JohnGrahamCumming writes: "In this simple project a hacked Linksys WRT54GL talks to a public API to get real-time bus information and displays the times of the next buses on a model bus. Never miss the bus again!" Link to Original Source
JohnGrahamCumming writes: "It's been reported that the GCHQ code challenge has been solved and 'complete' solutions posted on the web, but there's more to it than meets the eye. There's a whole block of undecrypted data just waiting to be examined." Link to Original Source
JohnGrahamCumming writes: "Unable to resist a string of programmable Christmas lights I cut them up and built and 7x7 color display from them. The string is controlled by an Arduino Pro and hidden in a picture frame." Link to Original Source
JohnGrahamCumming writes: "In 1837 Charles Babbage laid down plans for a general purpose digital computer with memory, a CPU, a printer and a plotter. Now there a project afoot to actual build the massive steam-powered machine." Link to Original Source
JohnGrahamCumming writes: "I had an itch that needed scratching... I needed to render equations on the web and I didn't want to rely on something like MathML because of poor browser coverage.
So, I created The Equationater. Type in an equation in LaTeX format and it is instantly turned into a PNG file that you can download or link to." Link to Original Source
JohnGrahamCumming writes: "Photoshop's clone tool provides a powerful way of covering up areas of an image. Uncovering those touched up areas can be done automatically using a recently published algorithm. This blog post describes the algorithm, with examples, and provides GPL licensed source code to image forgery detection." Link to Original Source
JohnGrahamCumming writes: "The shimmer project implements a cryptographically-based system for hiding important (e.g. SSH) open ports in plain sight. By automatically forwarding from a range of ports all but one of which are honeypots and by changing the ports every minute only a user knowing a shared secret can determine the location of the real SSH server." Link to Original Source
JohnGrahamCumming writes: "My newly released Wildfire application brings social news to Facebook by exploiting Facebook's social graph. Instead of "digging" stories, or "voting up/down", stories gain credibility only if you deem them worthy of being passed onto your friends. Wildfire offers users three views of the news: the news you and your friends deem interesting, the news that the great unwashed deem interesting and a random view. Randomness means that the Wisdom of Crowds is harnessed without succumbing to mob rule. And RSS integration means you can automatically bring your feeds to Facebook and pass on a subset of the stories. Personally, I started with the Slashdot feed."
JohnGrahamCumming writes: "1,225 Facebook applications. 73,109,074 installed in profiles. Hence, the average application has 59,700 users. The problem with the average is that it hides a savage reality of Facebook applications: some have many users, most have almost none. 86% of applications on Facebook have less than 10,000 users, with 62% having less than 1,000."
JohnGrahamCumming writes: "Web crawlers that search for email addresses on web sites are a big problem. My simple and free email image generator service generates a randomized image containing your email adddress. Simply copy and paste the relevant HTML to your web site to get a human-readable image that contains your email address but hides it from web crawlers." Link to Original Source
JohnGrahamCumming writes: "If you've got a snippet of source code, a neat algorithm, a cool mashup, or just an explanation of some awful Windows API you can share it with UseTheSource a new web site I've put together. Using the same 'voting' style as popular social news sites, and divided by language, you can vote on the best snippets of the day. And the entire source of the site is open too."
JohnGrahamCumming writes: "SPF, Sender-ID and DomainKeys all require that email messages be received before their validity can be checked, but SMTP servers are overloaded with SPF-compliant and DomainKeys-signed spam. Trusted Email Connection Signing is an approach that allows an SMTP server to decide before any email is delivered whether a connection is trustworthy or not saving bandwidth and CPU on overloaded mail servers."
JohnGrahamCumming writes: "In this article I argue that you shouldn't be using a debugger. Instead you should be using your brain, printf and unit testing. After decades of improvement in programming languages, debuggers still suck. And they are not going to improve because the entire idea of breakpoints, single stepping and watching variables is the wrong way to debug."
JohnGrahamCumming writes: "If the web page you want is overloaded because its Slashdotted, or it's just NSFW but you don't want to forget about it, the free service l8tr will send you an email reminder when the web page becomes available. Now if the site is Slashdotted, of course, it can't remind you of its own existence!"