tag:blogger.com,1999:blog-32602290064431018992024-03-19T05:00:07.143+01:00explosion ⇄nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-3260229006443101899.post-48139311071627388372011-03-11T22:14:00.002+01:002011-03-11T22:14:49.780+01:00On Icaza kissing up to proprietary software<br />
The iPad is better than anything else around, and it's not got much to do with being proprietary. The only serious contenders are F/OSS-based: Android and WebOS.<br />
<br />
By saying it does, Miguel is engaging in the same kind of cargo cult that has led Microsoft to try to compete with Apple by copying the wrong things. Take Zune and its closed platform ecosystem, the restrictions on Windows Phone 7 development and so on.<br />
<br />
No, Apple has succeeded better than anyone because Steve Jobs is really good at industrial design. By industrial design I do not mean making nice shiny objects. Slapping a fancy 3D interface on a piece of shit is not design; hiring an expensive designer to draw the packaging and enclosure of a shitty product is not industrial design.<br />
<br />
It's putting all those things together so that the product is robust, does not frustrate the user, affordable as opposed to cheap, and, most importantly, does something useful for the user.<br />
<br />
(Apple products are often seen as way too expensive compared to the competition, but the fact is, for the past 20 years, they've had excellent resell value even a few years after release. How much can you sell a 3 year old Dell laptop? It's probably not even worth the shipping; while you can resell a Macbook that old for a reasonable amount of money. It's not cheap, but it's valuable.)<br />
<br />
That's why the battle of specs competitors are trying to wage is incredibly retarded. Take the front facing camera that the iPhone 3 and 3GS were lacking; almost all high end smart phones at the time had them. I had one on my N900. *None* of them had decent software to support it. What good did it make? Entirely pointless.<br />
<br />
And again, this has nothing to do with proprietary software. The only way proprietary software serves Apple here is because they have a competitive advantage. But the market is becoming a commodity. The iPhone has less of an advantage (it's still much better than the competition but the gap is closing), so it's going to become pointless, in fact, a hinderance: openness will be an advantage to Android when the playing field levels. The corollary is that Microsoft's fucked, they're not better than Apple now, they could catch up but they will never be significantly better than Android.<br />
<br />
On new markets, like that of the iPad that Apple created, it serves Apple right now. In time it will matter less, in the same manner. And again, Microsoft is in trouble.<br />nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-77887157234541357142010-11-03T18:40:00.002+01:002010-11-03T18:45:38.416+01:00XML is way too hard for the rocket scientists at EMCNavicli is the command line tool to configure/query a Clariion SAN. Apparently you need some special license to use it, which is weird but I guess a command line tool is unusual for an appliance that's built on a point-click OS such as the Windows 3.11 underlying this storage system.<br />
<br />
I won't go into too many details as to how this C.L.I. sucks; let's just instead pick one obvious way it does.<br />
It conveniently provides an <i>-xml </i>switch. <i>Sweet!</i> you might mistakenly think, <i>I shall be able to reliably parse query results!</i> Alas, no.<br />
<br />
In the previous version (6.29.something), it didn't even output well-formed XML. It is evidently way too hard for a multi-billion dollar company to publish code that respects decade old standards. And after all, you've just spend $200k on that piece of hardware, you wouldn't want code that works, too?<br />
<br />
Well they appear to have fixed that (or maybe I just got lucky and didn't trigger the bug recently), and the XML now passes basic checks. But it's still unusable. To wit, here's an excerpt of the output of the <i>getdisk</i> subcommand, which is supposed to list all the disks with all their parameters:
<br />
<br />
<br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><?xml version="1.0" encoding="utf-8"?></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><CIM CIMVERSION="2.0" DTDVERSION="2.0"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <MESSAGE ID="877" PROTOCOLVERSION="1.0"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <SIMPLERSP></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <METHODRESPONSE NAME="ExecuteClientRequest"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <PARAMVALUE NAME="CLASSIC CLI" TYPE="string"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <VALUE>Bus 0 Enclosure 0 Disk 0</span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><PARAMVALUE NAME="Vendor Id" TYPE="string"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <VALUE>SEAGATE </VALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> </PARAMVALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <PARAMVALUE NAME="Product Id" TYPE="string"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <VALUE>STT30065 CLAR300</VALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> </PARAMVALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br /></span><br />
<span class="Apple-style-span" style="font-family: inherit;">At first it looks like a straightforward list of key/value pairs, with added (mostly useless) loose type information. But notice the "Bus 0..." information. Now look at the next instance of it:</span><br />
<span class="Apple-style-span" style="font-family: inherit;"><br /></span><br />
<br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <PARAMVALUE NAME="Prct Busy" TYPE="uint64"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <VALUE>0</VALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> </PARAMVALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br /></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br /></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;">Bus 0 Enclosure 0 Disk 2</span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><PARAMVALUE NAME="Vendor Id" TYPE="string"></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> <VALUE>SEAGATE </VALUE></span><br />
<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"> </PARAMVALUE></span><br />
<div style="font-family: inherit;">
<br /></div>
<div>
<span class="Apple-style-span" style="font-family: inherit;">That's right, it's a stray printf in the middle of XML output. It's completely unparsable. On top of that, everything is indeed linear, the hierarchy of data is not preserved. For instance, they could have grouped all Bus 0 items under one element, and then Enclosure 0, and so on; instead it's all listed at the same level. </span></div>
<br />
Edit: and I forgot to add, the RPM for version 7.30.0.4.74 asks a question in the %postinst section, which appears to break installation through yum. Is there anything those MS-DOS types can't get wrong?nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-24576307947984043592010-10-19T14:14:00.001+02:002010-10-19T14:15:32.216+02:00Firmly stupid Linux firmware updating with IBMIBM boasts of plenty of admin-friendly tools for updating drivers and firmwares. Unfortunately, as usual with administration tools, it looks like they've been packaged by complete retards.<br />
<br />
Apparently they don't like tar.gz, zip, tar.bz2, 7z or even rar, arc or what have you. Nope, the geniuses at IBM are so nostalgic of the good ole DOS days that they decided to resuscitate the very bad scheme of self-unpacking executables.<br />
<br />
If that malware-spreading nonsense wasn't bad enough in itself, they made sure that:<br />
- it required an executable /tmp<br />
- that unpacking required root privileges most of the time<br />
- you couldn't specify the temp dir with TMPDIR or anything, really<br />
- it writes random log files in random places, such as the current directory, without telling anyone, and happily overwriting any file with that name. What if that file happens to be a symlink towards /etc/passwd? Don't worry, IBM's got you covered, it will fuck your system up free of charge.nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-44656710059987837702010-06-24T04:43:00.005+02:002010-06-24T05:39:17.453+02:00SELinux policy module for pipslitedPipslited is the daemon part of the official Linux driver for Epson inkjets. It used to suck quite frankly, but as far as I can tell the latest versions have been improving visibly. Problem is that it hasn't got an SELinux policy module. Oddly I thought there was one but I just realized today that I couldn't print. So I got to work with Slide, the Eclipse-based SELinux policy editor.
<p>This is on Fedora 13, selinux-policy 3.7.19
<h2>
The code</h2>
<h3>
pipslite.if</h3>
<pre>## <summary>epson cups module</summary></pre>
Yes it's empty, as usual.
<h3>
pipslite.te</h3>
<pre>policy_module(pipslite,1.0.12)
require {
type fs_t;
type setroubleshootd_t;
type cupsd_t;
type printer_device_t;
}
type pipslite_t;
type pipslite_exec_t;
type pipslite_config_t;
type pipslite_pid_t;
type pipslite_fifo_t;
type pipslite_tmp_t;
domain_type(pipslite_t)
# Access to shared libraries
libs_use_ld_so(pipslite_t)
libs_use_shared_libs(pipslite_t)
miscfiles_read_localization(pipslite_t)
dev_read_urand(pipslite_t)
# Type for the daemon
files_type(pipslite_exec_t)
domain_entry_file(pipslite_t, pipslite_exec_t)
# Type for configuration files
files_config_file(pipslite_config_t)
allow pipslite_t pipslite_config_t:file { getattr read create_file_perms };
allow pipslite_t pipslite_config_t:dir { create_dir_perms };
# Type for PID file
files_pid_file(pipslite_pid_t)
allow pipslite_t pipslite_pid_t:file manage_file_perms;
allow pipslite_t pipslite_pid_t:dir rw_dir_perms;
files_pid_filetrans(pipslite_t,pipslite_pid_t,file)
# Type for temporary files
#
# Probably not necessary, but in case pipslite wants to create
# temp files, it's there and it's secure
files_tmp_file(pipslite_tmp_t)
allow pipslite_t pipslite_tmp_t:file create_file_perms;
allow pipslite_t pipslite_tmp_t:dir create_dir_perms;
files_tmp_filetrans(pipslite_t,pipslite_tmp_t,{file dir})
# We define a new type for the fifo used by cups to connect to pipslite
allow pipslite_t pipslite_fifo_t:fifo_file { read create open };
filetrans_pattern(pipslite_t, var_run_t, pipslite_fifo_t, fifo_file)
allow pipslite_fifo_t fs_t:filesystem associate;
allow pipslite_t pipslite_fifo_t:fifo_file unlink;
# Network connections, incoming
allow pipslite_t self:tcp_socket { bind create setopt listen };
corenet_tcp_bind_generic_node(pipslite_t)
# Makes the init.d script execute in the desired domain
# Without this, it just takes the context of the caller, unconfined typically.
init_daemon_domain(pipslite_t, pipslite_exec_t)
# --- Getting to the point ---
# Pipslite needs to talk to the printer
allow pipslite_t printer_device_t:chr_file { read write open };
# .. and cupsd needs to talk to pipslited
allow cupsd_t pipslite_fifo_t:fifo_file { write open };
# No idea why this is needed, new thing?
allow setroubleshootd_t pipslite_fifo_t:fifo_file getattr;</pre>
<h3>
pipslite.fc</h3>
<pre>/usr/lib64/pipslite/pipslited -- gen_context(system_u:object_r:pipslite_exec_t,s0)
/etc/pipslite(/.*)? gen_context(system_u:object_r:pipslite_config_t,s0)
/var/run/pipslited.pid -- gen_context(system_u:object_r:pipslite_pid_t,s0)
# This is needed because pipslited doesn't seem to always delete
# the fifo on exit, and it doesn't recreate it if it's already there
/var/run/pipslite[^/.]* gen_context(system_u:object_r:pipslite_fifo_t,s0)</pre>
<h2>
Compiling and installing the module</h2>
<pre># service pipslited stop
# ln -s /usr/share/selinux/devel/Makefile .
# make
Compiling targeted pipslite module
/usr/bin/checkmodule: loading policy configuration from tmp/pipslite.tmp
/usr/bin/checkmodule: policy configuration loaded
/usr/bin/checkmodule: writing binary representation (version 10) to tmp/pipslite.mod
Creating targeted pipslite.pp policy package
rm tmp/pipslite.mod tmp/pipslite.mod.fc
# semodule -i pipslite.pp
# restorecon -Rv /etc/pipslite/ /usr/lib64/pipslite/pipslited /var/run/pips*
# service pipslited start
</pre>nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com3tag:blogger.com,1999:blog-3260229006443101899.post-82727595627340977602010-04-28T01:29:00.000+02:002010-04-28T01:30:04.700+02:00Wacom Bamboo Touch<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3BakLq_vcEekXyAav-hWvu2NJ6avdHosBSd-zn2ERl2BlgNcjLCT-5scQMNqGYqqGbZTXEu7E9upCmnHwJ5GE8KOlAYGbeiOPLfYuopwhDE_wOmVfnAK0oJVHuz4lItI0qWzGPhU-l1i_/s1600/stroll.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 316px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3BakLq_vcEekXyAav-hWvu2NJ6avdHosBSd-zn2ERl2BlgNcjLCT-5scQMNqGYqqGbZTXEu7E9upCmnHwJ5GE8KOlAYGbeiOPLfYuopwhDE_wOmVfnAK0oJVHuz4lItI0qWzGPhU-l1i_/s320/stroll.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5464963560303369778" /></a>nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com1tag:blogger.com,1999:blog-3260229006443101899.post-58421690254564054282009-12-04T13:53:00.001+01:002009-12-04T13:53:25.632+01:00Snoopy spotted in Paris<div style="float: right; margin-left: 10px; margin-bottom: 10px;"><a href="http://www.flickr.com/photos/nixar/4157872464/" title="photo sharing"><img src="http://farm3.static.flickr.com/2595/4157872464_f93a7c6223_m.jpg" alt="" style="border: solid 2px #000000;" /></a><br /><span style="font-size: 0.9em; margin-top: 0px;"><a href="http://www.flickr.com/photos/nixar/4157872464/">charonnedogportrait</a><br />Originally uploaded by <a href="http://www.flickr.com/people/nixar/">docteur_nic</a></span></div>Rue de Charonne.<br clear="all" />nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-92027078668136601382009-08-20T22:23:00.004+02:002009-08-20T22:52:04.513+02:00Retarded coding standards?<p>I just stumbled upon <a href="http://www.yosefk.com/blog/coding-standards-having-more-errors-in-code-than-code.html#comment-440">this strange blog post</a> that appears to affirm that the following code:
<pre>#include <iostream>
int main() { std::cout << "Hello, world" << std::endl; }</pre><p>... is full of "errors," according to the poster's interpretation of <a href="http://www.misra-cpp.org/">MISRA C++</a> and LINT.<p>Those are not errors in code; those are design flaws in either the spec for the standard or LINT.
<blockquote>1. The “int” in “int main” violates an advisory rule to avoid using built-in types and instead use typedefs indicating the size and signedness of the type, such as int32_t, INT or signed32T.</blockquote><p><code>main(int,char**)</code> returns an int. Not an <i>int32_t</i> or an <i>int16_t</i> depending on the platform, but an int, which happens to be an <i>int16_t</i>, an <i>int32_t</i> or an <i>int64_t</i> depending on the platform. This is Unix semantics. The resulting value is an error code, not an integer meant to be calculated upon and subject to overflow. At worst it's a small binary set, again not subject overflow. It has been so since C and Unix exist. Ignoring it is just strange.
<blockquote>2. The first left shift operator violates a MISRA rule disallowing the use of bitwise shift on signed types, or so it does according to LINT</blockquote><p><code>ostream & operator<< (const char *)</code> is not the bit shift operator. It is an operator alright. It does not, however, perform a bit shift. Therefore, it is not the bit shift operator. The bit shift operator is (for example) <code>int operator<<(int)</code>. <p>Furthermore, the meaning of said operator is clearly defined for signed integers. Why not disallow substraction on unsigned types, while they're at it? That should prevent underflow!
<blockquote>The two left shift operators as a whole are reported to violate the rule disallowing dependence on C operator precedence [and add parenthesis everywhere]</blockquote> <p>This is simply crazy. This kind of blanket rules are completely, utterly idiotic. '<<' here is much more readable without parenthesis, esp. considering that there is no other operator that could preempt it. <p>And anyone who's graduated grad school, even last of his class, knows that 1+2*3 == 1+(2*3) != (1+2)*3. And anyone who's graduated from junior high knows that 1/2/3 is fishy. And what about expressions with just one commutative operator? Are we to add parenthesis to 1+2+3? <p>I don't know who's to blame here, if the LINT tool is really that clueless or if the MISRA standard mandates this behaviour, but I can't begin to understand how you can ignore long standing (25+ years!) C and C++ idioms. If they don't like operator overloading, why don't they remove them altogether and call it Java?nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-51835934209170551722009-04-17T17:50:00.004+02:002009-04-17T17:59:26.832+02:00Lettre aux artissss pro #hadopi<p>Internet je pratique depuis près de 15 ans. Je sais comment ça marche de fond en comble. Je me considère comme un expert. Internet, avant de savoir que ça existait, je rêvais que ça existe.
<p>Internet est plus utile à l'humanité que l'ensemble de l'édition phonographique française.
<p>Internet, c'est Wikipédia, Linux, Firefox, Google Earth, Wikileaks, Wiktionary et tout ça. Vous, vous êtes Pascal Obispo, la Star Ac', la bande des potes de Sarko du Fouquet's.
<p>Internet c'est l'Encyclopédie, vous vous êtes la Cour de Louis XV.
<p>Nous voulons l'accès au savoir. Vous voulez la boite à con de TF1.
<p>Si Internet disparaissait, ce serait une catastrophe pour l'humanité. Si la Sacem brûlait, ça sentirait juste un peu mauvais Pont de Neuilly.
<p>Je n'aurais pas tenu ce discours il ya deux mois. Mais j'ai vu vos tristes manœuvres, votre ignorance revendiquée, vos mensonges à répétition, vos calomnies sordides et vos complicités de situation avec les autoritaristes qui nous gouvernent. Et je sais que vous êtes mon ennemi.
<p><a href="http://j.aimelesartistes.fr">Niczar</a>nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-47484245672911378742009-04-04T13:15:00.000+02:002009-04-04T13:16:04.336+02:00Lettre de Félicitations à Bertrand BurgalatFélicitations! Mission accomplie!
Bravo! Votre loi a été adoptée!
Vous allez pouvoir faire la fête avec tous vos copains artistes de renom, tel Dick Rivers! Eh oui, pauvre Dick! Il ne vend plus de disque, et c'est uniquement à cause de l'internet, ça ne peut avoir aucun rapport avec le fait que le seul fan de Dick que j'ai jamais connu soit ma grand mère décédée en 1993.
Mais attention, pensez bien à installer un firewall, "Open Office", comme le préconise votre ministre!
Et puis bon, si on vous accuse à tort VOUS, ou même pas à tort puisque vous l'avez avoué vous-même, vous téléchargez, ou si par exemple quelqu'un (moi, par exemple, ou les 200000 autres personnes capables de le faire) injecte votre adresse IP dans un tracker, eh bien, ce n'est pas grave, vous n'aurez plus d'internet à la maison pendant 1 an, mais vous pourrez toujours aller au cyber café! Bon, ça n'existe plus les cyber café, un peu comme les fans de Dick Rivers, mais faudra faire avec!
Enfin, je suis aller vérifier si vos oeuvres étaient piratées; c'est marrant, j'ai rien trouvé. Rien. Personne vous pirate.
Les gens vous respectent trop pour ça? ... mouais, non.
Ca, ou ils n'aiment pas du tout ce que vous faites. Moi j'aimais bien, mais l'association d'idée me donne la nausée, donc je boycotte. Il y a une autre possibilité, c'est que personne ne connait vos productions. Eh oui, votre seule apparition médiatique significative a été ce grand "FUCK YOU" auquel vous avez participé avec cette bande de blaireaux. Regardez bien de qui vous étiez entouré, Bertrand. Ca fait vendre, ça.
"Cher public, vous êtes tous des voleurs!" -- Bertrand Dick Burgalat Riversnixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-28601835403923150352009-04-03T15:25:00.004+02:002009-04-03T15:30:05.975+02:00Une loi pour protéger la création pornographique: les valeurs de l'UMP au grand jour<p><a href="http://www.assemblee-nationale.fr/13/cri/2008-2009/20090210.asp">Frank Riestert à l'Assemblée</a>:
<blockquote>Jusqu’à présent, il était prévu que les recommandations adressées par la Haute Autorité informent les titulaires d’un abonnement à Internet que le téléchargement illégal est répréhensible et que ceux qui s’y livrent s’exposent à des sanctions. Nous proposons que ces recommandations informent également l’abonné sur l’offre légale de contenus culturels en ligne, qu’elles insistent sur la possibilité de s’équiper de logiciels de sécurisation pour protéger son accès Internet et qu’elles indiquent la date et l’heure du téléchargement illégal.
<p>
Par ailleurs, nous souhaitons que l’abonné puisse également, s’il en fait la demande expresse auprès de la HADOPI, connaître le contenu de l’œuvre qui a été téléchargée illégalement. Nous ne voulons pas que ce contenu apparaisse dans l’avertissement, car cela pourrait créer des problèmes importants dans les familles, par exemple s’il s’agit d’un contenu pornographique.</blockquote>
<p>1. La loi vise donc à protéger, entre autres, les droits des producteurs d'œuvres pornographiques.
<p>2. En toute logique, le courrier d'avertissement devrait donc comporter une liste de téléchargement légal de sites pornos, si l'envoi découle du téléchargement d'une telle œuvre.nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-72907642822297652062009-04-02T18:04:00.003+02:002009-04-02T18:09:34.904+02:00Lettre à Frédéric Lefebvre<p>To: Frederic Lefebvre <flefebvre@assemblee-nationale.fr>
<p>Cc: Christian Paul <christian.paul@wanadoo.fr>
<p>Bonjour,
<p>Je voudrais savoir ce qui est prévu dans la loi Création & Internet pour ce qui concerne les PME; en suivant les débats j'ai cru comprendre que rien n'est prévu pour protéger une petite entreprise d'un employé ou stagiaire indélicat qui aurait abusé de la connexion de l'entreprise.
<p>Vont-ils être coupés? Que se passe-t-il dans le cas, par exemple, d'un imprimeur, qui reçoit ses fichiers par internet, doit-il déposer le bilan immédiatement si un employé en conflit avec son patron fait exprès de télécharger Winnie L'Ourson sur le peer-to-peer pendant que ce dernier est en déplacement et n'a pas le temps de faire un recours dans les temps?
<p>Vous et vos collègues avez évoqué des <span style="font-style: italic;">"logiciels de sécurisation"</span> pour éviter cela — logiciels dont j'ignorais au passage la possibilité jusqu'à ces dernières semaines malgré près de 15 ans d'expérience professionnelle d'ingénieur systèmes et réseaux.
<p>Je vous propose un scénario, je vous l'accorde par avance, hautement improbable: le vilain employé pourrait avoir un ordinateur portable personnel et pourrait le brancher sur le réseau de l'entreprise. De la pure science-fiction, je vous l'accorde, mais ne vaut-il pas la peine d'étudier toutes les conséquences de cette loi? Or donc, dans une telle situation hautement hypothétique, comment les logiciels de sécurisation du futur installés sur tous les ordinateurs de l'entreprise seront-ils en mesure de "sécuriser" le <span style="font-style: italic;">laptop</span> en question?
<p>Enfin, devant me rendre à l'évidence de mon ignorance dans un domaine qui est sensé être mon mêtier, je me suis mis en quête de m'instruire sur ces fameux logiciels de sécurisation, et pour l'instant je n'ai trouvé que celui utilisé par le Ministère de la Culture, Open Office. Comme c'est un logiciel libre, je me suis empressé de le télécharger par le peer to peer, j'ai cru comprendre que c'était encore légal. J'ai pu trouver les fonctions "Tableur," "Traitement de texte," ainsi que "Dessin," mais je n'ai pas réussi à localiser la fonction "sécurisation de tout mon réseau contre toutes les possibilités de se faire pirater, injecter son adresse IP dans un tracker de The Pirate Bay, ou être la victime d'une erreur des ayant droit."
<p>Au passage je note que votre collègue M. Tardy ne cesse de s'opposer à votre glorieux combat. Il cache à peine son arrogance d'être lui-même informaticien et chef d'entreprise, comme si cela lui donnait une quelconque légitimité dans ce dossier. Il vient ainsi d'affirmer péremptoirement l'impossibilité du filtrage automatique des contenus. Il semble ignorer que le problème a été depuis lontemps réglé par l'IETF (Internet Engineering Task Force) avec la <a href="http://www.faqs.org/rfcs/rfc3514.html">RFC3514</a>, publiée début avril 2003, et qui fournit un moyen simple d'identifier les données illicites transitant sur le réseau.
<p>En vous remerciant par avance de votre attention,
<p>bien cordialement,
<p>Un informaticien.nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com2tag:blogger.com,1999:blog-3260229006443101899.post-77219920148531824182009-04-02T14:14:00.002+02:002009-04-02T14:19:59.521+02:00What's your firewall Christine? "Open Office"<span style="font-family: sans-serif;font-size:200%;" ><span style="font-style:italic;">Mme Christine Albanel, ministre de la culture.</span> … lorsque l’on achète un pack Microsoft avec Word, Excel, Powerpoint, qui ne sont pas des logiciels libres , il existe des pare-feux, des logiciels de sécurisation ; mais<span style="color: rgb(255, 0, 0);"> les logiciels libres peuvent aussi être assortis de <span style="background:#FF0">pare-feux.</span> Ainsi, au ministère de la culture, nous utilisons le logiciel libre <span style="background:#FF0">Open Office</span></span></span>
("Free software can also have firewalls. Indeed in my ministry we use the free software program Open Office.")nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-52004982253639197792009-02-25T19:35:00.002+01:002009-02-25T19:42:44.143+01:00Le Net en France: black-out<a href="http://www.laquadrature.net/HADOPI" title="HADOPI - Le Net en France : black-out"><img src="http://media.laquadrature.net/Quadrature_black-out_HADOPI_425x500px.gif" border="0" alt="HADOPI - Le Net en France : black-out" /></a>nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-5825017202436924062009-02-05T15:41:00.006+01:002009-06-23T14:19:33.109+02:00MITEL phones are revolting<p>The damn things have the WORST USER INTERFACE IN THE WORLD.</p>
<p>Do you have any idea how to dial back a missed call on 5224 IP phone? It's a fucking nightmare! Here's the thing: unless you have done the right magic invocation, you can't. Nope. It's an "advanced feature" or something, somehow, so you have to program a programmable key to invoke the advanced function, and then you have the pleasure to enjoy the retarded user interface that the sick, sick, sick minds at Mitel have produced.
</p>
<p>And forget about those calls you missed before doing the hocus pocus, it's lost forever.
<p>What are the invocations, you may wonder? Well, let me put it this way: there is absolutely NO WAY you can find out just by using the phone. It's completely random. In fact, I wouldn't be able to do it again.
<p>Are there people working on UI at MITEL? Rhetorical question ...nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-58156991956148380192009-01-22T11:19:00.003+01:002009-01-22T12:02:44.842+01:00New phone features 'baffle users'<blockquote>The complexity of modern mobile phones is leaving users frustrated and angry, research suggests. </blockquote>
This is the kind of information that should make any wannabe iPhone competitor pause. And a good rebuke to those who chide Apple for not supporting useless features such as MMS. Why are they useless? Because they fail often enough to frustrate users. In fact, a few years ago my brother and I tried to set it up to exchange camera phone pictures, and couldn't get the damn thing to work. We're both sysadmins, using Nokia phones, on the same damn network, using the operator's own recommended setup. Didn't work, and there was absolutely no way to know what was wrong. They might have fixed the thing by now but I won't waste any time on it.
<p>
My Nokia phone is full of such bullet point features. It has MMS, but it can also play music. Funny thing, that music player. It can't fast forward. Oh sure, there is a "fast forward" button, and it does go forward, but not <i>fast</i> by any stretch of the imagination. Say you're listening to a podcast. 10 minutes in, you have to make a phone call. You have to exit the music player, and when you come back ... the player is back at the beginning. Want to fast forward 10 minutes? That's gonna take you 5 minutes with the non-fast fast forward button.
Useless.
I hear newer Nokia phones have a much better music player; good for them. The thing is, they advertised a music player in that phone's ads, and it was unusable. It worked, but was unusable.</p>nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-43423527813014228722009-01-13T18:38:00.002+01:002009-01-13T18:42:53.763+01:00Chicago's Transport Authority fails at the internet<blockquote>Norwegians are either utterly fascinated with the comings and goings of CTA buses, or there just aren't enough recreational activities in the land of fiords and Viking ships.
The CTA Bus Tracker Web site has received 15,395 visits since last year from people in Norway or whose computers or personal wireless devices were registered in that Scandinavian kingdom.</blockquote>
It took me about 3 µs to think of <a href="http://www.opera.com/mini/">Opera Mini</a>, which is a light-weight mobile phone web browser. Most of the HTML processing is actually done on servers at Opera's HQ ... in Norway.nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-19440168346002939562008-12-29T23:00:00.000+01:002008-12-29T23:20:10.942+01:00Mon XKB maison<a href="http://n1xar.free.fr/test/xkbnico">Mon XKB maison</a> pour clavier AZERTY, où j'ai remplacé la plupart des symboles ésotériques et franchement inutiles par des opérateurs mathématiques, flèches et autres smileys.<pre>┌─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┲━━━━━━━━━┓
│ ~ ¬ │ 1 ¡ │ 2 ⅛ │ 3 £ │ 4 $ │ 5 ⅜ │ 6 ⅝ │ 7 ⅞ │ 8 ™ │ 9 ± │ 0 ° │ ° ¿ │ + ˛ ┃ ⌫ Retour┃
│ ` ` │ & ¹ │ é ~ │ " # │ ' { │ ( [ │ - | │ è ` │ _ \ │ ç ^ │ à @ │ ) ] │ = } ┃ arrière┃
┢━━━━━┷━┱───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┴─┬───┺━┳━━━━━━━┫
┃ ┃ A Æ │ Z ≺ │ E ¢ │ R ® │ T ∉ │ Y ¥ │ U ↑ │ I ☺ │ O Ø │ P Þ │ ¨ ° │ £ ¯ ┃Entrée ┃
┃Tab ↹ ┃ a æ │ z « │ e € │ r ¶ │ t ∈ │ y ← │ u ↓ │ i → │ o ø │ p þ │ ^ " │ $ ¤ ┃ ⏎ ┃
┣━━━━━━━┻┱────┴┬────┴┬────┴┬────┴┬────┴┬────┴┬────┴┬────┴┬────┴┬────┴┬────┴┬────┺┓ ┃
┃ ┃ Q Ω │ S § │ D ∀ │ F ∏ │ G ∪ │ H ⊄ │ J ‹ │ K › │ L ☹ │ M — │ % ˇ │ µ ˘ ┃ ┃
┃Maj ⇬ ┃ q √ │ s ß │ d ∃ │ f ∑ │ g ∩ │ h ⊂ │ j † │ k █ │ l ░ │ m – │ ù ^ │ * ` ┃ ┃
┣━━━━━━━┳┹────┬┴────┬┴────┬┴────┬┴────┬┴────┬┴────┬┴────┬┴────┬┴────┬┴────┲┷━━━━━┻━━━━━━┫
┃ ┃ > ≥ │ W ▓ │ X ≻ │ C © │ V ‘ │ B ’ │ N * │ ? … │ . × │ / ÷ │ § ‣ ┃ ┃
┃Shift ⇧┃ < ≤ │ w ▒ │ x » │ c ¢ │ v “ │ b ” │ n * │ , ' │ ; ≠ │ : · │ ! • ┃Shift ⇧ ┃
┣━━━━━━━╋━━━━━┷━┳━━━┷━━━┱─┴─────┴─────┴─────┴─────┴─────┴───┲━┷━━━━━╈━━━━━┻━┳━━━━━━━┳━━━┛
┃ ┃ ┃ ┃ ␣ Espace fine insécable ⍽ ┃ ┃ ┃ ┃
┃Ctrl ┃Meta ┃Alt ┃ ␣ Espace Espace insécable ⍽ ┃AltGr ⇮┃Menu ┃Ctrl ┃
┗━━━━━━━┻━━━━━━━┻━━━━━━━┹───────────────────────────────────┺━━━━━━━┻━━━━━━━┻━━━━━━━┛</pre><p>Pour l'utiliser, je fais <tt>xkbcomp -w 0 -R/usr/share/X11/xkb $HOME/xkbnico :0</tt>, mais il faudrait pouvoir faire ça automagiquement au lancement de la session. Je crois avoir essayé de le mettre dans un élément de session gnome, mais ça ne marchait pas des tonnes.</p><p>Enfin, en gros, toujours beaucoup de magique dans le maniement de ces mappages de clavier, et pas assez de doc clair, c'est bien dommage. Vos commentaires sur le sujet sont les bienvenus.</p>nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-73568443123513881552008-12-27T02:07:00.001+01:002009-04-02T14:21:29.259+02:00Dear Clive Hamilton, is "ethics professor" australian slang for moron?<h3><a href="http://www.nytimes.com/aponline/2008/12/26/technology/AP-TEC-Australia-Internet-Filter.html">Uproar in Australia Over Plan to Block Web Sites </a></h3><p></p><blockquote><p>But ethics professor Clive Hamilton, in a column on the popular Australian Web site <a href="http://crikey.com/" target="_">Crikey.com</a>, scoffed at what he called ''Net libertarians,'' who believe freedom of speech is more important than limiting what children can access online.</p>''The Internet has dramatically changed what children can see,'' said the professor at Charles Sturt University in Canberra, noting that ''a few extra clicks of a mouse'' could open sites with photos or videos of extreme or violent sex. ''Opponents of ISP filters simply refuse to acknowledge or trivialize the extent of the social problem.''</blockquote>
Dear Pr. Moron-Fuckhead,
What you don't seem to understand, and that is completely obvious to us "net libertarians", is that even if your stupid retarded moronic schemes worked as intended (and they won't, because they can't), they would be completely fucking useless anyway.
Think about it. Suppose your braindead filters worked. What have you achieved? Aussies can't see pædoporn on the web. Alright. Now what? What's the difference? How does that protect the children? If there's a picture of a crime on the internet, and nobody's looking at it ... does that make the crime go away?
Come to think of it, it worked for the boogieman when I was a kid. I hid under the bed sheets, and it never got to me.
In other words, you can have the mind of a five year old and get a job as a professor in Canberra.nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-77026188963509415982008-12-18T01:42:00.000+01:002008-12-18T01:49:19.174+01:00Why do lusers send screenshots in a .doc in a mail?Not only does every single stupid luser do it, but even people who do otherwise look sane and do not ostensibly sport <a href="http://farm2.static.flickr.com/1433/1094407198_5d9d526216.jpg?v=0">brain slugs</a> always send screenshots as .DOC attachment with a picture inside. What's wrong with just sending the image file? If you can paste the screenshot into the dreaded Word, what's preventing you from pasting it into the atrocious Outlook's window?
Yeah, what? And why? WHY??nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0tag:blogger.com,1999:blog-3260229006443101899.post-18862385535371151702008-12-06T23:46:00.000+01:002008-12-07T00:10:29.708+01:00Accesskey for “Prev” / “Next” on Google search results<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4jBkTzc4hRC-W0W0a6yFzDzZvvmgeMLB8mMJ39Ph-ucPKo_RcuakVQS_Gi4nYzD_lPZgvL-x7ErSmV5iya30aU9TA44nyDC6aqOqT6MEN-CyM_064DobtkrjvmARxsRO2nfGUbWT5AIgP/s1600-h/Screenshot.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 133px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4jBkTzc4hRC-W0W0a6yFzDzZvvmgeMLB8mMJ39Ph-ucPKo_RcuakVQS_Gi4nYzD_lPZgvL-x7ErSmV5iya30aU9TA44nyDC6aqOqT6MEN-CyM_064DobtkrjvmARxsRO2nfGUbWT5AIgP/s320/Screenshot.png" alt="" id="BLOGGER_PHOTO_ID_5276815345436643298" border="0" /></a>
I searched on userscripts.org and couldn't find one that worked fine for me, so here is mine.
Use ⌥⇧W for “Previous” and ⌥⇧X for “Next.”
You will need GreaseMonkey to use this; link to the script coming soon.nixarhttp://www.blogger.com/profile/09005166361368118111noreply@blogger.com0