Nothing like coming out of work and finding your car with a big frickin’ dent in the door to really cap off the day. I was parked at the inner end of a right turn in the structure. From the looks of the angle and height, it was probably backed into by a moron doing some kind of maneuver in a truck or SUV. No note, of course. This is exactly the kind of thing I don’t need.

results of some jackass running into my car

Mozillazine has a new Firebird preview article: (Rapid Pace of Development for Mozilla Firebird. Among other things it addresses one of the issues Anil brought up about accessing sidebars.

First of all, any bookmarked page can be made to load in the
sidebar via a simple checkbox in its properties dialogue. In addition,
support is also offered for the Mozilla Application Suite’s addPanel API,
which causes a bookmark that is already set in to open in the sidebar
to be created. Furthermore, Opera’s method for adding panels to its
sidebar equivalent, the Hotlist, is also supported (this method simply
involves a normal link with a rel="sidebar" attribute). By creating a link with a target="_search"
attribute (named for compatibility with Internet Explorer), a site can
cause a page to be loaded transiently in the sidebar, with no bookmark
being created.

Very good.

todo: wiki comparison

criteria: code modularity, data model extensibility: how to integrate blogging, todo (simple node states?), development activity, diffing/versioning, authZ model

  • Twiki
  • Tavi
  • Kwiki
  • TikiWiki
  • PHPWiki
  • CoWiki
  • SnipSnap

I started noticing the worm spoofs this morning around 10AM. Doing some legwork seemed to reveal it as a Sobig variant, and about a half hour later the virus definition popped up in the AV scanner. Around the net, a lot of people are clarifying that this isn’t an “email worm,” but a “Windows worm,” which in some sense is true, however, while the worm only propagates through infected W32 machines, the spoofings/spoofed bounces affect (and highlight the problems) of the entire email system, and highlight the need to some sort of authN/dsig system.

Perhaps signed headers would be a simple way of solving the problem – it’d require some extra key servers, but you could implement this on a per-server basis, or even the user level (mta level would be better, it would save bandwidth and allow realms of trust), and is completely backwards compatible…

(While perhaps resource intensive, it would certainly create a trusted path, and could be done completely voluntarily (ie, deployed when the cost of sifting/sending bad emails outweighs the cost of the decrypting the signatures of each message).

todo: look up proposals for various systems/frameworks that can verify paths, senders, recipients, but still maintain some semblance of privacy or anonymity