Sunday, June 20, 2010

Pioneer One - An independent sci-fi drama web series premieres

Pioneer One is a tv series that premiered online-only last week.
As the story goes a space object sprayed radiation over North America. Homeland Security immediately begins investigation fearing a terrorist attack. However the truth isn't so simple and the implications of what they found can involve the whole planet Earth...
Pioneer One is the work of Josh Bernhard and Bracey Smith, the guys behind another indie success named Lionshare, in collaboration with VODO. The pilot is the first episode in a season of seven. The story will unfolds during a total of four seasons.
This first episode cost just 6000 US$ and additional 20000 US$ are needed to produce the next three episodes. Pioneer One is a project made possible by donors and other forms of fund raising.
You can download the episode and watch it for free. There are several ways you can do it by checking the series page on VODO. From the same page you can help the production by making a donation (from 5$) or spreading the word.
I think this is really an interesting project especially because of the fact that this is not an unexperienced amateur work (no offence intended) but a show of high qualities and high expectations. From what I know regular tv series are getting more and more costly by the day and this is perceived as a problem even by certain producers (check the articles from a Sfy manager on Boing Boing). Pioneer One demonstrates how budget could be cut down by thinking smart, a little of courage and a leap of faith.

Saturday, June 19, 2010

Google Chrome Logo Domino

Dominos are fun and by looking at the work of this guy (and all the many other works he did) I finally know what self control mean...

Wednesday, June 16, 2010

Friday, June 11, 2010

Dell states: Ubuntu Linux is safer than Windows

The VAR guy spot one very interesting statement on Dell’s website.
By looking at Dell.com/ubuntu there’s a list of ten points why Ubuntu Linux is a great system.
At point 6 Dell shows its guts and write in plain black on white what follows:


I don’t know about you but I see a trend in Linux system adoption and diffusion which is getting more and more steep every year. Security is surely one of the best reasons why users should venture in adopting a Linux distribution as their computer system. While the fact that the vast majority of malware is written for MS Windows this is not at all the only reason why Linux systems are safer than Windows ones. There are strong architecture, environment and philosophy differences that make the security split between the these two systems look more like a rift.

wizzywig revamped and serialized

If you're a geek or a technology enthusiast you must absolutely read wizzywig.
wizzywig is a comic, a work of invention but based on real facts. It tells a story of hacking in the golden age of computer history, when all was hard cored technology embraced in a halo of mystery, like a clockwork sorcery, so much different from the glossy fashionable era of 2.0 web.
3 volumes were published so far by the author, Ed Piskor, and believe me they make for a wonderful gift to yourself or any real geeky person you know.
Now Ed's come up with the idea of revamping the comic and republish it as a serial on http://www.wizzywigcomics.com/
I judge wizzywig one of the highest example of comics in general and the fact that it's now available to everyone on the web it's just fantastic.
You can follow the series every Sunday and Wednesday at  http://www.wizzywigcomics.com/.
You can also buy copies of the volumes here.
Here below the freshly published revamped first page of volume one.

Friday, May 28, 2010

How to set DDclient for OpenDNS in Ubuntu Linux

OpenDNS is one of the public domain name servers available to the users.
When setting the DNS IP address to 208.67.222.222 or 208.67.220.220 your client will lookup the domain name using OpenDNS servers. Apart from the security advantages (that I don’t want to discuss here) one killing feature of OpenDNS is the possibility to effectively set content filters for your client computers.

Imagine you’re a father and don’t really want your 6 years old kid to stumble upon (yes you can involuntarily stumble upon them) adult websites while surfing the web. You should be with your kid when he/she does but we know that this isn’t always possible even at home. OpenDNS gives the user the possibility to filter several categories of websites and even to create personal blacklists and whitelists.



The problem is that OpenDNS recognizes a user through his/her IP address. This works fine in case of static IP but doesn’t work with dynamic IP addresses that are assigned by the ISP to the user at every session.
DDclient is what we need to do the trick. It’s basically a perl client designed to catch the user’s IP address and perform the update of that for certain services.
You can find and install the script directly from the repositories, just look for DDclient in Synaptic.

While performing the installation the script will render a setup form that you must fill in with basic data about the task DDclient has to do.
Anyway I found that also by filling in the form the IP address update for OpenDNS doesn’t work. This is not a big deal because we are gonna modify the configuration script.
Open a terminal and type:

sudo gedit /etc/ddclient.conf

Enter the following information in the text file

/etc/init.d/ddclient status


sudo ddclient


ssl=yes


# Configuration file for ddclient generated by debconf
#
# /etc/ddclient.conf


pid=/var/run/ddclient.pid
use=web, web=whatismyip.org
protocol=dyndns2
use=if, if=eth0
server=updates.opendns.com
login=XXXXXXXXXXX
password=XXXXXXXXXX
Home

Customize the following data:
login --> your login name in OpenDNS
password --> your password account in OpenDNS
Home --> change this with whatever name you gave to your network in OpenDNS

Save the script and close.
Now type:

sudo /etc/init.d/ddclient status

This will check if DDclient in running. The ouput should be something like this: Status of Dynamic DNS service update utility: ddclient is running

DDclient is configured by default to run as a deamon, therefore you shouldn’t have to do anything. Should you have issue with it running check first the configuration file to spot syntax or command errors. You could also type sudo /etc/init.d/ddclient restart to see an error output.

To check the update of the IP in your machine try to switch off and on the router a few times, obtain a new IP address from your ISP and check the setting page of OpenDNS. You should see the new IP address associated with your network (gives a few minutes to the trick to happen though). You could also monitor changes in /var/log/syslog

Well, you’re now set up to effectively filter what your kids will access on the web.

Wednesday, May 26, 2010

Revolutionists of the small screeen - Google introduces the Google Tv

Google's doing that again. They're taking good ideas, trying to make them better and the hammer down the old ways to shape the future. This time their target is the old school, fence-and-spear, tv. They took Boxee's idea, insert new concepts and are about to sweep the video fruition scenario like a combine harvester.
Let's just pray and hope Google will succeed in being what mammals were for dinosaurs...
Introducing the Google Tv

Sunday, May 23, 2010

The Treat of the Week #17

Funny homemade trailer of "Cars 2"

Friday, May 21, 2010

Google Doodle with Pac-Man

Google celebrates 30 years from the release date of Pac-Man (22 May 1980 in Japan) with a doodle that's not just good taste but also very fun. Reach Google today and find their logo changed in a googolized version of the original Pac-Man level. There's more, you can interact with the doodle and play Pac-Man. Click one more time on the "insert coin" button and play a double.
I'm falling more and more in love with Google every passing day.

Tuesday, May 18, 2010

Fan restyle of 1984 David Lynch's DUNE

In 1984 David Lynch directed the movie representation of Frank Herbert sci-fi classic DUNE. If you haven't read the novel I strongly advise you to do it because it's a masterpiece of science fiction literature (and that's not just my opinion).
Anyway, Lynch's film got alternate reviews. Many, including Herbert himself, gave the movie a high rate, while others despised it because of the complication of the plot and the deviations from the book story.
I personally liked the film but I can admit that the realization can be at least seen as controversial.
A talented fan, Sasha Burrow, a Los Angeles based 3D modeler and animator, is relentlessly working on a project to "revamp" the movie, with a focus on the special effects.
Here below you can see the showreel, dated March 2010, and appreciate the improvements so far tested on the film. Considering the quality of the improvements and the fact that Sasha's currently working alone, the effort is really heroic.
You can find more information and keep track of the improvements on Sasha's blog: DUNE Special Edition.
The guy's looking for help, so if you feel able to join this interesting and commendable project, just contact Sasha.

Monday, May 17, 2010

B-Movie Cast 104 is Out! - Teenagers from Outer Space 1959

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!
You can drop your comment to the show with their Toll Free Number 888-350-2570

Sunday, May 16, 2010

The Treat of the Week #16

The force of water...

Friday, May 14, 2010

B-Movie Cast 103 is out! - Interview with John Saxon

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!
You can drop your comment to the show with their Toll Free Number 888-350-2570

The Moon Nazis Are Coming – The First Iron Sky Footage is Out!

Thanks to my friend Vince of the B-Movie Cast that let me know that the first footage of Iron Sky was released yesterday.
I don't know if you are aware of this movie but it drives me crazy! I can't wait they finish and release it.
Iron Sky is being produced by Energia Production a Finnish independent movie company. The movie is set in an alternative timeline where (or better when) bunch of Nazis managed to escape to the moon and install a base on the dark side of the rock.
In the 2018 they are ready to come back to Earth and attack!
You can find more information aboout this amazing production on the official website here.
If you like alternative timelines, science fiction and world war two stories then Iron Sky it's for you! If you happen to be an expert in some movie production areas drop a line to the production. Moreover, if you happen to have some money to invest you can finance the production. Just check the web site for more information.
See the footage here below and.. watch out for the invasion!

Wednesday, May 12, 2010

Valve's Steam game distribution client and Source game engine are coming to Linux!

Modern distribution like Ubuntu are finally in range of competition with the most famous [2] commercial operating system. That's true for a lot of things. For other things they're even superior. But not for gaming. Every Linux user knows that gaming on Linux it's a big pain in the ass. Don't mistake me. There are lots of independent games and you know that I'm especially fond of them. Apart from few exceptions though the major games are lacking.
However the future scenario of Linux gaming is getting a bit brighter. Today Phoronix announced what was a long time speculation and something that they stalked since long: Valve is going to release Steam, their gaming distribution client, for Linux. The good news aren't finished though. Valve will also release their Source game engine for Linux. Source is a modern game engine that powers games like Half Life 2, Portal, Left for Dead 2 and so on.
This is a huge hit for Linux gamers and users in general. The trend of increasing quality some Linux distributions are showing so far is getting more and more users to Linux. It's a drop of water in the sea comparing to major commercial operating systems, yet is improving. Could this be one reason of Valve's bet on Linux? I can't say for sure but I hope this incredibly good news will spawn other good happenings. For one I hope Id Software support to Linux will strengthen. Moreover -and here I can be wrong- but Linux strategy towards game development frameworks sucks, or better is non existent. There are scattered libraries for the management of the basic systems needed for gaming like graphics, sound and controls. However the lack of a unified and solid framework affects game development and keep developers away from Linux. It's far too common to encounter problems when running games for Linux. For example I can easily recall the most recent disappointments trying out the demo of X2 the Threat which had serious audio problems, Little Space Duo with non existent sound, Heroes of Newerth which didn't even start. 
To wrap this article up, Steam for Linux is expected for the end of the summer and a Valve announcement is imminent. Kudos for Valve for what they're doing and I look forward supporting their choice and buying Linux games when available - Portal, Portal 2 and Postal III in particular.


Monday, May 10, 2010

How to open Magnet Links with Google Chrome and Transmission on Ubuntu

Magnet links represent a way to reference resources available for download via peer-to-peer. This is a relatively new way of access to peer to peer resources that will probably substitute in time the BitTorrent files. The differences with the afore mentioned files are that magnet links identify the files by the content’s hash value and not by name or location. This is an improvement in the effort of a more unique identification and fake content’s isolation. Another huge improvement is the fact that peer-to-peer content providers won’t have to store physical files anymore. Magnet links are just plain text and can therefore be stored effortlessly on any web page and even copied into emails, etc…
 
Magnets can nowadays be found on many peer-to-peer content providers like The Pirate Bay. There are however two main problems with them: they aren’t supported by all BitTorrent clients and, even when they are, by clicking on a magnet link the browser doesn’t usually open the desired application to resolve the request.
For the first problem the solution is quite simple. Clients are getting updates to include the magnet links features. Vuze, µtorrent, and the last version of Transmission are just three of the BitTorrent clients that support magnet links.
For the second problem I found a solution to open a magnet link with Transmission via Google Chrome.
This works for sure with Ubuntu 9.10 and Ubuntu 10.04.

Open the terminal and type
$ gconftool-2 -t string -s /desktop/gnome/url-handlers/magnet/command "transmission %s"
Enter
$ gconftool-2 -s /desktop/gnome/url-handlers/magnet/needs_terminal false -t bool
Enter
$ gconftool-2 -t bool -s /desktop/gnome/url-handlers/magnet/enabled true
Enter

In this way you should be set up to use magnet links with your Ubuntu distribution and the default BitTorrent client Transmission.

Have fun.

Thursday, May 6, 2010

An Overview of Linux Rootkits

Linux is widely considered and appreciated as secure and reliable operating system. Especially for what concerns desktop users, the advantages of Linux in terms of security overwhelm the situation of other operating systems like, for example, Microsoft Windows. However malware like viruses and rootkits do exist for Linux as well, and they are especially dangerous for more tasty systems like those connected to large networks. In this article we will cover one particular set of malware: the rootkits.

A rootkit is essently a set of tools designed to set up an pathological environment inside the host’s operating system. It first needs to gain access to that system by means of various type of attacks. Having succeeded in doing so, the rootkit is designed to implement actions in order to take perform the fulfill the following objectives:

1- Establish a backdoor for future access to the host system

2- Perform malicious operations like gaining passwords or any kind of reserved and confidential information related to the compromised system (i.e. by means of keyloggers).

3- Using the compromised system to sniff communications within the network to which the system is connected

4- Attack other systems

5- Cover their tracks especially by deleting portions of log files

All these three objectives are related to the concept of the rootkit gaining superuser privileges within the infected system.
To assure future access to the system there are a few option.

- Connect via telnet. This method is a bit primitive and quite easy to be spot by the experienced administrator.

- Connection via SSH daemon. This method provides a higher level of stealth compared to the one above because the communication is encrypted and, by using a customized ssh daemon, it’s possible to avoid leaving traces of activities in log files. Provided that commands haven’t yet been replaced by the attacker’s customized ones, it is possible to spot ssh activity using the netstat command. This command is very useful to display inlet and outlet network connections as well as routing information and various network statistics.

- Other more subtle and advanced techniques like UDP listeners, backdoors on Internet Control Message Protocol (ICMP), backdoors opened through remote HTTP shells that mimic a regular browser connection to an internet website using a standard HTTP compliant protocol

My favourite one: covert channel backdoor. A covert channel attack is based on techniques that enable to transfer information using channels that aren’t normally meant for this operation. The advantage is clearly that of going stealth by creating a customized communication that will not be detected by the security systems. This method opens a world of creative ideas and suggestions about the creation of the protocol and the transmission method. For example I read (http://www.invisiblethings.org/papers/joanna-passive_covert_channels-CCC04.ppt)  that at least one method is to slightly change some fields in the packets generated by the HTTP communication.  For more information check this (http://www.fas.org/irp/nsa/rainbow/tg030.htm) book of the DoD Rainbow Series and these websites that are intereting resources in the fields of hacking and computer security. (gray-world.nethttp://invisiblethings.org)

In order to maintain the environment which enables the attacker to perform operations inside the victim’s system, part of the rootkit’s job is to acquire root privileges and substitute system administration commands with customized ones. For example an attacker could hack the netstat command in order to hide the unauthorized connections, killall to block administrators from killing rootkit processes or lsof to conceal open files from the list provided by this command.

Another task that rootkits must implement in order to maintain their stealth status is deleting log files. Rootkits can be more subtle and erase only part of log files or even change dates and references.

Rootkits that access the system as LKM can be even more malicious. LKM is an acronym of Loadable Kernel Module. This components represent a simple way to expand or add features to the kernel without the need of recompilation. Should a rootkit gain access to the system carried inside an LKM, it could modify the behavior of all a series of command without the need to replace them!

One funny (if ever) operation accomplished by rootkits is sometimes clearing the field from competition. Sophisticated rootkits have been found implemented with capability to remove pre existent malware on the target system.

From all this derives the best common sense advice agains rootkits: prevention. Despite the havoc they bring to a system once installed, rootkits aren’t designed as instrument for gaining access to the system. Therefore, after installing a new system, a good strategy is to concentrate all the efforts in the techniques for preventing attackers to gain access. Some common techniques include:

- firewall the networks

- avoid installation of LKM

- use strong passwords and change them routinely

- use secure encrypted communications like VPN and SSH

- avoid granting useless and potentially dangerous privileges to system users

Once having implemented the above mentioned techniques, there are techniques that can be used to harden the system to rootkit manipulation and tools that can be used to check for rootkits either by direct comparison or by deductive methods.

- keep an up to date list of the daemons and other services that are running in the system and monitor it for changes

- keep an up to date list of the modules loaded into the kernel by means of lsmod command. It shows the module name, size, use count and list of referring modules. Note that the same information can be found from /proc/modules.

- keep track of and install all the security patches that are released for the software installed in the system

- familiarize with netstat command to check the network connections. This command shows information as protocol name (TCP, UDP), IP address of the local computer as well as the port used, IP address of the remote computer to which the local computer is connected and state of the TCP connection. Another way to obtain the same data is to look at /proc/net/dev

- routinely run lsof command which is meant to list open files as well as the processes which opened them. By running lsof -i | grep we can isolate a certain service / daemon and acquire information about the TCP port the file is listening. The option –i lists the IP sockets.

- remotely store log files to an external location so they can’t be manipulated directly on the system

- protect crucial files from modification by making them unchangeable. Typing $sudo chattr +i who will flag the who command as immutable. Note that although a superuser can’t delete a chattr +I flagged file, he can set mutable with chattr –i

Chkrootkit is a shell program designed to check for known rootkits activities like: system binaries modified by rootkits, promiscuous mode of the network interface, lastlog deletions, wtmp deletions, LKM Trojans, dirty strings replacement and utmp deletions. To run all the tests (which I consider wise) open the terminal and type sudo ./chkrootkit. A good idea would be to add chkrootkit to the system cron for routine checks and email the log report to the administrator. Chkrootkit can be found here (www.chkrootkit.org).


-          Rootkit Hunter (rkhunter) is another tool to spot rootkits in your system. It will compare MD5 hash to spot files alterations, look for default files used by rootkits, wrong file permissions for binaries, suspected strings in LKM and KLD modules, hidden files, and optionally scan within plaintext and binary files. It’s an instrument similar to chkrootkit but I advise to use them bot for redundancy. The same advices regarding cron scheduling and remote reporting are valid also here. The common usage is sudo rkhunter –check. For more information chek the project website at http://www.rootkit.nl/projects/rootkit_hunter.html


-          Tripwire and AIDE are two tools that perform useful checks on the files’  integrity. The rationale is simple: by comparing the MD5 values (http://en.wikipedia.org/wiki/MD5) of two versions of the the same file –a password protected sample and the in-use version in the system- they should find if a certain file was modified from the original version. Check the websites of the projects at http://www.tripwire.org and http://www.cs.tut.fi/~rammer/aide.html


If you’re a novice or an amateur administrator, I think that by reading this article you can have a better idea of some of the stuff that is involved in Linux systems security. If you’re a pro you’ll probably know all of this and maybe find me a bit retarded. In both cases I beg all of you to forgive all the mistakes and inaccuracies in the text.

Live long and prosperity and stay out of trouble.

Sunday, May 2, 2010

Amateur video edit - Mogwai Auto Rock

This guy made a stunning editing of Mogwai Auto Rock. The song is beautiful.

Wednesday, April 28, 2010

B-Movie Cast 100 is out! - Special 100th Show! Dr. X 1932 Return of Dr. X 1939

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!
Due to job meetings and trips I couldn't post this before but I won't let this week pass without mentioning that another B-Movie Cast episode is out and it's number 100!!!
So congratulations guy, it's an important achievement you reached!

From the episode synopsis:
On today’s: It’s our Special 100th show and Nic, special guest Juan from the creepy swamps of south Florida and I will be talking about Dr. X and the Return of Dr. X. Plus we have a ton of feedback from our great listeners.
Toll Free Number 888-350-2570



Sunday, April 25, 2010

The Treat of the Week #015

Zombies exist!
The Saint against the zombie is a proof!
This is from the book Theatrum Mortis by Janez Vaijkard Valvasor aka Johann Weichard 

Saturday, April 24, 2010

That's a Python_ic irony!

While discussing a thread called "Should I study Python" in the Python section of the software development forum in DaniWeb, Ene Uran said:

Python? That is for children. A Klingon Warrior uses only machine code, keyed in on the front panel switches in raw binary.


That's a blazing irony I'd like to read!

Friday, April 23, 2010

Original Lewis Carroll's Alice's Adventures in Wonderland manuscripts rock!

If you're a nerd like me you can't but love Alice's Adventures in Wonderland and Through the Looking-Glass for what that matters.
Maybe you worshipped the books, enjoyed some old films, gone mad with American McGee's Alice and despised the latest Disney movie. All of this don't stand a change with the original manuscript currently conserved in the collection of the British Library.
Thanks to the wonders of technology and the good deeds of the Library you can find the virtual copy of the book here. From the cover you can immerse into the manuscript and its awesome genuine illustrations. You can enlarge the single pages and even listen to the audio version of the text.
Imagine reading Carroll's masterwork for the first time with your tablet device (no I won't say the name of Sauron :D). What an experience could be to read directly the Author's handwriting and enjoy his own illustrations!


The version currently presented by the British Library doesn't use any fancy java or flash based tricks so your computer won't risk to take off because of the fans rotation. Linux user will be also able to enjoy the book without messing with any driver. Kudos to the British Library for this clean implementation.

All the images are Copyright © The British Library Board

Tuesday, April 20, 2010

Protect your privacy online: Setup of VPN Ipredator service in Ubuntu

These days our privacy online is compromised at best. Every possible piece of information concerning our behavior on the web is collected by the various services we use like Google related services, Facebook, Twitter and so on. These are the information we gladly give to these and other web companies. Other than those there are many more information about ourselves that we're barely or even not aware of giving to third parties of various nature. The most obscure and alarming problem is to be aware of which data government agencies and the various police branches are collecting, how they're doing this and what they plan to do with the collected information. Some say that if you're not doing anything wrong then you have nothing to worry about. However this concept is illocical other than a moral aberration. Is it not a human denigration to live under the constant and pervasive vigilance of an obscure entity? Again, who knows what the collectors are doing, or will do, with the collected data? To whom will they hand the data over? To quote Alan Moore "Who watch the watchmen?".
The concept of privacy itself is a nonsense online. However there are certain "rules" or choices, some more general some others more technical, that if followed can ensure if not a complete privacy protection at least an higher degree of safety online. One of this rule could be chosing a Linux distribution as operating system in order to achieve the best protection (read virtual immunity) against malware. One could also choice open source software against proprietary as the first is generally safer because the code is under the constant vigilance of the community. And so on...
One more technical rule which is the object of this post is connecting to the internet via a VPN server. Wikipedia defines the VPN as A virtual private network (VPN) is a computer network that is layered on top of an underlying computer network. The private nature of a VPN means that the data travelling over the VPN is not generally visible to, or is encapsulated from, the underlying network traffic. Similarly, the traffic within the VPN appears to the underlying network as just another traffic stream to be passed. A VPN connection can be envisioned as a "pipe within a pipe", with the outer pipe being the underlying network connection.


Recently I decided to give a try to Ipredator, the Sweden based VPN service created by the guys behind the famous tracker indexing site The Pirate Bay. So far I'm quite satisfied by the service. The speed is quite good for my usage. It collapsed just three or four times so far. The only drawback is that if you're an American user Ipredator will prevent you to watch videos on sites like Hulu because you'll basically surf with a swedish IP number.

Anyway, the VPN website doesn't offer any instruction to connect your Linux operating system to their server but I assure you it works and the procedure to setup the connection is very simple.
First of all you need to obtain a username and a password by buying the 3 months term of service for the price of 5€/month.
Now the technical part. Note that I've done this in Ubuntu 9.10. I suppose the instructions are valid with minor modifications for a lot of distros.

Step 1:
First right click on the Applet NetworkManager and choose "modify connections". Then select the VPN tab and click Add.
Choose Point-to-Point Tunneling Protocol (PPTP)

Note: if you can't select the VPN tab or you have some other issue here you need to install the PPTP plugin for the network manager.
Open a terminal and type sudo apt-get update
Now type sudo apt-get install network-manager-pptp


Step 2:
fill in the gateway, your Ipredator username and password as you see in the picture below

Step 3:
Now click Advanced and select the options shown in the picture below. Mostly it's use Point-to-Point encryption (MPPE) and 128-bit security.

Step 4:
Now you're basically set up. To connect to the VPN server just click without releasing on the connection manager icon (top right in Ubuntu) and when the menu appears just choose VPN Conncetions and then Ipredator (provided that you named it like that during the setup). If all goes well a lock icon should appear on top of the connection icon. 

Step 5:
Now that the connection is established you can check that you're really running with a Swedish IP address. You can either note that the commercials in Facebook turned in Swedish or you can cheek the IP on an IP locator site like ip-address.com

Surf smart and safe folks.




Monday, April 19, 2010

B-Movie Cast 99 is out! - Shock Waves 1976

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!



Here's the synopsys of the show:

Beneath The Living, Beyond The Dead, From The Depths of Hell’s Ocean!
What’s the link between Monk, Flipper and Underwater Nazi Zombies you ask?
Well you’ll find out on today’s show as Nic and I will be taking a trip to Florida to talk about the film “Shock Waves” from 1976 starring Peter Cushing, Brooke Adams, Luke Halpin and John Carradine.

Sunday, April 18, 2010

The Treat of the Week #014

A funny way to tell the user that the page can't be found.

Tuesday, April 13, 2010

Miami Medical

I watched the first episodes of Miami Medical, the brand new CBS television series which premiered on April 2, 2010.
I’m not really a fan of medical dramas ‘cause I don’t like to see people get hurt, at least not in a context that resembles what can happen to you anytime. However I do love House MD and so I gave this one a change, much for the sake of the commentary.
I must admit though that even if I had a look only to a few episodes Miami Medical is quite fun to watch.
At a certain point one doctor tells a patient something like this: “among the doctors, trauma doctors are the rockstars. And among trauma doctors, the alpha team are the Rolling Stones”. This cheered the patient up a bit about the chance of his pregnant wife and soon to be delivered baby to get saved. This sounds somehow to me also like the motto of the series.
Miami Medical is fast, glossy and fresh. Watching the episode was like a ride on a roller coaster until the final chill out scene. The character are gorgeous as the photography is with vivid and warm colors and a cool usage of light.
And last it seems that, unlike for what is with House MD, the setting of Miami Medical plays a bit of a role by giving the series the particular appeal linked to the seaside city and environment.
See here below the promo of the series.

The Linux Game Box #6: ASCIIPORTAL

This week we're gonna talking about a game that is totally and unmistakable AWESOME. Asciiportal is a portal game developed by Joe Larson and inspired by Portile, Super Serif Bros and Portal by Valve. 

Title: ASCIIPORTAL
Genre: Puzzle (portal game)
License: MIT
Website: http://cymonsgames.com/asciiportal/


Installation requirements --> 9

There's no need for installation. You just download the Linux version and double click the bin. That's very straightforward and a always nice when you see something so simple with a Linux game.


Gameplay fun --> 10

Asciiportal is a portal game and that mean that's all fun. You're basically stuck in rooms and must evade by casting portals and walking through them to proceed on your way. Portals are like space wormholes but limited in range by the two way-points that the player places in two location of the map. Once placed, the two portals creates a tunnel as if the reality itself is bent, and the player can travel through it. There are several elements like barriers, spikes, ladders and so on that force you to be cunning in order to clear the levels.


Graphical appeal --> 7

As the name suggests, Asciiportal is completely text based thus every graphical element is in ascii. But don't fool yourself, this doesn't mean asciiportal isn't graphically cute, on the contrary the graphics made the game look stilish and enforce the sensation of being trapped inside some computer guts.

Sound delight --> 9

I'm so glad that this time I can say without a doubt that the sound snd music of the game are great. Music is composed by Steve Fenton. I've played a dozen of levels and I've listen only to two tracks: one for the menu and one for the levels. The music does really a great job in making this game even more enjoyable. The track for the levels is especially nice and creates a sci-fi atmosphere. By the way it reminds me a lot of the kind of music used in the game X2 The Threat. The sound is also noticeable, especially the voice effect that accompanies the instructions / advises of the guiding computer at the beginning of every level.

Story enchantment --> 3

As far as I've understood the story has no practical use in asciiportal. Maybe it is revealed further into the game but as far as I played there was scarce glimpse of it. It seem that whoever your character is, you must escape and to do so there's only one way: reach the exit of each level figuring the way out, overcome all sorts of hazards and of course use portals.

Bonus point --> 8

The game is totally open source and this means you're not just permitted but also encouraged to take a peek of the code and exploit it. Joe personally wrote me that "ASCIIpOrtal is released MIT open source. It's the closest to a "do whatever you want" license i could find. I'm of the opinion that the world is a better place when everybody shares. ;)".
If you're willing to hack but you're not capable or not comfortable with messing with the code, then there's a map editor, provided by Mads Lund, you can download here and use to create your own level. The editor is a MS Windows .exe but it works flawlessly (or so it seems to me) under wine.

OVERALL SCORE --> 9.4

Maybe my opinion is biased by the fact that I'm a total nerd but asciiportal and its creators are way cool.
Just try this game and drop me a line about what you think.
Below you can see asciiportal in action.

Monday, April 12, 2010

B-Movie Cast 98 is out! - The Psychotronic Man 1980

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!

Sunday, April 11, 2010

Which OS runs on Olivia's laptop (from Fringe 1x09)

I'm not sure enough to say for sure what's running on agent Olivia Dunham's laptop as seen during season 1 episode 09?

I've my own idea but as said I'm not really sure. What's your guess?

The Treat of the Week #15

Love when the woman begins to laugh.. :D

Thursday, April 8, 2010

D&D and Psychology

I caught a post on Gaming Brouhaha that linked to a very interesting article by Nancy Darling on Psychology Today that reports the psychologist experience with her kids approaching at Dungeons & Dragons.
The original Dungeons & Dragons set
The article is especially interesting for us geeks because it shows the educated point of view of an attentive parent who wasn't confident with the game and, by consequence, not completely at her ease, at the beginning, with her kids playing at it.
Nancy tells mostly of the interleaving relationships of the members of the group with themselves, the dungeon master and the game.
The picture that comes by once you reach the end of the piece is something that validates somehow what I -as a person proud of his twenty something years of gaming-  always suspected. As the author observation suggests, Role Playing Games stimulate cognitive skills, especially concerning the manipulation of abstract ideas. More of that RPGs fit into the kids development because they give them the chance to experience discussing and arguing on abstract ideas (i.e. which door to open in a dungeon, who must speak to the village mayor and take the protection ring, and so on).
Today I'm in my thirties and I continue playing at D&D -even if not so often as I would- and I can't wait the day when my kid will be old enough that I can give him his first D&D player's manual.

Tuesday, April 6, 2010

The Wicker Man: of pagans and lust

Last night I was up to watch a movie I wanted to check since long.
The Wicker Man is a 1973 British movie based on David Pinner's 1967 novel The Ritual.

The story begins with a deeply Christian police officer that is driven to investigate in the disapperance of 12 years old Rowan Morrison on the fictional island of Summerisle off the cost of Scotland.
Soon after his arrival and having met some peculiar characters like Mrs. Morrison who seem uninterested by the daughter disapperance, and the arrogant landlord and his uninhibited daughter Willow, the officer begins to suspect that there's something strange about the island and its people.
As the investigation proceed the detective gets totally aware that the Summerisle people worship pagan deities. Itìs the ruler of the island, Lord Summerisle, that gives word to his suspects by declaring that the island has abandoned God since long. The stiff bigot sergeant is in complete shock but determined to put a stop to the unholy paganism and solve the case of the disappeared child. 
However from this point on the events begin to turn grim and the officer inexorably falls into the spider web that will lead him to find the missing girl and meet the Wicker Man.

The Wicker Man shows great images of a frigid forgotten land and a very impressive music. The scene with Willow dancing and singing naked in an attempt to corrupt the God fearing policeman, is just unforgettable.

IMDB and Rotten Tomatoes classify this movie under horror even if The Wicker Man doesn't show any of the typical situations of horror movies. Yet the film is disturbing and chilling in a way that is difficoult to explain. Summerisle seems a paradise with all its treehuggers and lustful babes but this paradise its currupt by madness and a naive cruelty.

Did I mention that this film is great? No? Well, it is.

If you are looking for more in depth information about the movie then check the wikipedia article here.

Here below the theatrical trailer of the movie.

Monday, April 5, 2010

B-Movie cast 97 is out! - Outer Limits Part 2

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!


Saturday, April 3, 2010

Google Maps Street View in 3D

Today I spot something really cool on Google Maps and good of that I had the blu and red googles somewhere on the desk.  On April 1 2010 Google gave us another milestone improvement of their map service. Many thought it was  an April joke but the implementation was far to profound to be just that. Right now if you surf the street of any city with the Street View enabled you'll see the the yellow guy with a pair of blue and red googles resting up on his forehead. You click on the dude, he'll wear the googles and then the images will go stereoscopic. You can now wear your own googles and, with a little of practice, travel the streets of your favourite destination in 3D!
Just try it yourself!




Thursday, April 1, 2010

The force of Open Source: Hand written translation of Ubuntu manual into Tamil

I recently read that guys from KanchiLug, a LUG from the Indian city of Kanchipuram, just finished to translate the Ubuntu documentation into their native Tamil language.

They've been evangelizing about the operating system through colleges since long, but they realized that it was a hard job for Tamil people to familiarize with the system through the English guides.
When they heard of the Ubuntu handbook produced by the Ubuntu-Manual Project, they team up themselves to translate it in Tamil.
And so they got the work done!



I think this is another of the countless story that shows the force of the open source community which is capable to spur the best from people to convey it into projects that, for several aspects attain excellence.

You can download the Tamil-English Ubuntu manual here.

Pictures of the translation event can be found here.

Tuesday, March 30, 2010

The Photo of the Week #001 - Biggest manhunt in Arizona's history

During my wanders through Flickr pages I stumbled upon this picture from freeparking collection. This wanted poster comes from boxes of family photos that the user inherited and which are really interesting especially those depicting scenes from the far west.
The poster shows the reward due for the capture of the men involved in the "Powers Affair", the biggest manhunt in Arizona's history.



An account from wikipedia says:

"In 1909 Jeff Powers and his family homesteaded in Rattlesnake Canyon and began mining nearby. When two of Powers' sons, Tom and John Powers, failed to report when drafted into World War I, Sheriff Robert F. McBride of Graham County delivered a letter to the Powers' asking them to come in for prosecution, but it was ignored. Several weeks later, on the night of February 9, 1918, Deputy U.S. Marshal Frank Haynes, Sheriff McBride, and Deputy Sheriffs Martin Kempton and T.K. Wooten arrived at the Powers' cabin near the Powers Mine. They carried arrest warrants for Tom and John Powers for draft evasion, and warrants for Jeff Powers and his hired man, Tom Sisson, for an unrelated charge. Just before dawn on February 10, as the Powers camp was preparing breakfast, they heard two of their horses gallop by their dogs began barking. When Jeff Powers stepped outside with his rifle Deputy Sheriff Wooten yelled, "Throw up your hands! Throw up your hands!" A furious gunfight ensued, leaving Sheriff McBride, Deputy Sheriffs Kempton and Wooten, and Jeff Powers dead. Marshal Haynes escaped to nearby Klondyke, Arizona, while the Powers boys and Tom Sisson fled south to Redington on the San Pedro River, leading to the biggest manhunt in Arizona's history. They entered Mexico south of Hachita, New Mexico, where on March 8 they surrendered to a U.S. Army patrol that had picked up their trail and crossed the border in pursuit. At their trial, all three men were convicted of first-degree murder and sentenced to life imprisonment. Sisson died in prison at the age of 86, but the Powers brothers were paroled in 1960, forty-two years after their conviction. They were pardoned by Governor Jack Richard Williams nine years later."


The photo is by freeparking published under this Creative Commons license

Monday, March 29, 2010

B-Movie cast 96 is out! - I Walked with a Zombie (1943)

A new episode of the B-Movie cast is available at http://bmoviecast.com/.
Check the website to listen to the episode and subscribe to the podcast!


Sunday, March 28, 2010

The Treat of the Week #013

When smoking wasn't evil, advertisement from a tobacco friendlier time.


This is the title of a collection of tobacco posters published on Flickr by juffrouwjo.
I just hate cigarettes and I shiver when I think of a dozen years ago or so when you couldn't go to a bar or a restaurant without having your lungs filled of the pestilential smoke of the other patrons.
This flickr set reminds us of those days when wasn't smoke only accepted but also considered the natural companion of the healthy, sexy and moder men and women.

Have a look at the complete set here.





Friday, March 26, 2010

The Linux Game Box #5: Madness


In this installment of "The Linux Game Box" we are going to talk about Madness, a roguelike game that demonstrates how it's still possible to give the player a fun experience only with the scarcest need of technology.

Title: Madness
Genre: Roguelike




License: MIT License


Installation requirements --> 9


There's no need for installation in Madness. Windows users must double click on madness.exe. Linux users just have to open a terminal and run  python madness.py





Gameplay fun --> 8

In madness you control an adventurer that must explore 10 dungeon levels and defeat the evil dungeon master. Each level is dark and packed with monsters and objects like armor, weapons and potions. Like in a skeletal rpg your character will level up and get stronger. Unlike many games, the most precious resource in Madness is sanity. The sanity level will constantly fall no matter what the player does. When it reaches the level or forty or so a message will inform you that the colors around your character are getting more vivid. Then imaginary monsters like butterflies and ponies will begin to appear in increasing numbers. As the game help states "not all what you see is real. And not all of what isn't real is harmless...". This is an intriguing mechanism that gives the game a clear touch of fun. 



Graphical appeal --> 7

Graphically the strongest point of Madness is its originality. As it happens with roguelike games, the graphics is all made of ASCII symbols. Walls are made of #, your character's a @ and the monsters take the shape of their initials like the r rats, B bats and colored b butterflies.

Sound delight --> 0

Sound is non existent.

Story enchantment --> 3

The story has no practical use for this kind of game though is almost non existent. You don't know who you are nor why you're stuck in a dungeon and can only descend through levels to fight an unknown and unexplained enemy.

OVERALL SCORE --> 5.4

Madness is a skeletal game that manages, after all, to supply a fun experience. It will not last for long though because the mechanics are to simple and the graphics too scarce to keep a player busy for long. However I suppose this wasn't the intent of the creator. As a matter of fact Madness was made by hmp (humpolec[at]gmail[dot]com) in seven days during the 2010 seven-day roguelike challenge