Re: Forms-design application builder tool?

2011-01-21 Thread Matt Shields
On Fri, Jan 21, 2011 at 1:13 PM, Rich Braun ri...@pioneer.ci.net wrote:

 Matt Shields suggested:
  CakePHP.org

 Got it, thanks!  Sometimes a one-word response is all I need.  Thanks for
 the
 push in the right direction, this one is /much/ easier to use and more
 flexible than all the others I looked at.  Have already gotten my basic
 screens (list and detail views) up and running; their tutorial example
 happens to be just like what I had in mind.

 -rich



For those interested in MVC frameworks for PHP, we're having a PHP Framework
Bake-off meetup on Feb 22.  We will be having a common website that needs to
be built by 4 presenters, each presenter is a user of one of the following
frameworks (CakePHP, Symfony, Zend Framework, CodeIgniter).  They will have
a certain amount of time to build a fully functioning site/app live in front
of the audience.

http://www.meetup.com/bostonphp/calendar/16011906/

-matt
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: querying free space on a dvd-rw disk

2011-01-21 Thread Jerry Feldman
On 01/21/2011 02:34 PM, Stephen Adler wrote:
 Hi Blu'ers...

 I'm writing some scripts to do backups of data for my job. Does anyone 
 know how to query a DVD-RW disk to find out how much free space is on 
 it? I guess one could mount it, get the used space and subtract that 
 from the official 4.7Gigs of DVD capacity, but it would be nice to be 
 able to do some kind of direct query.
I would think that the df command should work. It will give you used and
available.

-- 
Jerry Feldman g...@blu.org
Boston Linux and Unix
PGP key id: 537C5846
PGP Key fingerprint: 3D1B 8377 A3C0 A5F2 ECBB  CA3B 4607 4319 537C 5846


___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: querying free space on a dvd-rw disk

2011-01-21 Thread Stephen Adler
On 01/21/2011 02:34 PM, Stephen Adler wrote:
 Hi Blu'ers...

 I'm writing some scripts to do backups of data for my job. Does anyone
 know how to query a DVD-RW disk to find out how much free space is on
 it? I guess one could mount it, get the used space and subtract that
 from the official 4.7Gigs of DVD capacity, but it would be nice to be
 able to do some kind of direct query.

 Thanks in advance.

 Cheers. Steve.
 ___
 Discuss mailing list
 Discuss@blu.org
 http://lists.blu.org/mailman/listinfo/discuss

ok... I'm on my way...

___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


why do you play with computers?

2011-01-21 Thread Eric Chadbourne
i just finished up a website.  i wrote a cms from scratch for fun in
php.  just installed it on a vps.  everything pretty much worked.  that
feeling...  wow, i know to some of the 'real programmers' on the list
it's no biggy, but to me, wow, really, this stuff works!  and that is
the feeling.  that is why i play with computers.

a friend compared it to manual labor.  in a good way.  in that you see
your effort.  makes sense here.  i work and at the end of the day see a
difference.

so, why do you play with computers?  what is your experience?

-- 
Eric Chadbourne



___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: security ofwireless keyboards

2011-01-21 Thread John Abreau
As I understand it, the Bluetooth specs include decent cryptography,
including a pass phrase mechanism that allows for reasonably long
pass phrases.

However, most peripheral vendors don't allow the user to supply
their own pass phrase, and instead hard-wire the pass phrase
at the factory, often to .  They also try to shape consumer
expectations by calling it a PIN instead of a pass phrase.



On Thu, Jan 20, 2011 at 2:12 PM, Tom Metro tmetro-...@vl.com wrote:

 Matthew Gillen wrote:
  I can't bring myself to use a wireless keyboard.  I just don't like the
  idea of broadcasting my passwords out to anyone within listening
  distance.

 The Security Now podcast has covered the security of wireless keyboards
 a few times. In episode 269 Steve Gibson says:

  ...the wireless keyboards have such weak security that essentially,
  when you turn the keyboard on, it chooses an eight-bit byte randomly
  and XORs the data that's being sent with that byte.  ...the data is
  not technically in the clear.  It's not plaintext.  But, boy, I mean,
  it would just be a fun and relatively short exercise to decrypt that
  stream.  It would be trivial to decrypt it. ... So the encryption of
  wireless keyboards is virtually ineffective.

 And in episode 271 he says:

  Yeah, I wanted to quickly calm everyone's nerves over the issue of
  keyboard security.  ... I did some research, read some whitepapers and
  some security evaluations and so forth.  And the good news is Logitech
  got it 100 percent correct.  They did a beautiful job.  ... There's
  nonvolatile memory in the keyboard and in what they call their little
  unifying receiver.  This is Logitech's new technology.

  So at the factory, nonvolatile memory in the keyboard and in the
  unifying receiver are synchronized with the same 128-bit symmetric
  key, which the AES algorithm uses to encrypt keystrokes.  So if you
  repair the keyboard, because for example you might pair it with a
  different receiver that hasn't seen that keyboard before, the pairing
  process does exactly the right thing.  There are pseudorandom number
  generators at each end.  They're able to establish a new key without
  it ever going over the wire, over the air, in the clear, in order to
  synchronize a new key that they agree upon on the fly.  That's written
  into nonvolatile RAM and kept there.

  ...I haven't looked at anybody else's.  But I know that the unifying
  receiver technology that Logitech has is doing this.  And it does say
  in the specs, just in the regular top-level specs, 128-bit AES
  encryption.  So that's the way they implemented it.  I would imagine
  anything that Logitech has done, even if it's not the K320 wireless
  keyboard, that also says that would be using the same technology,
  which means you can trust it.

 So the level of security depends on the keyboard, with at least some of
 the newer models having adequate security.

 And elsewhere in that episode:

  ...anything Bluetooth is, well, okay.  Anything Bluetooth is way more
  secure than a simple 8-bit XOR, if for no other reason than almost
  nothing could be less secure than an 8-bit XOR. ... Bluetooth is good
  security, very good security.

 Episodes 280 and 283 cover BlueTooth in depth. (I haven't listened to
 them yet.)


 Episode 269:
 transcript: http://www.grc.com/sn/sn-269.txt
 audio: http://media.grc.com/sn/sn-269.mp3

 Episode 271:
 transcript: http://www.grc.com/sn/sn-271.txt
 audio: http://media.grc.com/sn/sn-271.mp3

 Other episodes:
 http://www.grc.com/securitynow.htm

  -Tom

 --
 Tom Metro
 Venture Logic, Newton, MA, USA
 Enterprise solutions through open source.
 Professional Profile: http://tmetro.venturelogic.com/
 ___
 Discuss mailing list
 Discuss@blu.org
 http://lists.blu.org/mailman/listinfo/discuss




-- 
John Abreau / Executive Director, Boston Linux  Unix
GnuPG KeyID: 0xD5C7B5D9 / Email: abre...@gmail.com
GnuPG FP: 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: why do you play with computers?

2011-01-21 Thread Jack Coats
On Fri, Jan 21, 2011 at 8:15 PM, Eric Chadbourne
eric.chadbou...@gmail.com wrote:
[snip]
 so, why do you play with computers?  what is your experience?

 --
 Eric Chadbourne

It's corny.  I fell in love with computers because I am basically a
tool builder at heart.
Started out to be a MechEngr, but in '70 I took my first computer
class in college and
was hooked by the 'mind tool' I saw as the possibilities in the computers.

In some ways, programming is a way to immortalize the programmer, by allowing
them to put a part of their thoughts and way of thinking into the
computer as a program.

I said it is corny. ... Now 40+ years later, they still mesmerize me.
I don't have the knack
or skill to play first person games, but enjoy watching others play,
not so much to see the
game as to marvel at the mesh of hardware and software it takes to get
it to work.

I have gone from programmer that did bits and bytes, to mainframe
programmer when
COBOL was king (I did PL/1 mainly), some FORTRAN and Assembler (I
preferred these),
moved to mainframe system programmer after 15+ years programming, to be doing
systems geek work ever since.  I made the transition to UNIX when the
company I worked
for made the change (a major oil company).

I did purchase an Altair 8800 with my first paycheck from my first
full time job out of college
(spelled Jan '75).  I have averaged spending $5K on computers,
magazines, software,
every year since.

Still I love computers.  Have started working on learning
microcontrollers and want to do
control systems now just as something different.

Thanks for letting me go down memory lane. ... Sorry for the length. ... Jack

___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss


Re: Colorize text matching a regex through a pipe?

2011-01-21 Thread David Kramer
On 01/20/2011 12:42 AM, Rajiv Aaron Manglani wrote:
 On Tue, Jan 18, 2011 at 10:24:03PM -0500, David Kramer wrote:
 Thanks.  I played with this, and with colortail.  I didn't really like
 either solution in the end.  [e]grep only allows one color and one
 pattern, and colortail doesn't actually work as a filter (the author
 has a patch for that).
 
 have you looked at multitail http://www.vanheusden.com/multitail/ ?

I've used it before, but I didn't think of using it for this, because
I'm not always colorizing a tailed file.  Although I already have a
solution, I might play with it anyway.

Thanks.

___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss