Tag Archives: technology

Enclosed Space Technology – Airplane, Boat, Train, Building

I recently tweeted an article from Ars Technica on Linux technology being used by Raytheon for US Navy warships.

Although the article is recent the technology is old. I worked on projects 10 years ago that utilized the same concepts – military grade server hardware that is not susceptible to vibrations or EM, Ethernet based network that connects various components to various control points, a push / pull data subscription model based on widespread industry protocols (ARINC), and SBC embedded devices that interface to various equipment such as water systems, entertainment systems, lighting, etc.

How can I achieve absolute privacy or anonymity on the Net?

If I was a lawyer advising a client with a questionable criminal liability, or a person in absolute need of privacy, I’d recommend the following:

  1. Do NOT use free anonymity services such as TOR if you are transferring sensitive information. Countless persons in government and journalists across the world have made this mistake. Ever heard of WikiLeaks – they got their start by creating TOR end nodes and snooping data.
  2. Use a Live DVD like Amnesic Incognito Live System or Ubuntu Linux for anonymous browsing. It’s fairly simple to burn an Ubuntu DVD and to boot your laptop device from the DVD. The live system does not save any cache or browsing history to your hard disk.
  3. Use a VPN to transmit sensitive information. There are two VPN types – SSL VPN and IPSEC VPN. Either will do. I’d suggest subscribing to a VPN service whose infrastructure is hosted outside of the government’s reach. StrongVPN has host servers located in several friendly Caribbean nations.
  4. Use different anonymous proxy tunnels through your VPN if you plan to access a website or service regularly and wish to remain anonymous. These services have the same limitations as Tor though and shouldn’t be used for transferring sensitive information. I explain a bit more below.

There are countless SSL/TLS encryption schemes, countless SSL/TLS software implementations, and each configuration can be potentially distinguished depending on the application software stack, operating system, hardware, etc. in use. The permutations among these configurations is large enough to distinguish a browser client.

jQuery Plugin

I’ve recently used Bootstrap in a client project and had to extend the Bootstrap Typeahead control. The extension I created allows opening the Typeahead dropdown and selecting an item without having to enter data into the input control. It’s basically an editable combo box.

There are jQuery user interface plugins that create an editable combo box, but my control is quite simple and allows me to keep Bootstrap and jQuery uncluttered with jQuery UI.

Continue reading

PHP deficiencies

I’ve recently had the task of uploading a large dataset via a PHP script. My application is designed under a MVC paradigm, and the uploaded data was transferred via an array declared in the controller to the view from the model. After processing around 5,000 records my script died with an out of memory error – the 128 megabyte limit was reached. Wow, I wondered why my script was consuming so much memory?

Continue reading