Author: spierzchala

  • Moleskine…I have drunk your kool-aid

    Kevin Briody over at SeattleDuck talks about how he decided to purchase a Moleskine notebook. [here]

    I too have drunk the kool-aid, and mine are coming from my favourite online paper retailer, Vickery. This is where I got my Rhodia graph pads.

    Looks like I will carry a Moleskine and a Rhodia with me wherever I go.

    Now, does anyone have a recommendation on an inexpensive, yet techno-cool, tough and functional, pen?

  • Opus has a Powerbook

    I read my comics this morning, and there was Opus, my finely feathered friend…
    …bloging with a Powerbook.
    I am green with envy.

  • Trying the Glide Pad and slipping geek cred

    As many of my readers know, I have been pining for a Powerbook. However, one if the “fear factors” has been the need to switch to glide pad.

    I am a “pencil eraser” pointer man. All of my laptops have had them — even the Dell Inspiron I am using now. But I can see that I am in the minority and that I will have to become a convert.

    So, I have disabled the keyboard pointer and switched to the glide pad.
    On a secondary note, the “What’s in your bag” meme appears to be catching. So many iPods and Powerbooks…I feel my geek cred slipping way down.

    Off to walk the Damnation in the latest 10 inches of snow.

  • What’s in your Man/Woman Tech-Purse?

    Joi Ito’s Pack
    And so many others.
    Man…my man purse (2 year-old Targus backpack) is not that geeky…<pout!>

  • Blocking Anonymizer Hits

    Someone has been abusing the Anonymizer system and hammering my system. Again, IPTABLES is my friend.

    /sbin/iptables -A INPUT -s 168.143.113.125 -j DROP

    This IP Address points to vortex.anonymizer.com.

    dig -x 168.143.113.125
    ; <<>> DiG 9.3.0 <<>> -x 168.143.113.125
    ;; global options:  printcmd
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52723
    ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2
    ;; QUESTION SECTION:
    ;125.113.143.168.in-addr.arpa.  IN      PTR
    ;; ANSWER SECTION:
    125.113.143.168.in-addr.arpa. 10800 IN  PTR     vortex.anonymizer.com.
    ;; AUTHORITY SECTION:
    113.143.168.in-addr.arpa. 10800 IN      NS      ns1.infonex.net.
    113.143.168.in-addr.arpa. 10800 IN      NS      ns2.infonex.net.
    ;; ADDITIONAL SECTION:
    ns1.infonex.net.        172693  IN      A       168.143.113.201
    ns2.infonex.net.        172693  IN      A       168.143.113.202

    If someone at Anonymizer can bring these requests under control, I will turn the access back on.

  • My favourite "Hitchhiker's Guide to the Galaxy" Quote

    The Encyclopaedia Galactica defines a robot as a mechanical apparatus designed to do the work of a man. The marketing division of the Sirius Cybernetics Corporation defines a robot as “Your Plastic Pal Who’s Fun To Be With.”
    The Hitchhiker’s Guide to the Galaxy defines the marketing division of the Sirius Cybernetics Corporation as “a bunch of mindless jerks who’ll be the first against the wall when the revolution comes,” with a footnote to the effect that the editors would welcome applications from anyone interested in taking over the post of robotics correspondent.
    Curiously enough, an edition of the Encyclopaedia Galactica that had the good fortune to fall through a time warp from a thousand years in the future defined the marketing division of the Sirius Cybernetics Corporation as “a bunch of mindless jerks who were the first against the wall when the revolution came.”
    © Douglas Adams (c/o PlanetClaire)

    Describes many marketing teams I have worked with.

  • More Firewalls with Problem Content Filters

    Seems that some firewalls with Content Filters are brain-dead. I found another firewall that provides the same anti-compression “service” for its customers. [here]
    Thanks to Alexy Titov for the link.

  • Symantec Firewall — Problems with Accept-Encoding Headers

    Here is a little tidbit that we discovered while trying to debug an issue at work. One of my colleagues found that the Symantec/Norton Personal Firewall/Internet Security mangles the “Accept-Encoding” header sent out by any application — browser, streaming media, etc.
    More can be found here.
    This is a serious problem, and has a negative effect on Web performance in general, as one of the key methods for improving bandwidth consumption and user performance is Server-Side Compression of as much content as possible.

    What the client wants to send:  Accept-Encoding: gzip,deflate\r\n
    What is sent:                   ---------------: ---- -------\r\n

    What is the problem? Is this because Symantec can’t parse compressed content on the fly?

  • Bots from hell, and a plea for a free-to-use public “DROP” Port

    There is some idiot out there running a bot/attack protocol using a referring URL that always ends with ‘.eu.tt’.

    Turns out that there was more than one IP involved. IPTABLES took care of them.

    /sbin/iptables -A INPUT -s 200.123.9.119 -j DROP
    /sbin/iptables -A INPUT -s 195.54.87.222 -j DROP
    /sbin/iptables -A INPUT -s 194.47.95.115 -j DROP
    /sbin/iptables -A INPUT -s 198.234.202.130 -j DROP
    /sbin/iptables -A INPUT -s 198.234.202.131 -j DROP

    Please use DROP. This stalls the buggers, as they get stuck in an endless trap of trying to open a TCP connection with your server.

    Does anyone know of a server that has an open DROP rule for Port 80? This would be a useful online tool for folks who can re-direct annoying traffic through server configs, but who can’t control the firewall or IPTABLES.

    Simple set-up. Get a domain, register it. Get a DNS record to say that www.foobar.com is the machine’s IP Address. Then use IPTABLES to DROP all Port 80 inbound traffic. Publish the URL. Watch the fun!

    What’s the fun? Well, when you publish the address and explain that anyone can use targetted re-directions to send unwanted traffic to this place of lost TCP connections, and annoying bots get stuck.

    It’s a simple IPTABLES rule. For my machine, it would be:

    /sbin/iptables -A INPUT -p tcp -i eth0 -s 0/0 --dport 80 -j DROP

    Which, in IPTABLES speak, means “Any [-s 0/0] inbound traffic on network interface eth0 [-i eth0], headed for TCP port 80 [–dport 80], should be quietly dropped [-j DROP]“.

    Please do not try this on a production server! All of your HTTP traffic will disappear! However, you could re-write it slightly, and still preserve port 80 for standard HTTP, like, statistics on the distinct IPs stuck in your flypaper.

    Change ‘http://www.foobar.com/’ to ‘http://www.foobar.com:9080/’ and adjust the IPTABLES rule accordingly.

    /sbin/iptables -A INPUT -p tcp -i eth0 -s 0/0 --dport 9080 -j DROP

    Ok, my rant is done. Have fun, and use these tools wisely.

  • Kahvi: Source for free groovy Techno

    When I need techno, I head on over to the Kahvi Collective. They have a really great collection (ever-growing too) of home-brew techno to help you concentrate.

    I find this music best for sessions where I really have to concentrate. A backbeat to optimal thought, if you would.