Create an Account
username: password:
 
  MemeStreams Logo

I Love Lamp's MemeStream

search

I Love Lamp
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

I Love Lamp's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Mac Book Air vs. Lenovo X300
Topic: Technology 2:02 pm EDT, May  1, 2008

My friend that works at Lenovo sent me this video.

I really like the X300. Work purchased a T60p for me before the X300 was available. Hopefully I can scam them into one sooner than later. Also, I'm pretty sure I would snap the MacBook Air in half the day I got it.

Mac Book Air vs. Lenovo X300


Replacing people with RSS feeds
Topic: Technology 10:56 am EST, Feb 29, 2008

I've worked with someone in biz-dev for a while where he essentially interfaces with certain large companies and keeps senior management and research up to date on things the companies are working on that impact us.

There has been a slow and steady decline in the quality of these reports over the last year or so, to the point this person is literally forwarding me items directly from the company's RSS feeds.

... [sigh] ... So, I conducted an experiment where I subscribed to 3 RSS feeds and kill filed the biz-dev guy. The result? I'm actually receiving *more* up-to-date info then he was providing because I don't have the lag-time while he reformats other people's content into Digest-of-Company-X emails. Granted I'm missing his commentary but thats a trade-off I'm comfortable with.

Maybe that makes me rude, but I found a way to save the company $80k a year. Go figure.

Replacing people with RSS feeds


YouTube - Trailer: The New Face of Cybercrime
Topic: Technology 1:21 pm EST, Jan 17, 2008

Created by Academy award nominated director Fredric Golding and presented by Fortify Software (www.fortify.com), The New Face of CyberCrime gives a face to the criminals' intent on hacking into your systems today. Who are they? How do they think? What makes them successful? You'll also hear candid interviews with many industry leaders and executives of large organizations taking steps against these attacks. Understand how they think about these threats and what they are doing about them throughout their companies.

This is extremely retarded. What a bunch of fear mongers. We're all going to die!!!!

YouTube - Trailer: The New Face of Cybercrime


And you thought O'Hare was a bad name...
Topic: Technology 9:30 am EDT, Oct 11, 2007

School: Did you really name your son Robert'); Drop Table Students;--?
Mom: Oh. Yes. Little Bobby Tables we call him
School: Well, we've lost this year's student records. I hope your happy.
Mom: and I hope you've learned to sanitize your database inputs.

HAHAHA! Sweet.

To be fair, you shouldn't sanitize user input, you should validate it.

And you thought O'Hare was a bad name...


Schneier on Security: New German Hacking Law
Topic: Technology 10:54 am EDT, Sep 27, 2007

I will be traveling to Frankfurt on Friday to attend a class @ Sabre security, so it will be very interesting to see if I have to sign any paper work, or how terms in the class will actually be phrased...

Schneier on Security: New German Hacking Law


w00t!
Topic: Technology 10:37 am EDT, Aug 30, 2007

Someone sent me a link to woot.com this morning. I exclaimed that there is a special place in hell for the person who decided to use that domain for a commerical purpose. That hell involves having nothing to do but sit on efnet for millenia. Then I noticed the linked Thinkgeek page.

w00t belongs to gamers the world over. It seems to have been derived from the obselete 'whoot' which essentially is another way to say 'hoot' which itself is a shout or derisive laugh. But others maintain that w00t is the sound several players make while jumping like bunnies in Quake III. Still others want you to believe that it comes from the phrase 'wow loot' used in multiplayer RPGs many moons ago. And if you can believe it some folks even think it was derived from the gaming phrase, 'We Own the Other Team!' Fiction or fact? I suppose you'll just have to decide what 'w00t!' means to you...

Fiction you fucks. There is another special place in hell for people who think words like pwn and w00t are the recent inventions of multiplayer gamers. This word had become popular and then gone out of fashion long before Quake III was released. The first time I heard it was on efnet in a hacking related channel in 1992 or 1993. Its a combination of Woohoo and Root; as in "Woohoo, I got Root!"

Words like pwn and w00t are so obviously hacking related that its hard to understand why gamers would rationalize that they have something to do with quake. However, it is really interesting that these words have been appropriated by that scene and become extremely mainstream. When I saw Cartman say pwn on national television a few months ago I almost jumped out of my seat. I don't really know who invented the term, but that person is likely only one degree of separation from the folks who hang out at summercon.

I freaking hate those Summercon idiots. Nothing but a bunch of drunks imho.

Also, I believe gamers made up the ';)', typing and the internet (with the help of al gore).

w00t!


YouTube - Image Resizing by Seam Carving
Topic: Technology 10:28 am EDT, Aug 30, 2007

A new technique shows resizing of images while keeping the important features of the image undistorted, also allows you to protect or remove part of the image with anything removed being automagically and seamlessly filled in.

This is making the rounds in technical circles today. The technique simple and very effective! Apparently Adobe has hired this guy so hopefully we'll see commercial availability soon.

We will now see better image spoofs on the interwebtubetrucks! I can't wait!

YouTube - Image Resizing by Seam Carving


Schneier on Security: JavaScript Hijacking
Topic: Technology 2:08 pm EDT, May 22, 2007

JSON Hijacking

It appears that there is quite a bit of misinformation out there regarding JSON (JavaScript) Hijacking. This site contains the orignial white paper that was put together by Fortify Software.


It seems that the main problems are servers willing to send JSON data to a session authenticated user via HTTP GET method.


Even though it requires that the JSON data objects are sent back in Arrays ([]), this may be a true concern for people that are storing sensative information in their JSON data.



Schneier on Security: JavaScript Hijacking


 
 
Powered By Industrial Memetics
RSS2.0