Windows 8: defective by design?

Microsoft has been known as a company that changes its direction, and more importantly changes the user interfaces and names of their products continuously. Their search website Bing just doesn’t gain much attention, Windows Vista was one of their biggest failures (aside from Microsoft Bob) and now they try to change the way people interact with computers via the new Metro interface. What’s the problem? I’ll explain my view about it.

Continue reading

my experience with iTunes Match and multiple iTunes accounts

At the start of 2012 Apple released a new service called iTunes Match. This service which costs $24.99 a year analyzes your music library. If a song is a available in the iTunes Store, it will be available through iCloud for free, using a high-quality 256kbps AAC format. All other songs will be copied to your iCloud account in their original form. The purpose of iTunes Match is making your music available to all devices that are associated to your iTunes Store account, and can therefore be streamed or downloaded to those devices. At the beginning it was only available in the US. But because I live in Europe and don’t have a valid US Credit Card I couldn’t use it until it was released in European countries a month ago. I mostly use my US iTunes account using iTunes Credit coupons, but I had to use my EU account for iTunes Match.

Continue reading

How to create a secure Video Conferencing network

When I was reading the NY Times yesterday I’ve read this interesting article about a security officer of a company who has managed to connect to video conferencing equipment in boardrooms and was therefore able to control the camera and hear what is going on in these rooms (http://www.nytimes.com/2012/01/23/technology/flaws-in-videoconferencing-systems-put-boardrooms-at-risk.html).

In theory he could eavesdrop on conversations that where happening in these boardrooms. Companies who utilize video conferencing solutions around the globe suddenly start to realize that they might be at risk. I’ll try by best explaining the vulnerability and possible solutions.

Continue reading

How to make a web page fit the browser window

At these times your visitors have all kinds of different screen resolutions and also resize their browser window. Resolutions vary between 1280×1024, 1680×1050, 1920×1200, 2560×1440 and all make a huge difference. And then there’s the difference between people who have their browser window maximized, while others resize it so they can fit other windows on the screen as well. There’s a relatively easy way to make it fit the window properly.

Continue reading

Deploying DKIM on Debian and Ubuntu

This guide will demonstrate how to deploy DKIM on Debian-based Linux distributions. Other distributions work similar, except some do not use the scripts in init.d. The configuration of DKIM will be the same. I will discuss HOW to deploy it, not WHY to deploy it as I assume you’ve already decided to do so.
Continue reading

Delegating Reverse Lookup Zones for big subnets

Imagine that your company’s network owns the IPv4 range 40.50.60.0 – 40.50.60.255. The Reverse Lookup zone would be 60.50.40.in-addr.arpa, covering this entire network. Your primary nameserver is ns.acme.com. Your zone would look something like this:

60.50.40.in-addr.arpa       ns.acme.com.      support.acme.com. (
                                              20111202001
                                              4h
                                              1h
                                              1w
                                              1h
                                              )

@          IN          NS           ns.acme.com.
1          IN          PTR          www.acme.com.

But now you want to delegate the range 40.50.60.20 – 40.50.60.39 to the nameserver coyote.acme.com. Since it also resides in the same reverse zone, you cannot delegate this entire zone, as this would just move your entire network to the control of coyote.acme com, something you might not want to achieve with delegation.

Continue reading

Introduction to PHP Classes

Since PHP version 5 has been released, it has been improved with Object-Oriented Programming, using classes. It’s one of the most used features in system programming languages like C++ and can now be used in PHP.

In this article I assume you know the following in advance:

– You know what variables are and how to assign values to them in PHP.
– You know what a function is and how it works.

Before I start, I want to tell a bit about functions.

Continue reading

Combining PHP with JavaScript

Using server-side programming languages like PHP and ASP.NET is a great way to build dynamic web pages. Build content on-the-fly or perform database operations. This is usually combined with static HTML documents. But the major disadvantage of server-side scripts is the fact that each user input requires the page to be reloaded (basically needs to be re-parsed by the server-side application). And on the other hand there is JavaScript, which can perform many tasks without requiring a page to be reloaded, as all instructions can be processed directly in the browser.

There’ve been quite some questions about web developers who are wondering if they can combine a server-side programming language like PHP with a client-side programming language like JavaScript to combine the advantages of the two. Well, the answer is Yes. It can be done, and it’s not hard to do either. it just takes a different approach.

Continue reading