October 28, 2005
Accesskeys and Reserved Keystroke Combinations

In a non-scientific study conducted in the summer of 2002, we researched the availability of available Accesskeys which had not already been reserved by various other software technologies which might be employed by various users. The results indicated a real problem in that most ALT __ keystroke combinations (assuming the Windows operating platform) have already been reserved by one type of application or another.

October 27, 2005
Airpwn: Owning the Airwaves

In an open wireless network, all requests to the internet made from your computer are passed as plain text over the airwaves. Most wireless users are aware of this and often avoid using POP based email, ftp/telnet programs, and the like. Since all the information being passed over the network is in plain text, anyone with a sniffer can easily capture and view the data. This includes your emails, account information, chat sessions, etc. However, this simple fact does not stop people from surfing their favorite online sites, such as informit.com, to read up on the latest news or do some innocent research.

October 20, 2005
Tact Filter by Jeff Bigler

This is a kool perspective about Nerds and Tact (or rather the lack of) by Jeff Bigler that I really liked. It explains the tact gap between what he calls "normal" people and nerds. I wouldn't have used the term "normal people" but rather "common people" to describe non-nerds because the word "normal" implies that they are normal where "common" implies that they are merely more numerous than nerds.

October 19, 2005
Good sleep, good learning, good life

I have for years been interested in sleep research due to my professional involvement in memory and learning. This article attempts to produce a synthesis of what is known about sleep with a view to practical applications, esp. in people who need top-quality sleep for their learning or creative achievements.

October 13, 2005
Style Web Forms Using CSS

Whether your main business is Web design or backend development, chances are you spend a fair amount of time creating forms for user input. So you already know that the default appearance of forms isn't always appropriate for the look and feel of your site.

In this article we'll look at how you can use CSS to create attractive and usable forms.

October 10, 2005
yDSF - Robust CSS Drop Shadows

Drop shadows are cool, but adding them to elements of a web page can be a pain. You can fiddle with background images, tables, pure CSS solutions, Internet Explorer PNG limitations, or fixed single-use shadows tied to an image and a particular background.

The latest release of TypePad has a new popup (or flyout) interface element which presents the user with a set of options or an expanded view of an object when clicked on. The flyouts are similar to the location bubbles used in Google Maps. They have soft alpha-blended drop shadows that scale with the size of the box. The drop shadows are implemented in valid XHTML and CSS, with no CSS hacks or JavaScript. We call it ydnar Drop-Shadow-Fu.

Ajax Mistakes

Ajax is also a dangerous technology for web developers, its power introduces a huge amount of UI problems as well as server side state problems and server load problems. I’ve compiled a list of the many mistakes developers using Ajax often make.

Using TCP Wrappers to secure Linux

TCP Wrappers can be used to GRANT or DENY access to various services on your machine to the outside network or other machines on the same network. It does this by using simple Access List Rules which are included in the two files /etc/hosts.allow and /etc/hosts.deny .

October 06, 2005
Making Menus with wxPerl

As this article has shown, menu programming with wxPerl is an extremely simple task. Wx::MenuBar and Wx::Menu's methods are very easy to use and remember. If you understood this article, you can do anything possible with menus in your wxPerl programs.

Pass on Passwords with scp

In this article, I show you how to use the scp (secure copy) command without needing to use passwords. I then show you how to use this command in two scripts. One script lets you copy a file to multiple Linux boxes on your network, and the other allows you to back up all of your Linux boxes easily.

October 03, 2005
Why scientists dismiss 'intelligent design'

Evolution was and still is the only scientific theory for life that can explain how we get complexity from simplicity and diversity from uniformity.

ID offers nothing comparable. It begins with complexity — a Supreme Being — and also ends there. The explanations offered by ID are not really explanations at all, scientists say. They're more like last resorts. And, scientists argue, there is a danger in pretending that ID belongs next to evolution in textbooks.