<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2730413417562938348</id><updated>2024-10-24T12:29:35.758-06:00</updated><category term="technology"/><category term="computer"/><category term="internet"/><category term="wireless"/><category term="phone"/><category term="Google"/><category term="OS X"/><category term="security"/><category term="mail"/><category term="The Man"/><category term="media"/><category term="rss"/><category term="storage"/><category term="virtual machine"/><title type='text'>Logic Bound</title><subtitle type='html'>Technology Stuff</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-8489462820756929533</id><published>2009-09-20T10:26:00.002-06:00</published><updated>2009-09-20T10:38:39.552-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="The Man"/><title type='text'>Flash Cookies Gaining Steam</title><content type='html'>In my &lt;a href=&quot;http://logicbound.blogspot.com/2007/12/local-shared-objects-aka-flash-cookies.html&quot;&gt;original post&lt;/a&gt; about LSO, I tried to give a brief update on what they were and how to block them.   Since that time, their use has become more invasive, and Adobe&#39;s &lt;a href=&quot;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html&quot;&gt;tool&lt;/a&gt; reached the point where it just doesn&#39;t work for day to day use.&lt;br /&gt;&lt;br /&gt;I got very frustrated with the Settings Manager that Adobe provides.  The key reasons are:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;It doesn&#39;t integrate with my browser (Firefox)&lt;/li&gt;&lt;li&gt;It doesn&#39;t always save my preferences&lt;/li&gt;&lt;li&gt;I have to go back to it and manage each site&#39;s data regularly&lt;/li&gt;&lt;/ul&gt;A couple of days ago, I just got fed up and went looking.   At the time of my last post, there wasn&#39;t much out there to help manage this problem.  Today, there is, so I wanted to share what I found.&lt;br /&gt;&lt;br /&gt;First of all, if you want some general education on LSO and what they are for, please see &lt;a href=&quot;http://privacychoice.wordpress.com/tag/flash-cookies/&quot;&gt;this website&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;Next, if you want to be proactive about keeping this data off of you computer, you need to be using &lt;a href=&quot;http://getfirefox.com&quot;&gt;Firefox&lt;/a&gt; along with the &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/6623&quot;&gt;BetterPrivacy&lt;/a&gt; extension.   If you aren&#39;t using Firefox yet, you should be.  Not because it&#39;s faster, not because it&#39;s open source, or any of that jazz.  Use it because it is flexible and extensible by the open source community.  Without that capability, the ability to remove LSO data would probably not be possible at this time.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/8489462820756929533/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/8489462820756929533' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/8489462820756929533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/8489462820756929533'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2009/09/flash-cookies-gaining-steam.html' title='Flash Cookies Gaining Steam'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-7218692635944945638</id><published>2009-04-09T21:46:00.001-06:00</published><updated>2009-04-09T21:46:00.860-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="media"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><category scheme="http://www.blogger.com/atom/ns#" term="storage"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Home Media, Part 2 (Storage.  No, firewall.)</title><content type='html'>For starters, I need more storage.  My main office computer is a Mac Mini hooked up to a 20&quot; flat screen.  It&#39;s got an 80g drive which filled up last year sometime.  At that point, I went with an external USB enclosure with a 500g drive.   It was fairly cheap (thanks Newegg!) and allowed me to move my iTunes library off to another drive, which freed up my primary volume considerably.&lt;br /&gt;&lt;br /&gt;At 500g, I had way more space then I needed.  I decided to partition the drive in half and give &lt;a href=&quot;http://en.wikipedia.org/wiki/Time_Machine_%28Apple_software%29&quot;&gt;Time Machine&lt;/a&gt; a try.  It was incredibly simple and easy to setup.  Just the way I like it!   On top of that, I felt moderately better that I was backing up important documents, photos, and home video.&lt;br /&gt;&lt;br /&gt;Anyway, back to the point.  I need more storage.  I would like to start moving my DVD collection online so that I can stream it downstairs to the PS3.  I&#39;m pretty lazy and this would save me some trips up the stairs.  Furthermore, I get kind of tired of swapping disks in the PS3 from playing games to watching DVDs.&lt;br /&gt;&lt;br /&gt;So, because I&#39;m not only lazy, but also cheap, I started looking around at the spare equipment that I had stored up in the office.  I just figured I&#39;d repurpose some existing equipment and fire up Linux and Samba and be done with it. There are probably enough parts lying around to build about 3 pc&#39;s, but it&#39;s all pretty old stuff.  I have 2 working pc&#39;s, one of which is a Windows gaming machine that powers down randomly.  The other is my &lt;a href=&quot;http://en.wikipedia.org/wiki/Firewall&quot;&gt;firewall&lt;/a&gt; which runs &lt;a href=&quot;http://en.wikipedia.org/wiki/Debian&quot;&gt;Debian&lt;/a&gt; at the moment.&lt;br /&gt;&lt;br /&gt;The firewall it is.  But, before I repurpose that box, I need a different firewall.  (I know this is a long ways from storage, but bear with me)   I decided to upgrade my wireless access point to be wireless access point/firewall.  The excellent &lt;a href=&quot;http://en.wikipedia.org/wiki/Dd-wrt&quot;&gt;DD-WRT&lt;/a&gt; package made this very easy in addition to adding some nice &lt;a href=&quot;http://en.wikipedia.org/wiki/Qos&quot;&gt;QoS&lt;/a&gt; functionality that I wasn&#39;t using before.  I won&#39;t go into all the details of how to do it, because I believe that it is documented well elsewhere.  Definitely drop a comment if you have some questions about it.   I can go into details of my setup in a future post.&lt;br /&gt;&lt;br /&gt;Before I closed out the firewall project, I ran over to &lt;a href=&quot;https://www.grc.com/x/ne.dll?bh0bkyd2&quot;&gt;Shields Up&lt;/a&gt; to verify the firewall settings were sufficiently hiding me from &lt;a href=&quot;http://en.wikipedia.org/wiki/Port_scan&quot;&gt;portscans&lt;/a&gt;.   Yep, all good!   Everything comes back &quot;stealth&quot;.  Now... where was I?</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/7218692635944945638/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/7218692635944945638' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7218692635944945638'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7218692635944945638'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2009/04/home-media-part-2-storage-no-firewall.html' title='Home Media, Part 2 (Storage.  No, firewall.)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-5804708437678041689</id><published>2009-04-02T21:31:00.003-06:00</published><updated>2009-04-02T21:46:56.842-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="media"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Home Media, Part 1</title><content type='html'>I&#39;ve been watching the home media craze from a distance.  My friends are buying &lt;a href=&quot;http://en.wikipedia.org/wiki/Media_server&quot;&gt;media servers&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Media_extender&quot;&gt;media extenders&lt;/a&gt; and networked &lt;a href=&quot;http://en.wikipedia.org/wiki/Tivo&quot;&gt;TiVos&lt;/a&gt; and on and on.  But, I just haven&#39;t jumped into it.  I have been quite satisfied with my DirecTivo with a modded hard-drive for extra capacity.  It&#39;s not HD.  It&#39;s not networked.  It is years old and it just keeps working.  I have all the movie channels and I do the occasional &lt;a href=&quot;http://en.wikipedia.org/wiki/Redbox&quot;&gt;RedBox&lt;/a&gt;.   Life is simple.&lt;br /&gt;&lt;br /&gt;Unfortunately, that doesn&#39;t last forever.  Now, I&#39;m itching to do something different.  I have some growing storage needs on my home network.  I&#39;ve got a PS3 that I use to play me some Call of Duty with my 10 year old friend and some guy named &lt;span style=&quot;font-style: italic;&quot;&gt;A_Trillion_Ninjas&lt;/span&gt;.   I&#39;ve got a growing sensitivity to risk and how my data backup strategy is working out. &lt;br /&gt;&lt;br /&gt;I&#39;ve just got this growing laundry list of fun little projects that take about 5 times as long as they should.   The more I thought about it, the more they all became related. &lt;br /&gt;&lt;br /&gt;I thought I would share my adventures here.  Maybe you can relate.  Maybe you think I&#39;m an idiot.  It&#39;s all good...</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/5804708437678041689/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/5804708437678041689' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5804708437678041689'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5804708437678041689'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2009/04/home-media-part-1.html' title='Home Media, Part 1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-3473202567079134572</id><published>2008-04-06T14:35:00.003-06:00</published><updated>2008-04-06T15:40:22.323-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="mail"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>More Email Redirection</title><content type='html'>I&#39;ve written &lt;a href=&quot;http://logicbound.blogspot.com/2007/11/take-back-your-email-address.html&quot;&gt;before&lt;/a&gt; about some of my email behaviors.  I thought I would share some more with how I manage personal email and how I got bitten by it this month.&lt;br /&gt;&lt;br /&gt;I have used a personal &lt;a href=&quot;http://en.wikipedia.org/wiki/Domain_name&quot;&gt;domain name&lt;/a&gt; for quite a few years now.  These are sometimes called &quot;private label&quot; or &quot;vanity&quot; domains. There are a number of reasons why I do this.  It used to be because I ran my own mail server, but any more it&#39;s probably just a matter of branding and the ability to choose any email address I want.&lt;br /&gt;&lt;br /&gt;When &lt;a href=&quot;http://www.gmail.com/&quot;&gt;Gmail &lt;/a&gt;became available (my oldest message is dated October 2004), I signed up for an account to see what it was all about.  I liked it so much that I wanted it to become my primary email application.  I quickly &lt;a href=&quot;http://mail.google.com/support/bin/answer.py?answer=21288&amp;amp;topic=12897&quot;&gt;moved&lt;/a&gt; my personal email over to my new Gmail account and configured my personal address to &lt;a href=&quot;http://en.wikipedia.org/wiki/Email_forwarding&quot;&gt;forward&lt;/a&gt; to my Gmail address.  This allowed me to respond to mail regardless of which address it was delivered to.   The &lt;a href=&quot;http://mail.google.com/support/bin/answer.py?answer=22370&amp;amp;topic=12896&quot;&gt;ability&lt;/a&gt; to set a custom From: address meant that I could still have messages that I sent from my Gmail account be marked with my personal domain address which provided some consistency for those who pay attention to where messages come from.&lt;br /&gt;&lt;br /&gt;I operated in this fashion for a few years.  I ultimately got bored with configuring my own &lt;a href=&quot;http://en.wikipedia.org/wiki/Smtp&quot;&gt;SMTP&lt;/a&gt; server and started using a &lt;a href=&quot;http://en.wikipedia.org/wiki/Webhost&quot;&gt;webhost&lt;/a&gt; to do this for me.  I went through a couple of services before I found one that I liked for the amount I was willing to pay.   Recently, Google started up another service called &lt;a href=&quot;http://www.google.com/a&quot;&gt;Google Apps&lt;/a&gt;.  This is a free service that will host your personal mail and web space among a few other things.  They don&#39;t have as many features as some other places, but the price is right.&lt;br /&gt;&lt;br /&gt;I switched my personal domain over to be hosted by Google Apps about a year ago now.  The experience has been pretty good, although not perfect.  Now that my personal domain email actually lived on Google&#39;s servers, the dilemma that I faced was whether or not to maintain my @gmail.com address and continue to use the Gmail application. &lt;br /&gt;&lt;br /&gt;As for my main inbox, I prefer the Gmail application over the Google Apps mail application for my personal domain.  The main reason is that the public Gmail application &lt;a href=&quot;http://gmailblog.blogspot.com/2008/03/newest-gmail-features-now-available-for.html&quot;&gt;seems to get&lt;/a&gt; new features long before they release them to Google Apps.  A secondary reason is because many of my friends already have my Google Talk login (@gmail.com) and I don&#39;t want to go through the hassle of getting them all to change.  :)&lt;br /&gt;&lt;br /&gt;Once that decision was made, I configured my personal address, once again, to simply forward all mail to my @gmail.com address.  This works well except for the way that Google has chosen to implement a forwarding mail alias.   I say alias, because on other webhosts (and, indeed, in &lt;a href=&quot;http://en.wikipedia.org/wiki/Sendmail&quot;&gt;Sendmail&lt;/a&gt; itself)  it is quite easy to create an alias that merely forwards everything to a real mailbox.   Google&#39;s Apps offering does not offer that functionality.  You have to create a real mailbox for every address that you want.  Then, if you want it to forward mail, you must login to the mailbox and configure it to forward mail to another address.  This means maintaining another username/password as well.  I don&#39;t really like this approach, but, let&#39;s face it, it isn&#39;t painful enough to make me switch to another webhost. &lt;br /&gt;&lt;br /&gt;Now that you have a background (hopefully, you aren&#39;t just plain confused) of how my personal email ultimately flows to my inbox, I will share with you how this approach has let me down over the past few weeks.  It all comes down to &lt;a href=&quot;http://en.wikipedia.org/wiki/E-mail_spam&quot;&gt;spam&lt;/a&gt;; where should it be filtered?&lt;br /&gt;&lt;br /&gt;Google does a wonderful job fighting spam.  I rarely see spam in my inbox anymore.  It is just something that hasn&#39;t been an issue for quite a long time.   One of the very common methods that mail providers use to ensure that they don&#39;t incorrectly mark a message as spam is to check to see if it is from a person in your address book or contacts list.  They assume (correctly) that if a person you know is sending you a message, it probably isn&#39;t spam.   Well, for me, that breaks down.&lt;br /&gt;&lt;br /&gt;Recall a couple paragraphs ago, that I have an actual mailbox for my personal domain address.  All this mailbox does is forward to my @gmail.com address.  However, since it is a mailbox and not just a forwarding alias, Gmail checks all messages coming to that address for spam.   This approach is fine, I suppose.  Although, it would be perfectly acceptable if they just forwarded the spam messages and let my @gmail.com address handle it.   Since I never login directly to that address, I obviously don&#39;t manage my contacts there.   Therein lies the problem.  I realized yesterday that a few of my messages from dear friends of mine have been getting flagged as spam because I don&#39;t have any contacts listed in that mailbox.  These messages hit the spam folder and never get forwarded to the @gmail.com address that I monitor. &lt;br /&gt;&lt;br /&gt;This has been happening only for the last few weeks, which leads me to believe they have done something to get more aggressive lately, or (sinking feeling) I just don&#39;t have anything in the spam folder older then the last few weeks and this problem has been happening all along.&lt;br /&gt;&lt;br /&gt;My short term fix for this is to export my contacts from my @gmail.com account and import them into my personal domain account.  I don&#39;t like this approach because it is a high maintenance solution, but it will have to do until I get some time to research this further.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Feel free to comment if you are using an interesting approach to email and let me know what you do and don&#39;t like about it.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/3473202567079134572/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/3473202567079134572' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/3473202567079134572'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/3473202567079134572'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2008/04/more-email-redirection.html' title='More Email Redirection'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-7166877268530666532</id><published>2008-03-23T13:20:00.000-06:00</published><updated>2008-03-23T13:24:40.705-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>iPod Touch vs. Zune</title><content type='html'>In &lt;a href=&quot;http://logicbound.blogspot.com/2008/03/magic-touch.html&quot;&gt;one&lt;/a&gt; of my earlier posts, a friend of mine commented that I would probably regret my purchase of the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;iPod&lt;/span&gt; Touch and should pick up a &lt;a href=&quot;http://www.zune.net/&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;Zune&lt;/span&gt;&lt;/a&gt;.   He knows how to get to me. Normally, I just write off his Microsoft-loving comments as gibberish.  But before I did that, I figured I should actually go out and see what the differences are.  Honestly, I had no idea what the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;Zune&lt;/span&gt; could or could not do.  I&#39;ve just never really cared about the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;Zune&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;A &lt;a href=&quot;http://www.google.com/search?q=compare+zune+ipod+touch&quot;&gt;Google search&lt;/a&gt; later, I am looking at a &lt;a href=&quot;http://www.engadget.com/2007/10/03/zune-vs-ipod-specification-smackdown/&quot;&gt;comparison&lt;/a&gt; of features between the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;iPod&lt;/span&gt; Touch and the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;Zune&lt;/span&gt;.   Most of the features are really pretty much the same.  Screen size, weight, battery life... (yawn).     There is a couple of areas that stood out though.   Turns out they each have something the other does not:   The &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;Zune&lt;/span&gt; has a FM tuner.   The &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;iPod&lt;/span&gt; Touch has the Internet.  &lt;br /&gt;&lt;br /&gt;Which one would you choose?</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/7166877268530666532/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/7166877268530666532' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7166877268530666532'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7166877268530666532'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2008/03/ipod-touch-vs-zune.html' title='iPod Touch vs. Zune'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-4591654400593244180</id><published>2008-03-14T18:09:00.000-06:00</published><updated>2008-03-14T13:57:34.887-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Wake Up</title><content type='html'>I access my home computers from over the Internet all the time.  Because of this, I typically leave them on 24x7 so that I can always log into them.    Yeah, this uses some power, but the convenience of it has always been more important to me.  I knew about &lt;a href=&quot;http://en.wikipedia.org/wiki/Wake-on-LAN&quot;&gt;wakeonlan&lt;/a&gt; capability, but just never took the time to figure it out.&lt;br /&gt;&lt;br /&gt;After I read &lt;a href=&quot;http://lifehacker.com/348197/access-your-computer-anytime-and-save-energy-with-wake+on+lan&quot;&gt;this write-up&lt;/a&gt;, I decided to bite the bullet and give it a try.  Turns out to be way easier then I thought.  You should give it a try!&lt;br /&gt;&lt;br /&gt;I ended up using a different utility then the ones suggested in the article though.  Since I tend to log in via ssh, I needed a utility that will work via command line.  This &lt;a href=&quot;http://gsd.di.uminho.pt/jpo/software/wakeonlan/&quot;&gt;one&lt;/a&gt; works nicely on my Mac (cuz OS X just comes with PERL out of the box).   I also grabbed it on my Debian system with &quot;apt-get install wakeonlan&quot;.&lt;br /&gt;&lt;br /&gt;One thing to note, it will be easier to use this if you happen to recall the &lt;a href=&quot;http://en.wikipedia.org/wiki/Ethernet_address&quot;&gt;ethernet address&lt;/a&gt; of all your home machines.  I could tell you that I have all mine memorized, but I would be lying.  Instead, I just created a quick &lt;a href=&quot;http://www.google.com/notebook&quot;&gt;notebook&lt;/a&gt; on Google and stored them all there.&lt;br /&gt;&lt;br /&gt;My machines now have power management settings enabled.  They will enjoy a well deserved rest tonight.  Give it a try and let me know how it goes...</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/4591654400593244180/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/4591654400593244180' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/4591654400593244180'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/4591654400593244180'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2008/03/wake-up.html' title='Wake Up'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-6963405753667264616</id><published>2008-03-01T16:44:00.005-07:00</published><updated>2008-03-01T17:12:21.551-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="mail"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>The Magic Touch</title><content type='html'>I got an &lt;a href=&quot;http://www.apple.com/ipodtouch/&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;iPod&lt;/span&gt; Touch&lt;/a&gt; the other day.  Yes, they&#39;ve been out for a while now, big deal.   Some of my friends will tell you that I am afraid of new technology.  They are liars.&lt;br /&gt;&lt;br /&gt;At any rate, I got a used one from my cousin who recently upgraded to an iPhone.  If not for that, I probably still wouldn&#39;t have one.  I played around with it for about 4 hours last night and I&#39;m just blown away by the possibilities in this little device.&lt;br /&gt;&lt;br /&gt;However, I don&#39;t necessarily like it for the same reasons that Apple has intended.  Sure, the screen is beautiful, and the form factor is nice.  Problem is, I have a perfectly good &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;iPod&lt;/span&gt; that plays music and video just fine.  And no, I really don&#39;t need to watch it sideways.  That isn&#39;t the reason that I like the Touch.   The reason I like the Touch is  twofold; the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;wi&lt;/span&gt;-&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;fi&lt;/span&gt; capability, and the full web browser. &lt;br /&gt;&lt;br /&gt;I carry a laptop for a living.  It is a heavy beast and I have a bag full of accessories to go along with it.  It certainly has its place, but I find that I won&#39;t take it into a coffee shop or some other place with &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;wi&lt;/span&gt;-&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;fi&lt;/span&gt; access because it is just to painful to lug it around, boot it up, and log in just to check my email or catch up on some &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;RSS&lt;/span&gt; feeds.   Sometimes, I feel like &lt;a href=&quot;http://improveverywhere.com/2008/02/25/mobile-desktop/&quot;&gt;these guys&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Enter the Touch.   It fits nicely in my laptop bag or in my pocket.   It is &lt;a href=&quot;http://en.wikipedia.org/wiki/Flash_memory&quot;&gt;flash&lt;/a&gt; based, boots immediately, and has a fully capable web browser.   Take that, add in the excellent &lt;a href=&quot;http://www.google.com/intl/en/options/&quot;&gt;applications&lt;/a&gt; provided by Google, and I have a very powerful device that can replace my laptop in a lot of scenarios.  Gmail and &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;Greader&lt;/span&gt; are apps that I use daily.  Both are quite usable on this handy little device.   Next I will have to try creating one of these posts with it!&lt;br /&gt;&lt;br /&gt;Do you have an &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;iPod&lt;/span&gt; Touch or iPhone yet?</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/6963405753667264616/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/6963405753667264616' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6963405753667264616'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6963405753667264616'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2008/03/magic-touch.html' title='The Magic Touch'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-9125424316250850005</id><published>2008-02-05T22:10:00.000-07:00</published><updated>2008-02-05T22:29:32.889-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="rss"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>The RSS Web We Weave</title><content type='html'>I ran across &lt;a href=&quot;http://www.makeuseof.com/tag/how-to-filter-out-undesirable-posts-in-your-rss-reader/&quot;&gt;this&lt;/a&gt; just now.  I&#39;m not sure that it is something that I would use as  I tend to just use my brain to filter out crap I don&#39;t want to read (hence, I don&#39;t click on it).   However, I have mentioned here before that I&#39;m a fan of &lt;a href=&quot;http://www.aiderss.com/&quot;&gt;AideRSS&lt;/a&gt;.  As I thought about it some more, I guess you could called AideRSS a kind of filter.  By using AideRSS, I depend on &quot;the community&quot; to filter out some crap for me.&lt;br /&gt;&lt;br /&gt;What made me write this post however, was thinking about how many levels of indirection an RSS feed might pass through by the time I read it.  Using my own feed as an example, I write it on &lt;a href=&quot;http://www.blogger.com/&quot;&gt;Blogger&lt;/a&gt;, then I &quot;burn&quot; it with &lt;a href=&quot;http://www.feedburner.com/&quot;&gt;FeedBurner&lt;/a&gt;.  There&#39;s one.  Then, someone might use AideRSS to get out my &quot;best&quot; posts.  There&#39;s two.  Next, they might run it through &lt;a href=&quot;http://feedrinse.com/&quot;&gt;FeedRinse&lt;/a&gt; to cleanse out the content they find objectionable.  There&#39;s three.  Now, that it&#39;s clean, they might do God knows what with it after running it through &lt;a href=&quot;http://pipes.yahoo.com/pipes/&quot;&gt;Yahoo Pipes&lt;/a&gt;.  There&#39;s four.   And that is before they even see it in their aggregator, which may have another set of tags, virtual folders, or searches.  Wow....&lt;br /&gt;&lt;br /&gt;The Windows guys won&#39;t get this, but those whole idea just parallels so well with the &lt;a href=&quot;http://en.wikipedia.org/wiki/Unix_philosophy&quot;&gt;philosophy&lt;/a&gt; of the *nix operating system.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Write programs that do one thing and do it well.&lt;br /&gt;Write programs to work together.&lt;br /&gt;Write programs to handle text streams, because that is a universal interface.&lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/9125424316250850005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/9125424316250850005' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/9125424316250850005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/9125424316250850005'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2008/02/rss-web-we-weave.html' title='The RSS Web We Weave'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-6385674419727312658</id><published>2007-12-29T14:05:00.000-07:00</published><updated>2007-12-29T13:54:57.486-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phone"/><title type='text'>Mobile phone usage analysis</title><content type='html'>I mentioned earlier that I am using the Tmobile &quot;myFaves&quot; plan.  This plan allows me unlimited calling to five numbers and 300 minutes to all other numbers.  Now, there are two, maybe three, people that I talk to regularly so they instantly went into my &quot;faves&quot;.   For the remaining slots available, I want to make sure that I am getting the numbers in there that I talk to frequently.  Since I&#39;m allowed to make changes once per month, I have been going through a quick spreadsheet analysis to determine which numbers I am using the most and ensure they are in my &quot;faves&quot;.&lt;br /&gt;&lt;br /&gt;To do this analysis, I first downloaded my call records from Tmobile&#39;s website.  They offer the ability to download in a CSV format making it easy to import into your favorite spreadsheet. &lt;br /&gt;&lt;br /&gt;I, then, created a pivot table on my call data.  (If your favorite spreadsheet cannot do pivot tables, then get the free &lt;a href=&quot;http://www.openoffice.org/&quot;&gt;OpenOffice&lt;/a&gt; application.)  To create the pivot table, I simply highlight the data, drag the &quot;minutes&quot; column into the main data space, drag the &quot;numbers&quot; column into the left-hand row space, and click &quot;done&quot;.&lt;br /&gt;&lt;br /&gt;Once the pivot table has aggregated all my minutes by number, I then highlighted that dataset, sort descending by minutes, and I now have a nice list of my most frequently used numbers!&lt;br /&gt;&lt;br /&gt;Using the top five of these numbers, I go back to Tmobile&#39;s website (which has timed out my login.  Nice.) and &quot;manage&quot; my &quot;faves&quot;.    This has been a very useful activity taking about 10 minutes once per month.  This activity really saved me last month when a friend that is on my list of five changed their phone number.  I updated it in my phone&#39;s contact list, but did not remember to update my &quot;faves&quot; until just now when I looked at the data.  It would be nice if Tmobile would aggregate the data in this way, but I suspect it is not in their interest for me to have a finely tuned &quot;fave&quot; list.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/6385674419727312658/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/6385674419727312658' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6385674419727312658'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6385674419727312658'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/12/mobile-phone-usage-analysis.html' title='Mobile phone usage analysis'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-3511218159662788441</id><published>2007-12-16T12:11:00.001-07:00</published><updated>2008-12-11T08:20:32.239-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="The Man"/><title type='text'>Local Shared Objects (aka: Flash cookies)</title><content type='html'>Just when you thought you were protecting your &lt;a href=&quot;http://en.wikipedia.org/wiki/Data_privacy&quot;&gt;privacy&lt;/a&gt; by preventing &lt;a href=&quot;http://en.wikipedia.org/wiki/HTTP_cookie&quot;&gt;cookies&lt;/a&gt; being stored on your computer, The Man has found another way to do the same thing.&lt;br /&gt;&lt;br /&gt;The Man&#39;s new trick is called &quot;&lt;a href=&quot;http://en.wikipedia.org/wiki/Local_Shared_Object&quot;&gt;Local Shared Objects&lt;/a&gt;&quot; (LSO).  LSO describes the capability of Adobe&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Adobe_Flash&quot;&gt;Flash&lt;/a&gt; software to store information on your computer without you knowing about it.   Furthermore, other websites can access this information to understand more about you and places that you have visited before.&lt;br /&gt;&lt;br /&gt;Adobe provides a &lt;a href=&quot;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html&quot;&gt;tool&lt;/a&gt; to give you control over how LSOs are stored on your computer.  I highly suggest that you check this out and alter the default settings for your computer.  To use the tool, log onto the &lt;a href=&quot;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html&quot;&gt;Settings Manager&lt;/a&gt;, and jump over to the &quot;&lt;a href=&quot;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html&quot;&gt;Website Privacy Settings Panel&lt;/a&gt;&quot;.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdOfafttnWz1GggspH0BFjcE5Cd7ygbSwUloWgnJI7a-8u9pvlx9Qn-vOYEleTKaznQEvW0yyHAXvbfLbHNy6QUNLMRJzOrpVPs36bhDtc_OvYMHyZtrWh7aQNvqpE8zXTXMzd4vOdJuON/s1600-h/Picture+1.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdOfafttnWz1GggspH0BFjcE5Cd7ygbSwUloWgnJI7a-8u9pvlx9Qn-vOYEleTKaznQEvW0yyHAXvbfLbHNy6QUNLMRJzOrpVPs36bhDtc_OvYMHyZtrWh7aQNvqpE8zXTXMzd4vOdJuON/s320/Picture+1.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5144710355991543186&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;You will likely see a long list of &quot;Visited Websites&quot;.  As soon as I saw this, I immediately hit the &quot;Delete all sites&quot; button and then thought about taking a picture. Oh well...  &lt;br /&gt;&lt;br /&gt;Browse through each of the tabs along the top.  If you are like me, you will be appalled at some of the default settings.  (Why yes, actually, I would like third parties to access my webcam!) For example, the default setting on the &quot;Storage Settings&quot; tab allows every website to store up to 100KB of data on your computer!   Move that slider to zero, pronto.&lt;br /&gt;&lt;br /&gt;Next, head on over to the &quot;&lt;a href=&quot;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html&quot;&gt;Global Storage Settings Panel&lt;/a&gt;&quot; and un-check the option to &quot;Allow third party Flash content to store data on your computer&quot;.  This is supposed to prevent any future storage of LSOs on your computer.  I will be watching mine closely to see how it works.&lt;br /&gt;&lt;br /&gt;I supposed we should be grateful that The Man (Adobe, in this case) provides the Settings Manager in the first place.  I just wish the defaults for this kind of stuff were in favor of my privacy instead of the other way around.&lt;br /&gt;&lt;br /&gt;Oh, and don&#39;t forget to load up the Settings Manager on every computer you use.  Yes, it is too much to ask to only do it once.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/3511218159662788441/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/3511218159662788441' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/3511218159662788441'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/3511218159662788441'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/12/local-shared-objects-aka-flash-cookies.html' title='Local Shared Objects (aka: Flash cookies)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdOfafttnWz1GggspH0BFjcE5Cd7ygbSwUloWgnJI7a-8u9pvlx9Qn-vOYEleTKaznQEvW0yyHAXvbfLbHNy6QUNLMRJzOrpVPs36bhDtc_OvYMHyZtrWh7aQNvqpE8zXTXMzd4vOdJuON/s72-c/Picture+1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-2529980318660043191</id><published>2007-11-25T12:31:00.000-07:00</published><updated>2007-12-01T16:17:03.991-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="mail"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Take back your email address</title><content type='html'>How many times a week do you get prompted for an email address while you are surfing the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;ol&lt;/span&gt;&#39; web?  Once? Three times? Multiple times a day?    It probably depends on what kind of surfing you do, but it seems that every site wants your address these days.  They assure you that they won&#39;t sell it or rent it to anyone else, and I&#39;ll actually giving them the benefit of the doubt that they honor this promise.&lt;br /&gt;&lt;br /&gt;Yet, when you hand it over in order to get some free download or other wares, the &lt;a href=&quot;http://marketing.about.com/od/directmarketin1/a/makeahit.htm&quot;&gt;marketing campaigns&lt;/a&gt; begin.  I&#39;m not necessarily talking about &lt;a href=&quot;http://en.wikipedia.org/wiki/Spam_%28electronic%29&quot;&gt;spam&lt;/a&gt;, although that is certainly something to be concerned about.  No, I&#39;m referring to the continuing stream of &quot;special deals&quot;, coupons, and other crap that companies want to send you.&lt;br /&gt;&lt;br /&gt;Here&#39;s another scenario that gets to me regularly.  I need to purchase a hard to find item.  The big stores that I usually do business with don&#39;t have it, so I have to &lt;a href=&quot;http://www.google.com/&quot;&gt;Google&lt;/a&gt; for a niche website that carries it.  While I&#39;m glad to have found the item in question, I now have to give my address.  Now, I do want to get things like shipping notices and order confirmations, but I don&#39;t want all the stuff that comes after I&#39;ve received my order.&lt;br /&gt;&lt;br /&gt;So, there&#39;s the problem.   Now, for the solution.  To key to preventing someone keeping your address longer then you want them to is to use a disposable address! If the address they have no longer goes to my primary inbox, then I have no problem at all with them keeping it on file for as long as they want.  :)&lt;br /&gt;&lt;br /&gt;The great folks over at &lt;a href=&quot;https://www.spamgourmet.com/&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;spamgourmet&lt;/span&gt;&lt;/a&gt; have provided a service that does this.  To use this service, you need to create a &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;login&lt;/span&gt; and give them your primary email address.  (I know, I know...  don&#39;t worry, this is the last time you need to surrender your &quot;real&quot; address)   Once you have a &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;login&lt;/span&gt; name, you are ready to go.   Next time you are asked to provide an address, you just follow a pattern.  The pattern looks like this:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;label.number.login@spamgourmet.com&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;In the pattern above, you would replace the text &quot;label&quot; with a unique string that is meaningful to you.  I usually use the name of the company or website that I am filling out.  (This gives me the added advantage of knowing if they did sell their email list to another firm.)  Next, you replace the text &quot;number&quot; with a number, either numeric or fully spelled out.   Finally, you replace the text &quot;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;login&lt;/span&gt;&quot; with the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;login&lt;/span&gt; name that you created when you originally signed up and keep everything else the same.  Here is how it might look:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;bestbuy.6.michaelscott@spamgourmet.com&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;The number in the middle is really the interesting part of all this.  Basically, the way that this works is that Best Buy (in my example) will send email to the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;spamgourmet&lt;/span&gt; address.  &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;Spamgourmet&lt;/span&gt; will then forward the email to my real address &lt;span style=&quot;font-weight: bold;&quot;&gt;if&lt;/span&gt; I have received less then 6 messages to the &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;spamgourmet&lt;/span&gt; address.  Once, I have received 6 messages, then &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_9&quot;&gt;spamgourmet&lt;/span&gt; will no longer forward them.  They call this &quot;eating&quot; my spam.  Next time I actually want to buy something from Best Buy, I &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_10&quot;&gt;login&lt;/span&gt; to &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_11&quot;&gt;spamgourmet&lt;/span&gt;, search for my &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_12&quot;&gt;bestbuy&lt;/span&gt; disposable address, and tell them I want to receive 6 more messages.  Easy!&lt;br /&gt;&lt;br /&gt;To show how much of an impact this has made for me, I&#39;ll publish my stats.  These are provided by &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_13&quot;&gt;spamgourmet&lt;/span&gt;.  &quot;Your message stats: 1,428 forwarded, 18,458 eaten.  You have 149 disposable address(es).&quot;   This gives me a ratio of almost 13 messages &quot;eaten&quot; for every 1 that I&#39;ve actually received.   Wow...&lt;br /&gt;&lt;br /&gt;Oh, and did I mention that &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_14&quot;&gt;spamgourmet&lt;/span&gt; is free?</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/2529980318660043191/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/2529980318660043191' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/2529980318660043191'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/2529980318660043191'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/11/take-back-your-email-address.html' title='Take back your email address'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-8664970783256054172</id><published>2007-10-27T17:56:00.000-06:00</published><updated>2007-10-27T18:16:14.238-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Upgrade your Wireless Router</title><content type='html'>Today, I upgraded my wireless router.  Not because it was broken, but just because it was there, you know?  &lt;br /&gt;&lt;br /&gt;When Linksys was its own company, it did a very cool thing.  It based some of its devices on the Linux operating system, which made it very easy for enterprising young folks to do the same.  Fast forward a few years and now you can take a third party operating system and place it on your Linksys wireless router.   &lt;br /&gt;&lt;br /&gt;I&#39;ve been reading about the excellent &lt;a href=&quot;http://www.dd-wrt.com/wiki/index.php/Main_Page&quot;&gt;DD-WRT&lt;/a&gt; package for some time now.  This afternoon, I found the time to give it a try.  (Actually, I was just running out of excuses to do yardwork, and this fit the bill nicely.)   In less then an hour, I had downloaded the software, flashed the router, and re-configured it to use my existing SSID and network information.   While, it doesn&#39;t compete with Apple&#39;s &lt;a href=&quot;http://www.apple.com/macosx/features/300.html&quot;&gt;300&lt;/a&gt;, it does have quite a few interesting &lt;a href=&quot;http://www.dd-wrt.com/wiki/index.php/What_is_DD-WRT%3F#Features&quot;&gt;features&lt;/a&gt;.  It brings a lot of new ideas to the home broadband router area.  It can update your &lt;a href=&quot;http://logicbound.blogspot.com/2007/10/connect-to-your-home-network-dynamic.html&quot;&gt;DDNS&lt;/a&gt; information, host your PPTP &lt;a href=&quot;http://en.wikipedia.org/wiki/VPN&quot;&gt;VPN session&lt;/a&gt;, provide a full SSH management login, and keep its time current with any &lt;a href=&quot;http://en.wikipedia.org/wiki/Network_Time_Protocol&quot;&gt;NTP&lt;/a&gt; server.  My favorite feature is probably the ability to increase the power of the radio so my devices downstairs can get a better connection.&lt;br /&gt;&lt;br /&gt;Anyway, let&#39;s just say that I&#39;m impressed.  I&#39;ve even considered using it to replace my custom-built Debian firewall that currently guards my home network.  If you want to give it a try, it supports much more then just Linksys, so visit &lt;a href=&quot;http://www.dd-wrt.com/wiki/index.php/Supported_Devices&quot;&gt;this page&lt;/a&gt; to see if your device is supported.   If yours isn&#39;t and you are ready for an upgrade, you can pick up the very nice Linksys WRT54G for around $50.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/8664970783256054172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/8664970783256054172' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/8664970783256054172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/8664970783256054172'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/10/upgrade-your-wireless-router.html' title='Upgrade your Wireless Router'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-7349364383853142008</id><published>2007-10-20T12:15:00.000-06:00</published><updated>2008-12-11T08:20:32.502-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Connect to your home network (SSH)</title><content type='html'>In my &lt;a href=&quot;http://logicbound.blogspot.com/2007/10/connect-to-your-home-network-dynamic.html&quot;&gt;last post&lt;/a&gt;, I discussed how I keep track of my home IP address so that I could connect from &quot;outside&quot;, whether I&#39;m at my parent&#39;s house, traveling, or in a coffee shop.&lt;br /&gt;&lt;br /&gt;Now, if you are going to connect from the typical open wireless access that you will find at a coffee shop, then you should be thinking about the security of the information you pass to your home network.  It is incredibly easy to eavesdrop on your web session on an open wireless network.   There are, as always, multiple ways to connect home securely.  I will show you a couple of different ways to do it.&lt;br /&gt;&lt;br /&gt;From here on out, this post will reference a Mac system that is connected directly to the Internet without any sort of firewall in the middle.  Next week, I&#39;ll do a similar post for those of you gutsy enough to connect your Windows system directly to your external connection.&lt;br /&gt;&lt;br /&gt;On my home system, I have &lt;a href=&quot;http://docs.info.apple.com/article.html?path=Mac/10.4/en/mh1921.html&quot;&gt;configured&lt;/a&gt; the &lt;a href=&quot;http://en.wikipedia.org/wiki/Ssh&quot;&gt;SSH&lt;/a&gt; server to allow traffic from my internet connection.  I can then connect to that from a Windows, Mac, or *nix system.  When making the SSH connection, I choose the options to allow &lt;a href=&quot;http://en.wikipedia.org/wiki/Tunneling_protocol&quot;&gt;tunneling&lt;/a&gt;.  This allows me to then connect to my home system while &quot;tunneling&quot; through the secure SSH connection.&lt;br /&gt;&lt;br /&gt;From the Mac system that you are currently sitting at, the command you would use to do this is (all one line):&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;ssh -L 5931:localhost:5900 username_on_home_system@my_home_system.dyndns.org&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;By running this command, you are attempting to login to your system at home using an account named &quot;username_on_home_system&quot;.  Once you authenticate successfully, you instruct SSH to connect port 5931 on the system sitting in front of you to port 5900 on your home system.&lt;br /&gt;&lt;br /&gt;Once you have successfully made this connection, then you can use a remote desktop application like RDP (for Windows) or VNC (for Windows, Mac, and lots of other systems).  I use &lt;a href=&quot;http://www.redstonesoftware.com/osxvnc/OSXvnc.html&quot;&gt;VNC&lt;/a&gt; on my home system, so that is why I chose the port number 5900 when connecting SSH.   To connect to my home system, I use a VNC client like &lt;a href=&quot;http://sourceforge.net/projects/cotvnc/&quot;&gt;Chicken of the VNC&lt;/a&gt; and configure it to connect to the local systems sitting in front of me.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT4gOXA4BkB_enfjaYOAtec-_W-67FPaFZqKviAdr08AnjKIOpGRleACQ-l2XNAzVet-JOcs3Azl-r3oKW7ICnQMyLLio8kCdbtGdMqhhpcTljRLk_OFs4kIA8uL4n4tG2vfrV2gY-_jNM/s1600-h/Chicken_connect.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT4gOXA4BkB_enfjaYOAtec-_W-67FPaFZqKviAdr08AnjKIOpGRleACQ-l2XNAzVet-JOcs3Azl-r3oKW7ICnQMyLLio8kCdbtGdMqhhpcTljRLk_OFs4kIA8uL4n4tG2vfrV2gY-_jNM/s320/Chicken_connect.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5123513522101363938&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;It may seem odd to be trying to connect VNC to the system that you are currently sitting at, but keep in mind that the SSH program is going to forward anything you send to your local port 5931 to the port 5900 on your system at home.  If you&#39;ve done everything correctly, you should be looking at your home desktop, and it will be completely &lt;a href=&quot;http://en.wikipedia.org/wiki/Encrypted&quot;&gt;encrypted&lt;/a&gt; while doing so!   Now, you can launch programs on your home system just as if you were sitting there.&lt;br /&gt;&lt;br /&gt;I hope you find this helpful.  It can be complicated, but your privacy and security are well worth taking the time to figure it out.   If you have questions, leave a comment for me and I&#39;ll do my best to help you out.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/7349364383853142008/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/7349364383853142008' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7349364383853142008'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7349364383853142008'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/10/connect-to-your-home-network-ssh.html' title='Connect to your home network (SSH)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT4gOXA4BkB_enfjaYOAtec-_W-67FPaFZqKviAdr08AnjKIOpGRleACQ-l2XNAzVet-JOcs3Azl-r3oKW7ICnQMyLLio8kCdbtGdMqhhpcTljRLk_OFs4kIA8uL4n4tG2vfrV2gY-_jNM/s72-c/Chicken_connect.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-6074102546158664969</id><published>2007-10-14T12:10:00.000-06:00</published><updated>2007-10-20T14:30:20.358-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Connect to your home network (Dynamic DNS)</title><content type='html'>Ever been at work or at a friend&#39;s house and wanted to log into your home connection?  Know the &lt;a href=&quot;http://en.wikipedia.org/wiki/IP_address&quot;&gt;IP address&lt;/a&gt; off the top of your head?  Well, if you&#39;re like me, then you probably don&#39;t remember it.  Even if you write down your current address, it will likely change on you by the time you need it.&lt;br /&gt;&lt;br /&gt;To make this easier, your &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_service_provider&quot;&gt;ISP&lt;/a&gt; will assign you a dedicated IP address.  This will allow you to always have the same address and make it easier to connect to your home network. Problem is, they will want to charge you a monthly fee for the privilege.&lt;br /&gt;&lt;br /&gt;Fortunately, there is a free service available to make it possible to get by without a dedicated address.  The concept is called &lt;a href=&quot;http://en.wikipedia.org/wiki/Dynamic_DNS&quot;&gt;Dynamic DNS&lt;/a&gt; and the website that I use that offers this service is called &lt;a href=&quot;http://www.dyndns.com/services/dns/dyndns/&quot;&gt;DynDNS&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;Basically, the way that this works is that a central party keeps track of your computer&#39;s IP address.  By downloading a special client to your computer, you can configure it to send an update to DynDNS whenever its address changes.  This allows you to use &lt;a href=&quot;http://en.wikipedia.org/wiki/Domain_name_system&quot;&gt;DNS&lt;/a&gt; to easily recall the exact address that your home computer is using at any time.  DynDNS is easy to &lt;a href=&quot;http://www.dyndns.com/services/dns/dyndns/howto.html&quot;&gt;setup&lt;/a&gt; with the hardest part being choosing which of the 80 &lt;a href=&quot;http://www.dyndns.com/services/dns/dyndns/domains.html&quot;&gt;domain names&lt;/a&gt; that you want to use.&lt;br /&gt;&lt;br /&gt;This should allow you to find your home network on the Internet.  &lt;a href=&quot;http://logicbound.blogspot.com/2007/10/connect-to-your-home-network-ssh.html&quot;&gt;Next&lt;/a&gt;, I&#39;ll cover how I securely connect and encrypt all communications to my home network.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://logicbound.blogspot.com/2007/10/connect-to-your-home-network-ssh.html&quot;&gt;Part 2, SSH&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/6074102546158664969/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/6074102546158664969' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6074102546158664969'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6074102546158664969'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/10/connect-to-your-home-network-dynamic.html' title='Connect to your home network (Dynamic DNS)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-9179706408213980555</id><published>2007-10-07T10:20:00.000-06:00</published><updated>2007-10-07T12:55:00.560-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="virtual machine"/><title type='text'>Run a Windows application on your Mac</title><content type='html'>I decided to try out a product called &lt;a href=&quot;http://www.parallels.com&quot;&gt;Parallels&lt;/a&gt; the other day.  I did this because I love my Macs, but I also love Quicken for Windows.   I had heard about Parallels from a number of places, but figured now was the time to give it a try.&lt;br /&gt;&lt;br /&gt;After installing it and installing Windows XP as a guest &lt;a href=&quot;http://en.wikipedia.org/wiki/Virtual_machine&quot;&gt;VM&lt;/a&gt;, I got to really see what was so special about this product.  &lt;br /&gt;&lt;br /&gt;The feature of Parallels that I &lt;strong&gt;really&lt;/strong&gt; liked is called &lt;a href=&quot;http://www.parallels.com/en/products/desktop/features/coherence/&quot;&gt;Coherence&lt;/a&gt;.  With the Coherence feature enabled, it becomes very seamless when running a Windows application on your host OSX operating system.  You no longer have to &quot;swap&quot; between the two operating systems.  You can now have the Windows shell natively embedded into your OSX environment.  For a peek at what this looks like, check out the image below.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.parallels.com/files/upload/1/coherence03.png&quot;&gt;&lt;br /&gt;&lt;br /&gt;It is really a powerful, clean way to implement better usability of the guest environment.  You can even go farther with cross-launching applications between the two environments, but that just isn&#39;t something I&#39;m all that interested in.  My goal is to use Quicken for Windows on my Mac and this Parallels is a great way to do it!&lt;br /&gt;&lt;br /&gt;The drawback...   Have plenty of physical memory.  The Mac Mini that I was running this on has 1G of memory and that was just not quite enough for a pleasurable VM experience.  Swapping back and forth between the guest environment and the host environment was very noticeable and almost unusable.   I&#39;m very familiar with VM technology, both at home and at work, so I&#39;m confident that this was not a problem with Parallels.  It just takes more then 512M of memory for each operating system (the guest and the host) to run smoothly, and any VM product has to deal with this.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/9179706408213980555/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/9179706408213980555' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/9179706408213980555'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/9179706408213980555'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/10/run-windows-application-on-your-mac.html' title='Run a Windows application on your Mac'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-5051126489737311859</id><published>2007-10-01T16:07:00.001-06:00</published><updated>2007-10-01T16:33:37.612-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="mail"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Backup Gmail Data</title><content type='html'>I ran across an interesting &lt;a href=&quot;http://lifehacker.com/software/gmail/geek-to-live--back-up-gmail-with-fetchmail-235207.php&quot;&gt;post&lt;/a&gt; the other day about making a backup of your email that is hosted by Google.  The original author did a good job with instructions, so I won&#39;t repeat them here.  I will note that I needed to a couple of things differently to make this work on my Mac.&lt;br /&gt;&lt;br /&gt;First of all, fetchmail was already available on my Mac.   (Don&#39;t you just love that OSX is really Unix? I do.)  &lt;br /&gt;&lt;br /&gt;Secondly, when configuring the .fetchmailrc file, I added a couple of things:&lt;br /&gt;&lt;ol&gt;&lt;br /&gt;&lt;li&gt;&lt;i&gt;and wants mda &quot;/usr/bin/procmail -d %T&quot;&lt;/i&gt; - The default behavior of fetchmail is to try and forward the mail that it downloaded to your systems SMTP service.  In my case, I had never intended for my desktop machine to receive mail directly, so this was not enabled.  The first time I ran fetchmail, it choked and died at this step.  By adding the &quot;mda&quot; option, you direct fetchmail to deliver the mail locally to your default system mailbox.  This will be a file that matches your username in the /var/mail directory.  You can view it with a texteditor or by using the command &#39;mail&#39; when you are in the Terminal.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;i&gt;keep&lt;/i&gt; - I added this keep option so that I don&#39;t need to use the &quot;-k&quot; option when running the fetchmail command.  Not sure why the original author didn&#39;t do this.&lt;/li&gt;&lt;br /&gt;&lt;/ol&gt;&lt;br /&gt;Okay, so my .fetchmailrc file looks like this now:&lt;br /&gt;&lt;pre&gt;poll pop.gmail.com with proto POP3 and options no dns&lt;br /&gt;user &#39;you@gmail.com&#39; there with password &#39;itsasecret&#39; is &#39;YourOSXUsername&#39; here and wants mda &quot;/usr/bin/procmail -d %T&quot; options ssl keep&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;Upon running fetchmail, it downloads a few hundred messages at a time.  My Gmail currently has about 1800 messages, so this will take a while to download, but that&#39;s fine.  My intent here was to get a copy of my mail on my own hard drive just in case my relationship with Google ever fell through.  I&#39;ll schedule this nightly via &lt;a href=&quot;http://en.wikipedia.org/wiki/Cron&quot;&gt;cron&lt;/a&gt; and in a week or two, I&#39;ll have a copy of everything.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/5051126489737311859/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/5051126489737311859' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5051126489737311859'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5051126489737311859'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/10/backup-gmail-data.html' title='Backup Gmail Data'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-6153718028202949924</id><published>2007-09-13T10:18:00.000-06:00</published><updated>2007-10-01T16:33:11.603-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="rss"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Wading through the onslaught of RSS feeds</title><content type='html'>If you don&#39;t know what a &lt;a href=&quot;http://en.wikipedia.org/wiki/RSS_(file_format)&quot;&gt;RSS&lt;/a&gt; feed is, you should.  (I&#39;ll wait while you follow the link and read up on it.)&lt;br /&gt;&lt;br /&gt;Okay, so now you know what RSS means, but why is it such a big deal?   For me, RSS is rapidly becoming the tool that I use to keep up on all the latest information.  Whether it is news, new products, weather, or tips on how to save money, RSS feeds are what I read.   By subscribing (at no cost) to RSS feeds, I am able to load up a single page in my browser and view new content from a multitude of websites.   This is an incredible timesaver as I no longer have to actually go out and visit each website every day. I don&#39;t have to bookmark all of those sites, nor do I have to sit through a bunch of graphic-intensive ads as each website loads into my browser.&lt;br /&gt;&lt;br /&gt;As I wander through the Internet each day, I invariably stumble across content that I like and may want to read more about in the future.  When this happens, I look for a feed that I can subscribe to.  If you are a Firefox or Safari user, the existence of a feed will be highlighted for you in the address bar of your browser.  If not, just scan the page for words &quot;subscribe&quot;, &quot;rss&quot;, or &quot;feed&quot;.  You can also look for a &lt;a href=&quot;http://www.charterflights.co.uk/rss/rss-icon.jpg&quot;&gt;little orange icon&lt;/a&gt; somewhere that is the accepted symbol for RSS feed.&lt;br /&gt;&lt;br /&gt;Once you choose to subscribe to a feed, then you will need an application known as a &quot;feed reader&quot; or &quot;aggregator&quot;.  You can find lots of them out there, but I would recommend &lt;a href=&quot;http://reader.google.com&quot;&gt;Google Reader&lt;/a&gt; as a good place to start.  It&#39;s easy to use and accessible from whatever computer you happen to be on.  &lt;br /&gt;&lt;br /&gt;As you start collecting a few feeds, you will invariably come across one that has &quot;high traffic&quot;.   This means that they post new content many times throughout the day.  This can be overwhelming if you have many feeds to browse or if you haven&#39;t checked your feeds for a few days.   &lt;br /&gt;&lt;br /&gt;I have recently ran across a tool that helps with this problem.  It is called &lt;a href=&quot;http://www.aiderss.com/&quot;&gt;aideRSS&lt;/a&gt;.  This is a great tool and even comes with a nice &lt;a href=&quot;http://www.aiderss.com/blog/screencasts/rss-import/&quot;&gt;training video&lt;/a&gt; that shows you how to use their site.  By using this tool, you will be able to add a filtered feed to your reader instead of the original one that you were interested in.  This allows you to only spend time reading content that aideRSS has noted as popular.&lt;br /&gt;&lt;br /&gt;The main drawback of this approach is that you won&#39;t be the &quot;first&quot; to read the new content and/or comment on it.  If that is important to you, then you should retain the original feed subscription.  For me, personally, I am content with a delay before I see the content when it means that I&#39;m going to be viewing content that the community has already voted as popular.&lt;br /&gt;&lt;br /&gt;Take a few moments, check out aideRSS, and let me know how it goes.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/6153718028202949924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/6153718028202949924' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6153718028202949924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6153718028202949924'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/09/wading-through-onslaught-of-rss-feeds.html' title='Wading through the onslaught of RSS feeds'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-5877780890348154494</id><published>2007-09-01T13:30:00.000-06:00</published><updated>2007-09-01T10:14:08.296-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phone"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Switching Cell Phone Providers, pt 5 (Customer Service)</title><content type='html'>The last aspect of this whole evaluation I wanted to look at was their customer service.  I have heard raves about Tmobile&#39;s customer service.  I have called them a total of two times so far.  They are certainly the friendliest company that I have dealt with.  I was very impressed.&lt;br /&gt;&lt;br /&gt;My second call to Customer service  was to actually port my Cingular number over to my Tmobile account.  After getting through the &lt;a href=&quot;http://www.call-center-tech.com/automated-response-unit.htm&quot;&gt;ARU&lt;/a&gt;, I spoke to the initial operator who validated my info and then transferred me to a more technical staff member for the number porting.  He walked me through each and every step and about how long it would take.  My expectations are well set (should be all done by tomorrow) and I&#39;m ready to go.&lt;br /&gt;&lt;br /&gt;At this point, I would have to concur with others that I&#39;ve read from and talked to.  Tmobile&#39;s customer service really is great!</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/5877780890348154494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/5877780890348154494' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5877780890348154494'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5877780890348154494'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/09/switching-cell-phone-providers-pt-5.html' title='Switching Cell Phone Providers, pt 5 (Customer Service)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-2812151194012080394</id><published>2007-08-25T12:55:00.000-06:00</published><updated>2007-10-15T20:18:08.916-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phone"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Switching Cell Phone Providers, pt 4 (Website)</title><content type='html'>Next test, the website.  I wanted to see how easy it was to navigate and manage my account.  The other thing that I really needed to know was how I could manage my 5 numbers.&lt;br /&gt;&lt;br /&gt;Anyway, since I am using a non-&quot;faves&quot; enabled phone, I wanted to see if I could manage my list of 5 numbers through the website.  Sure enough, I can and did.  That question answered.&lt;br /&gt;&lt;br /&gt;The other thing that I liked about the website is that it shows you how many minutes you&#39;ve consumed for the month.  Unfortunately, it doesn&#39;t appear to give detailed information on call data.  Perhaps, it will after a monthly statement is generated.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://logicbound.blogspot.com/2007/08/switching-cell-phone-providers-pt-3.html&quot;&gt;Part 3, Plan&lt;/a&gt; | &lt;a href=&quot;http://logicbound.blogspot.com/2007/09/switching-cell-phone-providers-pt-5.html&quot;&gt;Part 5, Customer Service&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/2812151194012080394/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/2812151194012080394' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/2812151194012080394'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/2812151194012080394'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/08/switching-cell-phone-providers-pt-4.html' title='Switching Cell Phone Providers, pt 4 (Website)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-2228124177721654639</id><published>2007-08-18T12:41:00.000-06:00</published><updated>2007-10-15T20:17:35.681-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phone"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Switching Cell Phone Providers, pt 3 (Plan)</title><content type='html'>Before I started searching for a plan, I needed to know what type of usage I would need.  I was abler to pull my last 6 months of usage records from my current Cingular account.  A quick analysis showed that I used about 400 minutes a month and sent/received 110 SMS messages.  Turns out I was buying a lot more then I was using.&lt;br /&gt;&lt;br /&gt;I got signed up on the base &quot;myFaves&quot; plan with Tmobile.  This plan offers unlimited (again, within context) calling to 5 numbers.  For all other numbers, 300 minutes.&lt;br /&gt;&lt;br /&gt;I now have a Tmobile plan with a temporary number.  At least, that is what they called it.  I had told them when signing up that I would either cancel the plan or roll my existing Cingular number over.   I got the phone home and immediately removed the &lt;a href=&quot;http://en.wikipedia.org/wiki/Subscriber_Identity_Module&quot;&gt;SIM&lt;/a&gt; card and plugged it into my existing phone.  Ah, the beauty of GSM...   I already own a &lt;a href=&quot;http://direct.motorola.com/hellomoto/slvr/&quot;&gt;SLVR&lt;/a&gt; which I really like.  The free phone that came with the plan was a nice, pink &lt;a href=&quot;http://www.blogger.com/www.motorola.com/miamiink/&quot;&gt;Miami Ink RAZR&lt;/a&gt;.  Needless to say, that&#39;s just not my style.&lt;br /&gt;&lt;br /&gt;Anyway, 5 minutes after I got home, my existing SLVR was up and running on Tmobile&#39;s network.  By the way, the perfect way to evaluate two services is to actually use the exact same device.  The Mythbusters would be proud of me.  I immediately phoned a friend and walked through the house to see what the service was like.  First impression was good.  I definitely have some dead spots in the house on Cingular&#39;s network.  Now, does this alone mean that Tmobile is better then Cingular?  Not really, it just means that there is likely a Tmobile tower closer to my house then a Cingular tower.&lt;br /&gt;&lt;br /&gt;Over the next week, I continued to check the bars on my phone (which isn&#39;t foolproof) and called friends and family from different locations.  Overall, in my area, I got just as good, if not better, service with Tmobile then with Cingular.   That aspect of my evaluation is looking good.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://logicbound.blogspot.com/2007/07/switching-cell-phone-providers-pt-2.html&quot;&gt;Part 2, Coverage&lt;/a&gt; | &lt;a href=&quot;http://logicbound.blogspot.com/2007/08/switching-cell-phone-providers-pt-4.html&quot;&gt;Part 4, Website&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/2228124177721654639/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/2228124177721654639' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/2228124177721654639'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/2228124177721654639'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/08/switching-cell-phone-providers-pt-3.html' title='Switching Cell Phone Providers, pt 3 (Plan)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-7132528892199038393</id><published>2007-08-11T14:28:00.000-06:00</published><updated>2007-10-15T20:22:13.254-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>4 Things To Think About If You Must Use WEP</title><content type='html'>Okay, if you&#39;ve read my previous posts, know how to use WPA to secure your wireless network. For some, this will not be an option.  If you absolutely must use WEP, let me give you a few things to keep in mind.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;#1&lt;/span&gt;) Use the longest password possible.  At least 128 bit.  This won&#39;t buy you much security, but it will mean that someone looking to &lt;a href=&quot;http://en.wikipedia.org/wiki/Password_cracking&quot;&gt;crack&lt;/a&gt; your password will have to sniff more traffic.  This means they have to be connected for a longer period of time before being able to discover your password.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;#2&lt;/span&gt;) Disconnect the devices connected to your wireless network when they aren&#39;t in use.  If you have a computer that you leave on all the time, it is constantly &quot;checking in&quot; with your access point.  This conversational traffic is exactly what a malicious person needs in order to collect the right information to crack your password.   If you are like me, you don&#39;t like powering down your equipment every day.  In this case, just access your wireless configuration on your laptop and disable the connection.  When you are ready to use it again, just enable it.  Easy.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;#3&lt;/span&gt;) Use a firewall.  If you don&#39;t know what this is or how to configure it, don&#39;t worry.  There are lots of resources available on the &#39;net.  I may also do a basic writeup on it if there is interest.   Basically, you want to keep your wireless network separate from the rest of your home network that has your other computers on it.  If someone were to access your wireless network, you don&#39;t want them getting to your internal resources. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;#4&lt;/span&gt;) Be smart about the type of data that you transfer over your wireless network.  Assume that some stranger is going to get a copy of it and ask yourself if it is something that needs to be more private.  Is it something that you would write on a postcard and send through the post office?   If so, it&#39;s probably okay for use on your wireless network.</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/7132528892199038393/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/7132528892199038393' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7132528892199038393'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7132528892199038393'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/08/things-to-think-about-if-you-must-use.html' title='4 Things To Think About If You Must Use WEP'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-6400753644552074738</id><published>2007-08-02T21:38:00.000-06:00</published><updated>2007-10-01T16:33:37.613-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Use WPA instead of WEP, pt 2</title><content type='html'>&lt;font style=&quot;font-weight: bold;&quot;&gt;Lesson #2&lt;/font&gt;) &lt;font style=&quot;font-style: italic;&quot;&gt;Fine.  I&#39;ll use the instruction manual.  What should I be looking to do?&lt;/font&gt;  Great!  Look for instructions on how to connect to the administration function of the device you are setting up.  This will usually be accessible on a &lt;a href=&quot;http://en.wikipedia.org/wiki/Private_network&quot;&gt;private&lt;/a&gt; address in the 192.168. range.  This means that you plug it in and then use your browser to access a special address that is given to you in the instruction manual.  Once you have accessed this function, you should be looking for a security section.  This will give you options on what kind of wireless security you want.  At the time of this writing, most devices give you three options: open, WEP, and &lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;WPA&lt;/a&gt;.  You want to choose WPA.  (Specifically, referring to Pre-Shared Key or &quot;Personal&quot;.  The Enterprise level is not within the scope of this blog.)&lt;br /&gt;&lt;br /&gt;The setup of WPA is really not any more difficult then WEP.  Which is what makes it frustrating for me to see people still using WEP.  There are probably a handful of situations in which folks may still want to use WEP.  Most of these being to support older equipment that was purchased before the WPA protocol was developed.  We will cover approaches to using WEP safely later.&lt;br /&gt;&lt;br /&gt;&lt;font style=&quot;font-weight: bold;&quot;&gt;Lesson #3&lt;/font&gt;) Choose a good password.  Good passwords are difficult for humans.  They are hard to remember, hard to come up with, hard to type.  This is unfortunate and typically leads most people to choosing bad passwords.  Bad passwords are short and easy to remember.  They are things that can be found in dictionaries or on your myspace page (birthday, dog&#39;s name, friend&#39;s name, etc).   When thinking about a good password for your wireless network, you have one thing going for you; you just don&#39;t have to type it very often, if ever.  Most modern devices allow you to enter the password one time and it will retain it.&lt;br /&gt;&lt;br /&gt;When choosing a password, you want to make it as long as possible and as random as possible.  WPA allows for a password of up to 64 hexidecimal characters.  I know what you&#39;re thinking, &lt;font style=&quot;font-style: italic;&quot;&gt;how am I going to type in a 64 character password?&lt;/font&gt;  Don&#39;t worry, I will walk you through the approach that I use in a bit.  You won&#39;t have to type a thing.  The point here is that you want the longest password possible.  It doesn&#39;t make any difference on your day-to-day computer use, but it does increase the time needed for a malicious person to gain access to your network.&lt;br /&gt;&lt;br /&gt;Now, to get a random password, you need a thing called a &quot;password generator&quot;.   With OS X, you can create one using the Keychain application.  If you are a Firefox user, there is an excellent extension available called &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/135&quot;&gt;SecurePassword&lt;/a&gt;.  If neither of these are an option for you, there are a few of them available on the web.  My favorite website for this is &lt;a href=&quot;https://www.grc.com/passwords.htm&quot;&gt;GRC&lt;/a&gt;.  GRC&#39;s password generator will build the perfect password for WPA merely by accessing the link above.  They provide a 64 character hexidecimal password along with a 63 character alpha-numeric one.  Either one will work for WPA, so let&#39;s choose the alpha-numeric one since it is more human-friendly.  When I accessed the site, this is the password that I received:&lt;br /&gt;&lt;br /&gt;lKAg0kImzxZ3HdDrlojUaUCXfInGNBXbMai4V7Afz2uh9nMNiByqaCfD3KMXqlD&lt;br /&gt;&lt;br /&gt;Don&#39;t let this scare you.  Just highlight it and copy it into your computer&#39;s &lt;a href=&quot;http://en.wikipedia.org/wiki/Buffer_%28computer_science%29&quot;&gt;buffer&lt;/a&gt; (ctrl+c or Cmd+c).  Open up a text editor and paste (ctrl+v or Cmd+v) it into the text editor.  Do a quick File|Save and you&#39;ve got your password (and you didn&#39;t have to type a thing).  Now, back to the wireless device we were configuring...   You&#39;ve selected WPA and are prompted to enter the password or the &quot;pre shared key&quot;.  Just switch back to your text editor, copy your random password, and paste it into the password field.  Now, look for the save button and you are done with your access point configuration!   Once you hit save, your device will probably restart and anyone currently connected to it will be dropped.  They will also not be able to re-connect without your new random password.&lt;br /&gt;&lt;br /&gt;&lt;font style=&quot;font-weight: bold;&quot;&gt;Lesson #4&lt;/font&gt;) Configure only the computers that you want on your wireless network.  Your next challenge is how to get that new password to your laptop so that it can access your wireless network.  There are, of course, a number of ways in which to do this.  The one that I propose is called the &lt;a href=&quot;http://en.wikipedia.org/wiki/Sneaker_net&quot;&gt;sneakernet&lt;/a&gt;.  Put on your &lt;a href=&quot;http://en.wikipedia.org/wiki/Tin-foil_hat&quot;&gt;tin foil hat&lt;/a&gt; with me and find a blank disk or &lt;a href=&quot;http://en.wikipedia.org/wiki/USB_flash_drive&quot;&gt;USB thumb drive&lt;/a&gt;.  This password isn&#39;t something that you want to leave on your computer, transfer to your friend via email, or post on a website.  &lt;font style=&quot;font-weight: bold;&quot;&gt;Ever&lt;/font&gt;.  You must maintain strict control over this password.  Find a disk... floppy, CD, DVD, ZIP, whatever.  My preference is CD these days.  You want something that will be accessible to most types of computers. Remember that file you created with your text editor?  Move it to the disk.&lt;br /&gt;&lt;br /&gt;Now, take the disk and insert it into the laptop you want to access your wireless network.  Open up the text file, highlight the password, and copy it into your buffer.  Now, open up your computers wireless configuration and find your network in the list.  Hopefully, it will say &quot;secured&quot; or something to that effect.  When you select it, it will prompt for a password.  No problem!  You just paste the new password into the both fields and you&#39;re done.  If done correctly, your laptop is now authenticated to your wireless network and you are all set.   Just take out the disk and repeat the procedure on any other computers that you want to have connected to your wireless network.  Friend of yours is visiting and wants to get their email?  Hand them the disk.   Just make sure you get it back.  :)</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/6400753644552074738/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/6400753644552074738' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6400753644552074738'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/6400753644552074738'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/08/use-wpa-instead-of-wep-pt-2.html' title='Use WPA instead of WEP, pt 2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-7910437834681126601</id><published>2007-07-27T21:56:00.000-06:00</published><updated>2007-10-15T20:23:12.350-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Use WPA instead of WEP</title><content type='html'>Okay, folks, it is time once again to review the state of today&#39;s wireless 802.11 (also known by the marketing term, &lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi&quot;&gt;WiFi&lt;/a&gt;) security.   This has been documented time and time again, but it has recently became clear to me that it apparently isn&#39;t sinking in.   One of my goals with this blog is to try and educate friends and family, so I thought I would write something up that is in plain English and implore you to think about your wireless situation at home.&lt;br /&gt;&lt;br /&gt;I was recently on vacation in a small town in Idaho when I fired up my laptop and found no fewer then six wireless networks within range.   A couple of things surprised me about this.  The first being that there were six(!) networks in my immediate vicinity in a town with a population of 4,000.  I am not used to seeing this kind of coverage in the smaller mountain towns that I&#39;ve visited.  The second, and probably more, surprising aspect of this was that all of them were secured!  That&#39;s right, none of them were set to allow open access, nor did they have the all-too-familiar network name &quot;linksys&quot; or &quot;default&quot;.&lt;br /&gt;&lt;br /&gt;Unfortunately, they had all used &lt;a href=&quot;http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy&quot;&gt;WEP&lt;/a&gt; as the means for securing their network.  This is horribly insecure and merely serves as a means to keep the honest people honest.  Perhaps, that is all the owners were after, but I would like to encourage you to go a step farther in securing your own home network.  It&#39;s really not that hard and will take 10-15 minutes, tops.  If you haven&#39;t already, please read &lt;a href=&quot;http://logicbound.blogspot.com/2007/07/why-wep-should-be-considered-bad-form.html&quot;&gt;my post&lt;/a&gt; regarding the dangers of using WEP.&lt;br /&gt;&lt;br /&gt;If you are still reading, then perhaps I&#39;ve convinced you to convert your network from WEP or open to WPA.  If that is the case, read on...&lt;br /&gt;&lt;br /&gt;&lt;font style=&quot;font-weight: bold;&quot;&gt;Lesson #1&lt;/font&gt;)  Do not buy an &lt;a href=&quot;http://en.wikipedia.org/wiki/Wireless_access_point&quot;&gt;access point&lt;/a&gt; (also known as &quot;router&quot;, &quot;wireless hub&quot;, or just plain &quot;wireless&quot;), take it home, plug it in, and just start using it.   This is what we would call the &quot;default&quot; or open access.  It comes with an instruction manual for a reason.  Use it!  :)&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://logicbound.blogspot.com/2007/08/use-wpa-instead-of-wep-pt-2.html&quot;&gt;Next Lessons...&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/7910437834681126601/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/7910437834681126601' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7910437834681126601'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/7910437834681126601'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/07/use-wpa-instead-of-wep.html' title='Use WPA instead of WEP'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-5451657937318475812</id><published>2007-07-20T20:56:00.000-06:00</published><updated>2007-10-01T16:33:37.614-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Why WEP Should Be Considered Bad Form</title><content type='html'>If you have a wireless network at home and you&#39;ve either left it open (unsecured) or you have secured it using the WEP option, this article is for you.  If you have wireless and you have no idea what the preceding sentence means, you need to read this and my follow-up entries on how to secure your wireless network.&lt;br /&gt;&lt;br /&gt;If you think &lt;a href=&quot;http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy&quot;&gt;WEP&lt;/a&gt; is good enough for your wireless security, let me educate you on how incredibly simple it is to bypass.  One would need the correct hardware (an Atheros based wireless card - $50), the correct software (available over the Internet - free), and be near enough to your wireless network to pick up a signal (also free).  Once all three of these are in place, it takes less then an hour (in some cases, far less!) to come up with the password that you used to supposedly secure your network.  At this point, they are on your network.  Mostly, they will just be interested in accessing the Internet for free.  Mostly.   If this doesn&#39;t scare you, it should.   If you have other computers on your home network that have your financial information on them, this should scare you very much.   Kudos to you for choosing to secure your network instead of using the default &quot;open&quot; network.  Unfortunately, using WEP isn&#39;t much better then just leaving your network open.&lt;br /&gt;&lt;br /&gt;Perhaps you are one that doesn&#39;t care if someone else uses your network to access the Internet?   While that is altruistic and very generous of you, it does leave you open to risks.   For starters, most &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_service_provider&quot;&gt;ISPs&lt;/a&gt; specifically forbid the sharing of your home Internet service in their terms of service.  You can argue how the &quot;Man&quot; is trying to squeeze more money out of us all by doing this and you&#39;d likely be right.  But that doesn&#39;t stop them from disconnecting you if they feel that you&#39;ve infringed on the agreement that you submitted to when purchasing their service.  Furthermore, &lt;a href=&quot;http://news.com.com/Free+wireless+Net+access+for+the+masses/2100-1033_3-273516.html&quot;&gt;these types of companies&lt;/a&gt; believe that is a violation of federal or state laws and may seek action against you.&lt;br /&gt;&lt;br /&gt;If the risk of the Man disconnecting you isn&#39;t enough, think about what kinds of bad things can be done online and will be traced back to your home address.  Accessing child porn, probing government networks, and communicating with known terrorists are all things that will raise flags with your federal government and your ISP.   From what I&#39;ve read, it is a legal grey area on whether or not you could be held liable for this.  (How believable is your defense of &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;It wasn&#39;t me.  Someone must have used my wireless network.&lt;/span&gt;&quot;) Is it worth the hassle?&lt;br /&gt;&lt;br /&gt;Now, I&#39;m really not the doom and gloom type.  The chances of this happening to you are small, but not impossible.  If you live in a sparsely populated area, the chances of one of your neighbors wanting to break into your network to conduct malicious activity are slim.  If it isn&#39;t one of your neighbors, but a stranger instead, then ideally you&#39;d notice a car sitting out on your street with a person inside using a laptop.  If you live in a larger city or a densely populated area, there are many more people available and interested in using your network.  If you are in an apartment building, you would never even see that this is happening.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://news.com.com/2100-1039-5112000.html&quot;&gt;http://news.com.com/2100-1039-5112000.html&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://money.cnn.com/2005/08/08/technology/personaltech/internet_piracy/?cnn=yes&quot;&gt;http://money.cnn.com/2005/08/08/technology/personaltech/internet_piracy/?cnn=yes&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.pcworld.com/article/id,122153-page,1/article.html&quot;&gt;http://www.pcworld.com/article/id,122153-page,1/article.html&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/5451657937318475812/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/5451657937318475812' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5451657937318475812'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/5451657937318475812'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/07/why-wep-should-be-considered-bad-form.html' title='Why WEP Should Be Considered Bad Form'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2730413417562938348.post-20858867704933530</id><published>2007-07-16T12:29:00.000-06:00</published><updated>2008-12-11T08:20:32.884-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phone"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Switching Cell Phone Providers, pt 2 (Coverage)</title><content type='html'>Okay, so I start researching Tmobile.  First off, I need to learn about their coverage.  I check out their website to see if they have a &lt;a href=&quot;http://www.t-mobile.com/coverage/&quot;&gt;coverage map&lt;/a&gt;.  I was impressed on two fronts.  First of all, they offer a method to search on an address basis, so that you can drill down exactly.  Secondly, they offer a view of how strong the signal is, not just whether or not there is one.  I found this encouraging even if I might have a lower signal on a particular search.  I like it when companies are just upfront about things.&lt;br /&gt;&lt;p align=&quot;center&quot;&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie5YjXVx-QdvQfFu0oOhhVq_0sFP6BsniSwCMQJbsJ9Li6RlPG4SnKxi5W_19C1ys174JsFHmJVqT8P_rDiSnYi6mBRlbxU9ZmGdX7QkQHqiQRPUV0InZB-H-EwwXFAi956XMMqqNNEsmb/s1600-h/tmobile-coverage.png&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie5YjXVx-QdvQfFu0oOhhVq_0sFP6BsniSwCMQJbsJ9Li6RlPG4SnKxi5W_19C1ys174JsFHmJVqT8P_rDiSnYi6mBRlbxU9ZmGdX7QkQHqiQRPUV0InZB-H-EwwXFAi956XMMqqNNEsmb/s400/tmobile-coverage.png&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5087861475200346338&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;My next dilemma is figuring out how to test the service without getting locked into a contract. (side note: I hate the fact that every company out there wants to lock you into a two year contract.)  A friend of mine pointed me to &lt;a href=&quot;http://www.costco.com&quot;&gt;Costco&lt;/a&gt;.   Probably wouldn&#39;t have occurred to me to check there, but I swung by after work one day to take a look.   They have a small kiosk where they offer phones and plans from multiple providers.  The really cool thing about this is that they have worked out some deal with each provider where you have two weeks to change your mind and get out of the contract.  This was my perfect solution!&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://logicbound.blogspot.com/2007/07/switching-cell-phone-providers.html&quot;&gt;Part 1, Intro&lt;/a&gt; | &lt;a href=&quot;http://logicbound.blogspot.com/2007/08/switching-cell-phone-providers-pt-3.html&quot;&gt;Part 3, Plan&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://logicbound.blogspot.com/feeds/20858867704933530/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2730413417562938348/20858867704933530' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/20858867704933530'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2730413417562938348/posts/default/20858867704933530'/><link rel='alternate' type='text/html' href='http://logicbound.blogspot.com/2007/07/switching-cell-phone-providers-pt-2.html' title='Switching Cell Phone Providers, pt 2 (Coverage)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie5YjXVx-QdvQfFu0oOhhVq_0sFP6BsniSwCMQJbsJ9Li6RlPG4SnKxi5W_19C1ys174JsFHmJVqT8P_rDiSnYi6mBRlbxU9ZmGdX7QkQHqiQRPUV0InZB-H-EwwXFAi956XMMqqNNEsmb/s72-c/tmobile-coverage.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>