market. Yes, it’s true. It happened, Mac-heads don’t like to admit it, but it’s true.

Apple has done little to the face of innovation, they’ve advanced in tiny ways that have brought out surges of others ideas, but nothing so dramatically face changing since the Apple II that it’s losing the concept of what innovation is. Steve Jobs, is a controlling, smug, self-righteous son of a bitch. Who puts out products that causes an uproar. But the uproar is what causes the drive for people to use them, or come out with a way to make it do what it is fully capable of doing. If Steve wasn’t such a dumbass he’d look at the jailbroken apps available like lockinfo, and incorporate some of these into the iPhone OS. Rather than having a blatant disregard for the open developers who push the product to the limit and embrace their ideas he ignores it entirely.

Now that I’ve completely gone off on this tangent, I’m going to get to the point.

Apple is controlling, very much so. One paragraph in Lee’s post really struck me as almost a violation of our inherent 1st amendment rights.

“I am positive that there are a large number of Apple employees that strongly disagree with this latest move. Any real developer would not in good conscience be able to support this. The trouble is that we will never hear their discontent because Apple employees are forbidden from blogging, posting to social networks, or other things that we at companies with an open culture take for granted.”

Personally, this word bothers me a lot. “Forbidden”. If he is saying that they are unable to speak for themselves without fear of retribution? I can understand Apple wanting to protect the image of the company, but my question is if Apple was such a great place to work, then why wouldn’t they want to protect the image of the company? The answer is simple. It’s not.

Isn’t that one of the reasons why the country known as the U.S.A had the revolutionary war? Freedom of speech was so important to the founding fathers that it was the 1st amendment… not the 3rd or 13th.. but 1st. So not only have the government impending our 1st amendment rights, but private companies are doing it as well. Yet, this is also okay.

Job’s own ideology is shown to the general public (and owners of iPod Touches, iPhones, and now iPads) as a gesture of their enforcing his morals of the almighty Apple. They have removed any and all apps that might have an insinuation of sex or nudity or suggestion. But it didn’t stop there, they took it one more step too far. They removed a app of the Winter games because it had one picture of the speed skaters in her skin tight uniform receiving her gold medal.

Now excuse me if I’m slightly annoyed that people are not allowed to use their devices how they see fit. I understand that apple already had a certain amount of insane and ridiculous restrictions on apps that were being created, to further this and take it that far because it’s inappropriate for children? Or because developers might have ideas of their own? Since when is it’s apple’s right to be the moral judgment for parents? Why not just put an option for a parental lock on certain apps like a widget in the configuration?

There are plenty of ideas out there that you (Apple) could use, and it would make vast improvements in the UI alone of the iPhone OS. It’s time to Shit or get of the pot.

Honestly, the android phones are so much more customizable, and I’d rather get one so I can put what I want on it without restrictions to Flash or content. Unless Apple makes some serious changes in the next year, I’m ditching my phone.

I’ve added a few new plug ins’ one is to post my blog entries as link to facebook. The second is an update to make it iphone friendly. I’ve not tried it on an android but that is the next step.

Also, I’ve had the opportunity to play with the iPad. while it’s cool and it looks like a massive version of the iphone/iPod it is slightly different.
The interface allows for new customizations that your iphone didn’t like putting up a wall paper behind your home screen. Pictures and movies look absolutely gorgeous, but the speakers that are used are pathetic. you really need your own headphones if you’re going to enjoy much of anything with it.

Drawback, no flash support. I love the fact that in a month or two there will be a version that will work on 3G if you purchase a data plan, and that’s awesome. but what’s the point of having it web capable and able to go anywhere if it does not support flash? IF you want a large movie player for your kids to watch in the back seat of the car it would be a great device if it was blue tooth capable to do that, but it’s not.

Honestly, it’s a nice.. gimmick. But I have to say that Apple failed on this one. When my contract is up with my iPhone I’m going to ditch it. I for one am horribly disappointed. I won’t even use this thing as an iPod afterwords, I’ll buy a Zune.

Apple’s lack of ability for customization over Windows machine is a complete slap in the face to the public. I hope apple gets their act together, because in this economy, they shouldn’t be taking risks.

Online fear, loathing, and not giving a damn

A list of 21 apps that apple doesn’t want you to have. Because their current SDK won’t allow you to do this on a non-jailbroken Iphone

21 Apps

Fallout MMO.

It was announced today that Interplay and Masthead Studios confirmed the rumors of a Fallout MMO to be true. Not only that they slated a Beta time frame, sometime in 2012.

A game about post apocalyptic America, set in a year that’s supposed to bring on the apocalypse, the irony is to too great to pass up. I will laugh with joy if they decide to do the beta in January, and the release on Dec 21th 2012.  Not to mention there will be much giggling of me and several of the men of my office… I like that it would be much to the sounds of which will be similar to that of small school aged children of the female persuasion.

Read about it here

This is begging to be shared.

The Muppets do Queen!



So a long time ago, I setup a web proxy. I rarely use or need it anymore. The intent at first was to make it so only I really knew where it was. Lately, I’ve given it out to a number of people, and I figured what the heck. I might as well make it for public domain.

So here you are.

You use this proxy at your own risk, I am not responsible for content that you may see or your twisted mind may come across. I cannot be held liable for anything that may happen to you, as a result of your usage of this proxy.
This proxy works for the vast majority of websites and content, if it does not work I will look into it but I will not promise that I can make it do things that just may be beyond me to do successfully. Other than that, please enjoy yourself.