waider
dot i e

livejournal
pix
workshop
text
lyrics
Structure and Interpretation of Computer Programs, Second Edition: Harold Abelson, Gerald Jay Sussman, Julie Sussman
Structure and Interpretation of Computer Programs, Second Edition: Harold Abelson, Gerald Jay Sussman, Julie Sussman

Waterford: History and Society - Interdisciplinary Essays on the History of an Irish County (The Irish County History & Society Series) (9780906602201): William Nolan, Thomas P. Power
Waterford: History and Society - Interdisciplinary Essays on the History of an Irish County (The Irish County History & Society Series) (9780906602201): William Nolan, Thomas P. Power

(Kindle.com)
Watching
The Hunger (1983)
The Hunger (1983)

Snapping

Google
Web Here
Being The Geekly Diary of Waider
(may contain traces of drinking, movies, and sport)
May 21
Python on Mac comes with a module for reading and writing extended attributes, key to the TimeMachine hackery I've been engaged in and certainly makes the various stunts I've been doing in bash unnecessary. Just need to port all this code over...

May 14
Noting for the record: Dad completes his 8th decade and celebrates by climbing a mountain.

My achievement for the day: setting up VPN access to my home network. Not as impressive in any dimension, even if it did take a bit of fiddling around.

May 10
TimeMachine hackery: finished adding attributes to a large collection of "fake" backups. Then discovered I had the attribute format wrong. D'oh. Oh well, it was getting to the point where I needed to stop trying to do this in shell script anyway.

Hmm, actually, it still works - I renamed the backup "root directory" to "Server HD" - to match the server the backup lives on - and TimeMachine is now happy to browse the files for me. Sweet!

May 08
There was actual sunshine today. Like, real, warm, solar radiation.

May 06
For a movie starring David Bowie, The Hunger gives him a relatively short amount of screen time and for most of it he's in prosthetic aging make-up. The movie itself is loosely a horror - a vampire story - and belongs in the category of Not Actually A Bad Movie. The coda is clearly a tacked-on piece that doesn't quite fit with the lore of the movie established immediately preceeding it; this is confirmed (in as much as industry gossip cut-and-pasted from trade magazines by volunteers is a confirmation) by the IMDb trivia for the movie stating that the production company wanted to leave the way open for a sequel. Anyway, ignore that bit, the rest of it has pretty solid internal logic.

May 01
The Tourist is totally a bubblegum movie, but it's actually a bit of fun. Certainly not the disaster you'd expect if you went by the IMDb trivia page. Nobody does anything terribly fancy, and there's a twist that you could probably guess at but is reasonably well-concealed. Me and her were picking at the movie-geography of Venice, mind you.

April 29
Green Zone is a fairly decent thriller, as you'd expect from post-Bourne Matt Damon; not a whole lot else to say about it - there are no surprises in this movie, except that they apparently didn't have the budget or schedule to pay for Brendan Gleeson to come back for the finale reshoots. Worth a look.

April 26
It took a bit of effort, but since the Windows version of Arq doesn't seem to support creating a restricted AWS account by itself, I reverse-engineered the Mac one and applied that to a Windows backup - and lo, it appears to have worked. I'll poke at it a bit more and then maybe post some details here.

April 24
While upgrading SSL certs on DSPsrv, I took advantage of the fact that StartSSL now supports up to 5 subject names per cert, so one cert serves all purposes. Also turned on opportunistic TLS on the SMTP server and - for once - made sure that all presented certs actually validate (complicated by the fact that noone seems to quite agree on how this should work; exim and dovecot both support putting the entire cert chain in the cert file, but disagree over ordering, for example.

April 21
Excellent, I've successfully spoofed the top-level folder in the fake Time Machine backup so that Time Machine displays the range of backups correctly. It might be that the additional tomfoolery is only of use to Time Machine itself for thinning out backups (as best I can tell, they index the oldest and newest snapshots containing any given file, plus some metadata about snapshots).