473,419 Members | 4,250 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,419 software developers and data experts.

Jargons of Info Tech industry

Jargons of Info Tech industry

(A Love of Jargons)

Xah Lee, 2002 Feb

People in the computing field like to spur the use of spurious jargons.
The less educated they are, the more they like extraneous jargons, such
as in the Unix & Perl community. Unlike mathematicians, where in
mathematics there are no fewer jargons but each and every one are
absolutely necessary. For example, polytope, manifold,
injection/bijection/surjection, group/ring/field.., homological,
projective, pencil, bundle, lattice, affine, topology, isomorphism,
isometry, homeomorphism, aleph-0, fractal, supremum/infimum, simplex,
matrix, quaternions, derivative/integral, ... and so on. Each and every
one of these captures a concept, for which practical and theoretical
considerations made the terms a necessity. Often there are synonyms for
them because of historical developments, but never “jargons for
jargon's sake” because mathematicians hate bloats and irrelevance.

The jargon-soaked stupidity in computing field can be grouped into
classes. First of all, there are jargons for marketing purposes. Thus
you have Mac OS “X”, Windows “XP”, Sun OS to Solaris and the
versioning confusion of 4.x to 7 to 8 and also the so called
“Platform” instead of OS. One flagrant example is Sun Microsystem's
Java stuff. Oak, Java, JDK, JSDK, J2EE, J2SE enterprise edition or no,
from java 1.x to 1.2 == Java 2 now 1.3, JavaOne, JFC, Jini, JavaBeans,
entity Beans, Awk, Swing... fucking stupid Java and fuck Sun
Microsystems. This is just one example of Jargon hodgepodge of one
single commercial entity. Marketing jargons cannot be avoided in modern
society. They abound outside computing field too. The Jargons of
marketing came from business practice, and they can be excusable
because they are kinda a necessity or can be considered as a naturally
evolved strategy for attracting attention in a laissez-faire economy
system.

The other class of jargon stupidity is from computing practitioners, of
which the Unix/Perl community is exemplary. For example, the name Unix
& Perl themselves are good examples of buzzing jargons. Unix is
supposed to be opposed of Multics and hints on the offensive and
tasteless term eunuchs. PERL is cooked up to be “Practical Extraction
& Reporting Language” and for the precise marketing drama of being
also “Pathologically Eclectic Rubbish Lister”. These types of
jargons exudes juvenile humor. Cheesiness and low-taste is their
hall-mark. If you are familiar with unixism and perl programing, you'll
find tons and tons of such jargons embraced and verbalized by unix &
perl lovers. e.g. grep, glob, shell, pipe, man, regex, more, less,
tarball, shebang, Schwartzian Transform, croak, bless, interpolation,
TIMTOWTDI, DWIM, RFC, RTFM, I-ANAL, YMMV and so on.

There is another class of jargon moronicity, which i find them most
damaging to society, are jargons or spurious and vague terms used and
brandished about by programers that we see and hear daily among design
meetings, online tech group postings, or even in lots of computing
textbooks or tutorials. I think the reason for these, is that these
massive body of average programers usually don't have much knowledge of
significant mathematics, yet they are capable of technical thinking
that is not too abstract, thus you ends up with these people defining
or hatching terms a-dime-a-dozen that's vague, context dependent,
vacuous, and their commonality are often a result of sopho-morons
trying to sound big.

Here are some examples of the terms in question:

• anonymous functions or lambda or lamba function
• closure
• exceptions (as in Java)
• list, array, vector, aggregate
• hash (or hash table) ← fantastically stupid
• rehash (as in csh or tcsh)
• regular expression (as in regex, grep, egrep, fgrep)
• name space (as in Scheme vs Common Lisp debates)
• depth first/breadth first (as in tree traversing.)
• operator
• operator overloading
• polymorphism
• inheritance
• first class objects
• pointers, references
• tail recursion

My time is limited, so i'll just give a brief explanation of my thesis
on selective few of these examples among the umpteen.

In a branch of math called lambda calculus, in which much theories of
computation are based on, is the origin of the jargon _lambda function_
that is so frequently reciprocated by advanced programering donkeys. In
practice, a subroutine without side-effects is supposed to be what
“lambda function” means. Functional languages often can define them
without assigning them to some variable (name), therefore the
“function without side-effects” are also called “anonymous
functions”. One can see that these are two distinct concepts. If
mathematicians are designing computer languages, they would probably
just called such thing _pure functions_. The term conveys the meaning,
without the “lamba” abstruseness. (in fact, the mathematics
oriented language Mathematica refers to lambda function as pure
function, with the keyword Function.) Because most programers are
sopho-morons who are less capable of clear thinking but nevertheless
possess human vanity, we can see that they have not adopted the clear
and fitting term, but instead you see lambda function this and that
obfuscations dropping from their mouths constantly.

Now the term “closure” can and indeed have meant several things in
the computing field. The most common is for it to mean a subroutine
that holds some memory but without some disadvantages of modifying a
global variable. Usually such is a feature of a programing language.
When taken to extreme, we have the what's called Object Oriented
Programing methodology and languages. The other meaning of
“closure” i have seen in text books, is for it to indicate that the
things in the language is “closed” under the operations of the
language. For example, for some languages you can apply operations or
subroutines to any thing in the language. (These languages are often
what's called “dynamic typing” or “typeless”). However, in
other languages, things have types and cannot be passed around
subroutines or operators arbitrarily. One can see that the term
“closure” is quite vague in conveying its meaning. The term
nevertheless is very popular among talkative programers and dense
tutorials, precisely because it is vague and mysterious. These
pseudo-wit living zombies, never thought for a moment that they are
using a moronic term, mostly because they never clearly understand the
concepts behind the term among the contexts. One can particular see
this exhibition among Perl programers. (for an example of the
fantastically stupid write-up on closure by the Perl folks, see
“perldoc perlfaq7” and “perldoc perlref”.)

in the so-called “high-level” computing languages, there are often
data types that's some kind of a collection. The most illustrative is
LISt Processing language's lists. Essentially, the essential concept is
that the language can treat a collection of things as if it's a single
entity. As computer languages evolve, such collection entity feature
also diversified, from syntax to semantics to implementation. Thus,
beside lists, there are also terms like vector, array, matrix, tree,
hash/“hash table”/dictionary. Often each particular term isto
convey a particular implementation of collection so that it has certain
properties to facilitate specialized uses of such groupy. The Java
language has such groupy that can illustrate the point well. In Java,
there are these hierarchy of collection-type of things:

Collection
Set (AbstractSet, HashSet)
SortedSet (TreeSet)
List (AbstractList, LinkedList, Vector, ArrayList)

Map (AbstractMap, HashMap, Hashtable)
SortedMap (TreeMap)

The words without parenthesis are Java Interfaces, and ones in are
implementations. The interface hold a concept. The deeper the level,
the more specific or specialized. The implementation carry out
concepts. Different implementation gives different algorithmic
properties. Essentially, these hierarchies of Java show the potential
complexity and confusion around groupy entities in computer languages.
Now, among the programers we see daily, who never really thought out of
these things, will attach their own specific meaning to
list/array/vector/matrix/etc type of jargons in driveling and
arguments, oblivious to any thought of formalizing what the fuck they
are really talking about. (one may think from the above tree-diagram
that Java the language has at least put clear distinction to interface
and implementation, whereas in my opinion they are one fantastic fuck
up too, in many respects.)

---------------------
This post is archived at
http://xahlee.org/UnixResource_dir/writ/jargons.html
© Copyright 2002 by Xah Lee.

Xah
xa*@xahlee.org
http://xahlee.org/

Aug 12 '05
385 16844
In comp.lang.java.programmer Mike Meyer <mw*@mired.org> wrote or quoted:
Roedy Green <my******************************@munged.invalid > writes:
On Sat, 08 Oct 2005 19:56:50 -0400, Mike Meyer <mw*@mired.org> wrote
Show us *examples*! Do you create a style sheet for every site you
visit that overrides there classes? What?


Why don't you download a copy of Opera, see
http://mindprod.com/jgloss/opera.html


What makes you think I don't have a copy of Opera? Just so happens
I've got a registred copy on my newest computer.
Then try out the feature. Click View | style | user


My copy of Opera doesn't have that menu entry. I suspect you're making
platform-specific suggestions.

Trying it on a different platform, it looks like it does what I said
earlier: user mode simply disables the authors style sheets. None of
the "merging" you suggested was going on is actually happening.


The "user mode" uses style sheets you specify.

There's a whole bunch of built-in ones - and you can cascade them:

``User style sheets

``There is also the inclusion of 12 packaged user style sheets and an easy
menu application interface (View > Style). These sheets can be cascaded
together, with or without the page's styles. They are mostly for
accessibility, accessible web design and plain coolness: Emulate text
browser, Nostalgia, Accessibility Layout, Show images and links only,
High contrast, Hide non-linking images, Disable tables and Use default
forms design.

There are also three style sheets that are worth mentioning specially:
Hide certain-sized elements, Debug with outline, and Show structural
elements. Hide certain-sized elements is basically that CSS-powered
inline ad-killer that Eric A. Meyer came up with a few years ago. Debug
with outline uses the newly added support for the "outline" property to
display key elements. Finally, Show structural elements, which with the
acrobatic use of generated content, attribute selectors and counters,
shows the HTML tags inline, as well as the meta and link data, and a
report on the number of font tags and nested tables. Now this is cool!''

- http://www.evolt.org/article/Opera_7_Released/1/54851/
--
__________
|im |yler http://timtyler.org/ ti*@tt1lock.org Remove lock to reply.
Oct 9 '05 #251
In comp.lang.java.programmer Mike Meyer <mw*@mired.org> wrote or quoted:
Roedy Green <my******************************@munged.invalid > writes:
On Sat, 08 Oct 2005 17:41:38 -0400, Mike Meyer <mw*@mired.org> wrote:
If you've got a browser with a better solution, what's the browser,
and what's the solution?

Try Opera. You can merge the two.


Merge the two CSS files? Most browsers do that - that's why they call
them "cascading" style sheets. Got a sample style sheet that you use
that prevernts authors from overriding things?


Custom style sheets are usually applied after those in the document -
when they are both being applied.

That way, the custom style sheet has the final word.
--
__________
|im |yler http://timtyler.org/ ti*@tt1lock.org Remove lock to reply.
Oct 9 '05 #252
On Sun, 9 Oct 2005 13:44:42 GMT
Tim Tyler <ti*@tt1lock.org> wrote:
In comp.lang.java.programmer Roedy Green
<my******************************@munged.invalid > wrote or quoted:
Read my essay.
http://mindprod.com/projects.html/ma...ewsreader.html

It's gone :-)

FYI, this bit:

``Like ICQ, someone cannot send you mail without your prior
permission. They can't send you mail because they don't have your
public key to encrypt the mail.''

...is pretty confusing - because "public key" is a term with a
technical meaning in cryptography - and a public key really *is*
public.

If you want to allow email only from a list of senders, then you use
a simple white list. Cryptography is not needed or desirable if this
is the intended goal.


But what is desirable is the possibility to authenticate the sender of
the message as genuine, given the ease with which SMTP headers can be
spoofed. Maybe this is suggested in Mr Green's essay, but
cryptographically signed email (using the originator's _private_ key),
where the signature and hence the originator of the mail can be verified
independently, would be very useful. The problem is to get everyone to
use digital signatures, and to ensure that such a signature can be
linked to an individual or business. I've no illusions here.

Take care,

--
Stefaan
--
As complexity rises, precise statements lose meaning,
and meaningful statements lose precision. -- Lotfi Zadeh
Oct 9 '05 #253
On Sun, 09 Oct 2005 13:36:26 +0000, Tim Tyler wrote:
Since - in Roedy's essay - messages are digitally signed, authority
to advise about any email address updates would presumably be confined
to those people with access to the sender's private key.
If I have the sender's private key, then I can pretend to be him. That
would mean that when you received an email from the sender, you couldn't
be sure if it actually came from him or not, thus defeating the purpose of
having a private key.
Even /without/ any form of authentication, a standard change-of-address
message - which is understood by mail readers - is a fine and sensible
idea.


So any random person -- or bot -- could send an email to my business
associates, telling them that my email address had changed to
in******************@spyware.com, please send all your confidential
information directly there thank you very much.

Yeah. Fine *and* sensible.
--
Steven.

Oct 9 '05 #254
On Sun, 09 Oct 2005 13:44:42 +0000, Tim Tyler wrote:
In comp.lang.java.programmer Roedy Green <my******************************@munged.invalid > wrote or quoted:
Read my essay.
http://mindprod.com/projects.html/ma...ewsreader.html


FYI, this bit:

``Like ICQ, someone cannot send you mail without your prior permission.
They can't send you mail because they don't have your public key to
encrypt the mail.''

...is pretty confusing - because "public key" is a term with a technical
meaning in cryptography - and a public key really *is* public.


The term you want is "wrong", not "confusing".

--
Steven.

Oct 9 '05 #255
On Sun, 09 Oct 2005 15:50:12 +0200, Lasse Vgsther Karlsen wrote:
Tim Tyler wrote:
<snip>
Only if your photos are so obscure and confusing that they need captions.

"Here's Johnny with the dog. Here is Johnny with the dog again. This one
is Johnny on his own. Here is the dog. Oh look, it is Johnny with the dog
again -- that's the dog on the left, in case it isn't clear. Just for a
change, this is Johnny wearing a hat. It is blue with a feather in it,
in case you couldn't tell from, oh I don't know, looking at the actual
picture."

What have you got against captions?

Giving photos captions is a *very* common practice.


Perhaps he has a search engine that can find blue hats in an image and
recognize people?


Yes. It is called "eyes". I look at the image, and miracle upon miracles,
I recognise Johnny wearing a hat.

Then, if I have any need to save that image rather than trash it, I name
it and file it in a directory appropriately, so that I can instantly find
it later without needing to call up a search engine.

Honestly, anyone would think that photos and photo albums never existed
before Google. Why force one particular bad technological solution on
everyone for the sake of something which many people don't even perceive
as a problem?

--
Steven.

Oct 9 '05 #256
Steven D'Aprano wrote:
On Sat, 08 Oct 2005 23:39:27 +0000, John Bokma wrote:

Rich Teer <ri*******@rite-group.com> wrote:

On Sat, 8 Oct 2005, Roedy Green wrote:
Some people use email PRIMARILY for sharing photos.

WHat the hell has that got to do with HTML email?


The photo doesn't have to be included (as in attached)? with the email?

I'll repeat the question: what do attachments have to do with HTML emails?


His reply wasn't exactly clear, but I that he means that wen you use HTM
mail, you don't have to attach the photo with the email. You can also
use the HTML to refer to an image somewhere on a webserver.

Doesn't seem such a good idea to me, since the possibility of external
images gives spammers the possibility to track who opens their mails.

--
If I have been able to see further, it was only because I stood
on the shoulders of giants. -- Isaac Newton

Roel Schroeven
Oct 9 '05 #257
On Sun, 9 Oct 2005, Roedy Green wrote:
Normally you send photos to grandma with captions under each photo.
That is far more convenient for the technopeasant receiver than
dealing with multiple attachments.
And even more convenient is "Hey grandma, check out the latest
photos on my web site: www.example.com/rich/photos".
People keep thinking of email as a techie preserve.


Worse, people keep misusing email.

--
Rich Teer, SCNA, SCSA, OpenSolaris CAB member

President,
Rite Online Inc.

Voice: +1 (250) 979-1638
URL: http://www.rite-group.com/rich
Oct 9 '05 #258
Tim Tyler wrote:
Javascript can be turned off in *mail readers* - by their manufacturers.


Yes, mail readers, browsers, combined mail reading and Web browsing
"suites", or whatever combination of functions you care to consider. In
any case, in the not-exactly-unknown mail reader I use, I can't seem to
find a setting that will turn JavaScript on. Meanwhile, HTML mail is
flagged and presented as plain text with a prominent warning about
viewing the message as HTML - an acceptable tradeoff which only
slightly delays the viewing of the very few legitimate messages I get
sent in that format.

Of course, the most excitable manufacturers of mail readers with
respect to enabling a "rich experience" are those pitching "enterprise
functionality", although a full treatment of their mistakes (amplifying
my previous rant) would take this discussion even further away from the
tenuous connection it has with Python, related discussions on type
safety, private/protected/public, using Python in Mozilla, and the
disappearance of the Bastion module notwithstanding.

Paul

Oct 9 '05 #259
On Sun, 9 Oct 2005, Roedy Green wrote:
This is pulling a King Canute. There is not even a mechanism in email
protocols to warn your correspondents of your demand. I have been
Yes there is: the message my server sends someone sending me HTML
says so quite plainly. That Outhouse (and presumably other WIndoze
email clients) choses to not display the real message and put up
some other generic, "user friendly" (but totally techie useless)
message besides the point.
There is nothing wrong with formatted text. You are confusing
formatted text with spam.

You think you hated formatted text, but you really hate spam.
Please don't presume to think for me. I've been using email and
the Internet for over 10 years, and I think I can differentiate
between spam and formatted text. I hate spam, that's a given.
But I hate spam that's in plain text as well as formatted text.

I hate HTML email for several reasons, including:

1. it's wasteful of bandwidth

2. it enourages people to put form over content

3. it doesn't display properly on my email client of choice,
which, BTW, I've been using in various versions for 10+
years.

There are probably others, but you get my drift. You'll also notice
that I deliberately didn't list the security issues. HTML is for
web sites, not email.
If your lover sent you a message with photo, and even musical
accompaniment, I doubt you would feel offended. It is the CONTENT
bugging you, not the HTML.
No it isn't. And my wife knows better than to do that. When she
sends me virtual boquets, she does so in the correctmanner: she
sends me a plain text link to a web site that does all the fancy
stuff, including background music. That is how it should be.
You imagine that the two are inexplicably linked. That is just because
No I don't.
Eudora warns you of deceptive links in HTML. There are many more such
I am fortuanate enough to not use Windoze.
unfair to blame formatting for the foolish practice off allowing
untrusted code to run without even an ok. They have nothing to do
with each other.


Agreed. But as I said above, I have many other issues with HTML emails,
over and above the security concerns.

--
Rich Teer, SCNA, SCSA, OpenSolaris CAB member

President,
Rite Online Inc.

Voice: +1 (250) 979-1638
URL: http://www.rite-group.com/rich
Oct 9 '05 #260
On Sun, 09 Oct 2005 16:14:32 GMT, Roel Schroeven
<rs****************@fastmail.fm> wrote or quoted :
His reply wasn't exactly clear, but I that he means that wen you use HTM
mail, you don't have to attach the photo with the email. You can also
use the HTML to refer to an image somewhere on a webserver.

There is that and also the use of HTML formatting, embedded images,
captioning, rows, borders to make the message look more like a page
from a photo album.
--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #261
On Sun, 09 Oct 2005 20:54:32 +1000, Steven D'Aprano
<st***@REMOVETHIScyber.com.au> wrote or quoted :
Only if your photos are so obscure and confusing that they need captions.


That is a hair shirt approach. What if someone is sending photos of
their new house? What if I am sending diagrams to help someone repair
their computer? It is ridiculous to tie people's arms behind their
backs. What you do instead is work to prevent abuse. Captions in and
of themselves are not dangerous things.

--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #262
On Mon, 10 Oct 2005 01:40:34 +1000, Steven D'Aprano
<st***@REMOVETHIScyber.com.au> wrote or quoted :

Yes. It is called "eyes". I look at the image, and miracle upon miracles,
I recognise Johnny wearing a hat.


Even for a limited application like children's birthday parties
captions could say things like:

Johnny with this friend Pete, the one I told you about who has
leukemia....

Here is Johnny opening your present, the sweater you knitted him.

If you want to communicate with text and with pictures obviously there
are times when you want to communicate with both text and pictures.

Imagine a main sending emailed floor tile samples to his wife on a
business trip for her final veto and not being allowed to caption
them.

The point I can't pound enough is that rich text and pictures with
captions are not INHERENTLY dangerous or spam. (Note that the most
common spam is the Nigerian con and variants which comes as a
non-formatted message.) Many have mentally linked rich text with
danger and spam because of Microsoft's incompetent email software. The
solution is to fix the software not block everyone from communicating
with rich text and pictures.

You don't have to use Outlook. see
http://mindprod.com/jgloss/email.html
--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #263
Roedy Green:
(Note that the most
common spam is the Nigerian con and variants which comes as a
non-formatted message.)


Don't think that that is true for everybody. For example not for people
that are behind central filters that already cope with common spam.

--
Affijn, Ruud <http://www.pandora.com/?sc=sh770781&cmd=tunermini>

"Gewoon is een tijger."

Oct 9 '05 #264
On Sun, 09 Oct 2005 16:16:57 GMT, Rich Teer <ri*******@rite-group.com>
wrote or quoted :
And even more convenient is "Hey grandma, check out the latest
photos on my web site: www.example.com/rich/photos".


that is what my sister does. And there is now a service that will do
that See http://storymill.com/tidepool/

I find it amusing that people who complain about me giving links in my
posts rather that expounding inline are willing to insist others do
their emails via links where you need to fire up a separate browser
to see the images.

The other problem is maintaining a website is probably a skillset
Grandma is not willing to acquire. Even image inserting into emails is
pushing it. Further the website is yet an additional monthly expense
that could be avoided by using HTML in emails.

You might say what about those free 10 mb websites? That's not very
many images with today's megapixel digital cameras.

I think we computer folk owe the public an email system that works and
that is easy to use. It should at LEAST work better than the snail
mail system. The essential problem is it was designed overnight as a
proof of concept and has not been designed to deal with the problem of
spam or tracking conversational threads. Enclosures were a kludge.
Mail should be 8-bit binary transport with a system something like the
US post uses for large parcels. They don't show up directly in your in
mail box. You have to ok their delivery.

The biggest disincentive to spam would be to make sender pay a fee to
the receiver or to backbone maintenance. For most people it would all
balance out. Spammers would have to become more selective in their
targets. If they were sufficiently selective, they would not be a
nuisance. They could even be helpful sometimes.

I wrote an essay years ago on how such an email system might work. At
this point I think the most likely evolution is via Instant messaging
acquiring all the abilities of regular email. Instant mail interfaces
were designed to be computer friendly and extendable, so even though
there are a great many of them, people have written software that can
interface to many of them such as Trillian or Jabber.

see http://mindprod.com/projects/mailreadernewsreader.html
--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #265
> My grandma doesn't put captions in her photo album,
and she doesn't need captions on her photos in email.
She doesn't need captions in the album because she will explain the
pictures, at length, every single one of them, to anyone who comes
within grabbing distance.
"Here's Johnny with the dog. Here is Johnny with the
dog again. This one is Johnny on his own. Here is the
dog. Oh look, it is Johnny with the dog again -- ...


If your photos are so banal then only people who would recognise the
people would care about them.

Captions are for people who won't recognise the subject of the photo.
When you send a photo of a house to Granma is she supposed to just
_know_ that it your new house, or the one across the road, or the one
that burnt down last week ?

Oct 9 '05 #266
On Sun, 09 Oct 2005 05:55:01 -0400, Mike Meyer <mw*@mired.org> wrote
or quoted :
Virus writers will love the ability to
change peoples address books remotely.


Since this is just a broad brush view, I find it odd you can predict
just what bugs there will be in the early implementations.

You sound almost as if you were the author of the current system and
feel personally attacked by others looking for ways to improve it.

In my scheme, every message is digitally signed, even a change of
address message.

Surely for a virus to send out a digitally signed change of address
message is more difficult than sending out an unsigned one, which they
can do today.

You have two problems you want to avoid:

1. the practical problem: failure to inform your correspondents, not
just your address list, of your new address (at least the ones you
don't consider spam or pests).

2. the potential problem: rogue software sending out fake change of
address notices.

In my scheme, The receiver of the change of address message ignores
it unless it is properly signed. Surely that is a more secure system
than we have today and that handles (1) without effort. At worst, a
very clever virus could change the one address book entry, the one for
this computer, in other's machines. It could not generally corrupt
other machines.

--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #267
On Sun, 9 Oct 2005 13:44:42 GMT, Tim Tyler <ti*@tt1lock.org> wrote or
quoted :
``Like ICQ, someone cannot send you mail without your prior permission.
They can't send you mail because they don't have your public key to
encrypt the mail.''

...is pretty confusing - because "public key" is a term with a technical
meaning in cryptography - and a public key really *is* public.


What I envisioned was you would give a "public" key to someone you
wanted to converse with you. He would encrypt all mail with that. He
could give that key to someone else, who could then impersonate him.

Most likely that second person would be his laptop.

Let's say he posted the key in the New York Times, then anyone could
impersonate him. You would the deactivate him, just as if he were a
spammer. You might or might not give him a new key when he begged for
permission to communicate.

In my opinion, the weakest link in my scheme is the initial beg for
permission to send. Here a stranger has to, in one line, tell you who
he is and why he wants to talk to you. This is much like a spam title
that tries to trick you into reading the body of the message. You
still need spam list to help filter these types out.

My scheme should work fine if you are not someone like me who gets a
lot of legit mail from strangers.

Perhaps you could slow them down with some randomly chosen questions
to prove they know something about you. Companies could do the same
thing.

You can inconvenience the sender to a fair degree since most people
don't often write strangers with the expectation of a personal
correspondence.


--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #268
On Sun, 09 Oct 2005 05:55:01 -0400, Mike Meyer <mw*@mired.org> wrote
or quoted :
Actually, you present a design that forces a solution that makes them
do what you want down their throats, never mind what they want, or
what they've been doing. It shows an amazing ignorance about the
internet and how people behave on it. Like most antispam proposals, it
won't actually stop spam, just force spammers to concentrate on
different channels. You seem to have randomly broken quoting for
people who download mail and read it offline, and for any medium
that's unreliable or doesn't reliably deliver messages "in order" -
which includes mail and news. Virus writers will love the ability to
change peoples address books remotely. The problem of differing
character sets is technically solved. Practically, the solution
doesn't work because people implementing the software ignore the
standards. What's your server going to do when it gets messages with
characters in them that aren't valid in the charset that it's declared
as being? Better yet, what's it going to do when the characters are
valid, but the declared charset isn't the one the author actually
used? You implementation sketch only covers the client talking to the
first server (in that it requires the client to encrypt a challange
phrase with the private key belonging the email id, which is
presumably what 2822 uses for the envelope sender). Most mail on the
internet goes through at least two servers, and news is much
worse. For instance, your messages apparently passed through 10
servers getting to me. You really have to deal with store and forward,
or convince a large number of corporations that potentially hostile
users should be allowed to talk directly to their mail servers, which
isn't very likely. Kudos for recognizing that spam needs to be dealt
with by people with guns, but you lose half of them for making ISPS
liable for it.

I also read the comment about wanting an automated "Ask them to run my
browser in my favorite configuration", which is equally naive. A lot
of sites have such cruft on them already. I find them funny - I surf
the web on three different platforms, none of them Windows. Any
pointer to download a new browser or plugin for Windows just impresses
me with the authors lack of skills. The only browser I know of that
runs on all three platforms is Opera, and it's something radically
different on one of the three. Even should you get the platform right,
almost nobody is going to bother upgrading following the download
links. The very small percentage of users who are real geeks will
silently thank you for the notice, and update their software. Most
users will ignore it so long as the page isn't obviously broken. For
those for whom it's broken, all but small percentage will simply find
some other site to visit. I'd suggest that anyone thinking about writing


Your post brings up a meta-issue. How long should posts be?
I note several schools of thought.

There is the initial post, sort of a mini lecture on something
covering perhaps 7 major points.

Then you can have the theatre-critic style response where each person
in turn goes through the 7 points saying when they think.

Then they repeat the 7 points each commenting on what each of the
others had to say on the seven points. etc.

Then there is the conversational style where you discuss one major
point at a time, perhaps with several threads, one for each point.
These threads meander or split off themselves.

My preference is to think of a post, other than perhaps the initial
essay post, as like a paragraph. It should stick to one main idea.

Seems to me google will have an easier time classifying posts if they
don't cover too much ground.
--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 9 '05 #269
Roedy Green <my******************************@munged.invalid > writes:
His reply wasn't exactly clear, but I that he means that wen you use HTM
mail, you don't have to attach the photo with the email. You can also
use the HTML to refer to an image somewhere on a webserver.

There is that and also the use of HTML formatting, embedded images,
captioning, rows, borders to make the message look more like a page
from a photo album.


That's the worst of all. I certainly don't want my mail reader
opening network connections to arbitrary places when I read my mail.
I have no willingness at all to reveal my mail reading habits or IP
address to everyone who sends me email. If someone wants a return
receipt, they can use snail mail and fill out a form at the post
office for it.
Oct 9 '05 #270

"Roedy Green" <my******************************@munged.invalid > wrote in
message news:gm********************************@4ax.com...

Your post brings up a meta-issue. How long should posts be?
I note several schools of thought.


Your post brings up a usenetiquette issue. Why do you think that
perl/python/java/c people are interested in your personal discussions of
email?

Matt
Oct 9 '05 #271
On Sun, 09 Oct 2005 19:28:31 +0000, Roedy Green wrote:
On Sun, 09 Oct 2005 20:54:32 +1000, Steven D'Aprano
<st***@REMOVETHIScyber.com.au> wrote or quoted :
Only if your photos are so obscure and confusing that they need captions.
That is a hair shirt approach. What if someone is sending photos of
their new house?


Oh gosh, pictures of a new house. Why didn't you say so??? If you're
sending pictures named "my_new_house1.jpg" etc then OF COURSE they have
to be imbedded in a HTML email, otherwise how could anyone know what they
were?

What if I am sending diagrams to help someone repair
their computer? It is ridiculous to tie people's arms behind their
backs. What you do instead is work to prevent abuse. Captions in and
of themselves are not dangerous things.


I didn't say they were. Obviously you haven't been reading my emails,
just reacting against them mindlessly. I use a mail client that gives
me the choice of displaying or not displaying HTML emails. If there is no
alternative to HTML, then I may _choose_ to render the HTML.

But there is always an alternative. You can always send me a Word
document, a PDF, an Powerpoint presentation showing the steps one per
page, why the possibilities are endless.

You could even send me a URL to a webpage.
--
Steven.

Oct 9 '05 #272
On Sun, 09 Oct 2005 19:40:30 +0000, Roedy Green wrote:
Imagine a main sending emailed floor tile samples to his wife on a
business trip for her final veto and not being allowed to caption
them.


I don't have to imagine it, I've done it, more or less something like this:

"Dear wifey,

here are five pictures of the tiles I like. My favourite is tile02.jpg.
They are all in the price range we can afford. You pick the one you think
suits best, then call Freddy at TileMart on blah blah blah and order them.
We'll need X square metres."

Sheesh Roedy, to listen to you go anyone would think that human
communication was impossible before HTML email was invented.
--
Steven.

Oct 9 '05 #273
On Mon, 10 Oct 2005 08:49:32 +1000
Steven D'Aprano <st***@REMOVETHIScyber.com.au> wrote:
On Sun, 09 Oct 2005 19:28:31 +0000, Roedy Green wrote:
What if I am sending diagrams to help someone repair
their computer? It is ridiculous to tie people's arms behind their
backs. What you do instead is work to prevent abuse. Captions in
and of themselves are not dangerous things.


I didn't say they were. Obviously you haven't been reading my emails,
just reacting against them mindlessly. I use a mail client that gives
me the choice of displaying or not displaying HTML emails. If there
is no alternative to HTML, then I may _choose_ to render the HTML.


Norm Reitzel said it all a while ago:

"I don't understand that attitude. Don't we want email that has dancing
bears, cute little videos, musical tunes, animated waving hands, sixty
fonts, and looks like it's been done with crayolas? Good grief, man,
think like a three year old!"

--
Stefaan
--
As complexity rises, precise statements lose meaning,
and meaningful statements lose precision. -- Lotfi Zadeh
Oct 9 '05 #274
On Sun, 09 Oct 2005 20:01:28 +0000, Roedy Green wrote:
You might say what about those free 10 mb websites? That's not very
many images with today's megapixel digital cameras.
My system admins have a number of names for people who try to send
multi-megabyte files by email. The names start with "accursed of God"
and rapidly get worse. Email is not designed to cope with such large file
sizes, and if you are running virus scanners and spam filters -- and you
should be -- performance rapidly goes downhill from there.
I think we computer folk owe the public
We don't owe the public *anything* if they don't pay for it. We might
*choose* to build it for free, but that's our choice, not a duty.

[snip] I wrote an essay years ago on how such an email system might work.


Ah, I see. Another pie-in-the-sky replacement for email. Well, good luck
with it. I wish you every success, but don't ask me to buy shares in your
startup.
--
Steven.

Oct 9 '05 #275
>>And how do you fix the problem of unsolicited USENET articles?
(*ALL* of them are unsolicited to someone). Or unsolicited
email?


Read my essay.
http://mindprod.com/projects.html/ma...ewsreader.html

I talk around those problems.

It requires a fresh start.


This URL does not work. However, from some of the other replies,
it seems that your suggestion involved identification of the sender
with digital signatures.

I think one necessary function of email and USENET is that it should
allow you to SAFELY communicate with strangers or, worse, people
you know but do not trust at all, and who are known to be malicious,
if you wish to do so, especially since meeting in person might
invoke the use of weapons of mass destruction (like, for example,
me and my hypothetical ex-wife).

For example, George W. Bush ought to be able to exchange email with
Osama Bin Laden without risking revealing nuclear launch codes.
Hitler and Winston Churchill should have been able to exchange email
(had it been available during World War II) without revealing state
secrets accidentally. I ought to be able to exchange email with
my boss without his being able to track if/when I read it. I ought
to be able to communicate with the Direct Marketing Association to
get them to take my name off a mailing list without risking spyware
installation or revealing my credit card numbers. Union leaders and
management should be able to negotiate by email without unwittingly
leaking information.

HTML is *mostly* dangerous. (links. Javascript. references to
other files on the user's computer. Forms.) It's a lot more than
text formatting. I suggest that if you want a text formatting
language, start with *TROFF* and take out the parts that refer to
other files. As far as I know, troff doesn't have any networking
references in it. Lots of people probably hate troff, but it's a
better start than HTML.

Gordon L. Burditt
Oct 9 '05 #276
Tim Tyler <ti*@tt1lock.org> writes:
In comp.lang.java.programmer Mike Meyer <mw*@mired.org> wrote or quoted:
The technial problems have been solved for over a decade. NeXT shipped
systems that used text/richtext, which has none of the problems that
HTML has. The problems are *social* - you've got to arrange for
people to use mail/news readers that understand a rich text format
that isn't a vector for viruses. It's not HTML that has problems, it's Microsoft's crappy software.


HTML is a problem on *other* peoples crappy software as well. It
wasn't designed to carry code content, but has been hacked up to do
that.
Writing virus-free HTML renderers is not hard - but of course
Microsoft can still screw it up.
Sure - just disable all the features that make people want to use HTML
instead of something else.
Don't blame HTML for viruses - *every* document format Microsoft has
anything to do with becomes a vector for viruses.


Which would mean that every open format that MS has had anything to do
with comes a vector for viruses. Somehow, I'm not buying it.

And HTML has more problems than just viruses - web bugs, for one. But
MIME's support for external bodies gives you that anyway.

<mike
--
Mike Meyer <mw*@mired.org> http://www.mired.org/home/mwm/
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.
Oct 9 '05 #277
Tim Tyler <ti*@tt1lock.org> writes:
In comp.lang.java.programmer Mike Meyer <mw*@mired.org> wrote or quoted:
Roedy Green <my******************************@munged.invalid > writes:
> Read my essay.
> http://mindprod.com/projects.html/ma...ewsreader.html
>
> I talk around those problems.


Actually, you present a design that forces a solution that makes them
do what you want down their throats, never mind what they want, or
what they've been doing. It shows an amazing ignorance about the
internet and how people behave on it. Like most antispam proposals, it
won't actually stop spam, just force spammers to concentrate on
different channels. You seem to have randomly broken quoting for
people who download mail and read it offline, and for any medium
that's unreliable or doesn't reliably deliver messages "in order" -
which includes mail and news. Virus writers will love the ability to
change peoples address books remotely.


Since - in Roedy's essay - messages are digitally signed, authority
to advise about any email address updates would presumably be confined
to those people with access to the sender's private key.


It's not confined to just people - software can do this as well. In
particular, you should expect that the users mail agent will have to
have access to the key, so it can automatically send out the change of
address notice when the user changes their address (it actually needs
it to send any mail). Viruses regularly make users mail agents do
thing. "Change my address" becomes much more entertaining when that
triggers sending out change of addresses notices to everyone in the
address book. More likely, though, there'll be an API for getting the
key so that users can change mail agents without invalidating the
public key that everyone they correspond with has for them, and the
virus will just use that API.

This is also why his plan doesn't stop spam. Most spam comes from
zombies already. This will just cause them to masquerade as the owner
of the owned machine rather than somebody the author has a beef with.

<mike
--
Mike Meyer <mw*@mired.org> http://www.mired.org/home/mwm/
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.
Oct 9 '05 #278
Roedy Green <my******************************@munged.invalid > writes:
Perhaps you could slow them down with some randomly chosen questions
to prove they know something about you. Companies could do the same
thing.
Challenge-response system are old hat. I use one, and it reduces my
spam by three orders of magnitude. Most of what's left is spam that
went to a list that I've subscribed to whose mail circumvents the
anti-spam feature, and nigerian scam type things, which violates one
of the assumptions that such systems make about spam.

The downside is that I have no idea how many people try to contact me
out of the blue, or from an address other than the one I sent mail to,
but don't bother to answer the response.
You can inconvenience the sender to a fair degree since most people
don't often write strangers with the expectation of a personal
correspondence.


Right. Nobody sends email to addresses that come off business cards,
or off a web site, or ....

<mike
--
Mike Meyer <mw*@mired.org> http://www.mired.org/home/mwm/
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.
Oct 9 '05 #279
Roedy Green <my******************************@munged.invalid > writes:
On Sun, 09 Oct 2005 05:55:01 -0400, Mike Meyer <mw*@mired.org> wrote
or quoted :
Virus writers will love the ability to
change peoples address books remotely. Since this is just a broad brush view, I find it odd you can predict
just what bugs there will be in the early implementations.


I'm not predicting bugs in the implementations. I'm predicting how
people are going to abuse *features* of the implementations.
You sound almost as if you were the author of the current system and
feel personally attacked by others looking for ways to improve it.
Nah, I've just know people who spend a lot of time - and money -
dealing with spam, and we've discussed these issues at great
length. You haven't proposed anything that hasn't been proposed
before, and rejected for various reasons.
In my scheme, every message is digitally signed, even a change of
address message.
Yup, I assumed that.
Surely for a virus to send out a digitally signed change of address
message is more difficult than sending out an unsigned one, which they
can do today.
Maybe yes, maybe no. They can use existing APIs to send mail now. If
there's an API to sign a message - and there just about has to be,
otherwise changing mail readers will require sending out a change of
address form to change the public key - what prevents the virus from
simply using that to send out an encrpyted message? Yes, it's more
difficult, just like it's more difficult to send out mail with an
attachment than one that's just plain text. But the difference is just
more work, not something fundamentally different.
You have two problems you want to avoid:

1. the practical problem: failure to inform your correspondents, not
just your address list, of your new address (at least the ones you
don't consider spam or pests).

2. the potential problem: rogue software sending out fake change of
address notices.

In my scheme, The receiver of the change of address message ignores
it unless it is properly signed. Surely that is a more secure system
than we have today and that handles (1) without effort. At worst, a
very clever virus could change the one address book entry, the one for
this computer, in other's machines. It could not generally corrupt
other machines.


Depends on how convenient you make things. The problems aren't
technical, they're social. For instance, people will want their
address book to automatically send out change of address notices to
every non-pest if their address is changed. A virus can exploit this
by changing the address in the address book. No need for it to send
out mail - the users mail agent does it all for them. Fixing this
requires convincing the users that they should do a lot of work to
achieve point 1 - which sort of defeats your purpose.

Personally, I don't believe that you'll convince people to take do
more work to get more security. So you've got to convince all the
authors who deploy mail readers - and/or key security systems - to not
allow that. Since such a feature will be requested by users, and will
make their software more popular, that's not going to be easy either.

To be really secure, you store the private key encrypted, and ask the
user for a passphrase to decrypt it every time you want to sign a
message. So you make your interface do that, and it asks the user for
a key every time a message is signed. For true security, you have to
include the recipient address in the signatture, otherwise you're
liable to replay attacks sent different addresses, so changing your
address will involve providing your pass phrase once for everyone you
notify. Someone else will decide that's to inconvenient, and provide
an interface that stores the passphrase to reuse for some
user-specified length of time. Existing systems do this, and get lots
of use even thought they are less secure than doing it right. Then
you'll get a interface that ask for the key once a session. Then
you'll get one that asks once, and just keeps it forever. We've seen
this happen with access to web site passwords.

Guess which one users are going to prefer. Guess which one makes it
simple for viruses to hijack they system to send out mail that "you"
have signed.

<mike
--
Mike Meyer <mw*@mired.org> http://www.mired.org/home/mwm/
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.
Oct 10 '05 #280
Roedy Green <my******************************@munged.invalid > wrote:
On 8 Oct 2005 23:39:27 GMT, John Bokma <jo**@castleamber.com> wrote or
quoted :
Yeah, yeah, and 640K is enough for everybody. Same song, different tune.
For how long. Surely attachments are a stop gap. Can you imagine
people sharing images that way 100 years from now?


No, but I agree with you :-) I am not using HTML myself in email, but I
will when it makes things easier.
Why should we wait for the future? The problems blocking easy to use
photo sharing are not technological but social.


Yup, agreed. Like I already wrote, if I route all HTML email to /dev/null
I'll lose some customers, and some friends :-)

--
John Small Perl scripts: http://johnbokma.com/perl/
Perl programmer available: http://castleamber.com/
I ploink googlegroups.com :-)

Oct 10 '05 #281
Roedy Green <my******************************@munged.invalid > writes:
On Sat, 08 Oct 2005 23:33:13 GMT, Rich Teer <ri*******@rite-group.com>
wrote or quoted :
What the hell has that got to do with HTML email? Sending photos
is an example of what attachments are for.


Normally you send photos to grandma with captions under each photo.
That is far more convenient for the technopeasant receiver than
dealing with multiple attachments.


I'd like to agree, but I haven't received *ANY* properly formatted,
captioned and readable list of photos in an HTML email message in a
long while. What I usually get it an email message with a completely
irrelevant subject -- usually a reply to a random thread that happened
to include my email address in the recipient list -- with a message
body as useless as:

Here's a photo collection

or even more useless, or empty.

This and other things, that show the original poster of the particular
HTML email message has _no_ intention to spend just *one* minute to
properly write a readable, useful email message, tend to be the main
reasons why I block all HTML email messages from non-work-related
email addresses, save them in a special folder and look at them only
when I really feel like spending some time to weed through the junk.

Oct 10 '05 #282
In comp.lang.perl.misc John Bokma <jo**@castleamber.com> wrote:
Roedy Green <my******************************@munged.invalid > wrote:
On 8 Oct 2005 23:39:27 GMT, John Bokma <jo**@castleamber.com> wrote or
quoted :
Yeah, yeah, and 640K is enough for everybody. Same song, different tune.
For how long. Surely attachments are a stop gap. Can you imagine
people sharing images that way 100 years from now? No, but I agree with you :-) I am not using HTML myself in email, but I
will when it makes things easier. Why should we wait for the future? The problems blocking easy to use
photo sharing are not technological but social.

Yup, agreed. Like I already wrote, if I route all HTML email to /dev/null
I'll lose some customers, and some friends :-)


What I find is that when I see emails which are obviously spam, I
simply do not read them and delete them immediately. But then I
use Pine rather than a web browser... and while some forms of HTML
may be rendered, nothing is automatically pulled down.

Axel
Oct 10 '05 #283
In comp.lang.perl.misc Tim Tyler <ti*@tt1lock.org> wrote:
In comp.lang.java.programmer Steven D'Aprano <st***@removethiscyber.com.au> wrote or quoted:
Only if your photos are so obscure and confusing that they need captions. "Here's Johnny with the dog. Here is Johnny with the dog again. This one
is Johnny on his own. Here is the dog. Oh look, it is Johnny with the dog
again -- that's the dog on the left, in case it isn't clear. Just for a
change, this is Johnny wearing a hat. It is blue with a feather in it,
in case you couldn't tell from, oh I don't know, looking at the actual
picture."
What have you got against captions? Giving photos captions is a *very* common practice.


Why not just put them on a web page? It is then possible to include
thumbnails so the recipient can chose to see which ones he cares to
look at in detail.

It also allows the web address to be sent to several people
without wasting bandwith.

Axel
Oct 10 '05 #284
On Wed, 05 Oct 2005 21:36:47 -0600, rumours say that Mahesh Padmanabhan
<su****@gmail.com> might have written:
In article <11*********************@g14g2000cwa.googlegroups. com>,
"Xah Lee" <xa*@xahlee.org> wrote:

<snip lot of drivel> While I don't like to feed the trolls, I do find his posts amusing. He
is like a spoilt child seeking attention.


s/is like/is/
--
TZOTZIOY, I speak England very best.
"Dear Paul,
please stop spamming us."
The Corinthians
Oct 10 '05 #285
request for Google groups enhancement:

Report Abuse button should have 4 choices:
- Spam
- Illegal Content
- Xah
- other
;-}

Christos Georgiou wrote:
On Wed, 05 Oct 2005 21:36:47 -0600, rumours say that Mahesh Padmanabhan
<su****@gmail.com> might have written:
In article <11*********************@g14g2000cwa.googlegroups. com>,
"Xah Lee" <xa*@xahlee.org> wrote:

<snip lot of drivel>

While I don't like to feed the trolls, I do find his posts amusing. He
is like a spoilt child seeking attention.


s/is like/is/
--
TZOTZIOY, I speak England very best.
"Dear Paul,
please stop spamming us."
The Corinthians


Oct 10 '05 #286
On Sat, 08 Oct 2005 20:43:12 GMT, Roedy Green
<my******************************@munged.invalid > wrote:
On Tue, 04 Oct 2005 17:57:13 -0000, go***********@burditt.org (Gordon
Burditt) wrote or quoted :
HTML enables a heck of a lot of problems: "web bugs" in email,
links to fake sites that appear as real ones in what shows up
on the screen, Javascript viruses, denial-of-service attacks
(pages that open two windows when you close one), etc.
That is like hating all choirs because televangelists use them.


I liken it more to hating all viruses because some of them
install keyloggers.


I take it then you avoid browsers or use Lynx? No you FIX the
problems rather than wear a hair shirt. Same for email. Why should
rich expressions only be permitted to those with websites.

Some people use email PRIMARILY for sharing photos.


And they don't know about attachments?
--
Al Balmer
Balmer Consulting
re************************@att.net
Oct 10 '05 #287
On 9 Oct 2005 13:12:43 -0700, ri****@Azonic.co.nz wrote:
My grandma doesn't put captions in her photo album,
and she doesn't need captions on her photos in email.


She doesn't need captions in the album because she will explain the
pictures, at length, every single one of them, to anyone who comes
within grabbing distance.
"Here's Johnny with the dog. Here is Johnny with the
dog again. This one is Johnny on his own. Here is the
dog. Oh look, it is Johnny with the dog again -- ...


If your photos are so banal then only people who would recognise the
people would care about them.

Captions are for people who won't recognise the subject of the photo.
When you send a photo of a house to Granma is she supposed to just
_know_ that it your new house, or the one across the road, or the one
that burnt down last week ?


You might try something truly innovative, like including a line in the
email that says "Hi, Grandma, here's a picture of our new house."
--
Al Balmer
Balmer Consulting
re************************@att.net
Oct 10 '05 #288
On Sun, 09 Oct 2005 00:03:05 +0200, Lasse Vgsther Karlsen
<la***@vkarlsen.no> wrote:
In any case, html email is here to stay. Or perhaps I should remove html
and say "richly formatted", whatever that might mean in the future.

But trying to keep your email world into a pure text-based
no-formatting-whatsoever world, that's a fantasy bubble that is bound to
burst, sooner rather than later.

Deal with it.


And you're calling other people control freaks!

Sorry to burst *your* bubble, but no one has to "deal with it." For
centuries, intelligent people have managed to convey information using
plain text, and they'll manage for the foreseeable future.

I'm surprised that you can bring yourself to write articles in such a
humble venue as Usenet.
--
Al Balmer
Balmer Consulting
re************************@att.net
Oct 10 '05 #289
Rich Teer wrote:
On Sun, 9 Oct 2005, Roedy Green wrote:
Normally you send photos to grandma with captions under each photo.
That is far more convenient for the technopeasant receiver than
dealing with multiple attachments.


And even more convenient is "Hey grandma, check out the latest
photos on my web site: www.example.com/rich/photos".


In principle you're right but you forgot:
"And hey grandma, use this account name and this password for accessing
this web page."

Ciao, Michael.
Oct 10 '05 #290
On Mon, 10 Oct 2005, Steven D'Aprano wrote:
But there is always an alternative. You can always send me a Word
document, a PDF, an Powerpoint presentation showing the steps one per
page, why the possibilities are endless.
Why saddle you with a proprietory format (M$ Office), when StarOffice
and OpenOffice do the job just as well, for much cheaper (and are cross
platform too)?!
You could even send me a URL to a webpage.


Indeed!

--
Rich Teer, SCNA, SCSA, OpenSolaris CAB member

President,
Rite Online Inc.

Voice: +1 (250) 979-1638
URL: http://www.rite-group.com/rich
Oct 10 '05 #291
Tim Tyler <ti*@tt1lock.org> writes:
The "user mode" uses style sheets you specify.

There's a whole bunch of built-in ones - and you can cascade them:
Yup, saw those.
``There is also the inclusion of 12 packaged user style sheets and an easy
menu application interface (View > Style). These sheets can be cascaded
together, with or without the page's styles.


How do you set things to cascade those with the page's styles? I
couldn't see anything obvious in the UI, and the Opera help pages
didn't provide much help either.

Thanks,
<mike
--
Mike Meyer <mw*@mired.org> http://www.mired.org/home/mwm/
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.
Oct 10 '05 #292
On Sun, 09 Oct 2005 19:07:42 -0400, Mike Meyer <mw*@mired.org> wrote
or quoted :

HTML is a problem on *other* peoples crappy software as well. It
wasn't designed to carry code content, but has been hacked up to do
that.


It seems to me it goes without saying that you cannot trust code from
strangers, especially anonymous strangers. You simply don't run code
sent in email except from highly trusted individuals. If you do, that
is YOUR fault for being such a silly ass not the mail system's ability
to deliver code. It is as stupid as running code that came as an
attachment.

One of the ideas I play with in my essay is that you could insist
your correspondents have digital id certificate signed by Thawte or
other CA attesting to their identity, thus giving you legal recourse
against them if they send you spam, Trojans etc.

This would slow them down with requests for permission to send. they
could send only one per certificate. The cost and hassle of getting
the certificate could deter tem, and uniquely identify them for
blocking and public black lists.
..


--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 10 '05 #293
In comp.lang.perl.misc Roedy Green <my******************************@munged.invalid > wrote:
HTML is a problem on *other* peoples crappy software as well. It
wasn't designed to carry code content, but has been hacked up to do
that.
It seems to me it goes without saying that you cannot trust code from
strangers, especially anonymous strangers. You simply don't run code
sent in email except from highly trusted individuals. If you do, that
is YOUR fault for being such a silly ass not the mail system's ability
to deliver code. It is as stupid as running code that came as an
attachment. One of the ideas I play with in my essay is that you could insist
your correspondents have digital id certificate signed by Thawte or
other CA attesting to their identity, thus giving you legal recourse
against them if they send you spam, Trojans etc. This would slow them down with requests for permission to send. they
could send only one per certificate. The cost and hassle of getting
the certificate could deter tem, and uniquely identify them for
blocking and public black lists.
Plus being a total pain for legitimate correspondents and also expensive.

I don't know how much spam other people receive but on one account I
hardly receive any as I reserve it for friends and business. On another
I had about 40 spam messages which took all of ten seconds to delete.
Hardly a serious matter.

Axel


Oct 11 '05 #294
ax**@white-eagle.invalid.uk writes:
I don't know how much spam other people receive but on one account I
hardly receive any as I reserve it for friends and business. On another
I had about 40 spam messages which took all of ten seconds to delete.
Hardly a serious matter.


You don't have a spam problem. I get a few thousand spams a day -
which get filtered down to a handful. I don't have a spam problem.

Jeff Poskanzer, now *he* has a spam problem. He gets a few million
spams a day: <URL: http://www.acme.com/mail_filtering/ >.

For anyone who runs an ISP, spam is chewing up an ever-growing
percentage of their bandwidth, and a significant fraction of their
staff time. They have a spam problem.

But me and you, we don't have a spam problem. At most it's an
annoyance.

<mike
--
Mike Meyer <mw*@mired.org> http://www.mired.org/home/mwm/
Independent WWW/Perforce/FreeBSD/Unix consultant, email for more information.
Oct 11 '05 #295
On Tue, 11 Oct 2005 14:27:30 +0000, axel wrote:
I don't know how much spam other people receive but on one account I
hardly receive any as I reserve it for friends and business. On another
I had about 40 spam messages which took all of ten seconds to delete.
Hardly a serious matter.


Can I remind you that spam is approximately 70% of all email traffic these
days? Most of that is blocked by the ISPs, but even so you are obviously
one of the lucky few.

My home address, which I cunningly will not give you, used to get about
fifty spams a day until I changed ISPs and email addresses. That would
quadruple for a week or so whenever one of my Windows-using friends would
get infected by a virus. My current home address only gets about one a
month, which is what I consider acceptable.

My work email address, on the other hand, is another story. We run a two
layer defence: blocking blacklisted addresses at our mail server, and spam
assassin at the individual user level. Even with that, I get about 100
spams a day delivered into my inbox, although many of those are addressed
to generic email addresses which are automatically forwarded to me.

Four years ago, one of our sys admins accidentally turned off the
blacklisting at the mail server. In the ten minutes it took to get it
turned back on, the CEO of our company received eight hundred spams.

--
Steven.

Oct 11 '05 #296
On Tue, 11 Oct 2005 14:27:30 GMT, ax**@white-eagle.invalid.uk wrote or
quoted :
This would slow them down with requests for permission to send. they
could send only one per certificate. The cost and hassle of getting
the certificate could deter tem, and uniquely identify them for
blocking and public black lists.


Plus being a total pain for legitimate correspondents and also expensive.


First understand that you only have to get permission to send once.
That carries on until revoked. Permission gives me an encryption key
and permission to send mail to you.

Also I envision by the time this comes into being most people will be
24-7 attached.

So let's say I decide to send an email to Donald Knuth. I compose my
one line introduction. I compose my email and walk away. Without
further hassle on my part, either my mail will be delivered, or will
be rejected or it will sit in limbo until Dr. Knuth gets time to
decide. If he rejects my plea, my mail will never arrive at his site.

Presumably Dr. Knuth would configure his software to accept only pleas
from people with digital ids, and further to accept at most one plea
from them and to remember his no for at least a year.
--
Canadian Mind Products, Roedy Green.
http://mindprod.com Again taking new Java programming contracts.
Oct 12 '05 #297
Roedy Green <my******************************@munged.invalid > wrote:
So let's say I decide to send an email to Donald Knuth.


:-)

--
John Small Perl scripts: http://johnbokma.com/perl/
Perl programmer available: http://castleamber.com/
I ploink googlegroups.com :-)

Oct 12 '05 #298
Roedy Green <my******************************@munged.invalid > writes:
So let's say I decide to send an email to Donald Knuth.


Good luck. Prof. Knuth stopped reading email years before there was a
big spam problem. He uses his own version of hashcash to cut down on
unimportant mail: if you want to write to him, you have to send him
snail mail, which means buying and using an actual postage stamp.

I do something like that, sort of. I no longer publish an email
address, including on business cards and so forth. I have a contact
url that I give out instead, which keeps me off mailing lists.
Oct 12 '05 #299
Paul Rubin <http://ph****@NOSPAM.invalid> wrote:
Roedy Green <my******************************@munged.invalid > writes:
So let's say I decide to send an email to Donald Knuth.


Good luck. Prof. Knuth stopped reading email years before there was a
big spam problem.


Not entirely true:
"My secretary prints out all messages addressed to taocp at cs.stanford.edu
or knuth-bug at cs.stanford.edu, so that I can reply with written comments
when I have a chance."
<http://www-cs-faculty.stanford.edu/~knuth/email.html>

And I am sure Roedy is aware of this, hence his example ;-)

--
John Small Perl scripts: http://johnbokma.com/perl/
Perl programmer available: http://castleamber.com/
I ploink googlegroups.com :-)

Oct 12 '05 #300

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

336
by: Xah Lee | last post by:
Jargons of Info Tech industry (A Love of Jargons) Xah Lee, 2002 Feb People in the computing field like to spur the use of spurious jargons. The less educated they are, the more they like...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development projectplanning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.