Jun 012010
 

The other day, I updated the Java VM on this machine, and as part of the process, I uninstalled the previous version. During the uninstallation process, I was presented with the following dialog:

I’m not sure what purpose the checkbox in this dialog serves. By checking it, do I suppress the confirmation dialog for all future uninstallations? That doesn’t sound smart. But what is the alternative? A checkbox that serves no purpose other than helping me avoid having to click the mouse one extra time just in case I happen to reinstall, and then uninstall, the 6.19 version of the Java VM?

 Posted by at 5:27 pm
May 292010
 

If killing a motherboard was a criminal act, I guess it’d have a fancy Latin name, too, like matrotabulicide or something.

Fortunately, it is not criminal to murder a computer motherboard just yet, at least not if it is one that you own. Today, sadly, I managed to accomplish just this, prematurely ending the life of a computer I only recently put together for my wife. No, it was not first-degree murder, more like man-, or rather, motherboardslaughter: I did not set out to do damage, on the contrary, I was hoping to get rid of an annoying little problem (no keyboard after the system came back from hibernation) by upgrading its BIOS.

The consequences of the attempt are, sadly, known to many: after the BIOS upgrade program happily reported success and attempted a reboot (I did everything by the book, and there were no signs of any trouble), the system became completely non-responsive, suggesting a failure of the BIOS boot sequence.

Now usually, there are ways to recover from a failed BIOS upgrade. Many BIOSes recognize a corrupt image and drop into an emergency boot flash mode that allows recovery from, for instance, a floppy disk. I’ve done this before, more than once. However, in this case the process did not work: even when I manually “forced” a boot into the boot flash mode by shorting some of the BIOS pins, it just stubbornly refused to attempt to read anything from a floppy, the hard drive, or a CD-ROM. I even tried booting using a POST diagnostic card, but I became none the wiser.

So that’s it. It is time to move on. It wasn’t a new motherboard, but it still had plenty of useful life left in it, so I am sad to see it go. But investing further effort into it is just pointless. I could order an identical motherboard off eBay for about $80 total, including shipping from China, but why would I want to spend that kind of money on 7-year old technology, when I can buy a decent current motherboard, dual-core CPU, and 2GB memory for less than three times that amount?

The said thing is that it means not only junking this motherboard, but also the accompanying Socket 754 single-core CPU and 1 GB DDR memory, as I have no other Socket 754 or DDR motherboards. I hate contributing to the world’s landfills. I wonder just how much otherwise still flawless electronics ends up in those landfills because of BIOS failures?

 Posted by at 11:47 pm
May 162010
 

Recently, news have been circulating about a new form of phishing attack that doesn’t rely on some unpatched vulnerability; rather, it uses a legitimate feature of Adobe Acrobat to hijack users’ computers.

Sophos Labs offer a detailed description of how it works. (Basically, it’s the ability of Acrobat to open non-PDF attachments that is abused, tricking a user into running an executable program.) They also offer advice on how to disable this feature. I think it’s a darn good idea to follow their suggestion: most of us never deal with PDF documents containing non-PDF attachments anyhow.

 Posted by at 2:21 am
May 022010
 

It was not a virus after all. I have no idea what made my old workstation unstable, but after a monster 30-hour scan of its hard drives, all I found was 4 potential threats, none of which was an actual infection. One was a malicious Java applet that never had a chance to do harm because it relied on an old version of the JVM, and I tend to keep my software up-to-date. Another was a 20-year old joke program, pretending to hijack an unsuspecting victim’s computer, which for some reason Microsoft Security Essentials marked as a threat. The third was the user registration program in an old Iomega installation kit, whereas the fourth was the remote control software VNC, which can be harmful if someone puts it on your computer without your knowledge, but that wasn’t the case here.

So then, what was it? My guess is ailing hardware, perhaps the video card. But… it no longer really matters anymore. I’ve done the deed, swapped computers, and successfully set up my new quad-core system to work with essentially all of my peripheral hardware (no mean feat, considering that peripheral hardware, in this case, includes instruments like spectrum analyzers connected via GPIB.)

Now, I can actually get back to work…

 Posted by at 12:23 am
Apr 292010
 

I’ve been having computer trouble. My main (but soon-to-be backup) computer has been acting up lately. Since I fixed the broken heatsink, it crashed several times. Is it aging hardware? Is it a virus? An instability due to a recent update? Or perhaps, possibly, the result of the fact that most recently, I plugged the network into the gigabit Ethernet interface, as opposed to the 100Base-T one? (This motherboard has two network connectors.) I know for a fact that the gigabit Ethernet interface used to cause problems, but I thought that was fixed by driver updates ages ago. Perhaps not.

Anyhow, since I swapped the network cable, the system has been stable for days. Today, its video driver crashed, but that’s not new: the complicated driver set of my ATI All-In-Wonder card (combination high-end graphics and TV tuner card; well, whatever passed for high-end in 2005, that is) was never 100% stable, but it is stable enough for reasonably reliable use. Today’s crash, too, was recoverable: I was able to Remote Desktop into the machine from another computer. So… I still don’t know what has been causing the real crashes in recent weeks.

Anyhow, after restarting the system, I logged back onto my Linux server from it, and I was presented with the usual UNIX login fortune cookies. Including one I never saw before, and one that only those can truly appreciate who used to program in FORTRAN and are familiar with implicitly declared variables and the default implicit declaration rules:

“God is real, unless declared integer.”

 Posted by at 12:33 pm
Apr 032010
 

One lousy plastic bit. That’s all that was needed to take out my main workstation while I was in Hungary.

Fortunately, it did not interfere with my ability to access my data, as I was set up with a backup workstation that I could access using Remote Desktop while traveling. But still, it was most annoying when my wife called and asked if it was me that was messing with that computer, as it was at first making some strange noises, and then went dark.

The plastic bit in question was one of the bits to which the CPU heat sink is latched. It broke. The heat sink didn’t quite fall off, but as it was no longer pushed securely against the CPU, the CPU overheated and shut down. (A good thing, too. Some older generation CPUs failed to shut down under such circumstances and instead, burned a nice black hole in the middle of the motherboard.)

Grumble, I am old enough to remember when TVs had tubes and the repairman was a regular visitor. Back then, solid state electronics held a promise: it was supposed to last forever. But that’s because nobody at the time foresaw all the innovative ways modern computers have come up with to die at the most inopportune moments. What worries me is that the same thing, a computer disabled because of one lousy plastic bit, can happen anytime anywhere… even if said computer, say, is the one running the fly-by-wire system of a modern jetliner or controls the X-ray dose you receive in a medical device.

Of course those systems are redundant. But so was mine… I did have that backup workstation, after all. Nonetheless… I wish these things were a tad more reliable.

 Posted by at 11:41 pm
Mar 142010
 

Like any good geek, I like computer games. I’m not obsessed by them (the image of Comic Book Guy from The Simpsons serves as a powerful deterrent) but I do enjoy the occasional play. And I certainly have the disposable income to buy a new title when it comes out.

Except that I haven’t bought a new game in years. Ubisoft’s official explanation about their “always on” digital rights management system is a good example why. A company that needs to know every time I am playing, a game that kicks me out of my Internet connection drops momentarily… why would I want to pay good money for that? Come to think of it, why would I even want something like that for free on my computer?

The answer is, I don’t.

I have no statistics to prove it, but I think  DRM does far more harm than good. It may (or may not) deter piracy. On the other hand, I bet that the number of customers alienated and put off by DRM far exceeds the number of those who suddenly see the light and, as a result of DRM, start paying for stuff they previously stole. So the net result may very well be a decrease in sales.

Perhaps one of these days, software, especially game software companies will come to their senses again and realize this. Until then, I’ll just enjoy the occasional shootout with some heavily pixelated aliens in Duke Nukem.

 Posted by at 3:44 pm
Mar 092010
 

Today is the second Tuesday of the month, and it’s Windows Update day. Not my favorite day of the month.

So here’s a curious question: why is it that I was able to upgrade Microsoft Virtual PC from version 2004 to version 2007 and it did NOT require a reboot… but when I installed a security update to version 2007 (making sure that Virtual PC as well as all its drivers are actually shut down) a reboot was necessary?

I don’t think I’ll ever figure out this Microsoft reboot misery.

 Posted by at 9:07 pm
Feb 152010
 

The Electronic Frontier Foundation has a nifty Web site called panopticlick: it shows you just how unique your browser is. Even browser configurations that I thought were surely non-unique (such as a vanilla Internet Explorer setup on a Windows XP virtual machine or the off-the-shelf Mozilla Firefox that is installed on my Linux server but almost never used) turned out to have unique signatures, for which plugins, most notably Flash, are largely to blame. And you thought the [insert name of favorite most-hated intelligence agency here] needed cookies or some other tricks to track your every move!

 Posted by at 1:59 pm
Jan 242010
 

This is becoming almost traditional: just before I embark on a trip, my otherwise ultra-reliable server crashes while performing some routine operation.

Back when dinosaurs still roamed the Earth and the Internet was still an exotic novelty for most people, my wife and I spent an unforgettable few weeks driving around the United States.

My server has been in existence for more than two years by then. No Web site yet… that came later that year. (Actually, I already had a rudimentary version up and running courtesy of my Internet service provider, but I digress.) The server was “connected” to the Internet via dial-up; it dialed regularly (once an hour; my wife and I still remember the little touch-tone “song” that we heard many times a day) to exchange e-mail, and it dialed automatically if I tried to visit a Web site, for instance. Otherwise, the modem line was open for dial-in… and I planned to dial into the server regularly while traveling.

Except that on the morning of our planned departure, the server crashed. Not a minor crash either… its hard drive died. Fortunately, not an instant death, and I was able to obtain a replacement drive and rescue all data.

Though it was still a genuine, no-kidding, bona fide kernel panic, today’s crash was a little less dramatic. I was merely testing streaming video from the server, as I always find it useful to be able to watch an Ottawa newscast in the evening when I am out of town. Instead of streaming the darn video, the video capture driver (which I’ve been using, completely incident free, for many years) crashed, taking the server down. Most unsettling!

 Posted by at 6:16 pm
Jan 172010
 

My laptop (the one I don’t want customs inspectors to be poking around on) runs Windows 7 (just upgraded from Vista). However, on it I also run a replica of my main Linux server, in a virtual machine.

After the upgrade, VMware Server, which wasn’t playing very nicely under Windows Vista either, started to give me serious trouble. The VM was due for an upgrade anyway, as its virtual hard drive was much too small. So I decided to… well, before upgrading the VM, I decided to check if there is perhaps a better option than VMware.

I first tried the obvious: Microsoft’s Virtual PC, which is a standard add-on to Windows 7 Ultimate. Nope… it didn’t play nicely at all, not with a Linux VM. So what else is out there? This is how I happened upon Sun’s VirtualBox, a (mostly) open source virtual machine solution.

I installed VirtualBox on a 64-bit Windows 7 test machine. Worked fine! Then I installed a complete Slackware 13.0 setup. Still good. I then did a full backup of my server to this VM. This also worked, though there was a minor snag: in the morning after the backup, I noticed that the host OS was completely locked up and needed a hard reset. Was it related to VirtualBox? Perhaps.

I then transferred the VM to another 64-bit Windows 7 machine and there, too, it worked well. So now it was time to move it to my 32-bit Windows 7 laptop. As Murphy’s Law dictates, that’s where I had the most trouble. For some reason (leftover nastiness after the VMware uninstall?) VirtualBox only sees network interfaces if it is run as Administrator. I also needed to enable multiprocessor support in the VM in order to eliminate a nasty (especially on a laptop!) problem of the VM consuming too much CPU, even when idle. Oh yes, and there was a crash, too.

Right now, all seems to be well though, and the VM works reliably, much better in fact than VMware. So maybe I have found the right solution. I’ll find out soon, when I’ll be doing a little bit of travel with this laptop in my suitcase.

 Posted by at 3:40 am
Oct 292009
 

This morning, I decided to clean my main workstation, as it’s been noisier than usual these last couple of days. Sure enough, it had plenty of dust and cat hair in it, but I also noted that a little motherboard fan was not working. I had spares, so I decided to replace it. Removing it is not easy, as it is in an awkward location, and I also had to resolder its connector onto the new fan.

That having been done, I rebooted my machine. Or, I tried to anyhow, but it failed to boot. It failed to do anything after the BIOS initialization. After a while, I realized that for some weird reason, it was trying to boot from an attached USB device. I disconnected the device, but still nothing… worse than nothing, actually, as it told me that my system disk is unbootable.

Actually, I should say disks, as I am using a dual drive mirror configuration in this computer. After poking around in it some more, I realized that I have inadvertently knocked out a cable from one of the drives. Unfortunately, reconnecting this cable didn’t help… the system was still unbootable.

And I’ve seen this before! A while back, a similar thing happened… one drive was disconnected, and when I reconnected it, the stupid RAID controller somehow managed to wipe the boot sector from both. What on Earth it did that for, I have no idea. But this is why I have a spare computer with identical drives and RAID controller… once I understood what was happening, the solution was to simply remove both drives, put them into USB cases, connect them to the other computer, and then copy over the boot sector using a raw disk editor. Easier said than done, of course, especially as I couldn’t find a raw disk editor on that spare machine (I swear I used to have one installed!) but eventually downloaded HxD, a very fine free disk editor that I have used before.

Two hours after I began, I had a working computer again. Still, it’s not a fun way to start a morning when you need both a soldering iron and a raw disk editor to get your computer working again…

 Posted by at 7:02 pm
Oct 262009
 

When will companies finally learn that Activation and copy protection do little to deter real piracy, only punish and alienate legitimate users? Here is something I just came across in a PC World blog:

“Microsoft support reps were still replying to users’ questions about product keys with a canned response citing ‘several reasons why a product key might not be accepted.’

“Essentially, either, ‘You mistyped it. The product key you typed doesn’t match the key assigned to Windows on your computer. Microsoft has identified the product key you entered as counterfeit,’ or ‘the product key has already been used on another computer,’ according to Microsoft.

“One person griped: ‘I Have been on the phone since 4 pm EST and I still don’t have a valid product code. Thank you Microsoft! Thank you for wasting my valuable time! Time is money and this had been a flagrant waste of it,’ wrote thatguy38.”

So all you’re trying to do is install legitimately purchased software, and you end up with a major headache, a useless computer, lots of wasted time, and on top of that you might get accused of theft. Talk about a strong incentive to either use cracked pirate copies or to forego using commercial software altogether, switching to open source instead.

 Posted by at 9:27 pm
Oct 082009
 

Google’s Street View has just been introduced in Canada.

Many people consider it a “gross invasion of privacy” that someone can take pictures of their streets and post it on the Internet. “What if they see my car in my driveway?” they scream at the top of their lungs, as if Google broke some long established taboo by photographing a public street.

But wait a minute… are these the same people who readily submit to having their laptops searched, its content, personal and business, examined and scrutinized, just so that customs can catch the occasional pedophile?

For what it’s worth, I couldn’t care less if Google posts photographs of my street or my house. On the other hand, I am so concerned about real invasions of my privacy, I am willing to face the wrath of customs agents by using Bruce Schneier’s method of laptop protection against unwarranted searches.

Curiously, most of the people commenting on Schneier’s article completely misunderstand his point: it’s not that I have anything illicit or shameful on my laptop that I need to hide. That would be easy. It’s that I object to the principle of strangers going through my entire life.

The really scary thing is that so many people, citizens of supposedly free countries, already adopted such a strong police state mentality: rather than looking for a lawful way to maintain their privacy, they are discussing various ways to break the law without getting caught. What I like about Schneier’s method is that it does not involve breaking the law: all my statements to customs agents would be truthful. As they say, no good deed goes unpunished… I’ll likely be harassed more than the smartalec who just creates a hidden partition on his laptop and keeps the visible partition sterile. But, at least I’ll suffer with a clean conscience, whatever good that does.

 Posted by at 12:57 pm
Sep 092009
 

Finally, an idea I’ve had years ago seems to have occurred to others, too… namely, cutting down on spam e-mail by verifying that the originating server is a valid server for the sender’s domain. The mechanism developed for this purpose is called SPF, or Sender Policy Framework. I just set up my domains with SPF records… let’s see what happens! Of course SPF is not going to do the trick until a number of major providers begin to adopt it, but the fact that gmail has done so is quite encouraging.

 Posted by at 11:50 pm
Aug 062009
 

I built myself this dual-core computer several years ago, and it has been my main workstation ever since. By and large, it’s a good and reliable machine (not counting a broken fan and some fried capacitors on its motherboard… never mind, I now have spares of the same motherboard just to be safe) but there have always been a few minor glitches.

One of those glitches concerned MIDI files… if I played back a MIDI file on this computer, its tempo was all off. That is, unless I set the processor affinity of the MIDI playback program to play back only on a specific CPU core. Go figure. If that’s the worst problem I have on a machine that otherwise runs for months without a reboot despite being used for everything from software development to video editing, I guess I can call myself lucky.

But now, years later, I ran into another curious problem. There’s this computer game from the 90s, Duke Nukem, that I, for some reason, still find quite enjoyable. I usually run it on an old Windows 98 box. Recently I found out that there is an open source effort to develop and maintain a multiplatform Duke Nukem executable. I downloaded it and tested it on a test machine… it worked fine. So the other day, I put it on my main machine. It didn’t work fine… if I hit a key on the keyboard, it registered as a large number of very rapid keystrokes to the program.

I’ve been searching for a solution and came across a comment about CPU drivers and processor affinities. Whoops! Restricting EDUKE32 to a single CPU did the trick as a workaround. And then, I remembered that two years ago, I chose not to download a processor driver update from Microsoft Update, following the good old principle of “don’t fix it if it ain’t broken”. So now I took a deep breath and downloaded this update (okay, I wasn’t too worried, since this update already ran fine on a test computer with nearly identical hardware.)

Bingo! EDUKE32 runs like a charm and guess what… so do MIDI files? A years old mystery solved. Now I can happily shoot some heavily pixelated aliens in post-apocalyptic L.A…

 Posted by at 1:49 am
Jul 292009
 

Another software product I’ll not be buying because of activation is Dragon NaturallySpeaking. I just received a promotional e-mail from TigerDirect Canada, offering this software for only CAD 59.97. Back in the old days, I’d have placed the order without much hesitation. But that was before the days of activation.

Simply put, I don’t buy software the license of which is tied to my computer hardware. My computer hardware is always changing. I have backup and test computers, and I often install software on those before risking my main computers. I only use licensed software and I abide by the terms of the license, but I do not put up with police state nonsense. Software companies do NOT have the right to police which of my computers I install their software on, so long as the spirit of the license is not violated: I am the software’s only user, and I only use one copy at a time. The purpose of test/backup installations is not to violate the terms of the license but to ensure that my ability to work remains uninterrupted by system failures or software incompatibilities.

In any case, my computer has no money. It is silly to tie a license to my computer, which has no ability to purchase anything. I, on the other hand, do have money, and I can purchase things, but why would I want to purchase things that would be tied to a computer that really is a transient entity: tomorrow, its hard drive may change, the day after, its motherboard, and so on? (The particular computer on which I am writing this text has been through many incarnations since the days when it began its existence as an Intel ‘486 machine on my then two-computer home network in the early 1990s, yet in a sense, it still has the same “identity”. Unfortunately, not quite in the sense in which computer identities are interpreted by activation software.)

Activation was supposed to boost sales by reducing software piracy. Perhaps it does that, though I remain skeptical. Meanwhile, at least in my case, I probably saved several thousand dollars over the years by no longer buying software on a whim. What can I say… their loss, my gain, I get to keep more money in my retirement account or pay off my mortgage faster.

I also note with a mild degree of amusement that cracks for most popular software are widely available on the Internet. Further, because activation and copy protection can be cumbersome, a growing number of people who purchased legitimate copies actually use cracked versions for comfort and convenience. I am guilty of doing the same: in order not to have to insert the blasted CD every time I play some particular games, I am using cracked versions instead, in which the copy protection code is bypassed. And this is when one feels compelled to ask the obvious question: if I, a legitimate purchaser, am nonetheless forced to use cracked (i.e., illegal) copies of software just so that I can use it the way I want to, what’s the point of paying for it in the first place?

This is a sad question to ask, given that I also make a living from writing software and as such, software piracy can hurt my wallet.

 Posted by at 3:13 pm
Jul 142009
 

I have to thank a fellow blogger (ouch, does that make me a blogger, too? I still can’t stand this word, but I suppose it’s now inevitably part of the English vocabulary) for an excellent post that helped me out: during the install of VISTA SP2 on my laptop, the machine failed with the error code 0xC0190001 associated with explorer.exe. The first thing I did was to try Google, and the first Google hit I found was the above-mentioned blog entry, advising me to reboot into Safe Mode, allow Windows to do its thing and reboot again, and presto: VISTA is back, with SP2 properly (I hope) installed, and I saved myself a significant amount of unpleasantness associated with a system reinstall.

Or maybe I’ll have to reinstall something in the end… because although SP2 came up just fine, for some reason I lost the Aero desktop altogether, and I am back to a standard Windows 2000 style theme, the Aero theme nowhere to be found. Curious. Good thing that laptop is not mission critical, except when I am traveling, which I am not planning to do anytime soon.

Ah. Stupid service pack upgrade disabled the Themes service. It also monkeyed with one of the VMWare services, but now that I started everything that needed starting, things seem to be working fine.

 Posted by at 7:56 pm