Geek Stuff category archive
Dulcet Tones 0
I have another podcast up at Hacker Public Radio. In this one, I discuss the Move! Bike Computer Android app. If you bike, hike, or run and want to keep track of your route and performance, you might want to check it out.
Twits on Twitter 0
In the Guardian, Henry Porter considers the allure of twitterers.
Facebook Frolics 0
(snip)
The sales information that advertisers receive is anonymous, said Baser. “You would see the number of people who bought shoes,” he said, using the example of an online shoe retailer. But marketers would not be able to get information that could identify the people, he added.
Remember that, when you drill back far enough, at some point the information is no longer anonymous. Facebook knows who clicked what. In fact, with their persistent cookies, they can know even if you are not logged in to Facebook.
Dulcet Tones 0
I have a new podcast up at HPR (and still another that I recorded yesterday and will edit today).
This one concerns KeepassX, a free and open source cross-platform password vault that works on Windows, Mac, and Linux, and is compatible with an keepassdroid for Android. I resisted password vaults for years until I was introduced to KeepassX; its cross-platform operation and versatility have converted me.
If you have a number of important passwords to manage (I just counted–I have over 40 that must be secure and therefore unique and that I use regularly), check it out.
The Internet Is a Public Place 0
Please practice Safe HEX.
A survey by credit reference agency Equifax has found that while more than a quarter of people do online banking on their phone, a third don’t log out of social media or banking websites, 42% fail to clear their browser history and 45% do not protect their smartphones with passwords.
More at the link.
PSA: No, You Didn’t Win a Gift Certificate 0
The Atlanta Journal-Constitution has a long article about cell phone text message spam.
Text spam has increased significantly with sales of smart phones, since the recipient can click on a link right there on the handset. Carriers do not believe that your number has been specifically compromised, but that the spammers are using war dialers.
I’ve gotten a few of these and, following instructions from my carrier, forwarded them directly to 7726 (that’s S P A M on the dialer). Once I do, I almost immediately get a text from my carrier asking for the “from” number for the text, so be prepared with the number.
If you have a smart phone, read the article. It will help you practice Safe HEX.a href=”http://www.ajc.com/news/business/text-spam-messages-on-the-rise/nSW3C/”
Facebook Frolics, Cheap Thrills Dept. 0
Facebook: self-love.
Turns out that when you think of Facebook, you may be feeling a hunka-hunka burning love.
Cue the Barry White makeout music.
Researchers at the University of Chicago Booth School of Business say the desire to indulge in Facebook, Twitter and other social-media pastimes is among the strongest temptations we now face — right up there with sex and cigarettes.
Make TWUUG Your LUG 0
Join us Thursday.
Learn about the wonderful world of free and open source.
What: Monthly TWUUG Meeting.
Who: Everyone in TideWater/Hampton Roads with interest in any/all flavors of Unix/Linux. There are no dues or signup requirements. All are welcome.
Where: Lake Taylor Transitional Care Hospital in Norfolk Training Room. See directions below. (Wireless and wired internet connection available.)
When: 7:30 PM till whenever (usually 9:30ish) on Thursday, October 4.
Directions:
Lake Taylor Hospital
1309 Kempsville Road
Norfolk, Va. 23502 (Map)
Pre-Meeting Dinner at 6:00 PM (separate checks)
Uno Chicago Grill
Virginia Beach Blvd. & Military Highway (Janaf Shopping Center). (Map)
Welcome to the Machine 2
For some fool reason, as I listened to this episode of Radio Times about “wearable computers,” I was unable to shake this image:
![]()
Facebook Frolics, Connecting the Dots 0
You’ve seen Facebook Connect.
When a website invites you to login with your Facebook credentials, that’s Facebook Connect.
I always refuse that invitation, because, by so doing, I am not just logging into that website. I am also telling Facebook that I am logging in and permitting Facebook to track my actions while I’m there. I do the same if I login with Google, Twitter, or other credentials–I open myself to be tracked, then have my behavior sliced, diced, and sold to the highest bidder.
That is not safe HEX.
Indeed, if a site or service requires me to use my Facebook credentials, as Pandora does, I won’t use that site or service.
At MarketWatch, Jake Mann and Meena Krishnamsetty think that Facebook Connect is Facebook’s secret weapon to keep from becoming another penny stock:
If Facebook does choose to start charging for Connect, it would realize an additional $4.5 billion in annual revenues by the end of 2015. Considering the fact that current estimates from Wedbush Securities and eMarketer expect the company to finish 2012 with close to $5 billion in revenues, we can immediately see that any monetization of Facebook Connect would be material to the company’s bottom line.
And, regarding the slicing, dicing and selling, read this report at EFF.
Read it now.
Attn: Facebook Frolickers and Twitting Twits 1
Lord love a duck.
Justin Basini, CEO of the United Kingdom-based privacy company Allow, hopes this will be a trend that catches on. For £3.99 ($6.46) a month, the company provides a number of services to protect your social media networks and your personal information. Allow will provide legal advice if you are attacked online and want to sue. The company will also help to stop any legal action taken against you that was caused by the hacking.
Wouldn’t it be cheaper and simpler just to learn to practice safe HEX?
Dulcet Tones 0
I have another podcast up at HPR.
This one may be of wider interest than the others I have there. It describes how I use the free and open source Gnu Image Manipulation Project (commonly called the GIMP) to edit pictures for posting here. The GIMP is freely available for Unix, Linux, Mac, and Windows.
I based the podcast on this picture.
It is hardly an exhaustive description of the GIMP, which is a huge and powerful program, but, if you are interested in exploring the GIMP and freeing yourself of proprietary image-editing programs that cost umpty-ump hundreds of dollars, I think you will find it a useful introduction.
For detailed tutorials on the GIMP, you can do no better than this.
Revolt of the Machines 0
First, they lull you into a sense of security, and then . . . .
About 80 percent of bridge strikes in New York state, where parkways with low overpasses are supposed to be closed to commercial traffic, are caused by GPS misdirection, Schumer said. Even if the roads are well-marked, GPS devices may not note restrictions on trucks and buses, he said.
Senator Schumer wants the government to update GPS technology.
In the meantime, maybe the truckers should consider supplementing their gadgets with a fallback technology.
I believe it’s called “road sign.”
Bonded by the iHype 0
The Denver Post explores how Apple ihypes its iJunk while herds of iJunkies line for their iFixes. You’d think it was a the holy iGrail.
“It’s fun, you meet new people and interact,” said the 21-year-old, who
Customers line up outside Park Meadows mall near Denver Friday morning in hopes of being among the first to snag an iPhone 5. (Cyrus McCrimmon, The Denver Post)
has also camped out for an iPad and basketball sneakers. “Just the sleep part is messed up.”(snip)
“We’re very social animals,” (Univ. of Colo. Professor Phil–ed.) Fernbach said. “When we see someone else doing something, we automatically infer from that that it might be a good thing to do.”
At the San Jose Mercury-News, Apple’s local rag, Larry Magid worries about whether the media are playing into Apple’s hype strategy:









