NewsForge | MySQL migration: MyISAM to InnoDB
“The MySQL database is unique in that it offers multiple storage engines. The SQL parser and front end interfaces are separate from the storage engines, so you can choose among nine low-level table formats the one that suits your application best. I recently needed to convert a production application from the default indexed sequential format, MyISAM, to InnoDB.“
Creating Enhanced Podcasts: Include Slides and More!
This excellent HOWTO on the MAKE blog is a great HOWTO on creating enhanced podcasts for iTunes 4.9 and iPod Color. There are some potential uses here in a lot of areas in the education arena. Think lectures with slides and links to notes. Biggest drawback right now: tools to create these are Mac only:(
MAKE: Blog: HOW TO make Enhanced Podcasts (images, links and more with audio)
“Apple’s new iTunes 4.9, iPod color, allows you to view (and listen to) “enhanced podcasts” these are audio files that can have slideshows, URLs and some cool features we have discovered. Apple’s included documents and a Wiki was all I needed to make our MAKE enhanced podcasts, but I also wrote a how-to. Here’s how to get, make and all you need to know about enhanced podcasts! As a bonus, we put together some fun ideas we think many might use…“
Am I Fundable?
Slashdot | OSS Funding through Fundable
“FredCK, developer of the popular FCKEditor, recently raised $600 from supporters through Fundable to port his open source HTML editor to Safari. Fundable is a new site that lets groups of people pool money for specific purposes, like software features. Unlike generic donation dropboxes (such as PayPal buttons), if a group’s targeted collection isn’t reached after 2 or 4 weeks, everyone gets a complete refund.”
Maybe I’ll use this help fund some of my innovations…
Microsoft Downgrades Gator Detections
Slashdot | Windows AntiSpyware Downgrades Claria Detections
“A week after word leaked out that Microsoft was negotiating an acquisition deal with Claria (See recent /. coverage), spyware researchers have noticed that the Windows antispyware application has downgraded Claria’s Gator detections and changed the recommended action from ‘quarantine’ to ‘ignore.’ Screenshots of the new default settings.“
OpenCRS.com Provides Access To Over 8000 CRS Docs
Slashdot | Open CRS: Free Government Research Reports
“Ted Bridis of the Associated Press reports that more than 8000 Congressional Research Service reports produced exclusively for legislators are now available to the public for free. The Center for Democracy & Technology’s Open CRS project is a Web-based central clearinghouse that features several collections of government reports. The research service has ‘… a staff of more than 700 and a nearly $100 million budget …’ but ‘CRS Reports do not become public until a member of Congress releases the report.’ The Open CRS project wants your help in obtaining and adding reports to the database.“
Turning Up Rootkits at UConn
UConn Finds Rootkit in Hacked Server
“The rootkit was first placed on the server during a system compromise on October 26, 2003, but was only detected one week ago, on July 20.UConn said the attack took advantage of an insecure service for which no vendor patch was available, but stressed that an analysis of the computer showed that that the original compromise was incomplete.“
A couple of things to keep in mind here. First, because the original compromise was incomplete, it most likely means that the rootkit was dropped by some worm exploiting a known weakness, but for some reason failed to fully deploy. In all likelihood, the ‘kit never “called home” so the attacker(s) never accessed the machine. Second, this stresses the need for constant vigilence. The 18 month gap between the intrusion and detection was most likely because the ‘kit was dormant and not giving off any signels of its presence. On the other hand, a sysadmin should know if, in less than 18 months, that there was an unauthorized access to the box.
So, remember folks: keep the firewalls up and limit remote acces to servers.
Summary of Blog Reaction to Grokster Decision
Darknet: Blogosphere weighs in on Grokster ruling
As expected from the most important copyright case of the digital age, there’s much discussion in the blogosphere this morning about the Supreme Court’s Grokster decision today.
Darknet’s summary of reaction around the blogosphere is pretty thorough. Worth having a look at what those close to P2P nets have to say about this.
O’Reilly Adds del.icio.us Tags To Articles
Our del.icio.us Folksonomy (Beta)
“We’ve just added del.icio.us tags to our articles. These are single keyword categories generated by the O’Reilly readers as they bookmark our articles in del.icio.us. The sum of these tags is a taxonomy (some say folksonomy) of articles that emerged from our readers rather than being handed down by our editors.“
Based on data supplied by del.icio.us, O’Reilly is adding popular folksonomy tags to it’s articles. The tag info will appear in the upper left hand corner of the article. This is a great way to tie content to the broader community and put it in some sort of context.
Running XP As Non-Admin
Users Overlook XP’s Non-Admin Security
“Microsoft is sparing no expense to spread the Least-privileged User Account security gospel ahead of next year’s Longhorn launch, but a little-known fact—especially among IT administrators and end users—is that the technology is already available in the Windows operating system.“
The article references the nonadmin wiki as a good source for information and tools. It is run by Microsoft developers.
New York Law School to Offer Certificate Law Practice Technology
New York Law School’s Institute for Information Law and Policy to Offer Certificate of Mastery in Law Practice Technology
“New York Law School’s Institute for Information Law and Policy is introducing a “Certificate of Mastery in Law Practice Technology”.Starting in the fall 2005 semester, students will be able to pursue this certificate, to be awarded as an honor upon graduation. Students receiving the certificate will have demonstrated mastery of particular technology skills –such as electronic litigation, online transactions, or courtroom technology–that will prepare them for law practice and distinguish them as especially qualified candidates for legal positions.In order to receive the certificate, students complete a core curriculum in cyberlaw, intellectual property, and information law; attain at least four