Skip to main content

Home/ LumpysCorner/ Group items tagged tools

Rss Feed Group items tagged

John Lemke

The Physics Front - 0 views

  •  
    This sit is an awesome collection of physic education tools.
John Lemke

The Great Content Checklist: Tips, Tools, and Examples - 0 views

  •  
    This article makes some good points and has lots of great examples.
John Lemke

Use This Simple Tool to Move Forward in Your Writing Career - 0 views

  • It’s a trash can. Not a physical one, but a mental trash can. It’s for discarding advice that doesn’t feel right for you. It doesn’t seem like the right answer. Your gut tells you this advice isn’t for you. It just doesn’t resonate. If that happens, you should ignore that tip and move on. My teacher would say, “Use what feels right and discard the rest.” I think a lot of writers forget to take out their trash can when they’re learning about writing. But it really pays to keep it handy.
  •  
    I see many folks not using this tip.  Truth be told, I am also slow to clean house.
John Lemke

Seven Ways Your Physical Environment Can Help or Hinder Your Writing | Writing Forward - 0 views

  • Are You Likely to be Interrupted?
  • What Can You Hear?
  • Are You Sitting Comfortably?
  • ...6 more annotations...
  • How Much Clutter Can You See?
  • What’s the Mood of Your Room Like?
  • Are Your Tools Good Ones?
  • Just imagine trying to write with a dried-up pen, where you have to keep stopping to go over too-faint words.
  • If your keyboard is fiddly to type on, if the software you’re using freezes or crashes, or if you’re struggling in some way against your tools, don’t put up with this: change it.
  • Are You Allowing Distractions In?
  •  
    A good approach to looking at how your environment impacts your productivity. 
John Lemke

What happens with digital rights management in the real world? | Technology | theguardi... - 0 views

  • In 1997's Bernstein v United States, another US appeals court found that code was protected expression. Bernstein was a turning point in the history of computers and the law: it concerned itself with a UC Berkeley mathematician named Daniel Bernstein who challenged the American prohibition on producing cryptographic tools that could scramble messages with such efficiency that the police could not unscramble them. The US National Security Agency (NSA) called such programs "munitions" and severely restricted their use and publication. Bernstein published his encryption programs on the internet, and successfully defended his right to do so by citing the First Amendment. When the appellate court agreed, the NSA's ability to control civilian use of strong cryptography was destroyed. Ever since, our computers have had the power to keep secrets that none may extract except with our permission – that's why the NSA and GCHQ's secret anti-security initiatives, Bullrun and Edgehill, targetted vulnerabilities in operating systems, programs, and hardware. They couldn't defeat the maths (they also tried to subvert the maths, getting the US National Institute for Standards in Technology to adopt a weak algorithm for producing random numbers).
    • John Lemke
       
      This is also why they have a hard on for developing a quantum computer.
  • An increase in the security of the companies you buy your media from means a decrease in your own security. When your computer is designed to treat you as an untrusted party, you are at serious risk: anyone who can put malicious software on your computer has only to take advantage of your computer's intentional capacity to disguise its operation from you in order to make it much harder for you to know when and how you've been compromised.
  • The DMCA's injunction against publishing weaknesses in DRM means that its vulnerabilities remain unpatched for longer than in comparable systems that are not covered by the DMCA. That means that any system with DRM will on average be more dangerous for its users than one without DRM.
  • ...4 more annotations...
  • For example, in 2005, Sony-BMG music shipped a DRM called the "Sony Rootkit" on 51m audio CDs. When one of these CDs was inserted into a PC, it automatically and undetectably changed the operating system so that it could no longer see files or programs that started with "$SYS$." The rootkit infected millions of computers, including over 200,000 US military and government networks, before its existence became public. However, various large and respected security organisations say they knew about the Sony Rootkit months before the disclosure, but did not publish because they feared punishment under the DMCA. Meanwhile, virus-writers immediately began renaming their programs to begin with $SYS$, because these files would be invisible to virus-checkers if they landed on a computer that had been compromised by Sony.
    • John Lemke
       
      How the Sony DRM created serious security issues.  It should also be considered a violation of our civil rights.  Who the hell gave Sony permission to modify my OS!  Furthermore why didn't the OS companies sue Sony?  Likely because they are in bed together.
  • If I was a canny entrepreneur with a high appetite for risk -- and a reasonable war-chest for litigation – I would be thinking very seriously about how to build a technology that adds legal features to a DRM-enfeebled system (say, Itunes/Netflix/Amazon video), features that all my competitors are too cowardly to contemplate. The potential market for devices that do legal things that people want to do is titanic, and a judgment that went the right way on this would eliminate a serious existential threat to computer security, which, these days, is a synonym for security itself.And once anti-circumvention is a dead letter in America, it can't survive long in the rest of the world. For one thing, a product like a notional Itunes/Amazon/Netflix video unlocker would leak across national borders very easily, making non-US bans demonstrably pointless. For another, most countries that have anti-circumvention on the books got there due to pressure from the US Trade Representative; if the US drops anti-circumvention, the trading partners it armed-twisted into the same position won't be far behind.I've talked to some lawyers who are intimate with all the relevant cases and none of them told me it was a lost cause (on the other hand, none of them said it was a sure thing, either). It's a risky proposition, but something must be done. You see, contrary to what the judge in Reimerdes said in 2000, this has nothing to do with whether information is free or not – it's all about whether people are free.
  • The DMCA is a long and complex instrument, but what I'm talking about here is section 1201: the notorious "anti-circumvention" provisions. They make it illegal to circumvent an "effective means of access control" that restricts a copyrighted work. The companies that make DRM and the courts have interpreted this very broadly, enjoining people from publishing information about vulnerabilities in DRM, from publishing the secret keys hidden in the DRM, from publishing instructions for getting around the DRM – basically, anything that could conceivably give aid and comfort to someone who wanted to do something that the manufacturer or the copyright holder forbade.
  • Significantly, in 2000, a US appeals court found (in Universal City Studios, Inc v Reimerdes) that breaking DRM was illegal, even if you were trying to do something that would otherwise be legal. In other words, if your ebook has a restriction that stops you reading it on Wednesdays, you can't break that restriction, even if it would be otherwise legal to read the book on Wednesdays.
John Lemke

Our Free Society Stands Or Falls With Our Defense Of Sharing Knowledge And Culture | To... - 0 views

  • For once the censorship regime is in place, you won’t think for a second that it will stop at culture-sharing sites, would you? Once such a tool is available in the bureaucrat toolbox, it will be applied to anything and everything considered insubordinate or troublesome. There is a reason the copyright industry loves child pornography so much – the reason that industry lobbied hard to create censorship of child abuse sites, actively hiding the problem and preventing assistance. They knew politicians wouldn’t dare disagree on such a toxic subject, and once the box was open, “other illegal sites” – those that circumvent the harmful copyright monopoly – were next in line. In reality, the culture-sharing hubs had been the target all along, and mentioning “child pornography” had merely been a battering ram to get the censorship started – notwithstanding that the censorship actually creates more child abuse and protects predators, something the copyright industry doesn’t care about at all.
  • In the UK, censorship that started as “violent pornography” has crept to “all pornography”, already censoring a lot of political opinion under that definition, and crept further into “extremist views” and other clearly political material.
  •  
    The problem with censorship is that it starts with child porn, like who would object?, moves to Pirate Bay, then opposing political view points and, eventually, your Bible. Either all speech is free and protected or we are on the slippery slope of "what next" in order to protect "the greater good".   The best form of censorship is when free thinkers choose not to buy porn through the exercise of free will.
John Lemke

9 Irresistible Incentives That'll Grow Your Email List Like Crazy - 0 views

  • Unless they see the value of joining your list, they simply won’t invest any of those valuable minutes in you and your blog.
  • Do something for me and I’ll do something for you. In this case, the bribe is “give me your email address and I’ll give you something that isn’t freely available on my blog.”
  • Minimum requirements: Useful and engaging content, whether unique to the bribe or already published on your blog, that you can easily break into pieces. On the technical side, you’ll need an email newsletter service (e.g. Mailchimp, AWeber (aff), etc.) with an autoresponder feature ($10-20/month).
  • ...2 more annotations...
  • Minimum requirements: A word processor like Microsoft Word, Apple Pages or OpenOffice Writer is sufficient for creating a simple cheat sheet, but for a more sophisticated end product, you might require a desktop publishing package such as Adobe InDesign, Microsoft Publisher, or QuarkXPress. Alternatively, you can use a cheat sheet tool like Cheatography to generate cheat sheets based on a default template.
  • Minimum requirements: Your chosen word processor is enough to create a basic template, but to make it even more visually appealing, consider using some simple design elements such as colors, backgrounds and borders. If the template is meant to be printed, you can convert your .docx or .pages file into a downloadable PDF for your readers’ convenience.
John Lemke

So, How DO You Promote a Blog Post, Anyway? - 0 views

  • Comment on their posts.
  • If you want to build a blog, the reality is that Twitter is one of the most important platforms for sharing, probably followed by Google+, at this point. If you’re in a home/food/how-to niche, Pinterest may be important to you as well. If Facebook seems like a place people talk about your topic a lot, it might be useful, too.
  • There are plenty of tools out there — among the most popular are AddtoAny, ShareThis, and Sharebar (which is what I’m currently using).
  • ...6 more annotations...
  • Reverse-engineer your social-media success by noticing what sorts of posts get shared a lot in your niche, and writing something along those lines.
  • the key ingredient: Write a strong headline
  • Use hashtags
  • Use a scheduler
  • Don’t just keep retweeting your headline and link. Instead, vary what you say.
  • Be sure you share other things inbetween the repetitions of your new post. Do some scanning, find some interesting stuff, and lace it into your schedule as well, so you don’t start looking like an obnoxious salesman and continue to appear to be putting out useful, varied info.
John Lemke

20 Rules for Writing So Crystal Clear Even Your Dumbest Relative Will Understand - 0 views

  • Spreading an idea means getting it from your brain into someone else’s. It means putting together the essential facts, the logical arguments and your insightful conclusions together in exactly the right way to recreate your brilliant idea in the mind of your reader.
  • Try to describe your audience with this simple formula: X who Y. For example: “Bloggers who want to get more traffic”.
  • If you can’t explain what your post is about in one simple, short sentence, it’s probably too complex or unfocused.
  • ...16 more annotations...
  • Make sure a clear connection exists between the opening of your post and the headline.
  • If a sentence, phrase or word is particularly important or significant, use bold or italics to add stress. But don’t overdo it.
  • Always be consistent with your terminology.
  • If a point is worth making, it’s worth making twice. Or even three times.
  • Only tell them what they need to know to follow your argument. Share the minimum you need to convey the desired message.
  • Clear examples help readers understand difficult concepts.
  • Concrete language describes something detectable by the senses. Something you can see, feel, hear, smell or taste. Abstract concepts are much harder to imagine.
  • When you provide specific detail in your writing, there’s less room for ambiguity. Your reader is far more likely to end up with the same idea in their head as you have in yours.
  • Clarity does not tolerate “might,” “may” or “possibly.” If you can’t say something with certainty, perhaps you shouldn’t be writing about it at all.
  • if you’re in the business of spreading ideas, you must make friends with bullets.
  • Bullets are a valuable tool, but you should never drop your reader into a list without first setting the scene.
  • make sure each point is recognizably related to the others.
  • If you were giving your reader a list of steps, you’d present them in the order they needed doing, right? Obviously. But if the items in your list aren’t steps, they often still have a natural order – even if you didn’t have one in mind when you wrote them.
  • always supply everything the reader needs to fully understand your points within the post itself.
  • You think you’re being generous but truthfully you’re being greedy. Greedy with your reader’s time, their attention, and their patience.
  • include a clear call-to-action. Tell your reader what you want them to do.
  •  
    20 tips on writing with clarity.
John Lemke

Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution. - 0 views

  •  
    This particular Linux distro is intended to test your security.
1 - 12 of 12
Showing 20 items per page