Wednesday, May 2. 2012
For quite a while the Ubuntu subversion package suffer from bad user certificates that do not follow the standards strictly. In case you have to authenticate with such a certificate subversion will return such an error message:
OPTIONS of '<url>': SSL handshake failed: SSL error: Key usage violation in certificate has been detected. (<url>)
The root of this problem is that the Ubuntu packages link against libneon-gnutls, which handles certificates in a stricter way than libneon. A easy workaround in the past was to simply replace a replace the library link of libneon-gnutls to point to libneon:
sudo mv /usr/lib/libneon-gnutls.so.27 /usr/lib/libneon-gnutls.so.27.old
sudo ln -s /usr/lib/libneon.so.27 /usr/lib/libneon-gnutls.so.27
However once you do this in Ubuntu 12.04 Precise Pangolin you will get a another error message instead:
OPTIONS of <url>': SSL handshake failed: SSL disabled due to library version mismatch (<url>)
Continue reading "Subversion & Certificate Problems with Ubuntu Precise Pangolin"
Thursday, April 12. 2012
Recently I've talked with a friend about the legal notice [de] with added costs against a Facebook user. A third user has posted an image of a rubber duck on that users timeline. However this image violated the copyright of a copyright owner. Yes, you've read correctly: In Germany you can be sued for a photo that someone else has posted on your Facebook timeline.
This triggered the question whether it should be allowed to sue unlicensed usages of only private usage context? Should it be allowed that private users are sued for downloading and posting a picture on their Facebook page?
At first I thought about that like a user and my immediate response was "no", fair, non-profit usages of images should be allowed and not be subject to legal actions.
However recently I got more and more into photography and therefore became also part of the copyright owner side. So I dug deeper into the topic and soon found critical problems around this thinking.
Continue reading "Wanna Share One of My Pictures?"
Friday, November 25. 2011
Yesterday I and a couple of colleagues held a couple of Pecha Kucha sessions. Pecha Kucha is a presentation methodology that limits the presentation to 20 slides where the next slide is displayed after 20 seconds automatically. During the preparation and for the presentation session we felt the lack for a decent timer that counts down from 20 to1 for each slide and gives a clearly visible feedback before the time for the current slide ends.
Continue reading "Pecha Kucha Timer"
Tuesday, November 30. 2010
You won! Be proud of yourselves, you stinkers!
I am not a big fan of blogs that moderate every single comment. This hinders active and timely discussions and can be seen as a kind of censorship. Unfortunately my blog seems to have gained the interest of spammers and since their comments seem to be manual posts, captchas do not help. During the last days I had to delete about 10 spam comments per day, while there were were just about a few comments during the last weeks.
Since the effort to delete SPAM is higher than to accept valid comments and I really do not want to support some obscure sites just because I didn't check my mails for a few hours I decided to turn moderation on.
I promise that I will do me best to confirm any valid comments within a few hours.
At least you get easier to read captchas in return.
Wednesday, October 27. 2010
Dear David Fincher, Director of The Social Network,
yesterday evening I saw your great movie and I must say that I enjoyed it very much.
Besides the very interesting plot I was very happy that you have chosen KDE as Desktop environment for Marks computer (that does not prove that Mark is using KDE in real-life, of course - but as Mark is a smart guy, I would not wonder). At least you haven't followed the rest of Hollywood and gave him an Apple or made him use Windows.
I was very delighted that you did your homework and showed us the magic of wget and perl and no unrealistic Hollywood typical computer voodoo. People that did not know how to fetch a bunch of images from a website really learned something. Thank you very much for that.
But... really... was it necessary to ruin this good impression with the close up of the terminal session, where Mark had typed
> ping localhost PING localhost.localdomain (127.0.0.1) 56(84) bytes of data. 64 bytes from localhost (127.0.0.1): icmp_req=1 ttl=64 time=0.031 ms 64 bytes from localhost (127.0.0.1): icmp_req=2 ttl=64 time=0.041 ms 64 bytes from localhost (127.0.0.1): icmp_req=3 ttl=64 time=0.045 ms 64 bytes from localhost (127.0.0.1): icmp_req=4 ttl=64 time=0.036 ms 64 bytes from localhost (127.0.0.1): icmp_req=5 ttl=64 time=0.047 ms ^C --- localhost.localdomain ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 3996ms rtt min/avg/max/mdev = 0.031/0.040/0.047/0.005 ms
I guess Mark knows that his computer is up and running, while he sits in front of it surfing Facebook.