Different Google Searches

http://www.google.com/help/operators.html

link:

The query [link:”> will list webpages that have links to the specified webpage. For instance, [link:www.google.com”> will list webpages that have links pointing to the Google homepage. Note there can be no space between the “link:” and the web page url.

Quick List
• cache:
• link:
• related:
• info:
• stocks:
• site:
• allintitle:
• intitle:
• allinurl:
• inurl:

How to backup Outlook categories

http://www.slipstick.com/outlook/olcat.htm

Master Category List The master category list is not a separate file, but instead is part of the Windows Registry. Each user has a different category list

To back up the Master Category List in Outlook 97/98:

Run Regedit and go to HKEY_CURRENT_USERSoftwareMicrosoftOffice8.0Outlook and select the Categories key.

Choose Registry | Export Registry File to make a copy of the Categories branch of the registry.
To back up the Master Category List in Outlook 2000:

Run Regedit and go to HKEY_CURRENT_USERSoftwareMicrosoftOffice9.0Outlook and select the Categories key.

Choose Registry | Export Registry File to make a copy of the Categories branch of the registry.
To back up the Master Category List in Outlook 2002:

Run Regedit and go to HKEY_CURRENT_USERSoftwareMicrosoftOffice10.0Outlook and select the Categories key.

Choose Registry | Export Registry File to make a copy of the Categories branch of the registry.
You can use this exported branch to distribute a category list to other Outlook users. See the MSKB article How to Migrate Custom Categories to Other Users. CAUTION: Using a .reg file to propagate a category list does not update a user’s own list; instead it completely replaces it. I personally do not recommend this method, because it eliminates much the utility of the Category feature for users. See the next section for what I think is a better method.

If you remove a category from the master list, any items marked with that category are not affected. In the Categories dialog box, that category is listed as “(not in master list).”

Also see:

OL2000 Custom Categories Are Not Transferred from Outlook 2000 to Outlook 2002
http://support.microsoft.com/?kbid=303937

eLiberation – ePilot

[b”>eLiberation[/b”> is a two-year-old Internet software company that uses its “relational micro-transaction technology” to offer streaming and downloadable file tracking, reporting and revenue allocation. Its Integrated Peer Commerce System (IPCS)provides digital content owners with a method of commercializing the distribution of their digital media within a peer-to-peer environment (“superdistribution”), that includes: high volume micro-payments, royalty tracking and revenue distribution, content distribution control, protection of intellectual property and copyrights, marketing control and back-end reporting. IPCS is made up of three smaller services/mechanisms: a Financial Transaction Management (FTM) tracking and reporting service, a Digital Rights Management (DRM) access control mechanism that allows publishers and artists to manage their own intellectual property rights and Rich Information Files (RIF) that enable new marketing opportunities to be provided at the point of sale by allowing value-added sales and marketing information to be included along with the digital content distribution.

eLiberation’s first commercial implementation of its Financial Transaction Management model is ePilot.com, a cost-per-click search engine that pays its members to search for information using the company’s patent-pending ePilot application. The ePilot site performs over 3 million micro-transcactions every day. eLiberation has also partnered with Groove Networks to provide a branded version of its FTM software to Groove’s File Sharing users.

http://www.epilot.com/

PinPost.com – The Peer-to-Peer Instant Classifieds Network

Avalist Unveils PinPostâ„¢ – The Peer-to-Peer Instant Classifieds Network

Vancouver, BC – August 15, 2001 – Avalist Networks Inc., a peer-to-peer software development company, is proud to announce the direct market release of its end-user product, PinPostâ„¢ – the P2P Instant Classifieds Network (http://www.PinPost.com). In Beta release since May 2001, PinPostâ„¢ is a full-featured and free downloadable application for localized buying and selling through classified ad-style listings.

PinPostâ„¢, a Microsoft Windowsâ„¢ compatible application, is the first product of its kind, combining peer-to-peer technology with a Linux-based database infrastructure to create a powerful buy and sell network. It is a community-oriented tool serving 60,000 individually selectable localities in North America, enabling buyers and sellers to target their own cities and neighborhoods.

PinPostâ„¢ allows users to instantaneously share listings information through a network of peer computers. Based on locality, classification and keywords they can seamlessly search and browse through a massive collection of listings, conveniently organized within 4,000 product and service categories and posted by 90,000 buyers and sellers.Continue reading

backflip.com or bookmarksync.com to get bloggered by google?

Internal profiling of bookmarks – more valuable company
http://www.backflip.com/
http://www.backflip.com/help/ch_export_pages.html – at last

The others to serious consider more:

No profiling of your bookmarks – better product by specification
http://www.bookmarksync.com/

http://www.realmarker.com
http://www.bookmark-pals.co.uk/
http://www.syncit.com/
http://www.mybookmarks.com/
http://www.hotlinks.com/
http://www.blinkpro.com/
http://www.ranks.com/home/organize/top_online_organizers/#362
http://www.linkagogo.com/ – AnnotateContinue reading

“oo bacon” – XML/RSS news feeds converted to newsgroup :-)

[b”>XML to Usenet News conversion[/b”>
Stop downloading those news aggregators! You no longer need to stay connected and chew on the web all day. Chances are you’ve had the perfect news reader installed all along. From now on, you can read any XML newsfeed from the comfort of a Usenet news reader such as MS Outlook Express. News will pop up in your inbox automatically, instantly.

http://www.genecast.com/

http://dmoz.org/../Metadata/RDF/Applications/RSS/

http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&q=XML+RSS+applications+

Linux servers to host Microsoft Office applications :-)

silicon.com-Tue 25 February 2003 04:07PM GMT

New software from CodeWeavers will allow Linux servers to host Microsoft Office applications, which can then be accessed through a web browser, the company said on Monday.

CodeWeavers, which sells Windows-emulation software for the Linux platform, has launched a server version of its CrossOver Office that runs with Tarantella’s Enterprise 3 server software.

The combination allows administrators to set up a Linux server running applications such as Word and Outlook, which can be made accessible to large numbers of Linux or Unix users without needing any special client software.

Microsoft applications are not directly available on Linux because the operating system is a direct competitor to Windows. However, developers such as CodeWeavers have found ways of getting around this blockade in order to make desktop Linux installations more attractive to businesses.

http://www.codeweavers.com/

IBM: Storage Tank–fleetingly code-named Golden Retriever

[b”>IBM plans open-source storage strategy[/b”>
By Stephen Shankland
CNET News.com
December 20, 2002, 3:58 PM PT

SAN JOSE, Calif.–To encourage the broadest possible support for its forthcoming “Storage Tank” technology, IBM will release an open-source version of the software needed to let servers tap into the next-generation storage system.

Big Blue is working with an undisclosed open-source group on the software and will release the code when the product is generally available in 2003, said David Pease, manager of storage software at IBM’s Almaden Research Center and leader of the 5-year-old Storage Tank project. In addition, IBM plans to publish the communication method fundamental to the next-generation storage project.

The collaborative approach is the most recent example of IBM trying to capitalize on the momentum of the open-source movement. The company also backs the Linux operating system, the Globus Toolkit for supercomputing networks, and several other projects of the collaborative programming movement.

IBM has tapped into the open-source community as a way to speed the development and adoption of technologies it favors and to give itself more cachet with in-the-know programmers. The company devotes many of its own resources to open-source projects, most notably its Linux Technology Center.

Storage Tank–fleetingly code-named Golden Retriever–is a technology designed to get more use out of existing storage systems and make them easier to manage. With Storage Tank, existing systems can be linked, so vaster amounts of data can be stored.

The technology works by using a different way of keeping track of descriptive information–“metadata” such as physical locations, file sizes or access permissions–that accompanies the actual content within the files. Where most storage systems include this metadata in the storage system itself, Storage Tank spreads the information across a group of metadata servers, lower-end dual-processor Intel servers running Linux.

The approach permits several advantages. For one thing, it can keep track of a lot of files. IBM’s goal is for the system to control as many as a billion files, said Jai Menon, an IBM fellow and storage research manager at Big Blue’s Almaden Research Center.

In addition, files of a certain type can be automatically moved to a particular storage “pool.” For example, video and audio streaming files can be physically stored automatically on a particular storage device suited to that task, while infrequently used text files can be stored on a device with lower performance.

The use of the pools in conjunction with preset policies will let administrators automate tasks such as data backup, Menon said.

The system also means the same files can be accessed directly by different operating systems. Currently, because most operating systems have their own ways of storing files, that’s difficult to do without using file system software from a company such as Veritas Software.

But for servers with multiple operating systems to tap into Storage Tank, a piece of software called an agent must be running to communicate with the metadata server. IBM plans to release a sample agent program as open-source software, Pease said.

Releasing the example software will permit others to write agents to tap into Storage Tank, Pease said. In addition, IBM will describe the protocols the agents use to communicate with the metadata servers, allowing others to build their own metadata servers if they wish, he said.

IBM hopes its strategy will make Storage Tank widely used. “Our goal for Storage Tank is nothing short of world domination,” Pease said, only partly joking.

IBM’s Almaden labs are working on several technologies besides Storage Tank, showing off several products in a recent media tour of the facility.

IBM expects only about 60 percent to 65 percent of its research lab projects to reach the product stage, Menon said. “We don’t want to be more successful, because if we’re not being crazy enough, we’re not being challenged enough,” he said.

IBM has several other projects stewing at the lab:

• A project code-named SledRunner is designed to give priority access to the programs that need a fast response time from hard drive arrays. Often low-priority jobs take up a storage system’s time when those jobs could be postponed a few fractions of a second. The SledRunner name stems from the acronym SLE (service level enforcement).

• IBM is taking a crack at a technology that it acknowledges has flopped in the past–arranging blocks of data on a hard drive in the order it will be needed, which minimizes the time the hard drive has to spend moving mechanical components to grab the next tidbit of information. This project, called Automatic Locality Improving Storage (ALIS), relies on arranging data after monitoring the order in which it’s actually used as a computing process runs.

• For a future version of Storage Tank, IBM plans a front-end “gateway” so that remote computers can tap into a tank over a network. It’s similar in concept to EMC’s Celerra product or Network Appliance’s products in a deal with Hitachi Data Systems.

• IBM is working on a “semantic file system,” software to make it easier to find a specific file. Current file systems store files in an ever-more-complex cascade of directories, but a better method than indexed contents of files, for example, could help people find what they need faster–“a sort of Google for enterprise file systems,” Menon said.

• “Differential remote copy” is a technology to speed up the process of copying data on one storage system to a distant site with the identical data that protects against disasters such as earthquakes. The technique sends only the data that has changed since the last update, Menon said.

http://zdnet.com.com/2100-1104-978641.html

[b”>Distributed metadata searching system and method[/b”>
Patent Number: 6,434,548

Abstract:
A system and method of distributed metadata searching is disclosed. The present invention permits an extension of the searching and retrieval functions of existing Internet web search engines by utilizing computational resources embodied in user computer systems and search browsers. By distributing the searching and scanning functions to the user level, the present invention reduces the computational and communications burden on Internet web search engines and crawlers, resulting in lower computational resource utilization by Internet search engine providers. Given the exponential growth rate currently being experienced in the Internet community, the present invention provides one of the few methods by which complete searches of this vast distributed database may be performed. The present invention permits embodiments incorporating a Search Manger (1001) further comprising a Service Results Manager (1013), User Profile Database (1012), Service Manager(1013), and Service Database (1014); a Light Weight Application SCANNER (1002); and a Search Engine (1008). These components may be augmented in some preferred embodiments via the use of a Search Browser (1003), Internet Communications (1004); Web Site(s) (1005), Web Crawler(s) (1006), and a Repository Database (1007).

More Info

http://www.webmasterworld.com/forum34/367.htm

IBM Storage Tank
http://www.almaden.ibm.com/…/storage_tank/

NAS over Storage Tank
http://www.almaden.ibm.com/…/index.shtml

Distributed Storage Tank
http://www.almaden.ibm.com/…/index.shtml

p2p surfing

http://www.openp2p.com/pub/q/p2p_category
http://www.business2.com/webfile/0,1638,8782,00.html
http://www.bsoftware.com/directory.html
http://www.human-links.com/
http://open-content.net/

Grub provides a free for download, free to run, distributed crawling client, which is used to create an infrastructure (database + volunteers) that will eventually provide URL update status information for nearly every web page on the Internet. Grub’s distributed crawler network will enable websites, content providers, and individuals to notify others that changes have occurred in their content, all in real time.
http://grub.org/

What’s black and white and no longer red all over?

Why You Might Soon Feel More Secure about Insecure Software

BY SCOTT BERINATO
http://www.idg.net/go.cgi?id=775870

Application security—until now an oxymoron of the highest order, like “jumbo shrimp”—is finally changing for the better.

IF SOFTWARE WERE an office building, it would be built by a thousand carpenters, electricians and plumbers. Without architects. Or blueprints. It would look spectacular, but inside, the elevators would fail regularly. Thieves would have unfettered access through open vents at street level. Tenants would need consultants to move in. They would discover that the doors unlock whenever someone brews a pot of coffee. The builders would provide a repair kit and promise that such idiosyncrasies would not exist in the next skyscraper they build (which, by the way, tenants will be forced to move into).

Strangely, the tenants would be OK with all this. They’d tolerate the costs and the oddly comforting rhythm of failure and repair that came to dominate their lives. If someone asked, “Why do we put up with this building?” shoulders would be shrugged, hands tossed and sighs heaved. “That’s just how it is. Basically, buildings suck.”

The absurdity of this is the point, and it’s universal, because the software industry is strangely irrational and antithetical to common sense. It is perhaps the first industry ever in which shoddiness is not anathema—it’s simply expected. In many ways, shoddiness is the goal. “Don’t worry, be crappy,” Guy Kawasaki wrote in 2000 in his book, Rules for Revolutionaries: The Capitalist Manifesto for Creating and Marketing New Products and Services. “Revolutionary means you ship and then test,” he writes. “Lots of things made the first Mac in 1984 a piece of crap—but it was a revolutionary piece of crap.”

The only thing more shocking than the fact that Kawasaki’s iconoclasm passes as wisdom is that executives have spent billions of dollars endorsing it. They’ve invested—and reinvested—in software built to be revolutionary and not necessarily good. And when those products fail, or break, or allow bad guys in, the blame finds its way everywhere except to where it should go: on flawed products and the vendors that create them.

“We’ve developed a culture in which we don’t expect software to work well, where it’s OK for the marketplace to pay to serve as beta testers for software,” says Steve Cross, director and CEO of the Software Engineering Institute (SEI) at Carnegie Mellon University. “We just don’t apply the same demands that we do from other engineered artifacts. We pay for Windows the same as we would a toaster, and we expect the toaster to work every time. But if Windows crashes, well, that’s just how it is.”

Application security—until now an oxymoron of the highest order, like “jumbo shrimp”—is why we’re starting here, where we usually end. Because it’s finally changing.

A complex set of factors is conspiring to create a cultural shift away from the defeatist tolerance of “that’s just how it is” toward a new era of empowerment. Not only can software get better, it must get better, say executives. They wonder, Why is software so insecure? and then, What are we doing about it?

In fact, there’s good news when it comes to application security, but it’s not the good news you might expect. In fact, application security is changing for the better in a far more fundamental and profound way. Observers invoke the automotive industry’s quality wake-up call in the ’70s. One security expert summed up the quiet revolution with a giddy, “It’s happening. It’s finally happening.”

Even Kawasaki seems to be changing his rules. He says security is a migraine headache that has to be solved. “Don’t tell me how to make my website cooler,” he says. “Tell me how I can make it secure.”

“Don’t worry, be crappy” has evolved into “Don’t be crappy.” Software that doesn’t suck. What a revolutionary concept.

Why Is Software So Insecure?
Software applications lack viable security because, at first, they didn’t need it. “I graduated in computer science and learned nothing about security,” says Chris Wysopal, technical director at security consultancy @Stake. “Program isolation was your security.”

The code-writing trade grew up during an era when only two things mattered: features and deadlines. Get the software to do something, and do it as fast as possible.

Networking changed all that. It allowed someone to hack away at your software from somewhere else, mostly undetected. But it also meant that more people were using computers, so there was more demand for software. That led to more competition. Software vendors coded frantically to outwit competitors with more features sooner. That led to what one software developer called “featureitis.” Inflammation of the features.

Now, features make software do something, but they don’t stop it from unwittingly doing something else at the same time. E-mail attachments, for example, are a feature. But e-mail attachments help spread viruses. That is an unintended consequence—and the more features, the more unintended consequences.

By 1996, the Internet, supporting 16 million hosts, was a joke in terms of security, easily compromised by dedicated attackers. Teenagers were cracking anything they wanted to: NASA, the Pentagon, the Mexican finance ministry. The odd part is, while the world changed, software development did not. It stuck to its features/deadlines culture despite the security problem.

Even today, the software development methodologies most commonly used still cater to deadlines and features, and not security. Software development has been able to maintain its old-school, insecure approach because the technology industry adopted a less-than-ideal fix for the problem: security applications, a multibillion-dollar industry’s worth of new code to layer on top of programs that remain foundationally insecure. But there’s an important subtlety. Security features don’t improve application security. They simply guard insecure code and, once bypassed, can allow access to the entire enterprise.

In other words, the industry has put locks on the doors but not on the loading dock out back. Instead of securing networking protocols, firewalls are thrown up. Instead of building e-mail programs that defeat viruses, antivirus software is slapped on.

When the first major wave of Internet attacks hit in early 2000, security software was the savior, brought in at any expense to mitigate the problem. But attacks kept coming, and more recently, security software has lost much of its original appeal. That—combined with a bad economy, a new focus on national security, pending regulation that focuses on securing information and sheer fatigue from the constant barrage of attacks—spurred many software buyers to think differently about how to fix the security problem.

In addition, a bevy of new research was published that proves there is an ROI for vendors and users in building more secure code. Plus, a new class of software tools was developed to automatically ferret out the most gratuitous software flaws.

Put it all together, and you get—ta da!—change. And not just change, but profound change. In technology, change usually means more features, more innovation, more services and more enhancements. In any event, it’s the vendor defining the change. This time, the buyers are foisting on vendors a better kind of change. They’re forcing vendors to go back and fix the software that was built poorly in the first place. The suddenly efficacious corporate software consumer is holding vendors accountable. He is creating contractual liability and pushing legislation. He is threatening to take his budget elsewhere if the code doesn’t tighten up. And it’s not just empty rhetoric.

Says Scott Charney, chief security strategist at Microsoft, “Suddenly, executives are saying, We’re no longer just generically concerned about security.”

Berinato’s scrutiny of software security continues in “Forcing the Vendors to Get Secure”.

find and grep for text in /*

find . -name * -print | xargs grep “Then fax it to”
or
find . -name ‘*’ -print | xargs grep “development”

List file
find . -name * | xargs grep -l “secure.sal”
or for awkward specials use the single quotes eg:
find . -name * | xargs grep -l ‘$’

Disk space used
du scr /usr/local/home/httpd/vhtdocs | sort -n

Two new sites I’ve just opened accounts with

[b”>sms2email.com[/b”>
Allows you to receive a text message to a number with a keyword in the message and have the contents emailed to you or define you own http POST script – how cool is that?

(The http POST was an undocument feature until I opened the account and was a hell of shock – developer paradise!)
https://www.sms2email.com/

[b”>Half decent UK Virtual Web Hosting[/b”>
Surely – that’s impossible? Value for money, stunning functionality and tech support.
I dunno – but it sure looks cool to me.
Await the QOS report in a few months.
http://www.gradwell.com/