Archive 2.3.2005 - 10.3.2005

Iridient Digital - RAW Developer

Iridient Digital - RAW Developer - wow. I am thrilled. I have already looked at many RAW photo editing software. But the RAW Developer is absolutely brilliant. A rather sleek interface, sensible features and incredibly fast.

So far, with almost every software except the Canon software, I have stumbled upon a certain image from my collection - it was displayed incorrectly by all, with completely shifted green tones (rather all yellow instead of green). With the RAW Developer it works - and the results look just as good as with the standard software from Canon. But the operation is much more agile.

Also very nice: unlike the Canon software, you can pass a series of marked images to the program via AppleEvent - the RAW Developer thus integrates absolutely comfortably into iView Media Pro. Much better than the Canon software, which would then only display the appropriate folder, but not directly only the selected images.

Additionally, it has the advantage that it is the only software I have found so far that can handle the old Kodak DCS RAW images - all others could read the newer RAW formats from Kodak, but not the old ones - and I still have those from my rather short interlude with the DCS 520 on my hard drive.

65 euros is not a small amount of money (especially for a pure auxiliary tool), but if you work a lot with RAW images and possibly with different cameras, then the investment is worth it in my opinion. Because you don't constantly have to fiddle with different programs and the speed is simply great - and even if it's just a hobby for me, slow software is still annoying.

Perverse Taste Aberrations

Bullock smuggles Nuremberg sausages:

We always celebrate Christmas in the traditional German way. Then we have bratwurst with sauerkraut and cucumber salad. That's why our secret sources already send the packages with the Nuremberg sausages a month in advance. Surprisingly, they always arrive.

Hello, what please? Since when is traditional German Christmas dinner bratwurst with sauerkraut and cucumber salad? I mean, bratwurst with sauerkraut was an everyday meal for us and to then perversely eat cucumber salad on top of that can really only be an American ...

Schmidt threatens health insurers over high contribution rates - of course, the health insurers and the profiteers in the executive suite who quickly approved a salary increase for themselves will certainly be very impressed by the threat. Apart from the fact that even I would burst into hysterical laughter if the Proletarians in Berlin came at me with morality ...

Music Industry and Its Alleged Interest in Musicians' Rights

Music industry wants 95-year protection period for sound recordings and justifies this by saying that musicians should earn money from the rights to their music throughout their lives. Pretty cheeky, when it's precisely the music industry that makes the most money from these rights and musicians - if at all - only receive small contributions. The music industry doesn't care about musicians at all. They only care about increasing their own revenues without having to contribute even a bit of effort.

One can imagine what's behind this when you look at when the old songs were produced that the music industry still heavily relies on, because they are incapable of producing anything that goes beyond one-hit wonders. Because the copyrights for music from some bands from the 60s and 70s will expire in the foreseeable future - and then the gentlemen in the executive suites would actually have to take risks and support new bands to still have significant business in the future.

You can't live forever off the songs of the Beatles or the Stones ...

What Harvard Business School Understands by Hacking

According to Philip Greenspun's Weblog, it's quite banal: changing a URL to access actually blocked data. Not the supplier is fired because he is incompetent and the system is poorly secured - but the HBS applicants who used this "hack" to check their status before the official date are now not accepted to HBS. Because of changing a URL. Well, confirms all my prejudices about business schools.

Poverty is female

In the young world: Poverty is female. On the occasion of International Women's Day, a reminder that the equality of women in society is by no means fulfilled or even completed - on the contrary, the current social cutbacks in Germany particularly affect women. Surely, politicians will now find a whole bunch of great reasons why we are just imagining all this.

By the way, for the next election, one could also take a look at what the corresponding parties have to say about the topic of women's equality ...

Hedgehog is a nice little Lisp compiler and bytecode interpreter with a special focus on low resource consumption. Unfortunately, interactivity and debugging suffer as a result: no tracebacks and no REPL, just running scripts and searching for the breakpoint in the pseudo-assembler source via grep. It would be nice if the language could offer these interactive features as an option - you can then leave them out in small boxes.

In Rechte auf dem Weg in die Mitte the political scientist Chloé Lachauer discusses in an interview the reasons for right-wing extremism and what to make of the wild accusations of politicians.

Social Software and Un-Social Behaviour

Again, a social software manufacturer is causing a stir: Technorati censoring employee blogs? - of course, an employee can potentially harm a company if they speak negatively about the company or the business. That's one reason why there's nothing about my employer on my blog and nothing about our customers - you have to draw the line somewhere. But would I accept if my employer wanted to dictate what I think? If I were no longer allowed to report negatively about the nonsense of the IT industry because my employer is in the industry? I don't think so - that goes way too far.

Even as an employee of a company, one should be allowed to express one's opinion freely - within the limits of what is legally permitted, of course. Recently, I was even insulted as a German because we supposedly don't know what free speech is - we are all censored, regulated, and brainwashed. And then I read from the land of unlimited idiocy how free speech is trampled on there, lands you in jail, or gets you fired. Strange idea of free speech. And when I read the blogger's reaction - who was brainwashed there?

What kind of light this sheds on manufacturers of so-called social software is a whole different topic. It's not the first time that such a company has stood out extremely negatively (I spontaneously think of friendster) - communication seems to be a terrible threat to the communication experts.

Ancient LAND attack works again in current Windows - wow, Microsoft has a heart for outdated bugs and gives them a new life

Another bug in Linux security extension grsecurity - of course, something like this had to come up just when I'm writing about grsecurity, right?

Wladimir Kaminer on Entry to Germany

Wladimir Kaminer: Ein Vorschlag zur Güte - wirres, konsequent alles falsch describes the situation for people entering the country. Jutta's brother had some experience with this topic (entering Germany, applying for visas, etc.) a few years ago in Hamburg. His wife (Thai) brought two children into the marriage. They have a third child together. Of the two children from the first marriage, she could only bring the younger girl to Germany - she had to give up the boy (under 16 at the time of the application!) to at least have her daughter in Germany. Can anyone imagine what this means for a mother?

Sorry, but all the politicians who scream about how dangerous and bad all the people who apply for visas are should be thrown out of the country and have their German passports taken away. And then they should try to get back into the country through our great embassies and consulates ...

If you want to authenticate your WordPress against external user databases: the Authentication Plugins Patch extends WordPress with the necessary hooks to secure it, for example, via Apache authentication.

EU Council of Ministers for Compromise on Software Patents

Unbelievable - despite the resistance of various national parliaments and the clear vote of the European Parliament, the software patents directive was pushed through today. And then this corrupt and deceitful bunch wonders why citizens no longer take politics seriously when they trample democracy underfoot.

Disgusting, Mr. Clement, how you ignore and trample the clear request of the Bundestag. Disgusting how you, with your arrogance, think you have to cause more damage to the economic location than the 16 years of Kohl's government managed to achieve. Disgusting how you, with your stupidity, drive another nail into the coffin of the European IT industry - just to crawl up to some multinational corporations that won't create any jobs anyway.

angry face

Munich Regional Court Bans Link to Copy Software Manufacturer

Munich Regional Court bans link to copy software manufacturer - and Heise celebrates this as an important partial success. However, the court has only rejected the completely absurd demands - but the link itself must be removed. Well, one might be glad that not all the most outrageous demands of the music industry are being met, but the fact that links to manufacturers are illegal is still a big idiocy. Because this continues to open the door for link warning letters - and even if it's nice for the Heise publishing house that every page bears its own court costs, for the average web worker this is not realistic - hardly anyone has the money to pay the costs of such a procedure (and possibly even through several instances).

OSER is a project that aims to replace Exchange while keeping Outlook. Although I don't like Outlook as one of the biggest virus and trojan vectors, it is popular in companies because of its good integration of various information services. Switching to an open source server solution can be the first step to gradually replace Outlook with other programs. However, at the moment it is still mainly vaporware - at least if you look at the websites.

Top-Level Domain .at has no mandatory connection to Austria

Top Level Domain .at has no mandatory connection to Austria - because German judges think so. Unless you live in Switzerland - then the judges have a different opinion. All this nonsense about naming rights is simply ridiculous - arbitrariness would almost be a reliable alternative against all the judgments that have been made in Europe on this matter.

A similarly absurd justification - that a top-level domain does not stand for a country - was also brought up with .ag. There, the judges even dared to determine that only an AG has the right to a domain under .ag.

The controversial vehicle registration plate patent has been declared invalid - take a good look at this nonsense, we'll probably have to deal with more of this thanks to proles like Clement. And no, we can't be sure that such patents will be deleted.

cyrusharmon.org: More GCC-XML (new and improved -- now with pr0n!) - crazy title, but a brilliant thing: SBCL gets native bindings to the Carbon API. And thus becomes the second Open Source Lisp system with integration into the OS X world (although Cocoa bindings would of course be cooler - but so far in the Open Source area only OpenMCL offers that).

Graffiti and Art

Graffiti and Art - 1

Graffiti and Art - 1

The Skaters Palace is sprayed with graffiti and is a beautiful splash of color in an otherwise bleak area. If you continue from there to Agravis, you walk along a wall full of graffiti.

Graffiti and Art - 2

Graffiti and Art - 2

Here too, the colors are a wonderful contrast to the rather bleak industrial area. Even the plants in the area seem rather depressed - only the colors of the wall stand out. If you walk further to the canal and look at the Agravis silo, you will then be presented with the art.

Graffiti and Art - 3

Graffiti and Art - 3

Somehow I have the impression that the company would rather have spent the money on a decent, safe scaffolding and colors for the sprayers - the result would interest me far more than the colorful rags that were nailed to the silo ...

Graffiti and Art - 2

Graffiti and Art - 2

Graffiti and Art - 2

Graffiti and Art - 3

Graffiti and Art - 3

Graffiti and Art - 3

Graffiti and Art - 1

Graffiti and Art - 1

Graffiti and Art - 1

No Banana Union Europe

banana0503-400x90.de-crossed.jpg

Snowflowers

Snowflowers - 1

Snowflowers - 1

Snowflowers - 2

Snowflowers - 2

Snowflowers - 1

Schneeblumen - 1

Schneeblumen - 1

Snowflowers - 2

Schneeblumen - 2

Schneeblumen - 2

Beach Hut by the Canal?

Strandguthütte am Kanal?

Strandguthütte am Kanal?

No idea who has settled there and for what purpose - it is a small hut made of garbage, fenced and with a small area. Everything is equipped with garbage bags and right in the bushes - normally not visible. Only through the preparations for the canal expansion did it become visible. Somehow reminds me of these beachcombers on the beach of Amrum.

In the Law Blog, it is explained what we can expect due to the blacklist against corruption in NRW.

Install grsecurity

I used to play around with grsecurity before, but the installation was a bit tricky - especially, you didn't know what to configure as a start and how to begin a reasonable rule-based security - the whole thing was more of a trial-and-error hopping than an understandable installation. However, for a security solution for an operating system, it is rather negative if you don't get the feeling of understanding what is happening there.

With the current versions of grsecurity, however, this has changed to a large extent. On the one hand, the patches run completely smoothly into the kernel, on the other hand there are two essential features that make the start easier: a Quick Guide and RBACK Full System Learning.

The Quick Guide provides a short and concise installation guide for grsecurity with a starting configuration for all the options that already offer a fairly good basis and excludes problematic options (which could exclude some system services). This way you get a grsecurity installation that offers a lot of protection but usually does not conflict with common system services. This is especially important for people with root servers - a wrong basic configuration could lock themselves out of the system and thus make the system unusable and a service case.

But the Full System Learning is really nice: here the RBAC engine is transformed into a logging system and it is logged which users execute what and what rights are needed for this. The whole thing is still controlled by corresponding basic configs that classify different system areas differently (e.g. ensure that the user can access everything in his home, but not necessarily everything in various system directories). You just let the system run for a few days (to also catch cron jobs) and then generate a starting configuration for RBAC from it. You can of course still fine-tune this (you should also do this later - but as a start it is already quite usable).

RBAC is basically a second security/rights layer above the classic user/group mechanisms of Linux. The root user does not automatically have all rights and access to all areas. Instead, a user must log in to the RBAC subsystem in parallel to his normal login (which happens implicitly through the system start for system services!). Rules are stored there that describe how different roles in the system have different access permissions.

The advantage: even automatically started system services are only allowed to access what is provided for in the RBAC configuration - even if they run under root rights. They only have limited capabilities in the system until they log in to the RBAC subsystem - but for this, a manual password entry is usually required for the higher roles. Attackers from the outside can indeed gain the user rights restricted by RBAC, but usually cannot get to the higher roles and therefore cannot interfere with the system as much as would be possible without RBAC.

The disadvantage (should not be concealed): RBAC is complex. And complicated. If you do something wrong, the system is locked - quite annoying for root servers that are somewhere out there in the network. You should always have fallback strategies so that you can still reach a blocked system. For example, after changes to the RBACs, comment out the automatic activation at system startup so that a reboot puts the system in a more open state in case of problems. Or have an emergency access through which you can still administer a blocked system to some extent. In general, as with all complex systems: Keep your hands off if you don't know what you're doing.

In addition to the very powerful RBAC, grsecurity offers a whole range of other mechanisms. The second major block is pax(important: here a current version must be used, in all older ones there is an evil security hole) - a subsystem that restricts buffer overflow attacks by removing the executability and/or writability from memory blocks. Especially important for the stack, as most buffer overflows start there. Pax ensures that writable areas are not executable at the same time.

A third larger block is the better protection of chroot jails. The classic possibilities for processes to break out of a chroot jail are no longer given, since many functions necessary for this are simply deactivated in a chroot jail. Especially for admins who run their services in chroot jails, grsecurity offers important tools, as these chroot jails were only very cumbersome to make really escape-proof.

The rest of grsecurity deals with a whole collection of smaller patches and changes in the system, many of which deal with better randomization of ports/sockets/pids and other system IDs. This makes attacks more difficult because the behavior of the system is less predictable - especially important for various local exploits, where, for example, the knowledge of the PID of a process is used to gain access to areas that are identified via the PID (memory areas, temporary files, etc.). The visibility of system processes is also restricted - normal users simply do not get access to the entire process list and are also restricted in the /proc file system - and can therefore not so easily attack running system processes.

A complete list of grsecurity features is online.

All in all, grsecurity offers a very sensible collection of security patches that should be recommended to every server operator - the possibility of remote exploits is drastically restricted and local system security is significantly enhanced by RBAC. There is no reason not to use the patch, for example, on root servers as a standard, given the rather simple implementation of the grsecurity patch in an existing system (simply patch the kernel and reinstall, boot, learn, activate - done). Actually, a security patch should be part of the system setup just like a backup strategy.

Now it would of course be even nicer if the actual documentation of the system was a bit larger than the man pages and a few whitepapers - and above all was up to date. This is still a real drawback, because the right feeling of understanding the system does not really set in without qualified documentation ...

Sometimes Wikipedia surprises me with things that are actually quite obvious. For example, the very nice descriptions of the Münsterland and of course Münster itself.

WordPress Theme: Gila - looks quite nice, is three-column and has a flexible middle column.

Outrage over statement by JuLi chairman - well, Westerwelle was also once a JuLi Hansel and he also had some dumb remarks - so this guy seems to be the future leader of the FDP in 10 years ...

How to setup WebObjects 5.1 on Linux

How to setup WebObjects 5.1 on Linux describes how to get WebObjects (the original from Apple) running under Linux - due to the Java basis of the 5.x versions, this has become significantly easier by now. Although I am naturally much more interested in the Objective-C version for Linux - Java is not the big performer on Linux in terms of performance ...

Well, for the Objective-C version, you can also fall back on SOPE (I reported), it is compatible in many areas. For using XCode, there are also project templates, so you get similar comfort during development. I have to try how it looks with ProjectBuilder.

OpenACS

OpenACS is a web application platform that is often overlooked, based on AOLServer and PostgreSQL.

OpenACS also comes with a whole set of ready-made modules - true to its name as Ars Digita Community System, it offers a whole stable of ready-made applications. A complete CMS is also included. And all of this is partly several years old - from times when other CMS projects were still dreaming of being conceived.

The AOLServer is a multithreaded web server that uses TCL as a scripting language, just as Apache is often combined with PHP. However, the AOLServer is very fast and surprisingly resource-efficient. The thing is called that for a good reason: larger parts of AOL run on the server and it originates from there. It's still worth something.

All in all, an exciting old-timer with interesting features and - due to its age - quite good documentation. But also some warts and edges that may seem a bit strange nowadays. One must keep in mind that when ACS was developed, the definition of CMS was only in its infancy.

Software Patents: The Signs Point to Renegotiation in the EU Council

Software patents: The signs point to renegotiation in the EU Council

The Commission's plan to push through the directive as quickly as possible, in accordance with the lobbying efforts of major market giants, is likely to be doomed by the Danes' withdrawal from the Council. Because a majority that could vote to maintain the directive as a top priority would no longer exist in light of the expected follow-up of numerous other countries.

I'll believe it when this circus is really renegotiated.

Tabacco industry bribed scientists - what do you expect from legalized drug dealers? That they are honest? Pfffft ...

Backup with half of the data?

Found on Schockwellenreiter, looked at and immediately dismissed as nonsense: Substance Softwares Phew. Reason:

NOTE: Phew currently doesn't backup the resource portion of files. In short you may find incomplete files on your backups (text clippings for example). This probably won't effect 99% of most peoples data but please check critical files after a backup to make sure.

This doesn't just affect rare files. All applications that use the Carbon API and don't come in bundles or need to store in bundles require the Resource Fork. With this backup software, you can't even back up a whole range of Carbon applications, as their Resource Fork is lost - and that's where the entire program code is stored.

Sorry, folks, but until this problem is fixed, it doesn't make sense to use it. I'll stick with psync and psyncX, which may have a rather primitive interface, but at least a backup to an external drive is not only complete, but even fully bootable. And they're not only free, but also open source.

Repulsive

As Johnny from Spreeblick, I find the behavior of the Union politicians with their great "letter" to the government simply disgusting. When you look at the points listed, it's just hot air and nothing behind it. Talk. In part, it's even talk that has nothing to do with the actual problem - just the same empty phrases from Merkelnix and Stauber thrown together and chewed through again - without any nutritional value.

Researchers generate different X.509 certificates with the same MD5 hash - ouch. This really kills MD5 for signatures.

Kyocera to end camera production

Kyocera to end camera production - so now we have the first confirmation from Kyocera itself. Maybe it will be continued by someone else, but whether the product range will survive is rather questionable - at best the name will be of interest to others.

Great. The company Winkhaus builds locks that use cryptographic methods to verify the authorization of a key and you can crack these with a simple magnet. Security by Stupidity ...

Who believes that small politics works better than big politics, read about Hotel Falckenstein regarding Nr. 1737 and a Veto.

Officially approved data mining of an intelligence service mailing list - cute when the NSA people are analyzed. But also mean to refer them to their regional data protection organization - after 9/11, the word "data protection" is almost as an insult to Americans as the word "liberal".

SCO vs. Linux: SCO demands insight into IBM's construction plans - I would be interested in the medical term that describes what the SCO management team is suffering from

SKYRiX Object Publishing Environment

The SKYRiX Object Publishing Environment is a free variant of a web application framework based on the WebObjects model. Specifically, considering that WebObjects is now migrating from Objective-C to Java, SOPE is very interesting - as it is still entirely Objective-C.

Moreover, it runs not only on OS X, but also on Linux. And of course, I like that it is based on PostgreSQL and not on this glorified index card box ...

Would be a good reason to refresh my somewhat rusty Objective-C skills. However, the documentation is still quite sparse - but you should be able to refer to the WebObjects documentation for many areas.

By the way, for Debian Sarge there is a repository with ready-made packages for SOPE. It is not yet on their homepage, only on the Freshmeat project page for SOPE.

It is, by the way, the basis for OpenGroupware.org - a groupware construction kit (according to the developers themselves). And there is a Live-CD with which you can test the whole monster without having to install much.

Can someone explain to me why I have never seen this project before? Do I have tomatoes on my eyes? Strange ...

A warning to those who want to get started (I just compiled, installed and tested everything): describing the documentation for SOPE itself as non-existent would be flattering.

Tip: a WebObjects application is so to speak a small web server in itself - you simply start it and attach Apache to it using the mod_ngobjweb module to this small mini-server, and then you can access the elements of the application. It is not immediately obvious for someone who does not know WebObjects ...

SOS Children's Villages waiting for donation from Laurenz Meyer - did anyone really believe he meant it? Sorry, but he will only do it if public pressure becomes too great - and he has blocked that through his resignation. If it is pushed through the press, he might still do it - and come up with some flimsy excuse as to why it took so long ...

Stu Nicholls Cutting Edge CSS An amazing CSS puzzle is a small maze game that was implemented using only CSS - no JavaScript. Wow. (found at photomatt)

TB Quickmove and QuickFile

TB Quickmove 0.0.5a is a Thunderbird extension with which you can assign hotkeys and context menu entries to frequently used target folders to quickly move messages there without having to use drag-and-drop.

QuickFile is another extension that does the same thing.

I'll check both of them out, it's exactly what I need (found via photomatt)

Update: Unfortunately, after trying them out, it turned out that both are not usable under OS X. With TB Quickmove, you cannot select the hotkeys - the OK button doesn't work. And with Quickfile, you can select the hotkey, but it doesn't work - apart from the fact that the modifiers don't fit for OS X (what is Accel, what is Meta under OS X?). That's a shame.

Aranha server monitor

The freshmeat.net: Aranha server monitor sounds exactly like what I programmed under Servermonitoring. However, I don't use XML-RPC, but SOAP. And I didn't provide it with a XUL interface, but a web interface. And I don't use Perl, but Python. Strange.

surprised face

Mine has been running in the company for ages and faithfully performs its duty in monitoring our server zoo.