Thursday 23 August 2007

Email cleaning

I think everyone can relate to this but I've spent most of the evening going through old email from 3 or 4 email addresses. Ok, admittedly I did this whilst listening to music but as you can see time can easily evaporate with old emails.

Wednesday 22 August 2007

IT Conferences / Exhibitions

IT Conference

Today's keyword is: IT Conference

Whilst looking for random conferences, I spotted this article about a group of hackers wondered into a conference and spoofed a wireless login page that whoever connected downloaded some nice worms and viruses. That's funny. It's always turns out to be an inside job, doesn't it.

Anyhow let's have a look at what good development and security conferences that maybe of
interest:
You always join a developer community or too:
You can always attempt to shape great minds and gatecrash the party at Webdevconf [Bristol - Sep 26, 2007]

The Black Market for code

I was randomly looking for information captchas. Actually I was looking how to spell it properly seeing I iz fick and can't speek or speel! I stumbled on this project to bypass the myspace captcha. Looking at other projects on this site, you can find projects to enter data to create myspace profiles and creating duplicate copies of websites.

I remember a long time ago looking for projects to work on at possibly freelance auction but found that people would work for peanuts. I think you put yourself on a cheap project, a lot of things can go wrong. For example, you might not get paid. You don't know what your client is like, they could be anal and could give you a bad rating for no reason. Ratings adds to the unnecessary pressure.

So if you are looking for project or looking for a laugh in general, have a look at the following:
Of course you could mock up your own auction site!

Credit Card Numbers

I've noticed that there's been an improvement on the credit card verification. A lot of online vendors now require exact details of your credit card. Not only the credit card number and expiry date but also the CVV number. The paranoid amongst us would always think people have our credit card details. That may or may not be true. But these days, most reputable online sales are done through a third party banking organisation.

Anyhow back in the good old days, you could always use a valid credit card number to complete a transaction. Here is the anatomy of credit card numbers!

Tuesday 21 August 2007

Useful Java/Perl/Javascript/Linux links

I find it annoying that I keep forgetting to grab the links I've found for certain websites that are worth pointing out that I have spent my precious little time researching.

Anyways I've decide to take a big step back and re-evaluate what are the key things that I like, use and need to focus on.

1. Java has always been on my mind even though I've barely touched in the longest while. It's been knocked for being slow and clunky but it does have its place in server-side computing. http://java.net appears to be a good resource on keeping tabs on Java as well the omega site http://java.sun.com

2. Perl. Ever since I went to yapc::europe in 2006, I've known about the good effort they have been putting into CPAN and Perl 6.

3. Rapid Javascript Development. Client side stuff. A lot has changed since I originally did web development. There's so much you can do. The basic knowledge is still there but there should be lots of tools to develop a quick application with fancy moving graphics and fancy moving windows. Firebug and Mozilla seem to a common thing that's cropped up in searches.

4. Linux. A lot of above languages go hand in hand with Linux. In particular, Perl's catalyst package has little support for Windows. This has to be a basic building block for me.

Monday 6 August 2007

Data Mining

You know going back to when I did my masters, one of the subjects I did was data warehousing and data mining on a large scale data systems. Well as you know Google is the quintessential data warehouse. We can get anything we need from Google. Not unless you've managed to keep yourself away from the Internet. Data mining are specific methods for obtaining specific data.
Data mining has improved and now it looks like you can data mine the Internet for specific information about people. The obvious pro is you can find out about people, you've lost contact with. The obvious con is you can find out about people and use that information against them. Whether this is for an interview, research or just plain old stalking.

Have a look at paterva! This online tool does a search of many data sets including social networks (e.g. myspace, facebook) and the Internet to find out information about an entity. I say entity, more than likely it will be used and abused to find out more people. But then again this could my warped stalker mind.

Thursday 2 August 2007

Anti-spyware

Interesting thing, a friend of mine noticed. His home PC was running real slowly with Norton Internet Security 2007. He ran a different anti-spyware software (Spyware Doctor which has won a couple of awards) and this picked up no less than 134 bits of spyware that Norton Internet Security failed to pick up.

Norton don't detect spyware very well...

You should really run different anti-spyware packages against your PC as different packages pick up different things. However this should be in scan mode and not in monitor mode. More than one resident anti-spyware might make your machine choke, as discussed on Ask Leo