Re: Forms-design application builder tool?
On Fri, Jan 21, 2011 at 1:13 PM, Rich Braun ri...@pioneer.ci.net wrote: Matt Shields suggested: CakePHP.org Got it, thanks! Sometimes a one-word response is all I need. Thanks for the push in the right direction, this one is /much/ easier to use and more flexible than all the others I looked at. Have already gotten my basic screens (list and detail views) up and running; their tutorial example happens to be just like what I had in mind. -rich For those interested in MVC frameworks for PHP, we're having a PHP Framework Bake-off meetup on Feb 22. We will be having a common website that needs to be built by 4 presenters, each presenter is a user of one of the following frameworks (CakePHP, Symfony, Zend Framework, CodeIgniter). They will have a certain amount of time to build a fully functioning site/app live in front of the audience. http://www.meetup.com/bostonphp/calendar/16011906/ -matt ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss
Re: querying free space on a dvd-rw disk
On 01/21/2011 02:34 PM, Stephen Adler wrote: Hi Blu'ers... I'm writing some scripts to do backups of data for my job. Does anyone know how to query a DVD-RW disk to find out how much free space is on it? I guess one could mount it, get the used space and subtract that from the official 4.7Gigs of DVD capacity, but it would be nice to be able to do some kind of direct query. I would think that the df command should work. It will give you used and available. -- Jerry Feldman g...@blu.org Boston Linux and Unix PGP key id: 537C5846 PGP Key fingerprint: 3D1B 8377 A3C0 A5F2 ECBB CA3B 4607 4319 537C 5846 ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss
Re: querying free space on a dvd-rw disk
On 01/21/2011 02:34 PM, Stephen Adler wrote: Hi Blu'ers... I'm writing some scripts to do backups of data for my job. Does anyone know how to query a DVD-RW disk to find out how much free space is on it? I guess one could mount it, get the used space and subtract that from the official 4.7Gigs of DVD capacity, but it would be nice to be able to do some kind of direct query. Thanks in advance. Cheers. Steve. ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss ok... I'm on my way... ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss
why do you play with computers?
i just finished up a website. i wrote a cms from scratch for fun in php. just installed it on a vps. everything pretty much worked. that feeling... wow, i know to some of the 'real programmers' on the list it's no biggy, but to me, wow, really, this stuff works! and that is the feeling. that is why i play with computers. a friend compared it to manual labor. in a good way. in that you see your effort. makes sense here. i work and at the end of the day see a difference. so, why do you play with computers? what is your experience? -- Eric Chadbourne ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss
Re: security ofwireless keyboards
As I understand it, the Bluetooth specs include decent cryptography, including a pass phrase mechanism that allows for reasonably long pass phrases. However, most peripheral vendors don't allow the user to supply their own pass phrase, and instead hard-wire the pass phrase at the factory, often to . They also try to shape consumer expectations by calling it a PIN instead of a pass phrase. On Thu, Jan 20, 2011 at 2:12 PM, Tom Metro tmetro-...@vl.com wrote: Matthew Gillen wrote: I can't bring myself to use a wireless keyboard. I just don't like the idea of broadcasting my passwords out to anyone within listening distance. The Security Now podcast has covered the security of wireless keyboards a few times. In episode 269 Steve Gibson says: ...the wireless keyboards have such weak security that essentially, when you turn the keyboard on, it chooses an eight-bit byte randomly and XORs the data that's being sent with that byte. ...the data is not technically in the clear. It's not plaintext. But, boy, I mean, it would just be a fun and relatively short exercise to decrypt that stream. It would be trivial to decrypt it. ... So the encryption of wireless keyboards is virtually ineffective. And in episode 271 he says: Yeah, I wanted to quickly calm everyone's nerves over the issue of keyboard security. ... I did some research, read some whitepapers and some security evaluations and so forth. And the good news is Logitech got it 100 percent correct. They did a beautiful job. ... There's nonvolatile memory in the keyboard and in what they call their little unifying receiver. This is Logitech's new technology. So at the factory, nonvolatile memory in the keyboard and in the unifying receiver are synchronized with the same 128-bit symmetric key, which the AES algorithm uses to encrypt keystrokes. So if you repair the keyboard, because for example you might pair it with a different receiver that hasn't seen that keyboard before, the pairing process does exactly the right thing. There are pseudorandom number generators at each end. They're able to establish a new key without it ever going over the wire, over the air, in the clear, in order to synchronize a new key that they agree upon on the fly. That's written into nonvolatile RAM and kept there. ...I haven't looked at anybody else's. But I know that the unifying receiver technology that Logitech has is doing this. And it does say in the specs, just in the regular top-level specs, 128-bit AES encryption. So that's the way they implemented it. I would imagine anything that Logitech has done, even if it's not the K320 wireless keyboard, that also says that would be using the same technology, which means you can trust it. So the level of security depends on the keyboard, with at least some of the newer models having adequate security. And elsewhere in that episode: ...anything Bluetooth is, well, okay. Anything Bluetooth is way more secure than a simple 8-bit XOR, if for no other reason than almost nothing could be less secure than an 8-bit XOR. ... Bluetooth is good security, very good security. Episodes 280 and 283 cover BlueTooth in depth. (I haven't listened to them yet.) Episode 269: transcript: http://www.grc.com/sn/sn-269.txt audio: http://media.grc.com/sn/sn-269.mp3 Episode 271: transcript: http://www.grc.com/sn/sn-271.txt audio: http://media.grc.com/sn/sn-271.mp3 Other episodes: http://www.grc.com/securitynow.htm -Tom -- Tom Metro Venture Logic, Newton, MA, USA Enterprise solutions through open source. Professional Profile: http://tmetro.venturelogic.com/ ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss -- John Abreau / Executive Director, Boston Linux Unix GnuPG KeyID: 0xD5C7B5D9 / Email: abre...@gmail.com GnuPG FP: 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99 ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss
Re: why do you play with computers?
On Fri, Jan 21, 2011 at 8:15 PM, Eric Chadbourne eric.chadbou...@gmail.com wrote: [snip] so, why do you play with computers? what is your experience? -- Eric Chadbourne It's corny. I fell in love with computers because I am basically a tool builder at heart. Started out to be a MechEngr, but in '70 I took my first computer class in college and was hooked by the 'mind tool' I saw as the possibilities in the computers. In some ways, programming is a way to immortalize the programmer, by allowing them to put a part of their thoughts and way of thinking into the computer as a program. I said it is corny. ... Now 40+ years later, they still mesmerize me. I don't have the knack or skill to play first person games, but enjoy watching others play, not so much to see the game as to marvel at the mesh of hardware and software it takes to get it to work. I have gone from programmer that did bits and bytes, to mainframe programmer when COBOL was king (I did PL/1 mainly), some FORTRAN and Assembler (I preferred these), moved to mainframe system programmer after 15+ years programming, to be doing systems geek work ever since. I made the transition to UNIX when the company I worked for made the change (a major oil company). I did purchase an Altair 8800 with my first paycheck from my first full time job out of college (spelled Jan '75). I have averaged spending $5K on computers, magazines, software, every year since. Still I love computers. Have started working on learning microcontrollers and want to do control systems now just as something different. Thanks for letting me go down memory lane. ... Sorry for the length. ... Jack ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss
Re: Colorize text matching a regex through a pipe?
On 01/20/2011 12:42 AM, Rajiv Aaron Manglani wrote: On Tue, Jan 18, 2011 at 10:24:03PM -0500, David Kramer wrote: Thanks. I played with this, and with colortail. I didn't really like either solution in the end. [e]grep only allows one color and one pattern, and colortail doesn't actually work as a filter (the author has a patch for that). have you looked at multitail http://www.vanheusden.com/multitail/ ? I've used it before, but I didn't think of using it for this, because I'm not always colorizing a tailed file. Although I already have a solution, I might play with it anyway. Thanks. ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss