h1

Fanning the flames

September 8th, 2004

Via John Robb, from an interview with someone called Dr. al-Faqih (emphasis mine):

I think they will not attack before Bush is re-elected in November. Al-Qaeda is praying for a Bush victory, because Bush is facilitating the polarization between the Muslim and Western worlds and he is causing more and more Muslims to hate America.

h1

Jasmine Ashley, Heimlich Hero

August 22nd, 2004

I had a serious choking episode today at sunday dinner with my wife’s family. I was probably only a few seconds from losing consciousness when my 11-year-old daughter Jasmine came to my rescue and used the Heimlich manoeuvre on me, dislodging the chunk of roast beef from my windpipe.

I’m very proud of Jasmine for recognizing the problem, knowing exactly what to do, and stepping right in to deal with it.

I was surprised that a kid of her size could effectively perform the manoeuvre on her 6-ft 230-pound dad. Take my advice – learn about choking and how to deal with it, no matter how old you are.

h1

yoyo cable connection

August 2nd, 2004

This is what my cable connection has looked like all week:

Every 15 minutes, it drops for two to three minutes. I have them coming on Wednesday afternoon to look at it.

I’ve been looking all over the net to see reviews about the new WebSTAR DPC2100 modem Rogers gave me recently. All I can find is people saying that you should get the Motorola or the Toshiba – anything but the WebSTAR, but nobody ever actually says why. Anyone have any real scoop on this thing?

Mind you, in between the downtimes, I have been getting phenomenal download speeds – in the region of 450kbs.

h1

Time to buy a Volvo

July 28th, 2004

I climbed into an upside-down car this morning and unbuckled a remarkably fortunate young woman whose vehicle had flipped end-over-end multiple times at 100kph or more. She walked away with no discernable injuries apart from a red mark from the seatbelt. The car was surprisingly intact and all safety systems had deployed.

Thanks for the tip Reetu, next car I buy is a Volvo S40.

h1

Secure, flexible networking on a public or restricted connection

June 16th, 2004

As an independent consultant and programmer, I often connect my laptop to networks other than my own. Sometimes they are the corporate networks of my clients, and more frequently of late they are wireless networks, either at clients or publicly accessible hotspots. A couple of problems arise from this.

One is security/privacy (maybe that’s 2 – hmm…) – email passwords and surfing details are monitored or easily sniffed either on the wire or in the air.

Another is restrictions – corporate and ISP policies that limit my ability to reach the services I want – instant messaging, certain content, etc.

I’ve come up with a solution to all of these problems that is easily implemented by anyone who doesn’t mind becoming familiar with SSH and port redirection. All you need from any location is the capability to connect to one port on a remote machine.

Okay, so not everyone will be nerdy enough to follow these directions. Believe me, you’ll thank yourself if you decide to take the plunge and learn this stuff.

Server:

First, you will need a Windows or *nix (Linux, BSD, Mac OS/X, etc) machine somewhere on the net that you can reach via TCP/IP, either by static address or dynamic dns. You only need to get to one port on it, so it can be behind a NAT firewall as long as that port is mapped back to the box.

I have two such boxes – one at home behind my cable router using Zoneedit for dynamic dns, and another which is a virtual private server (a Linux virtual machine with root access) from www.velocityserver.com. For $14.95 a month, I have a complete RedHat server at my disposal with root access, a static IP, 500MB of space, and 10G per month bandwidth – highly recommended.

Second, on that box, you will need the SSH server running. On a Windows box, you can load up the free Cygwin sshd, and on any *nix you’ll have sshd. Expose the SSH listening port to the internet via your firewall or DSL/Cable router if necessary.

Third, you will want to run a proxy server on that machine. Squid is great on *nix, and there’s a free Windows proxy at AnalogX that works well too. Set it up to only accept connections from localhost.

Fourth, you may or may not want to run an smtp server – sendmail on *nix or Microsoft’s SMTP server that comes with IIS on Windows, set up to relay only from localhost.

Ok, so you have this box running now, with sshd, web proxy, smtp.

Client:

First, on your laptop or office machine, install an SSH client. *nix comes with one, and you can get PuTTY for Windows. By default it will run on port 22, which is not often blocked by firewalls. If it is, you may want to choose another port, for instance, port 80, which is usually used for http.

Second, set up a connection profile to your server with the following port redirections:

Local 110 -> mail.your_isp.com:110 (pop3)

Local 25 -> localhost:25 (if using smtp on server)
Local 25 -> smtp.your_isp.com:25 (if using your isp’s smtp)

Local 3128 -> localhost:3128 (if using squid proxy)
Local 3128 -> localhost:6588 (if using analogX proxy)

Third, set up your programs to use redirected ports:

Pop3 email program – set pop server to localhost, smtp server to localhost
Browser – set proxy to localhost:3128
Instant Messaging – set proxy to localhost:3128 (I use Trillian)

This will all be a big hairy deal to set up if you haven’t done it before, but once you get it going, you’ll think of lots of reasons to use port redirection.

Here is an ssh commandline that does it all:

ssh -p 22 myserver.mydomain.com -L110:mail.myisp.com:110 -L25:localhost:25 -L3128:localhost:3128

Now, wherever you are – even at home – the first program you run is your ssh client. Connect using your profile, then start up your email, IM and browser, and all of them will be talking directly to localhost and through the SSH tunnel out to your own network, never exposing your data to the network you’re connected to, and allowing you to browse wherever your own policy dictates.

I’ve been using this for a couple of months now and I can’t imagine doing it any other way.

h1

Saving the world

June 4th, 2004

I had lunch today with Dave Pollard, whose How To Save The World blog ranks high among the most cogent writing to be found on the net.

We had a great time tangentializing on a vast array of topics, and I was pleased to find someone with whom I share a fascination of knowledge, its collection, sharing and transfer.

Thanks to Terry Frazier for introducing me to Dave’s writing.

h1

I Give Up on Comment Spam

June 4th, 2004

I had about 2000 comment spams to clean up today – lovely topics like rape, incest, bestiality.

I deleted my comment script, and I’ll soon be moving my blog off of Movable Type, although you’ll still be able to find it here. People who want to get in touch with me will be find a way other than comments to do it.

Bastards.

h1

Referer Inspection

May 27th, 2004

Yes I know it’s “Referrer”, that is unless it’s the HTTP specification.

How is it I get a hundred hits a day from this page? Sure, there’s a link to me on it, and a bogus unnecessary broken image reference to my page (and every other page on it) that causes a hit every time someone opens it but do hundreds of people actually visit this gawdawful noisy page every day?