G8 nearly over, some souvenirs available

Posted by on 08 Juni 2007 | Tagged as: ... ? ...

screen1.pngcheck this out, maybe it’s something for you: http://cgi.ebay.de/…ViewItem… 😉

Offer was removed from ebay, seems that you are too late. Regards from the G8-town Rostock, soon I’ll be back on my blog and will write more regularly.

Virtual Identity bugfix release 0.4.2

Posted by on 20 Mai 2007 | Tagged as: Hacking, virtual id

Hi,

after being quiet for a while I just went through all bug-reports and finished a new version of virtual identity.

bugfixes:

  • If Smart-Reply found (for instance) an existing identity, sending works ok and was not tampered by the extension. But Thunderbird doesn’t remove the window, it ‚recycles‘ the window. Next time you compose a message, this one shows the same old identity but uses a different one behind the scenes. So I changed Virtual Identity to remove Window completely if message was sended, Window-Recycling is this way disabled (thanks to Charles, john and Henrik for the report).
  • repaired Dialog to choose which Virtual Identity to choose, was completely broken (thanks to Mark for the report).
  • Connected (and this way limited) usage of newsgroup Identities to the switch which enables Virtual Identity for newsgroups (thanks to Dave for the report).

You can download the new version at http://absorb.it/hacked/thunderbird/virtual_identity-0.4.2-tb+sm.xpi
and soon from addons.mozilla.org.

Wave of Repression against anti-G8 structures

Posted by on 10 Mai 2007 | Tagged as: ... ? ...

Press release, Gipfelsoli Info Group, Campinski Press Group 09.May.2007 12:24:

Since Wednesday (May 9, 2007) morning 8 am a wave of searches is taking places against left structures throughout Germany. Targeted are social projects and private persons that are organizing against the coming G8 summit – or suspected to do so.

In Berlin at least seven flats and office spaces are being searched, amongst which two offices in Bethanien, a social center in Kreuzberg, Berlin, and the Fusion shop in the same district. The latter is a space used by an antifascist organization and the Interventionist Left. Moreover, a bookshop in Mehringhof and the office spaces of several alternative media projects in Lausitzer Straße have been searched.

The criminal investigation police was putting special attention on the alternative Internet server so36.net. Many left and alternative projects have their websites, mailing lists and mail addresses hosted there. This way, the communication structure of the anti-G8 movement is hit on a sensible point.

In Hamburg the repression is aimed against the social center „Rote Flora“ and diverse housing projects. Also in the surrounding of Berlin searches are taking place. And there are first reports about searches in the city of Bremen.

The orders for the searches are based on § 129a: „Formation of a terrorist association with the aim to stop the G8 summit“. The random selection out of many left housing and infrastructural projects makes clear that the investigation is used as an excuse in order to weaken the mobilization against the G8. „Probably diverse cases of property damage serve as an excuse for these investigations“, so the impression of the Campinski Press Group. One of these cases occurred at the Kempinski Hotel, where the G8 summit is going to take place. The hotel was targeted with paint balls some months ago.

The context of a §129a investigation are instrumentalized in order to gather data about the protest movement. Besides, such measures have, most likely intended, intimidating effects. Only 2% of all $129a investigations result in sentencing.

However: „Who invites the G8 summit, also invites the protest against it“, explains Hanne Jobst of the Berlin Bethanien office. „All attempts to criminalize this movement will not prevent us from exposing worldwide inequalities during the G8 summit.“

The repressive acts of the criminal investigation police are not entirely surprising. The left and radical left resistance against the G8 has reached an uncontrollable level for the police. „So far, the police only tried to split the resistance in the public media through hallucinating about an army of ‚anarchists‘. Now they will try to sabotage the organizational structures“, Jobst explains further.

„It is noteworthy that the searches are targeted against all those parts of the resistance that refuse to direct claims to the G8, because they refuse the G8 in general as an illegitimate institution“, explains a spokesperson of the Gipfelsoli Info Group.

other media: indymedia de, indymedia uk, indymedia uk, CNN, BBC

Virtual Identity 0.4.1 is released

Posted by on 25 Apr. 2007 | Tagged as: ... ? ..., Hacking, virtual id

It took longer than I expected, but I think it was worth to include a lot of feature-requests and get rid of some bugs. Many thanks to you all who gave me reports and suggestions and translations and thank-you-mails, without this feedback the extension would have been not even half as nice as it is by now. So as you see, I like the result of the last weeks work, and I hope you will enjoy it too. Don’t like to mention the list of bug-fixes again, just the list of new features compared to version 0.4.0:

  • you can now sort the header any way you like, also exclude ‚to‘ or ‚cc‘ as you like it, but you have to tell Virtual Identity that it has to use those headers. So change your settings and add ‚to‘ and ‚cc‘ to the list of headers. A header name now refers to all headers of that name, not like before only the outmost one of you mail. To select a specific header, just use the number of it’s occurrence, so for instance „:3“ and add it to the headername. And if you wish to use only the email address and not the name, then simply add „:@“.
  • reading the headers was in version 0.4.0 dependent on installed mnenhy or enigmail. Now it’s independent on other extensions, so you are free to use whatever you like (but to protect the freedom of having secrets the same way as the freedom of choice or the freedom of speach, you might choose to install enigmail anyway)
  • added a nice debug-window, which helps you understanding what Virtual Identity really does. using complex filter rules you might get very creative, and this is the place to look if it doesn’t work as expected. This debug information is also helpful for me to understand how and when problems occur if you are sending a bug report.

Ok, here you can find the recent release 0.4.1, and, tadaa, there will be a documentation soon (have a look at the work in progress)

feed the MAC – software report

Posted by on 22 Apr. 2007 | Tagged as: ... ? ..., macbook

adium.pngThan I had to install some additional software to enjoy the Mac, we’ll see if I keep them for my mother.

First, there is Adium, an Instant Messenger which is able to handle ICQ, Jabber and doesn’t bug you with .Mac (like iChat does). Nice one, but till now I don’t have found how to keep the program at the dock after starting – it always shows you the contact window. Continue Reading »

HP Deskjet 995c mac mac mac

Posted by on 22 Apr. 2007 | Tagged as: ... ? ..., macbook

Nearly as fast as I got the MacBook, I received the printer I bought at eBay. Just told you, I bought an HP Deskjet 995c, cause this one has bluetooth included and I liked to make the system as flexible as possible. First impression, it’s an heavy printer – the weight of around 6,5kg remembered me on some russian technology… Continue Reading »

Virtual Identity extension 0.4.1pre4 released

Posted by on 22 Apr. 2007 | Tagged as: ... ? ..., Hacking, virtual id

A small bug in pre3 caused disabled the whole extension if in the preferences for the place where sended messages should be saved the settings of the default Identity were selected. Thanks to Guy for reporting and helping tracing the bug. New pre-release 0.4.1pre4 fixes this issue.

first installations – first MACken

Posted by on 20 Apr. 2007 | Tagged as: macbook

network configuration: it wasn’t as easy as I thought to connect the computer to the network. There is an assistent, but as intelligent as assistents are this one didn’t got the idea that I might like to get my internet (by now) out of an ad-hoc WLAN network. The airport was not able to find the network, nor was it able to connect to it if I entered the SSID of our network in the network settings. At some point I found the icon at the upper status-bar, clicked on it and saw not only wireless networks, but also computer-to-computer networks. And there it was, as easy as expected. Continue Reading »

first impressions – no privacy with MacOS

Posted by on 20 Apr. 2007 | Tagged as: macbook

First overall impression was good, the MacBook came in a huge box but after unwrapping all the air-shock-absorbers it ended as a real nice computer. „Designed by Apple in California“, and surely produced in China, but anyway, all looks very solid and nice.

You instantly notice the small things: the Power adapter has to ways of getting plugged into the power-net: with a long cord or as a wall power supply, as you like it. Trying to put the power-cable into the MacBook it jumps at the right place and a small LED-light shows you that something is the way it should. Nice, fancy.

register.pngBut now the real test. Pressing the power button the first time it gives you some options to change language and so on, but then it’s tries to register. This combined „register and create user accounts“ is a real mess (the image beneath shows the same dialog, but later). No indicator what the registration is good for, only a nice long text which ensures that they won’t play around with your data and they need it to give you a better service. And no way to go further without entering a name, fullname, address and a telephone number. What’s this? And you can only go forward (implies entering the data) or back (which is not what you want). Aborting might be possible, but maybe you abort the whole initial configuration? Really bad… Continue Reading »

MacBook – Welcome to the world of tomorrow?

Posted by on 20 Apr. 2007 | Tagged as: macbook

Future is now, so it was time to help my mother to enjoy the net as I do. And first I thought I’ll suggest her using a Linux, maybe Ubuntu system, but as much as I personally like Ubuntu there are some problems using Linux (have you ever tried to go to a shop and ask if a specific hardware is working with Linux? than you know what I’m talking about)

cimg0035.jpgSo I suggested my mother to buy a mac, more precise the cheapest MacBook available (MacBook MA699D/A, 1.83 GHz Intel Core 2, 512 MB RAM, 60GB disc, 13,3“ screen). This way I thought I might have the chance to administrate the machine without going mad and my mother hopefully will get attracted by the fancy computer too. Ok, ordered one at www.cyberport.de (have to mention this, cause it arrived around 30hrs later, wow). Continue Reading »

« Prev - Next »