Well Hallelujah! Big Brother has finally acted!

I just checked into a motel today that not only has a password for its internet access, and not only a good, secure password, but — get this — it was automatically generated when I checked in and asked about internet access, and that everyone gets an unique password. They told me that it has an expiry time that I could choose when I first logged on; if I mistakenly chose one too short, I just would have to call the front desk for a new one. I know it’s unique to “me” because I’m using two laptops on this trip, my company machine for company business, and my personal laptop for personal stuff, and when I tested the original password on my personal machine after having used my company machine, I was told that the limit of accounts attached to the password had been reached, so I called the front desk and they gave me another one, no questions asked.

Some would say that the unique passwords could be a violation of my privacy. Possibly, if they happened to tie the password to my room; I don’t know if they have, but in this case … well, the conspiracy theorist in me has not been awakened (I know, famous last words. 🙂 ) I suppose I’m not fond of the notion that the unique password could be used to against me, including wrongly and/or maliciously.

However, I suspect that I’m safe; hotels are generally in the business of being discrete as part of their profit motive, so keeping track of who gets which password or derivative information about my internet use is, well, not generally in their interest. Then again, perhaps I should also be worried about the key card hotels give me and whether they are keeping track of how often I go in and out of the room, or use the pool, hot tub, exercise room or laundry room protected by the key cards. Ooops, they took down my name, address, and phone number, and they have credit card information linked to me when I signed in! My privacy has already been thrown out the window!

I shouldn’t be — I figure that this should be the norm — but I’m sincerely impressed that this hotel protects its business resources much the same way they they protect the others, such as the aforementioned rooms, pools, hot tubs, exercise rooms, laundry rooms, and the like.

Hotel internet access passwords — Here’s a case for Captain Obvious

In the past 4 weeks I have spent as much time in my own bed at home as I normally spend in hotels for business over 6-12 months (about 4 nights.) As such I have been using a few hotel internet hookups.

First, the good news from Captain Obvious is that most hotels and motels in North America these days seem to have wireless internet. I know, I’ve been using hotel/motel wireless for about three years now, but now it’s so commonplace, that my experience last fall near Boston at an otherwise charming New England Inn where they used a large group of computer savvy geocachers as guinea pigs for their new wireless internet setup seems odd.

Next, to set the stage, Captain Obvious is observing that several years ago when people started getting wireless routers in their homes and offices and anywhere else, after a while people learned that they had to lock down their router with a password that nobody knows except, well, those with whom they wanted to share their bandwidth (and only those with whom they wanted to share their bandwidth), so that, well, you know, the neighbours don’t decide to save a few bucks on a cable modem and piggyback on yours. Or use so much of it that you start getting overage charges, assuming that their theft of your signal doesn’t significantly affect your use of your internet. Or that strange looking people don’t park in front of your house for hours on end for no apparent reason. Or worse yet, do so while doing things that would have the cops knocking down your door for doing things like, oh, who knows, downloading kiddie porn or spamming or hacking into financial institutions and stealing large sums of money.

Which makes me wonder about the all the hotels I’ve been staying at over the past month:

– The first one had a great, really secure password, that hadn’t been changed in over a year and a half.

– The next one used the hotel’s name with a few numbers added to the end. I don’t expect that they change it very often, if at all; I’ve used that hotel a couple of times over the past three weeks and I haven’t been told that the password has changed. The signals just work fine, and at the end of the week I think it’s even money that it still won’t have changed when I likely will go back to that hotel.

– The next one didn’t even have a password.

– The next one used its fax number as its password. Apparently the owner just recently acquired the establishment and at least has gotten to the point of pulling the plug on the router for a few minutes whenever he notices a suspicious character in his parking lot. There were anywhere from two to four other insecure networks in range, although one called itself “free public wireless”, and the other was a nearby internet café.

– The next one has two routers without a password, and there’s another insecure signal in range.

At each place I have implored the people at the front desk to please install a password and change it at least monthly if not weekly, or even have an unique key generated for each guest or at least each hour for whoever comes in during that period (OK, this is a bit too much Big Brother, but the day may come), and not use a dictionary word; of course two of the five are staffed by employees without any real influence over such matters, and at another I suspect much the same.

In general I wonder how hard it is to have a control panel to their router to change the password, that they remind themselves to do according to a schedule they can mark on their calendar, or they can ask their IT guy to set up a script to do it automatically according to whatever schedule the innkeeper chooses, and they just need a quick reference note to show up on their guest registration screen with the “internet password”. I know, I can’t do it, but I could even figure out how to do a cron job; surely in the MS world it’s easier than that.

I congratulated the first place for their excellent password but said that after a while all someone has to do is stay a night or speak with someone who has and they can get the password. Then they could easily set up a router in the bushes nearby and a few repeaters or a wire to their house a few doors down and bingo, who cares about the cops banging down the innkeeper’s door. The cops *know* that hotel guests will often use their trips to hotels to download things they might never do at home. However, the innkeeper is paying for some thief to reduce the service he’s supplying to his customers just to remain competitive. All he needs is the bad publicity from the cops knocking down his door or those of his clients because of someone in a van with a laptop, who can drive away when the sirens are heard down the street, is conducting some illicit business using a hijacked connection.

I can put up with the nuisance of a fist-time password challenge web page at a hotel. I understand that Friday evenings to Sunday mornings — and possibly other times during the week — there are a lot of guests at a hotel and the speed is likely to be slower as a result. But I wonder about how much slower it is because some industrious person may be hidden somewhere in the bushes or the parking lot, or have a series of repeaters running down the block and slowing down the access I’m paying for through my room rate. Or temporarily losing a connection because the innkeeper is “scaring off” a suspicious character in the parking lot by unplugging his router for a few minutes.

And the notion that my door conceivably *could* be knocked down for someone in the parking lot, or at least, I could be a spectator to such a thing and still be questioned, is less than savoury.

My complaints *are* rather petty compared to world hunger. But that’s not the point: It seems to me to be a good combination of due diligence and, well, good business sense, just to change the passwords on the first of the month, or every Monday. They put key-card locks to the pool, the whirlpool, the exercise room, and even the laundry room (that is coin-operated!) to limit access to their guests.

Why not do the same for their wireless internet?

Sigh … Bill Kurtis *is* consistent

In my last post I mentioned that Bill Kurtis, in his “I’m Bill Kurtis, and I’m faster than …” commercial series, didn’t appear to be consistent with the laptops the techies were supplying him with.

Obviously, I have seen the original commercial several times since and have been paying attention.

Well apparently he has been consistent, I again demonstrated my general incompetence by, in this case, wanting to see brown (ughh!) in the form of the Gnome desktop. In fact, it was much closer to the greenish blue of the second “Andy Roddick” commercial. And, there is the disclaimer at the bottom of the screen: “Simulated images”

This bugs me a lot. I’ve said it before, I say it again: it seems that for something as simple as these commercials, the screenshot doesn’t matter; all they are trying to do is avoid having some software developer demand royalties for the screenshot, so they make a generic desktop screenshot in-house. Too bad, the techies in the back usually would love to see their laptop in a (inter)nationally broadcast commercial and have the bragging rights.

Of course, putting aside my conspiracy theory about the TV producers not wanting to pay royalties for the on-screen use of copyrighted software or the legal department not wanting to risk depicting a “real, live OS” (like it or not that’s what MS is) and making potential customers think that what is being advertised will *actually*work* with their computer (hey, there’s a new conspiracy theory for me!), there is probably a much more logical explanation, along the lines of the difference in cycles between a screen and a TV camera (flickering), or simply maybe it’s difficult to get a good screen resolution off a computer in the shot on TV.

Printing PDFs

I’ve just had an interesting object lesson in the differences between two different pieces of software that have more than essentially the same function.

Today I had an important PDF document to print out at home instead of at the office. For the purposes of practical convenience, it was far better to print it out at home and just deliver it to the office than spend the extra time at the office (5-10 minutes) turning on my office computer and printing it out there on a printer I knew would have no difficulty dealing with it, having printed out a few dozen identically-generated documents on it.

On my pretty much stock Fedora 10 box, I use the Evince Document Viewer 2.24.2 using poppler 0.8.7 (cairo) for the Gnome desktop to display and print PDF documents. So far, I’ve been satisfied.

The PDF’s layout had margins beyond my printer’s abilities. And of course the most important parts of the document, being right at the edges of the margins in this document, were being cut off in the process of printing out the document. A reduction in the print size was not useful since the vital information was on the end of the document being cut off in the margins. I suppose I could have tried rotating the document to try to see if the cut off part would not contain crucial information, which I didn’t think of at the time. Both these strategies, however, miss the point: If the original document has very narrow margins, something is going to get cut off no matter what; not exactly desireable.

I did try something that happened to involve a Windows box (ughh) mostly because it had a different printer, and you never know how things behave differently with different equipment.

Not surprisingly, the windows box happens to have an Adobe viewer installed (I avoid that box as much as possible; I don’t even maintain it, that’s my brother’s job. 🙂 ). I click to print the document and whaddya know, in the print dialog there’s an option to fit the document within the printable area. Document printed, convenience secured.

Now what I would like to know is how much of the print window in my desktop is governed by HPLIP, how much by Gnome, how much by CUPS, and how much by the application invoking it at the moment. So I did a little experiment: Always selecting my printer, I opened a print dialogue in Evince Document Viewer, OpenOffice.org (3.0.1), Firefox (3.0.7), The Gimp (2.6.5), Xpdf (3.02) which I intentionally installed for the purpose of this experiment, and gedit (2.24.3) (on which I’m composing this blog). Besides Xpdf, each appears to have the same base, and except for Evince Document Viewer, each also adds a function tab of its own. Xpdf, on the other hand, has its own stripped-down interface — either invoke the lpr command or print to a file.

Here’s a quick table listing the tabs listed in the print dialogs available in five, off-the-shelf standard installs of Fedora 10 software, with my printer selected, plus Xpdf, which was installed directly from the Fedora repositories without any modification of settings or whatever on my part:

OpenOffice.org*: General; Page Setup; Job; Advanced; Properties
Firefox: General: Page Setup; Job; Advanced; Options; Properties
Document Viewer: General; Page Setup; Job; Advanced
The Gimp**: General; Page Setup; Job; Advanced; Image Settings***
Xpdf: Xpdf has its own stripped-down interface
gedit : General; Page Setup; Job; Advanced; Text Editor

* There is an Options button in the “Page Setup” tab for OpenOffice.org.
** The Gimp treats my “special” PDF as an image much like any other, and automatically sizes it to the current settings, much like it would handle a .png or .jpg image
*** The Gimp has an option to ignore the margins; see above note

Not one, besides The Gimp, has an option to fit the document within the printable range, and The Gimp only indirectly, because of the way it seems to handle PDFs by default as an image to be manipulated. And of the others, to be fair, only Document Viewer and Xpdf deal with PDFs — even FireFox delegates PDFs to the Evince Document Viewer by default.

Then I did another little experiment: I installed Adobe Reader 9.1 (that license is interesting, pretty convoluted, and makes me wonder whether I may use the installation at all; in any case, I’ll be getting rid of it since I really only installed it for the purpose of this experiment, and decided a while ago that having 2 PDF viewers above and beyond that which is available in the basic distro installation is superfluous unless ther’s a particular reason for it.) And what do I see? A new print dialog that reminds me of the one I saw earlier on the windows box. Interestingly, it has “fit to printable area” and “shrink to printable area” options.

So my little experiment has led me to the following conclusions:

– many pieces of software, presumably not wanting to reinvent the wheel, rely either on the OS or I suspect, at least in this case, the desktop environment for its print dialogs;
– some software authors do want to reinvent the wheel, such as to “do it their own way”, or to be completely platform and environment independent, and therefore make their own dialogs;
– some software authors want to do extra things but don’t want to reinvent the wheel, so they have a wrapper for to add extra functionality to an existing base;
– in my documents, I shouldn’t try to stuff as much content as possible into each page too far, at least not by playing around with the margins.

Looks like something for the Evince authors to toss in. Assuming, of course, that — without fundamentally changing a document — resizing a PDF and/or its content to the local printer’s printing range is a really useful feature, such as to deal with awry margins, or PDFs sized for A4 instead of letter sized or vice-versa. 🙂 And that such non-conformities and/or their prevalence make it worth my using the Adobe Reader, licensing issues aside. Or that another PDF reader out there that has that functionality.

Hmmm … OO.o differences, Fedora, and Ubuntu

In my post I may just have that reason to get rid of Ubuntu I whined about minor differences between “stock” OpenOffice.org appearances and functions and those I used straight off the OO.o website as well as what ships with Fedora.

This blog (here’s my archive) explains a bit why: It says “Many Linux distributions ship ooo-build. … Fedora ships a modified OpenOffice.org, but Fedora does not use ooo-build.” Which means that in keeping with Fedora’s usual policy, it ships upstream versions of software with only reasonably required modifications to make it work under Fedora. When I was using CentOS, I was using the vanilla version directly from OO.o.

That explains a few things. It doesn’t necessarily justify my whining — nor all the changes Ubuntu or other distros (or even Fedora) make, but … Why mess with a good thing? 🙂

Vino-server appears to have struck again!

Back a couple of years ago, my CentOS-4.6 system was slowing down to near unuseability. Using the Top command at a command line, there seemed to be this service listed at the top called Vino taking up a good amount of resources. My brother looked at it, researched it, and set up an hourly cron job to kill the vino-server every hour, and the problem was solved.

Back last fall, I was getting this notion, while running Ubuntu 8.04 LTS, that the system had slowed down a bit much the same way that Windows 2000 is a little slower than Win98. When I switched back to Fedora 10, I noticed the same thing. However, I never noticed a return of the infamous vino-server.

Then last week I figure it’s time to get more memory and decided to pull out my 512meg memory stick and go with it, for comparative purposes to make sure I get the right thing, to the store to get a twin for it, or a 1gig stick, in the hopes that either a gig or a 1.5 gigs would improve performance. I’m cheap and was pleased to pick up what appeared to be a nearly-new, opened box of 1gig of SDR2 667mhz for $5.

Well, I guess those of you who actually know what to do around an open computer are chuckling by now and know that my new purchase doesn’t fit in my DDR slots, the little slot in the DDR2 stick being about a millimetre or two over from the same slot in DDR memory sticks.

In the meantime I of course put my original memory stick back and notice over the past week that my computer is becoming increasingly bogged down to unuseability. During the week I found a website that seemed to make my computer freeze, but others didn’t. Today I mention the general slowness that the computer has bogged down to to my brother who looks at things and he has a flash of memory. A quick hourly cron job is set up to kill vino-server, and my computer works fine again.

Laptops, Linux, and US Customs

This weekend I went to meet some friends in the beautiful Commonwealth of Massachussets. I live north of the 45th Parallel in this part of the world (many of you might think “So what?” Think of the 49th Parallel, where the Canada/US border is much of the time out west.) I find crossing the border stressful, I always have all sorts of delusions about the difficulties I’ll be experiencing while answering questions from someone carrying a gun. (Usually the remarkable crossing is returning home: The Canadian guards roll their eyes in a bored kind of way when I pass them my passport, no doubt thinking “Oh, he’s a citizen, we have to let him in.”)

One of the things I was worried about was my laptop. On the advice of my Linux-guru brother, I ask him to set up an automatic login so that should the friendly US border guard ask me to show him my computer, it’ll boot up no trouble and not go through a login that may raise suspicion that I might be logging into a bogus account hiding all sorts of nefarious things. He also recommends that all .mp3’s be absent as well as other, ahem, illicit material (which I don’t normally have anyway), advice I take to heart.

However, besides the nuisance of a possible confiscation of my beloved 5+ year old laptop, what really has me worried is a suspiciously-asked:

“What’s that?”
“The gnome desktop under Fedora Linux.”
“Oh, that looks different.”
“Sure, you can get Linux off the internet for free …” (wince, I shouldn’t have said that, at least not that way …)

And then a bunch of annoying explanations that no Sir, I don’t have any illegally downloaded software, yes Sir it’s free and legal to do so, no Sir, there’s no copyright infringement here, no Sir, I’m not one of those nefarious computer crackers you hear about, think of this the way you might think of a Mac; an alternative to Windows …

Of course, the really nice border guard at the US border couldn’t have been less interested in the fact that I had a laptop with me, let alone that I turn it on.

Ok, Ubuntu works …

I haven’t gotten around to removing Ubuntu from my desktop. Frankly, besides what I’ve described as problems with it, basically, the desktop experience is pretty much the same as under a Red Hat system. Ugh. Which means, it’s staying a while just to avoid the hassle of reformatting.

Uggghh … I need a bar of soap

I think I’m going to be sick. 🙁

I never cared for Debian and derivatives because Debian never seems organized enough to get a new release out. In all honesty I’ve never tried Debian. I hate Ubuntu, mostly because I’m very suspicious of anything with great marketing hype and hordes of fanboys to boot. (So much for my initial suspicion of the Stargate movie in 1994 and all of its over-hyping; I have long since wished I had overcome this and gone to see it in the theatres, and I do love SG1 in reruns. 🙂 )

Last week my brother and I were jumping hoops again and again to get my printer working under Centos 5.2. Last January we’d gone to a lot of trouble to get it to work under Centos 4.6 (I finally upgraded to the 5.0 series about a month ago.) No matter how many hoops we’d jump through and resolve there were still more, or another set would surface. Realize that this is a relatively new printer that must have come out at least last fall if not earlier, my brother received it as part of a “throw it in with the new laptop he bought” kind of deal. Red Hat therefore had gone through at least one update, if not two (at least 5.2 if not also 5.1) to add the appropriate drivers or move to the next HPLIP version that would support the printer. To give you an idea, Centos 5.2 comes with HPLIP 1.6.something, my printer needs at least 1.7.something, and the current version is 2.8.something.

Seems to me that commodity printers should be supported, it’s not as though a corporate situation doesn’t use printers. Though they would probably say that my line of printers is too commodity for an enterprise to be interested in, they probably want high-capacity, high-quality printers, not an inkjet meant for the consumer market.

I knew that the printer worked under ubuntu since I tried a live CD from them and it worked without saying boo. My brother was “willing” to continue trying to get it to work but was pushing hard to switch. “You can always switch back to Centos you know.”

The printer was a killer. So is getting wireless on my laptop, using a several years old (about 4 years old) pcmcia wireless card; under CentOS 4.6 I had a kernel under which it worked but any time there was a kernel upgrade I would have to switch back if I wanted to use the wireless. We hadn’t done anything yet about the wireless but had a plan.

I still haven’t gotten the wireless to work under Ubuntu but to be fair I haven’t tried yet at all.

My first reaction was that Ubuntu was the Playskool version of linux.

I also HATE the fact that the default user under Ubuntu is a defacto root user — first thing I did was get rid of the annoying sudo requirement by assigning a password to root, but it’s not of much value because so far I haven’t come across anything in Ubuntu that really requires root the way it would under ANY other linux distribution, other than the fact that it constantly asks for passwords to do anything. Also annoying is that I can’t log root into a gui to do things that way (including to REMOVE the default user from the admin ring.)

This may be the undoing of Ubuntu along the lines of the way that Windows is plagued with problems because most of the time the default user has admin rights and can install and run just about anything unless the Admin user shuts it down. The only upside is that it always asks for your password, but I expect that most windows converts would find this annoying and just mindlessly enter their password just to get on with things.

Once I got over the shock, the problem now is that the user experience, other than the administration to which I’m accustomed mostly doing under a command line instead of gui, is identical to Centos. (The main ubuntu distro desktop is gnome, as is the case for Centos.) Admittedly, the Synaptic gui package manager along with the extensive Ubuntu repo vs. the Centos repos is as good as they say, and worth the switch. And 8.04.1 is an LTS version, meaning that it’s supported for 3 years instead of having to go through the reformat treadmill every 6 months (OK, Fedora supports versions for a month after the release of the second release following, meaning about 12-13 months.)

I hope that RHEL (and hence Centos) shapes up and realizes that some people like using as a desktop, and that making it at least vaguely usable without pulling teeth and hair is as important as making it stable.

I have to go now and wash my mouth out with soap.

New Desktop and Centos 5.2

So I’m going to the bank to deposit a trivial amount of pocket money (ok, not so trivial that it isn’t worthwhile to me in the moment; I’m discussing $50) and I decide to walk into the used laptop store before crossing the street.

I see this really cute Dell mini-tower. “Hyper-threading,” the guy tells me. Elsewhere I hear, “no good, could be a real security flaw under linux”. $100; I take out all my bills and about $40 in silver (I occasionally have way too much silver in my pockets!) and promise to come back with the remaining $10.

A cute little P4 2.8 with 512 megs and a 40gig HD, but only a CD rom. I’m happy, apparently there were a couple of duds in the lot of them he received.

Got home, and put on Centos 5.1 using the CD’s from a couple of months ago. Funny, the next day 5.2 comes out and I of course immediately upgrade, but the whole thing takes several hours to download and install!