April 2004 Archives

New Camera

| | Comments (0)
One Spot. Click for larger image.I just bought a new digital camera. The Pentax Optio 555. So far I am extremely pleased. I wanted a camera that was small and pocketable like my previous Canon S200, but, unlike the S200, also allowed for full manual control, 5MP of data, 5x optical zoom and stunning super-macro capabilities. Click the thumbnail for an example of what it can do.

Google files for IPO

| | Comments (1)
Is there more to say?

IPO Form, Google Press Release, NYT Article, Slashdot Thread.

Needless to say, the mood around here is electric. Alright... now back to work. :)

Offspring Blogs

| | Comments (1)
No, not the band. I'm talking about kids. Some questions for you:
  1. If your kid had a blog, would you read it?
  2. What if your kid was in their 20's? 30's?
  3. Do your parents read your blog?

Run Linux within Windows

| | Comments (1)
coLinux Logo via MeFi and slashdot: Cooperative Linux, coLinux, is the first working free and open source method for optimally running Linux on Microsoft Windows natively.

Interesting. I used to have my home computers dual-bootable into either Windows or Linux depending on my needs and mood. With coLinux it appears you could run them at the exact same time. This seems to be an extension of the User Mode Linux technology that my hosting company uses to run up to 32 different Linux distributions at the same time on a single machine.

Redesigning The Whitehouse Brief

| | Comments (0)
Greg over at Airbag decided that the recently declassified White House brief, regarding Bin Laden's plans to attack the US, was a usability nightmare and took it upon himself to redesign it.

The result is a multi-coloured, easily scannable, very polished version that any security advisor would be proud to read from on national television.

Declassified Whitehouse Brief -- redesigned!

Subservient Chicken

| | Comments (2)
A scolding from the subservient chicken. I'm always behind the curve when it comes to the latest trendy memes, and I'm sure this is no exception, but I had to post it anyway.

Feast your eyes on the Subservient Chicken. Apparently a clever marketing ploy by Burger King, you are presented with a man in a chicken suit who awaits your typed commands and then acts them out ("Have your chicken your way!"). It feels real for about a minute or so until our reptilian brain starts noticing scenes that don't just look identical, they are identical.

BoingBoing has information about someone who has reverse-engineered the available commands and 'unlocked' the previously censored actions. I tried a few out though and as far as I can tell, Burger King has 'patched' the flash file so that you just always get a scolding finger-wag.

Gmail Screenshots

| | Comments (1)
I thought I would jump on the Gmail screenshot bandwagon and post a few of my own. Click each image for a larger version.

Seamless built-in spell checker...

Gmail built-in spell checker

Integrated auto-completion of address book entries...

Gmail address book auto-completion

Step 1 of creating an email filter...

Gmail email filter step 1

Freedom Downtime

| | Comments (1)
Kevin Mitnick in custody Freedom Downtime is a documentary from 2001 by Emmanuel Goldstein (of 2600 fame) about the mistreatment of Kevin Mitnick by the US legal system. If you don't know who Kevin Mitnick is (and are willing to admit it), he is arguably the most famous computer hacker of all time. Described as a master of the telecommunications system and expert in social engineering, the government held him without bail for almost five years in maximum security prisons with questionable claims of his exploits causing over $80 million in damages.

The documentary itself is nothing earth-shattering. Lots of shaky shots of the road through the front window of their rented car as they drive all over the US while a narrator explains the next piece of the story. Unlike Michael Moore, Emmanuel never actually gets past the lobby of any corporate buildings to ask the tough questions. I suggest he bring a large fake cheque next time.

The documentary concentrates more on the injustice of how Kevin is treated rather than trying to explain any specific action. In fact the movie doesn't really tell you anything about what Kevin may or may not have done. At one point, a girl they are interviewing asks "And why is he in jail? Oh.. right.. 'hacking'." She looks as confused as I felt, and maybe that was the point.

John Markoff, a reported for the New York Times, capitalized a fair bit on Kevin Mitnick with some low-fact, high-speculation front page stories, as well as a book that was then made into a movie. The documentary has an interview with Markoff that, in my opinion, makes him look pretty foolish, but the interview segment is composed of about 20 short clips making you wonder what we're not seeing. He comes across as really knowing very little about Mitnick and the damage he is causing with his NYT clout. At the time of the documentary, he had written numerous articles, a book detailing Mitnick's capture, been involved in the movie based on the book, and yet had never actually met Kevin Mitnick.

You can buy the movie from the 2600 Store for $20, but it is also (legally?) available for download through this torrent or this torrent. Definitely worth a viewing.

spamotomy

| | Comments (0)
If you are looking for spam-related information, tools or news, check out Spamotomy an excellent resource for all things spammy.

They have an nice spam-tools search engine with full product details and reviews which I used to find SpamAssasin for installation on my server. Their main page is a weblog of recent spam-related news and information such as relevant court rulings and current proposals for combating spam.

Review: clevercactus share

| | Comments (1)
The people at clevercactus have been busy the last few months and have just recently let the public get a peek at what they have been working on. A beta version of clevercactus share (ccshare) has been announced on their website with an enticing login box and a single screenshot-filled teaser page -- but no way to register. During the initial testing period, access to use the application is by invitation only.

I'm good friends with a founder of clevercactus and so was able to acquire a coveted invitation. I've since played around with it a bit and thought I'd share my initial findings. The following comments were based on version 1.0 beta 9 of clevercactus share.

ccshare is essentially a P2P file sharing application where you only share with your Instant Messaging (IM) buddies rather than the whole Internet. You have control over which files are visible and which friends can see and download each file. It has a web-component where you login to clevercactus.com to add and remove people from your contact list, and a desktop-component where the actual sharing, downloading and uploading takes place.

Before ccshare, if you had a large selection of files that you wanted to make accessible to a person or group of people, it involved running an FTP server on your local computer, a daunting task for most people, or transferring all of your files to a website with an FTP client or (horrors) one at a time through a web-upload interface. Email is another alternative, but ISPs often puts limits on the size and number of attachments one can send and receive. Also, email forces the recipients to accept whatever is sent to them. They cannot choose which files to download or when they want to download them. Yet another alternative is Instant Messaging clients like MSN Messenger and Yahoo Messenger. IM seems to be the most approachable solution so far but still requires synchronized interaction from both parties for each file transferred and from my experience has a clunky interface and is prone to problems with aborted downloads when transferring large files.

ccshare attempts to combine the easy setup of an IM client with the powerful file sharing of an FTP server and have it all work over a P2P network of friends that you control.

When I first received my invite, I clicked the link, created my account and then got dropped on the main ccshare web page. I'll admit I didn't read much of the intro text and so was somewhat confused as to what I was expected to do next.

'clevercactus share web' main page
share web main page

I scanned the navigation on the left a few times looking for a download button without success before realizing I needed to click the 'launch' link under the 'share desktop' heading. I'm now aware that the web-component of ccshare is called 'share web', and the downloaded component is called 'share desktop', but I overlooked this distinction since these both read like actions rather than proper names. It is possible my own expectations and knowledge around file transfers, sharing, P2P and web applications prevented me from immediately understanding ccshare's novel naming, but I have a hunch that others will be confused by this as well.

After clicking the 'launch' link, I am taken to a page describing what to expect during the launch process. Displayed prominently at the top is a 'Get Java' button apparently informing me that my installed version of Java is not recent enough. I click through to the Java website, find the appropriate link, jump through some installation hoops, thankfully do *not* have to restart either my browser or my computer, and then return to share web. A screen refresh now presents a 'Launch clevercactus share desktop' button in place of the 'Get Java' button. I click it.

clevercactus makes use of Java Web Start, of which, I'll admit, I don't fully understand the implications. It seems to auto-update itself and download new components as it sees fit. Upon first launch it proceeds to automatically download a handful of files then prompt me with a dialog box requesting unrestricted access to my local machine and network. On the initial launch page it had prepared me for such a scary dialog box with a screenshot and so I was ready for it and let it proceed.

share desktop then presented itself and asked for same the email address and password I used to login to the website. A small hangup presented itself on first run when the email/password dialog box popped up along with a Java Web Start 'Desktop Integration' request dialog box. They fought for control and Java Web Start won visual rights, but the login box won interaction rights. A minor quirk. I brought the login box to the foreground, typed in my email and password, and watched it verify my information over the Internet with the clevercactus server. I was apparently good to go and got my first glimpse of the share desktop main screen.

'clevercactus share desktop' main screen
share desktop main screen

If you've used iTunes you will likely be comfortable with the share desktop interface. It uses a very similar view-selection interface using three selection panes and a results pane. In iTunes it is Genre/Artist/Album and in share desktop it is Group/People/Show. It proves to be a fairly effective way of slicing and dicing a larger set of data based on a few different parameters.

Although already ranted on at length in this review by Russell Beattie, I want to comment briefly on Swing and its usage to construct the share desktop interface. Based on a my own limited Swing-programming experiences, I am definitely impressed with what clevercactus has managed to tease out of the API. That being said, I can't help notice that the UI still has a distinctive Swing clunky feel: slow refreshes that flash dark gray rectangles, minor alignment issues that remind me of LayoutManager-hell. I don't want to dwell on this, but Swing definitely holds an interface back from blending seamlessly into the rest of the operating system.

Swing-induced gray box delayed refresh after a context menu was closed.
example of delayed refresh showing a gray box

Configuring clevercactus share to share a folder with a contact is done by selecting 'People & Files' from the list on the left, then selecting 'All Groups', then right-clicking on the name of the person you want to share with and selecting 'Share folder with contact'. A standard file selection dialog is opened, you select the folder to share, click 'OK' and you're done. This will share all files and folders contained within that folder with that contact. If you want to share at the granularity of individual files it works a little differently. Instead of choosing a folder you select the desired files to share, but instead of sharing them, it effectively queues them for sending the next time the contact connects to the share network.

To view folders a contact has made available to you, right-click on the contact and select 'View folders shared by this contact'. You are then presented with a list of the folders and files available for download from that contact. Select the file, click the 'request file' button, and it gets added to the queue of files to be transferred.

The application had done a good job of allowing the creation of per-folder access control lists with a fairly intuitive point and click interface. They held back on many of the more traditional (and obscure) FTP access control features and so avoided the need for a more complex interface.

Likes:
  • The interface is simple and fairly intuitive while still packing in many nice features like: chat, push and pull file sharing, per-folder access control lists, and an event log documenting relevant activity.
  • Nice re-use of the iTunes 3-pane selection UI.
  • Finally a suitable application to fill the long-empty niche of simple asynchronous file transfers between friends.
  • Guilt free sharing of music. Or perhaps I should say risk-free -- unless the RIAA is on your buddy list.
  • Application auto-updates at load time to ensure you have the latest and greatest code.

Dislikes:
  • I think the action-oriented naming of share web and share desktop is confusing and makes their use in a sentence hard to parse.
  • I'm sure there are strong reasons for the separation of share web and share desktop, but I really don't like how I need to change context to a website to add a new contact, then switch back to the desktop app and have it 'synchronize with share web'. Options from a menu that popup a website in a browser is not what I call integration.
  • share web interface doesn't make it obvious enough how to approve pending contact requests or how to launch share desktop. Perhaps integrating it into the main landing page (or even better, into share desktop) as a prominent 'todo' item.
  • Swing-induced-flickering-UI-refreshes. Whether actually the case or not, this just makes the UI seem unfinished and fragile.
  • Irritating that I need to have yet-another-IM-account. I wonder how long until Trillian supports it?
  • Every single time I minimize the window it beeps at me letting me know it is still running in the system tray. A 'Never show me this again' checkbox would be grand.

Feature Requests:
  • Image Thumbnails :: A great use of clevercactus share would be to make your digital photos available to friends and family. Without thumbnails though, the process of randomly downloading images and viewing them becomes tedious and unsatisfying.
  • Music Samples :: It would be awesome if you could quickly listen to a piece of a music file before committing to downloading the whole thing. A music sample interface like Apple's iTunes would be ideal.
  • Per-Contact Stats :: I think it would be very useful in the main 'People & Files' screen if you could get per-contact stats like the number of files shared and the quantity of bytes. Having to right-click to see what they've got will get irritating.
  • System-Tray Stats :: Nice to see current number of uploads / downloads as well as speeds in the system tray icon tooltip.
  • Native File View :: The 'folders shared by this contact' view should closer resemble an actual native folder view.

Conclusion
Although still in beta, the application is already very usable and feature rich. It adequately fills the role of an asynchronous private-network file-sharing tool, and does so in a nice clean interface. Although the current division of share web and share desktop seems arbitrary, such a division does leave the clevercactus team a lot of flexibility to incorporate the online-community features like that of Orkut and Friendster. I definitely see ccshare as a useful addition to my installed applications, and perhaps when it moves out of beta it will be promoted to my startup menu to be loaded at computer bootup time. I look forward to watching clevercactus share mature.

Gmail Registration

| | Comments (243)
Kevin Fox, a fellow Google employee, has posted an interesting comparison of the YahooMail, Hotmail and Gmail registration requirements. With all the recent privacy discussions around Gmail, it is nice to see a positive post such as this fair comparison of the up-front required personal information. He also promises further comments on this subject tomorrow.

VDS/VPS Hosting

| | Comments (3)
Well, the move to my new server is complete. I decided a few weeks ago to migrate my 5 domains, spread over 2 hosting platforms, to a single Virtual Dedicated/Private Server (VDS/VPS) hosted by TekTonic. I realized I had been paying a premium for host management services I could perfectly well do myself and was also getting very frustrated at my lack of control over my accounts.

I opted for TekTonic's $15 (now $20 it seems) entry-level 'Fast Start' plan which gives me full root access to a Linux distribution of my choice with 3GB of space, 64MB of RAM and 50GB of transfer a month. A VDS gives all the benefits of a true dedicated server, but without the up-front costs. If I decide I need more memory, space, CPU or bandwidth, I just tack on a few extra dollars a month and I get it. I only pay for what I need. For instance, TekTonic offers an additional 3GB of storage for $5 extra a month.

While signing up I didn't realize I could have chosen my OS distribution and so ended up with RedHat 9. The OS ate up almost 1GB right off the bat which didn't sit well with my plan to have lots of space for photos. I re-read mt sign-up emails and discovered that I could reset my OS anytime I wanted. I found the page that let me do this, selected Debian 'woody' from a pulldown menu, clicked OK, clicked OK to confirm that I knew this would wipe the previous distribution clean, and then 30 seconds later I had a fully functional Debian Linux server awaiting me with root access. Debian's small installation only took up around 200MB of space leaving me with over 2.5GB free to do with as I wished. I was very happy.

Part of what makes going the VDS route so cheap is that you have to setup everything yourself. For me this was a positive and not a negative. The server came with Apache up and running, but as far as firewalls, SQL servers, pop servers, imap servers, webmail applications, email accounts, etc, I was on my own. I discovered all sorts of great tutorials describing how to setup and secure a Debian install and I diligently followed many of the steps to get where I am now.

I learned about how xinetd works as a super-server and starts up the appropriate service (smtp, pop, imap) as it is needed, thereby freeing resources which would otherwise be tied up in idle daemons.

I learned about Debian's kickass apt-get utility to easily download, unpack and upgrade/install current and new software packages. And of course the apt-cache utility for keyword searching across all available packages and their descriptions. These both make installing new software very manageable and invaluable for keeping installed software up-to-date.

I learned about Apache config, virtual servers, DNS propagation, webmail integration, SQL backups, cron config, ssh config, port scanning, security analysis, mail relay tests etc etc etc. I fully immersed myself and lived to write this weblog entry. I can now participate (if I at felt inclined) in the Slashdot Linux evangelism like a true veteran.

Here is a shortlist of sites I found useful during this process:
  • Web Host Guide - A high-level overview of terminology and available options to expect when you start shopping around for a hosting company. If you have little to no experience with having your website hosted somewhere, you should likely start here.
  • WebHostingTalk - A large group of forums where you can find all sorts of discussions and critiques about all aspects of Web Hosting. An excellent place to search for any companies you are planning to give money to.
  • debian.org - The main site itself and it's copius amount of documentation.
  • HOWTO - Securing Debian - An excellent document describing all the fundamentals of making your Debian install secure. Gives pros and cons on different approaches and lots of suggestions on applications and config files to investigate further. This was my main starting point.
  • Web Access Logs - Config, Rotation and Analysis - A detailed description of different approaches to logging along with sample scripts to help with rotation and analysis.
  • Apache - Virtual Host Setup - If you'll have more than one domain pointing to your server, or you want to easily serve different content by sub-domain, this document provides examples of common Apache setups.
  • Linux Services - A great tutorial to learn about what services are running on your server, what ports they are listening to and how to disable any you don't need.
  • POP3 + stunnel = POP3s - How to setup SSH and stunnel with POP3 for a secure POP3 connection.
  • Jay's Iptables Firewall - A handy wrapper to ease the configuration of a firewall.
  • Sygate online port scan - A site offering to give your site a quick free port scan. See what it looks like from both sides of the scan.
So far the VDS approach is working well for me. It gives me the full control that I was craving in my hosting environment and I save a fair bit in the process. If you have a hosting change in your near future, hopefully the above links and text will be helpful in determining what you need and how to go about setting it up. Have fun!

Naked PhatBot

| | Comments (1)
A denial of service (DOS) attack typically requires a coordinated effort of a large number of Internet hosts to simultaneously flood the host under attack. A sizable number of machines all sending copious amounts of packets to a single machine or network can overload it to the point where it becomes unusable, or perhaps even cause it to crash.

The hosts involved in the attacking are often regular home computers that have been hijacked into doing the attacker's bidding. The computers have somehow become infected with a program that takes commands remotely. Many of these programs login to the Internet Relay Chat (IRC) network and join a predefined IRC chat area. Once logged in, they sit and wait for commands. When their master wants to launch an attack, he connects to IRC, informs all of the connected servant programs what he wants done, and they go do it. Spooky, eh?

The LURHQ Threat Intelligence Group has dissected one of these servant programs named PhatBot and posted information about its feature-set, just how advanced they have become and the list of commands they can respond to.

Here are a few of the more interesting commands:
  • bot.command :: runs a command with system()
  • rsl.reboot :: reboots the computer
  • ddos.synflood :: starts an SYN flood
  • redirect.https :: starts a https proxy
  • harvest.cdkeys :: makes the bot get a list of cdkeys
Remotely starting proxy servers? Harvesting product CD-KEYs? Things have apparently come a long way since back in 1995 when we thought sending disruptive vt100 codes to someone's terminal over 'talk' or IRC was way cool. Too bad such an impressive distributed network of computers is being used for petty mischief rather than something worthwhile.

HOWTO: WUSB11 and Windows XP

| | Comments (0)

HOWTO Successfully Install the Linksys WUSB11 v2.5 Wireless Adapter under Windows XP

Dylan Parker - March 2004 - wusb11 (at) warmbrain (dot) com

Note: These instructions should be followed at your own risk. They have worked well for me but I can't promise you anything. The information was gleaned from various sources including Linksys.com, USENET newsgroups and various mailing lists. You are fully responsible for your own actions. Don't yell at me.

Getting Ready

All operations assume you are logged in with Administrator privileges. If you have made previous failed attempts to install this adapter, you will first need to uninstall the hardware from the operating system and delete the old drivers. See below for how to do this.

Uninstalling the Hardware

If you have previously installed the adapter and are now trying to uninstall it, you need to plug the adapter back in to the USB port so that Windows XP will let you uninstall it.

Right click on 'My Computer' and select 'Manage' and then click on 'Device Manager'. If you see the Linksys Wireless adapter appearing in the 'Network Adapters' section, then right click on the entry and select 'Uninstall'. Then click Ok. After it has uninstalled, unplug the Linksys Wireless Adapter from your USB port.

Deleting Old Drivers

Search all of your local harddrives for a file named LSWLUSB.SYS and LSWLUSBX.sys. The installed versions of this file will reside somewhere under your C:\WINDOWS directory, but if it also exists in other locations then you need to deal with them as well.

Delete all files that you find matching those two names. If you are nervous about deleting them then create a new temporary directory somewhere and place them in there. The important thing is that they aren't sitting somewhere that Windows XP has used them before.

Once you are satisfied you have rid of yourself of the old drivers, move onto getting the new drivers.

Getting the Right Drivers

Depending on the path you take through Linksys' support pages you can end up downloading different sets of drivers claiming to work with Windows XP. Most do not. The ones you want are located here: ftp://ftp.linksys.com/pub/network/wusb11v25.zip

For whatever reason, if you download the .exe version of that file (supposed to have the same files) it has been packed without the needed WinXP files. Go figure.

Unzip the files into a temp directory. Delete everything except the WinXP directory. If you don't see the WinXP directory, then make sure you downloaded the correct zip file. Inside the WinXP directory should be two files: LSWLUSB.INF and LSWLUSBX.SYS.

We deleted all the other files so that there isn't even the chance that Windows will accidentally find any other drivers.

Installing the Hardware and New Drivers

Plug your adapter into the USB port. Windows should detect the adapter, see that it is currently not installed and try to install it. It should also at this point discover that it doesn't have the right drivers and ask you for them.

If Windows XP manages to install the adapter without ever asking you for drivers or locations of drivers then go back to the 'Uninstalling the Hardware' step again and make sure to follow the exact directions in the 'Deleting Old Drivers' section.

When the hardware installation wizard prompts you about drivers, click the 'Search for the best driver in these locations' radio button. De-select the 'Search removable media (floppy, CD-ROM...)' checkbox. Select the 'Include this location in the search:' checkbox and type in the path to that WinXP folder that has the new drivers (eg c:\temp\wusb11\WinXP). Click Next.

If it complains that the drivers are not signed, click 'Continue Anyway'. Click OK until it finishes. The correct adapter and drivers are now installed.

Configuring the Adapter

The adapter needs to be configured manually and not through the Wireless Zero Config service interface. To do this, go to the Start_Menu-> Settings-> Network_Connections and open the Wireless Network Connection associated with your WUSB11 adapter. Click the 'Properties' button. Click the 'Configure' button underneith where it lists your adapter. Click the 'Advanced' tab.

My settings are as follows:

  Authentication Algorithm = Automatic based on WEP setting
  Channel                  = (use same as your wireless hub/router)
  Encryption               = Disabled
  Fragmentation Threshold  = 2432
  Maximum Listen Interval  = 3
  Network Type             = Infrastructure
  Power Save Mode          = Disabled
  Preamble Mode            = Auto
  RTS Threshold            = 2432
  SSID                     = (use same as your wireless hub/router)  
  Transmit Rate            = Fully Auto

Click OK a number of times until all settings are saved. Then Reboot.

Note: I am describing an unencrypted wireless connection above. It is generally not advised to have your home wireless network setup as unencrypted. This typically means that anyone around your house can 'borrow' a connection with their computer without any special information. Also, it means all communication over the wireless network can potentially be eavesdropped on. Bank info, site passwords, corporate authentication etc etc. It is usually useful though to first setup an unencrypted wireless network to convince yourself that all of your equipment works.

Connecting to an Encrypted Network:

We still need to configure the adapter manually, but since the manual approach doesn't allow for the specification of an encryption key we need to poke at a few things through the Wireless Zero Config service interface.

Start by right-clicking on the Wireless Network Connection icon in your system tray in the far right of your taskbar. Select 'View Available Wireless Networks'. Click the 'Advanced' button. Select the encrypted network you are trying to connect to in the 'Available Networks' list. Click the 'Configure' button. Click the 'Data Encryption (WEP enabled)' checkbox. Type the same encryption key used on your wireless hub/router into the 'Network Key' field. Confirm it by typing it again. Click OK a number of times and then configure your adapter manually as described above.

Two settings were different for me:
  Authentication Algorithm = WECA Compliant (maybe 'auto' works?)
  Encryption               = 128 bit (same bit # as router/hub)
Click OK a number of times until all settings are saved. Then Reboot.

Turn off Wireless Zero Config Service after Booting

Each time you boot, you should find your network connection up and working, and then after a few minutes it starts acting flaky and losing contact. This happens because of the Wireless Zero Config service. You need to stop it.

You can't just disable the service though, because it apparently needs to be running to form the initial connection with the wireless hub/router. Once it has connected though, it can be safely stopped.

To stop the Wireless Zero Config service, go to the Start_Menu-> Settings-> Control_Panel-> Administrative_Tools-> Services. Scroll down the list until you find 'Wireless Zero Config'. Right-click it and select 'Stop'. Once off, it will no longer interfere with your live connection. If if your router goes down or gets rebooted, when it comes back up your adapter should reconnect successfully.

It sucks but the service needs to be up for the reboot, then stopped once a connection has been made. An automated startup .BAT script would likely make this seamless, but I haven't played with a setup like that yet. It's possible that it would be run too early before the connection had a chance to fully burn in. Let me know if you find something that works.

Conclusion

Hopefully you are now up and running with a WUSB11 adapter under WinXP that isn't crapping out every 2 minutes.

Although this method has worked for me successfully, it is not without its down points.
  • The Wireless Zero Config service needs to run then stopped after each reboot.
  • Changing wireless networks is a pain in the ass and involves manually configuring the adapter each time. Yuck. Changes involving encrypted networks get even uglier as you need to bounce between the Wireless Zero Config service interface and the manual adapter config. I just don't change it and leave my computer running all the time.
That's all. Good luck with your configuring.

Dylan

About this Archive

This page is an archive of entries from April 2004 listed from newest to oldest.

March 2004 is the previous archive.

May 2004 is the next archive.

Find recent content on the main index or look in the archives to find all content.