If you really want to go far down this path, there is the Conkeror browser. Fortunately, Camino adheres to the Apple standard, allowing me to have my cake (having CTRL-N move down one line, as it was Meant To Be) and keyboard-driven browsing. While this sounds minor, it bites me every time. Firefox has apparently overwritten the CTRL-N key to do nothing (overriding the operating system). This is a big deal for me because the Emacs key bindings are deeply ingrained in my fingers (and most of OS X, as it turns out), but Firefox doesn't allow this. This is going to sound odd, but one of the critical things that it supports is the ability to type a partial URL in the address bar (which it will auto-complete) and hit CTRL-N to move the cursor down to the first (or subsequent) matches. Camino is very lightweight (if "feels" lighter than Safari) and it supports my browsing habits. Recently, I stumbled across Camino, which uses the same rendering engine as Firefox, which means that my 2 favorite keyboard shortcuts work. Conversely, one of the things I hate about Firefox are all the plug-ins! I tend to find useful plug-ins and add them, which adds to the weight (and start up time) for the whole browser. ![]() I maintain a love/hate relationship because one of the cool things about Firefox is all the plug-ins available. ![]() This added to the spacebar to scroll down and shift-spacebar to scroll up and you can get a lot done in a browser without a mouse. I've found my address and never taken my fingers off the home row. From there, I can hit the slash key and start typing "London". In my new mouseless browsing mode, I go to the home page, hit the apostrophe and start typing "contact", hit enter and now I'm on the contact page. How many times do you go to a web site and you know the name of the link you want already? For example, if I need to go to the ThoughtWorks web site to get the address of the London location (this happened earlier today), I know (or can guess) that there is a "Contact" link on the home page, which takes me to a list of offices. ![]() The apostrophe does something similar, but it restricts the matches to URLs only. When looking at a web page, the slash starts an incremental find for text within the page. I love the keyboard affordances it provides, especially the slash ("/") and apostrophe ("'") shortcuts. One of my recent tendencies is mouseless browsing. Consequently, after The Productive Programmer came out, I continue to find new ways to make myself more productive. After it's off to the publisher, you can't turn off your interest in the subject. Once you write a book, you become really immersed in the subject matter.
0 Comments
![]() The replacement security app includes new and improved features. I received the following notification on my Apple device from Norton Mobile Security: “Norton Mobile Security will be discontinued.” What does this mean?īeginning January 15, 2019, if you have the Norton Mobile Security app version 3.12 installed on your Apple device, you will begin to receive notifications regarding its upcoming decommission on April 1, 2019. Customers can use the Norton Mobile Security portal to remove inactive devices and add new active devices to the Norton Mobile Security service. If you reach the maximum device limit, the Norton Mobile Security app will notify you. ![]() What happens if I exceed the device limit? Can I get permission to add more devices if I exceed my limit? This limit is set to prevent service abuse and make adding new devices easy. Norton Security Online has a device limit of five (PC, Mac, Mobile). ![]() Norton Mobile Security is included with your Norton Security Online service from Xfinity. The service will now be active on the new device. Simply install Norton Mobile Security on the device you want to protect and log in. You can install Norton Mobile Security on multiple devices without having to transfer licenses. What if I buy a new phone - will my subscription transfer? Not being able to view the complete URL to ensure it is directing you where you really want to go means the potential is greater for unknowingly clicking on malicious links. These are apps that appear to serve another purpose, but run up call or SMS charges to premium rate numbers silently in the background.Īdditionally, mobile device users may be vulnerable to phishing scams. We've also seen Trojan texters and dialers. There are a number of ways users can be exposed to mobile threats, but some examples we've seen are people downloading an application for a specific purpose (game, info, etc.) and not realizing it is doing something else in the background, such as sending out geo-location data. How do users get exposed to mobile threats? Norton Security Online is available at no additional cost with Xfinity Internet service. Norton Mobile Security is now included as part of Norton Security Online. After you enter this code, you will be prompted to login to your Norton Account to activate your complimentary version of Norton Mobile Security. If you download the Norton Mobile Security app from the Google Play store or the Apple App Store, rather than follow the suggested install steps, you will see an option to enter a Partner Code. Please see What is Norton Security Online? for the latest system and device requirements. What are the System Requirements for Norton Mobile Security? Norton Mobile Security will not eat up unnecessary resources or affect the phone's performance. FAQs Will Norton Mobile Security slow down my smartphone's performance? That tower-plus several other rooms destroyed in the disaster-were never rebuilt, but cordoned off. ![]() A 1900 postcard of the place shows a tower that was later toppled by the natural disaster. In 1906, the great San Francisco Earthquake caused three floors of the then seven-story house to cave in. AN EARTHQUAKE ONCE RATTLED THE HOUSE AND TRAPPED SARAH. There are also doors that open to blank walls, and a dangerous door on the second floor that opens out into nothing-save for an alarming drop to the yard far below. Sarah issued many bizarre demands to her builders, including the building of trap doors, secret passages, a skylight in the floor, spider web windows, and staircases that led to nowhere. THE HOUSE IS FULL OF ARCHITECTURAL ODDITIES. It's said that upon hearing the news of Sarah's death, the carpenters quit so abruptly they left half-hammered nails protruding from walls. The work only stopped on September 5, 1922, because the octogenarian mastermind behind the home died of heart failure in her sleep. She employed a crew of carpenters, who split shifts so construction could go on day and night, seven days a week, 52 weeks a year, for 38 years. In 1886, Sarah purchased an eight-room farmhouse in San Jose, California, and began building. Sarah Winchester's bedroom / Library of Congress, Public Domain, Wikimedia Commons THE HOUSE WAS UNDER CONSTANT CONSTRUCTION FOR 38 YEARS. "If you continue building, you will live,” the medium warned Sarah. There was just one catch: construction on the house could never stop. Sarah was advised to leave their home in New Haven, Connecticut, behind, and move west, where she was to build a grand home for the spirits. In order to protect herself, William said that Sarah must "build a home for and for the spirits who have fallen from this terrible weapon." He warned that vengeful ghosts would seek her out. Through the medium, William told his widow that their tragedies (the couple had only one child, a daughter named Annie, who died at six weeks old) were a result of the blood money the family had made off of the Winchester rifles. While she was presumably looking for solace or closure, she was instead given a chilling warning. Overcome with grief in the wake of her husband's death from tuberculosis in 1881, folklore states that Sarah sought out a spiritualist who could commune with the dead. ![]() MANY BELIEVE SARAH BUILT WINCHESTER HOUSE OUT OF FEAR. Construction on the 24,000-square-foot home, which is located at 525 South Winchester Boulevard in San Jose, California, began in 1886. Sarah Lockwood Winchester-the wife of gun magnate William Wirt Winchester, whose family created the Winchester rifle that was heralded as "the gun that won the west”-designed and oversaw the construction of the sprawling Queen Anne-style Victorian mansion that bears her name. THE WINCHESTER HOUSE IS NAMED FOR ITS MISTRESS. ![]() But before you go to the movie theater, wander through the curious past of one of America's most infamous homes. Naturally, it has inspired a chilling horror movie, Winchester, which opens in theaters today. Despite the Winchester Mystery House's cheerful appearance, this massive California mansion's history is edged with tragedy, mystery. That’s a good start, but I want to explore this idea further. Of course one quick fix for this is to just open up the image in a raster graphics editor, save it, and then the editor will write new metadata to the image for you, thus altering its contents without altering the actual image. Since almost all of the images I used the hex editor on were PNGs, and I didn’t do anything with the JPEG beyond just changing the metadata, I will be focusing all my attention on the PNG format from now on. So I had to look for other things, partly through reverse engineering, and partly through doing some minimal research on the file formats. There was no junk data for me to trivially change. This was true of screenshots that had never been touched by an editor. I figured some arbitrary modifications to the date and time wouldn’t hurt.īut then there were images that didn’t have any metadata. In this screenshot we see metadata from both the camera that took the picture as well as GIMP as I used it to edit the image. Since metadata has no effect on the actual pixel data of the image, you can easily change it without damaging anything. I started with what I figured would be the easiest thing to find: metadata. ![]() I used the hex editor known as FlexHex to do this.įirst I opened the one JPEG that I had. That means figuring out how something is built by making small changes and seeing if you break anything. ![]() I used a method of reverse engineering that I like to call the trial-end-error method. The next step is obvious: Open the images up in a hex editor and start poking around. For now, basically all I have is the compressed version of an image, and I have to alter that somehow without corrupting it and without changing its visual appearance. I could download a steganography program to do it, but I tend to want to figure out how to do those things on my own. This of course poses an interesting question: How do you change the contents of an image without changing its visual representation on the computer screen? I could borrow methods from steganography, where you decompress an image so you can access the actual pixel values, and then change the lowest-order bits in the red, green, and blue channels of each pixel, but I don’t know enough about the image formats in question to be able to do that intelligently. One creative way I’ve thought of to get around this problem is to delete the images from my site and then upload modified versions of the images that look exactly the same visually but are not the same file. In the case of images, if I have them uploaded for a draft but I don’t post them until several days later, Google might refuse to index the images because they’re not new. One problem that I want to solve is Google’s penalizing of duplicate or old content. This research basically consists of searching for my own pages on Google to see what’s been indexed and how the pages rank. ini to use the hex editor by default: "workbench.So recently I’ve been doing some SEO research for my site. For example, this would associate all files with extensions. The hex editor can be set as the default editor for certain file types by using the workbench.editorAssociations setting. Trigger the command palette (F1) -> Reopen With -> Hex Editor. ![]() Trigger the command palette (F1) -> Open File using Hex Editor.Right click a file -> Open With -> Hex Editor.There are three ways to open a file in the hex editor: Editing with undo, redo, copy, and paste support.A data inspector for viewing the hex values as various different data types.A custom editor extension for Visual Studio Code which provides a hex editor for viewing and manipulating files in their raw hexadecimal representation. That is, the outcomes measurements made in distant locations can be correlated with each other in ways that would be impossible if the measurements were truly independent and information about the results could only pass from one to the other at speeds slower than the speed of light. One of the most philosophically disturbing ideas to come from quantum physics is the fact that the theory is non-local. So, really, this one experiment contains everything you need to show conclusively that the wave nature of matter is a real phenomenon. If you want all the gory details, here's the Nature Nanotechnology paper, and the free version on the arxiv.) (If you want more detail, I did a detailed write-up of this experiment back in 2012. Slower speeds mean lower momentum, though, which means a longer wavelength, and thus a larger spacing between the stripes. You can even spot the relationship between momentum and wavelength in the angle of the stripes- the spacing is wider toward the bottom of the figure because those molecules are moving slower, and took more time to cover the distance between the grating and the detector. The compilation of all the detections, though, reveals a pattern of bright and dark stripes that is the result of interference. ![]() Each dot in the figure represents a single molecule, and their arrival times and locations are essentially random. They passed a beam of phthalocyanine molecules through a nanofabricated diffraction grating, and used fluorescence light to detect single molecules striking a glass plate on the far side. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |