spacer spacer spacer

2003-09-30

The ubiquitous blogging widget

Following Sarah and Mark’s lead, I had to make my own version of the ‘ubiquitous blog widget’.

I’d been looking for a way to display what I'm playing in iTunes on my blog, and I stumbled across Kung-Tunes, a cute little AppleScript that queries iTunes and formats your recently played list as XML (or OPML, if you take the time to teach it the right template), and then uploads it to your web server. It was simple enough to hook the blogging widget on to the OPML file, but I wasn't satisfied with the ‘skinning’ of the widget. It clashed with the look of my blog. I spent a few hours fiddling with Photoshop to create some new art, then adjusted the layout to handle my slightly different requirements. I tried to make the interface cleaner, and in the process lost some of the Laszlo promotional material. So I stole my prototype cyberlogo from my Site Toc demo and implemented some crude tool tips.

I hope people don't get too upset at the Apple-centricity of my implementation. Clicking on the song links will tell iTunes to search its Music Store. Sorry Windows users.1

1. The only reason I say "Sorry Windows users" is because the title/artist/album links are itms: scheme links. If you are running on a Mac with iTunes, clicking on the links will tell iTunes to search its Music Store for that title/artist/album. When iTunes is available for Windows, presumably it will work for Windows users who have downloaded iTunes too.

00:20 | Link | Track

2003-09-28

Microsoft’s Lumper Crop

Just as agricultural monocultures have resulted in disaster1 when a disease wipes out an entire crop, the ubiquity of Windows threatens the resilience of the internet2 because viruses targeted at Windows can spread so rapidly.

16:01 | Link | Reply | Comments (2)

Canning Spam

I’ve been around the net a while (we did have both 1’s and 0’s in my day — I’m not that old), so unfortunately my email address has found it’s way onto many a spammer’s mailing list and I probably get more than the usual amount of spam, which has driven me to find some tools to deal with spam.

One of the biggest misunderstandings with spam is how email works: Email is a lot like postal mail, in that it consists of both an envelope and a message. The envelope tells where to deliver the message. The message includes an inside address, which purports to be the source of the message, but is easily forged. (Just imagine writing a letter to your Aunt Jo, but you accidentally put it in an envelope to pay your electric bill. The electric company will get your letter, even though the inside address is for your Aunt Jo. Spammers do the same thing, intentionally. They write a nice letter that appears to be from your Aunt Jo, telling you how to enlarge your bank account, then make a zillion copies and stick it in a zillion different envelopes and send it to zillions of people.)

Unfortunately, most email clients, in an attempt to be helpful, open all your mail, discard the envelopes, and just show you the message. As a result, you don’t notice that the message from your Aunt Jo came in a bulk mail envelope — the one’s you would normally drop right into the trash if they came in your postal mail.

After a bunch of research, I decided to try a service called SpamCop.NET (not spamcop.COM — a cheap imitation, and not spamcop.ORG — who are actually spammers). Here’s how SpamCop works: it encourages people to report spam and analyzes the full spam message, looking at the internal postmarks (these are the Received: lines in the envelope of an email message that you can see if you ask your mail client to show the internet headers, or full headers of the message). By analyzing these postmarks1, SpamCop can trace the actual origin of the message. By accumulating spam reports, SpamCop develops a database of known spam sources. It then uses this database to analyze new messages, and marks those coming from known spam sources as likely to also be spam.

The technique that SpamCop uses is known as DNS blacklisting2, which some find controversial because they feel it could block legitimate mail that happens to originate at the same computer the spammer is using. SpamCop gets around that issue by only holding mail from suspected spammers — it leaves it up to you to choose to accept or reject the suspected spam, and if you like, to mark a particular address as being okay to always pass through (by putting it on your whitelist).

So, how do you use SpamCop.NET? After you sign up for an account, you can either arrange to have your old email address forward to your new SpamCop address, or you can configure SpamCop to pick up your mail from your old address. You have a choice of reading your mail using SpamCop’s web-based mail reader, or you can forward all unblocked mail to a new, private, email address (it can’t be your old address, or the mail will just go round and round in a loop). Keep this new address completely private — only SpamCop should know about it and only SpamCop should ever deliver mail there. You’ll need an email client that can be configured to pick up mail at your private address, but send mail using your public address to make this work best. (Unfortunately, AOL is not that flexible.)

Yes, it’s a bit contorted, but that is only if you want to keep your old public address around. If you are just as happy to discard your old public address, you can just use your SpamCop address as your public address. If you have a number of public addresses, like a free one from your alma mater, or a professional society, you can forward those to your SpamCop account too, and pick up all your mail in one place.

Recently, SpamCop has added two new features, virus scanning and a filter that analyzes email for spam-like content (the particular filter SpamCop is using is called SpamAssassin (again not to be confused with spamassassin.com or spamassassin.net, two commercial sites trying to capitalize on spamassassin.org’s success). The virus filter simply discards messages with viruses in them. They never reach your inbox. SpamAssassin uses a number of heuristics including Vipul’s Razor to score messages, and messages with a high spam-like score will be held for your approval before being sent to your inbox.

SpamCop.NET isn’t a perfect solution. I don’t think there is one. But it is the best I’ve found to date. I’m not associated with them in any way, just a happy customer. If you are as inundated with spam as I am, you might want to have a look.

1. Postmarks can be forged too, but SpamCop.NET is careful to trace the postmarks backwards from known trustworthy sources and to discard any that could be forged. If you want the gory details — the postmark is applied by the computer that receives the message (hence the Received: moniker), and records the IP address of the sending computer. This address cannot be forged, since the two computers have to carry on a two-way conversation to deliver the message.

2. Blacklists and whitelists use the traditional definition of good and evil. Addresses on a blacklist are considered evil, those on the whitelist are considered good.

11:31 | Link | Reply | Track

2003-09-24

Come out and play!

Christophe Coenraets has created a really neat Laszlo application for learning about Laszlo, the LZXplorer.

The explorer shows three panels that display simultaneously example code, comments on the code, and the results of running the code. It is is self-paced tutorial that lets you explore the basics of Laszlo programming, but you can also use it to prototype Laszlo code of your own.

If you are intrigued by what you see, you can download the free developer edition of the Laszlo Presentation Server for quick turn-around development.

When you have an idea that you want to share, you can upload it to MyLaszlo.com, a free service provided by Laszlo for sharing LZX demos.

12:22 | Link | Reply | Track

2003-09-16

Yahoo for Laszlo

Yahoo! has released a new personalization interface for their customers using Laszlo technology.

[Press release at Yahoo! Media Relations - Press Release.]

Read more about the Laszlo-based personalization tool in Sarah Allen’s web log.

12:50 | Link

2003-09-10

Mammas, don't let your babies grow up to be file-sharers!

So far the RIAA has succeeded in stopping a 12-year old girl, a Yale professor, and a 71-year old grandfather from sharing music. Will that make them buy more CD's, or just make them cynical and bitter?

[Full story: Guardian Unlimited | The Guardian | Mother settles piracy case.]

23:03 | Link | Reply | Track

2003-09-08

The Boy Who Cried Werewolf

R.I.P.
Warren Zevon
1947-2003
23:03 | Link | Reply