Seen on Broadband/DSL Reports.
2004's Scariest Halloween Costumes is a do-it-yourself guide to this season's quickest, least expensive, and spooky-ookiest Halloween costumes. And they're all related to politics. These photographs and descriptions are hilarious!
Today did a funny spoof for two TV shows and four celebrities (Apprentice boardroom cast including Donald Trump, Oprah, Paris Hilton, and Tina Turner for Halloween today (10/29/2004)). You can watch the streaming video clip here (requires Internet Explorer and probably Windows Media player since it didn't work in Mozilla v1.7.3 (with Windows Media Player v7.01) in Windows 2000 SP4 (all updates).
The free Guild Wars Preview Event game is underway until Halloween 2004. A buddy, Arimus, and I played the game for a couple of hours. We didn't team as a group, but we did team with strangers. It was fun! We will play more and maybe get more friends. The game is very smooth and only took about 281 MB of my HDD space. You download the 62 KB client and let it download data. It will still grow as you play. I am called "Xen Ant" (two names required) and I am mainly a blonde warrior woman with ranger background.
This MSNBC article says Kirsch, a professor of entrepreneurship at the University of Maryland, has been frantically collecting business plans of the dot-com era for more than two years. His purpose is to archive these documents that lie idle and scattered. They were risking in losing an important piece of American business and cultural history.
Kirsch and a rotating staff of loyal students have created a digital database -- available at www.businessplanarchive.org (use BugMeNot to log in if you don't want to register) -- that lists more than 2,300 companies so far, mostly from 1997 to 2002. It is a painstaking process, and the records are far from comprehensive, Kirsch acknowledges, but he hopes the archives may someday prove useful in capturing the craziness of the Internet boom.
"What I am presenting here is not really a game, per se. Rather it is an example of putting testing concepts into the format of game theory. I designed The Quest for Test specifically for a few reasons. Chief among them, however, was to present the thinking behind some testing concepts. Obviously solving the puzzles of such a game (or is that meta-game?) is not going to make someone a "good tester" nor will the ability to solve the game indicate if one is or is not a good tester. However, what the game does do is exercise certain cognitive faculties that are of use in the field of testing. Another reason for this was to allow testers to ... test the game! This game is being released as a "beta" version that players can test if they wish. Finally, I present the source code as well for those who are interested in the mechanics of such a game.
PuTTY 0.56, free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator, is now out.
Here is the update description: "2004-10-26 ANOTHER SECURITY HOLE, fixed in PuTTY 0.56 -- ... Released today, fixes a serious security hole which can allow a server to execute code of its choice on a PuTTY client connecting to it. In SSH2, the attack can be performed before host key verification, meaning that even if you trust the server you think you are connecting to, a different machine could be
Snoop Dogg's Shizzolator can translate any Web pages to da shiznit.
The Wave Magazine has a funny article about the ten geekiest hobbies for Dorkstorm: The Annihilation: "You can tell a lot about a person from the hobbies they choose, especially if it requires them to be tied to a bathtub full of hot dogs with a panel of judges and a proctologist with a tape measure watching. But enough about coin collecting. Weâ€™ve contacted renowned experts on geeks, as well as many actual geeks, to compile this list of the dorkiest things you can do with your time.
Jakob Nielsen's useit.com has a new Alertbox/column. He says, the Internet scams cannot be thwarted by placing the burden on users to defend themselves at all times. Beleaguered users need protection, and the technology must change to provide this... User education should not be the main approach to countering security problems for three reasons.
First, and most importantly, it doesn't work. Computer security is too complicated and the bad guys are too devious and inventive. Itâ€™s simply unrealistic to assume that average users can keep up with them. Yes, you can tell people not to click on attachments in email from strangers, but then attackers start sending email that apparently comes from your boss, your wife, or your best friends. In a modern office, you can't do your work without clicking on attachments.