Firefox aims for 10 percent of Web surfers | CNET News.com

Firefox Aims for 10% of Web Surfers

As much as I love Firefox I honestly don’t see this happening by the end of 2005. Far too many corporations mandate that IE be the broswer of choice. Until Firefox can break into this market (which they are slowly beginning to do) this market share will not be attainable.

[tag]Tech News[/tag]
[tag]Internet Related[/tag]
[tag]Software[/tag]

How I managed to waste time

      So I managed to play around with and get my Moblog working finally. I know some of you are rolling your eyes going “Yet another Moblog?” and my response is, “yes…but this one I will actually use.” The gmail moblog wasn’t really useful, it’s more of a proof of concept than anything else. Besides, that account is kind of a mess at the moment due to my extensive use of Gfile. LOL Oh how I wish Gmail would get rid of the 10MB attachment limit so I could really make use of my Gmail account.

      Anyways, back to the point. So now all I do is drop an email to a certain email account cool smirk with a particular subject line cool smirk from a particular email account (a list I specify so as not to receive any spam moblog posts) and then the entry is added with whatever attachments I included.

Pretty cool.

      Now…I just need to get a camera phone so I can start photoblogging with this moblog. That looks to be several years down the line though because I’ve only had my cell for 1 1/2 years at this point. Half way there I supposed. Ah well, back to the land of the productive.

[tag]Chaos[/tag]
[tag]Tech News[/tag]
[tag]Internet Related[/tag]
[tag]WebDEV[/tag]

So, Tonight Failed.

Well tonight pretty much failed. Granted, I really expecting much, but it failed more than I expected none the less. After standing outside for 30 minutes and seeing the line to get into the party not moving at all a friend and I gave up. It turns out that literally about 15 minutea after we left the line was gone and everyone was inside. My fucking luck. Ah well…here I go to read Darwin.  mad 

[tag]Thoughts[/tag]
[tag]Personal[/tag]
[tag]VC[/tag]

So Excited for Halo 2

I just downloaded a new video showing a lot of Halo 2’s multiplayer action and let me just tell you, oh my god. By far the coolest thing that I saw was this thing called Proximity Voice. Basically what this means is that while playing online (with the optional headset) you can speak and only people who would hear you in real life (those just in your immediate vacinity) will be able to hear you. So for example if you kill someone in a one on one duel you can stand over there body and talk trash to just them. LOL  While this doesn’t sound like a big deal to the non-geek, think about the technology behind that seemingly simple feature. The engine has to determine:

  • 1. You’re speaking.
  • 2. Someone is close to you.
  • 3. That the distance is “reasonable”…given whatever algorithm they use to determine this.
  • 4. Then, and only then, can people in the near vacinity will be able to hear you.
  • 5. oh yeah, this happens in less than a second.
  • Anyways, enough rambling. This game is going to kick so much ass. I can’t decide which I am more excited about, Halo 2 or Half Life 2 big surprise Too much fun and goodness…stupid classes. LOL

    [tag]Tech News[/tag]
    [tag]Software[/tag]
    [tag]Thoughts[/tag]
    [tag]Life[/tag]

    Security Hole Found in Gmail

    Security Hole Found in Gmail

    Gmail Accounts ‘Wide Open to Exploit’ – Report

    The flaw which was discovered by Goldshlagger and was tested many times by Nana’s editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes’ owners, we will only disclose that the process is based upon a security breach in the service’s identity authentication. It allows the hacker to “snatch” the victims cookie file (a file planted in the victim’s computer used to identify him) using a seemingly innocent link (which directs to Gmail’s site itself).

    Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won’t stop the hacker from using his box”, explains Goldshlagger.

    [tag]Tech News[/tag]
    [tag]Internet Related[/tag]
    [tag]Security[/tag]