Posted on Leave a comment

Test your speed.

On August 9 I asked How fast are you? C|Net brings a new speed test service to our attention. Speedtest.net uses a snazzy graphical interface and records results. Other than making it look like the icon of the person is taking a whiz on the servers, the interface really brings this one home. I question the accuracy as it is the first service to truly rank my connection at the 6.5Mbit/s that it is supposed to be.

C|Net also offers their own meter similar to http://www.testmy.net/ and http://www.bandwidthplace.com/speedtest/.

Posted on 2 Comments

How fast are you?

I enjoy writing about technology at Spy Journal Tech Tips. My lastest piece discusses Internet connection speeds. Reprinted here:

Our children will never appreciate the handshake of a 300 baud modem. The thought of transferring anything at 1200 baud is unthinkable even if we invoke the sacred z-modem. Now-a-days you are more likely to talk about megabits per second (a data rate) instead of baud (a symbol rate).

I find it amazing how our data communications have increased in such a short time. We used to drool over a T-1 connection (1.544Mbit/s). Since only businesses could afford such luxuries, people would plan weekend gaming sessions at their work place or stay late to download and surf in ways that the average home user could only dream possible. Now, your cable connection is likely faster than a T-1. Comcast advertises 6Mbit/s standard with 8Mbit/s for some extra money and is currently testing 16Mbit/s in Richmond, VA. The near future promises even better (28Mbit/s)!

What is your speed? Online testing services such as http://www.testmy.net/ and http://bandwidthplace.com/ can help you see if you are up to snuff. Your internal networking equipment can cause slowdowns so by-pass your router, hubs and other gear by plugging your computer directly into your cable or dsl modem when speed checking. You may need to power cycle the modem after connecting directly. http://broadbandreports.com/ (aka DSL Reports) is a fantastic resource when troubleshooting or investigating network speeds.

Your system software can influence speed. Tools like SG TCP Optimizer can greatly improve your Internet connection by adjusting network settings you may not even know exist.

See also It’s the latency, stupid for more understanding of speed issues. Read about hacking the Linksys router and Linksys Blue Box Router HOWTO.

[Source]

Posted on Leave a comment

Can’t see the code for all the debugging

So I’m pulling my hair out and pulling my hair out trying to figure out why my code isn’t working. In the process I resolve a fairly significant logic flaw (which is a good thing) but still it doesn’t seem to work and nothing is changing in the results when I finally remember that I put maxrows="10" on the <cfoutput> for troubleshooting.

Long and short that means I couldn’t figure out why anything past the 10th record was not updating and the reason was because I told the code not to update anything past the 10th record.

Thank you for joining me for that moment of Geek Zen.

Posted on 1 Comment

Now I am an IT manager!

Sometimes I don’t think. When I setup our home network, I did what most people probably do and set up DHCP which means the router dynamically gives a computer connecting to our network an IP address. This is nice that if someone with a laptop visits or I am working on someone’s computer that all we do is plug it into the network and the machine works on the Internet. Well, for a network of 7 computers that never move, DHCP is a bit of overkill.

Sometimes I like to look at the router logs and see what the kids are looking at on the Internet. Conceptually, their IP addresses could change and I never really know whose traffic I am observing. DHCP simply makes that difficult.

Sometimes I want to yank the Internet from one or more children. With DHCP the easiest thing to do was to walk to the router and pull the cable.

That has all changed! I wised up and set static IP addresses for all the machines. The ending ip number simply corresponds to the year of birth for the primary user of the computer. Now the logs make sense. Now in a couple of seconds I can deny the appropriate computer access to the Internet. Now I’m thinking.

Posted on 2 Comments

Seeking feedback on phones

I have to decide between the following phones. Any input?

  • Nokia 6102i ($29.99 after receiving a $50 visa card ala mail-in rebate 10-12 weeks from now)
  • LG C2000 (free) <—- Chose this one
  • LG CG225 ($9.99 after receiving a $50 visa card ala mail-in rebate 10-12 weeks from now)
  • LG CG300 ($49.99 after receiving a $50 visa card ala mail-in rebate 10-12 weeks from now) also buy one get one free
  • Samsung D407 ($9.99 after receiving a $50 visa card ala mail-in rebate 10-12 weeks from now)
  • Pantech C300 ($69.99)
  • Motorola L2 (free) No camera

I’ve linked each to a nice C|Net review that includes a short video of the phone.

Update: Chose the LG C2000 because for its purpose it is simply a value that could not be beat. The Nokia 6102i was the runner up and had Cingular not screwed me on rebates (to the tune of $200) in the past I might have considered it. After excluding the features of Nokia 6102i that would not be used it pretty much matched the features set of the LG C2000 for $80 more.

Posted on 4 Comments

Subscribe to comments

Have you ever posted a comment somewhere and thought, "I need to come back and see the followup comments" only to never return or return too late in the discussion? Comment subscriptions help you stay abreast of dialogs that interest you.

I have added Tempus Fugit’s Subscribe to Comments plugin for WordPress to Reality Me. Now you can subscribe to comments for specific posts that interest you. Enjoy!

Posted on Leave a comment

That thing programmers do

I’m doing that thing programmers have to do all too often. Today I’m staring at some gibberish and in as brief a time as possible I am absorbing it into my very essense. I can feel my brain swell with the influx of knowledge! Information overload. The synapses cannot fire fast enough and information gets arbitrarily filed in odd places.

Ok. Let’s see. When I was 8 years old after playing Axes (and Allies) I was thinking about searching for my descendants while skipping through the xpath in the woods.

Posted on 4 Comments

Get rid of viruses, spyware, malware and other nasties

One of the things I do that often helps with cash flow is cleaning PCs. That doesn’t mean dusting (although I do that) but means removing viruses, trojans, worms, spyware, malware, popups, and other things that slow down your machine and generally cause you to curse a lot. Busy Mom has found herself in a position to have to clean a machine. It usually takes me 5 hours and I charge $95 but am going to start charging $135 per machine. That is comparable price to BestBuy’s Geek Squad which gives the machine a couple of hours then declares it needing a reformat (which turns their job into a non-labor intensive automated process) removing all your photos, data, banking information, document and other things you probably have not backed up ever and will never see again. I also do not do upsales since that is not my business but I do love your referrals for web applications (web pages, business automation processes, and such).

This was my comment to BusyMom:

More and more of late I have had people ask me to clean their machines. It usually takes me 5 hours to make the machine presentable enough that I feel confident the viruses/malware/spyware and other garbage won’t return in a week.

Here are my trade secrets.
1) Go to http://www.ultimatebootcd.com/ and make a CD from the iso. (I prefer the windows version http://www.ubcd4win.com/ and often use both).
2) Make sure the bios is set to boot from the CD first.
3) Boot to the ultimate boot cd (I’ll assume you chose to use the windows version) and enable networking
4) Run all the virus scanners. When they prompt to update, do so! Not all will work. Skip the rootkit detector.
5) Run Adaware and Spybot.
6) Run EZPCFix, load the hives, delete temporary files, remove downloaded program files, update winsock/winsock2, and very important clear all pending file rename operations.
7) Reboot making sure to remove the UBCD from the cd drive.
8) Within Windows, go to http://housecall.trendmicro.com/ and start a virus scan from your browser.
9) Go to http://safer-networking.org/ and make sure you have the latest SpyBot Search N Destroy. Be wary of anything that is not SpyBot SND, Lavasoft’s Adaware, or Microsoft’s Defender (all 3 do similar things and overlap but one might catch something another missed).
10) Go to http://lavasoft.com/ and make sure you have the latest Adaware. Also get the VX2 cleaner from the addons.
11) Search google for “Microsoft antispy” and get the latest Defender (I hate this thing and often uninstall it when I’m done).
12) Get CWShredder http://www.trendmicro.com/cwshredder/ and run a scan.
13) Get HiJackThis http://www.spywareinfo.com/~merijn/downloads.html When you run it, simply google EVERYTHING that it returns and be certain you understand its purpose before removing something. When in doubt, probably best to leave it and rely on a detection and removal tool.
14) Start->Run->regedit Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and remove any suspicious items. Google and use caution. Do this also for RunOnce, RunOnceEx, RunServices, and RunServicesOnce.
15) Repeat 14 for HKEY_CURRENT_USER
16) Update the virus definitions for whatever virus software you use. Although Norton and McAfee used to be the top dogs, I no longer recommend them because they bog systems down too much with their “good intentions.” I advise people toward Grisoft’s AVG http://www.grisoft.com/ and AVAST http://avast.com/ (free). Run a full, intensive virus scan.
17) Run Windows Update and get all the latest security patches. It amazes me how many people have never run Windows Update or Microsoft Update.

I’m sure I have left some things out. Good luck!

An update was necessary after another user advised BusyMom to remove Adaware and Spybot and to reformat.

Sara’s comment “Oh and Adaware and Spy Bot add lag time as well as blocking certain sites.” is inaccurate.

There are two types of protection. Passive and Active. Active protection is a program that runs in the background all the time. Since it is running, active protection can cause performance issues. This would be akin to a doorman letting people (programs) into a night club. It would be faster if the doorman wasn’t there and just let everyone through but then you get the riff raff. Active protection checks everything as it goes.

Passive protection works only when you tell it to. With active protection you have no doorman at the club and people come and go. Perhaps some riff raff come in and vandalize a bit, steal some information, and when you start to notice the disturbances you run your passive protection. You turn off the music, make everyone stand still, and have the doorman and security sweep the place removing the riff raff.

Adaware and Spybot are passive protection. Adaware Plus (the paid version) has a wonderful piece of active protection called Ad-watch which I run all the time. Ad-watch does some blocking but mostly warns you if something is trying to make an unauthorized change to the registry.

Adaware and Spybot are not blocking applications. They do not block sites. They are scanners that look for and correct problems. They are the most valuable tools in your arsenal against malware. Ad-watch does some popup blocking but it is not a firewall and does not filter sites.

Reformatting to recover a computer is almost NEVER necessary. Sometimes it is easier and it is nice to start fresh but not required. I used to reformat and start a new every 6 months to a year but then again I had regular backups of my data.

Two other topics of consideration are virus protection and firewalls. Using our night club analogy, virus protection can also be active or passive. Software like McAfee, Norton Antivirus, AVG, and Avast are active. They reside in the computer’s memory and run all the time. They are the doormen that stick a tongue depresser into everyone’s mouth as they enter the club and make sure no sickness gets in. The online scanners at Trendmicro (http://housecall.trendmicro.com/) and Symantec (http://sarc.com/) and other are passive. They scan when you tell them to and it would be the equivalent of calling in the doctors after you notice your guests falling ill. I few Norton and McAfee as doctors that have gotten carried away and give everyone an anal exam even if they just came in for a splinter. Norton and McAfee both come with large staffs that consume a lot resources (ie. their Security Centers)

A firewall is like a guest list. That’s the big ugly bouncer who turns people away at the door. When a person tries to enter the club that isn’t on the approved list, the bouncer sends them packing. Some firewalls have VIP lists which are the programs that can run even if they appear on bad lists (this would be called your “exception” list). The firewall might trust most programs (depending on the instructions you’ve given it). These programs are called white listed. And might absolutely refuse some guests based on a blacklist typically maintained by not for profit organizations and the company from which you purchased your bouncer…er, firewall.

Btw, I see your header fine in Firefox.

And lastly:

One final tidbit, I forgot to meantion that you should go to the control panel->add/remove programs and confirm that each program is supposed to be there. There are some nasties out there that install themselves to your system and give names that sound appropriate. By searching google on each program name you will find out its purpose and may be surprised by some that should be removed.

Now you all know my secrets to cleaning a machine! Well, a lot of them.

Posted on 3 Comments

Captain Kirk Would Be Proud

Sony via Make (rss) is taking questions on their Reader (PRS-500) ebook reading device. Wow that’s pretty! Looks like it is right off the bridge of the Enterprise. Here’s hoping that DRM does not kill this device.

I know that if buy a paperback book that I can pass that book onto my children’s children. I also know that tomorrow when I wake up that the book will still be on my bookshelf instead of a note that the book has expired and must be repurchased. I hope that they choose to model the real world in their e-reader. Of course, in the real world my book can get destroyed or worn out. I do have books that have been purchased multiple times. An argument for a repurchaseable ebook can be made but I think their efforts would be better spent selling me quantity of content rather than repeating the same purchase.

Posted on 5 Comments

Are you cleaning up with AJAX?

AJAX bugs me because a bunch of developers that used to say "we can’t do that because we would limit our market" jumped on a bandwagon that potentially limits their market (ie. browsers that don’t support javascript or have javascript disabled don’t support AJAX). Try using Google’s calendar with javascript disabled or change your user agent to an unknown browser.

Regardless, all developers worth their salt should do some dabbling in AJAX. Here is a nice list of 126 examples.