Professional Documents
Culture Documents
IT Times (Beta, Rs 150 - )
IT Times (Beta, Rs 150 - )
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
Cover
16
17
18 Software: Photoshop
19
20 Model: Thilini
21 Photo: Roshan Perret
22 Studio Times
23
Agency: Impakt Models
24
25
26 Tel: 011 2394343
27 impaktmodels.com
28 info@impaktmodels.com
29
30 Open Source
31
32
33 This month’s cover shot on the theme ‘Open Source’. The model is a
34 literal display of openness, and there are levels of meaning under the
35 surface. Three metaphors are embedded in the image, representing Mi- As thanks to Impakt for their prompt and profes-
36
crosoft Windows, Apple, and Free/Open Source Software. sional support, IT Times is pleased to announce
37
38
the following Impakt events: Basic Grooming
39 The Windows level is the ... window, modeled after René Magritte’s ‘Tele- Course (Rs, 10,000). A course designed for
40 scope’. The window shows the Colombo sky from the Leisure Times bal- anybody, Male or Female Its contents are Hair,
41 Skin, Make-up, Etiquette, and Personal Presen-
cony. Much thanks to Deshan Tennekoon for his vital input on this de-
42
sign. Windows (or any OS) literally shows you the world outside. Within tation. Professional Modelling Course (8,000).
43
44 the window there is another Magritte painting - ‘Son of Man’. This man
45 with an apple in front of his face represents... Apple. Both pioneers Each course will run twice a week 18.30 – 20.30
46 have shown many things to many people, but they are still very closed for 4 weeks at Excel world, in the new rooms.
47
systems. The most basic wall they put up is affordability, which is why
48
49 Rupees paper the walls. Those who have the potential to become a Model
50 will be taken through to the next level, of profes-
51 Finally, Thilini represents Free and Open Source Software. Actually, each sional styling, Fashion, Posture, Posing in front
52
item of clothing has meaning, as you can read on page 28. In contrast to of a Camera, and of course The Catwalk!
53
54 the buttoned up world of proprietary computing she is more... open.
55
56
01
editorial 02
03
This is beta. If you’re unfamiliar with geek-speak, Indi Samarajiva
04
a beta is a version of software that is released for indi@indi.ca
05
public evaluation. Some projects - like Google News associate editor 06
and Flickr - never emerge from beta, even when they 07
Mahangu Weerasinghe 08
are full fledged powerhouses. Our goal at IT Times mahangu@gmail.com
09
is more simple. We simply seek to be an interesting
contributing editor 10
tech magazine. We have tried to tailor our content 11
to serve a broad range of youth, professionals, geeks, and people who are Ashwin Hemmathagama 12
ashwinh@mymail.lk 13
simply curious. Now we’d appreciate your feedback.
manager 14
15
The reason for this special edition is that IT Times has undergone a whole- Pragathi Mahilal 16
sale transformation. From today I, Indi Samarajiva, will step in as Editor pragathi@admin.wnl.lk 17
and Mahangu Weerasinghe is joining as Associate Editor. We are both ac- marketing executive
18
tive netizens, and that forms the core of our experience.. That is, we don’t 19
Dunstan Wijegunaratne 20
get out much. We recently founded www.kottu.org, which is an aggregator
21
of 60+ Sri Lankan blogs (personal websites). A great deal of the new con- design consultant 22
tent is actually drawn from these online resources. We have a new vision in Aruna Wickramarachchi
23
terms of design and content, one which focuses on the most immediately 24
graphics/layouts 25
useful information presented in the most comprehensible fashion. Our pri-
26
mary objective is to make you more tech-savvy by reading this magazine. Lalani Heenwella
27
proofs 28
Every article in this issue is chosen to either give you immediate skills or 29
David Ranabahu 30
knowledge to make you a better online citizen. For example, you can turn
31
to page 39 to learn the basics of modern web design, or page 24 to learn printing
32
about and see the code of a real live computer virus. This is in many ways Primal Fernando 33
a beta for the issues to come until the team hits its stride. Tell us what you 34
circulation 35
think. We really love this stuff and I hope that feeling come across, whether
36
you’re a geek or not. Rohan Fonseka
37
subscriptions 38
indi@indi.ca 39
Nimal Weerakkody 40
41
advertising
42
Saranga Wijeyarathne 43
IT Times Hotlines 44
promotions 45
Editor (077) 301-1266
46
Manager (077) 228-8199 Nalin Wickramasinghe
47
Advertising (077) 321-9733 / (077) 329-3511 branding 48
Subscriptions (077) 350-2183 / subs@wijeya.lk 49
Sujith Pathirannehe
50
publisher printer - lakehouse@sltnet.lk 51
systems
52
Wijeya Newspapers Ltd. Lake House Printers & Publishers
Naveen Guneratne 53
No. 9, Hunupitiya Cross W.A.D. Ramanayake Mw,
Colombo 2 Colombo 2 54
/it-times/editorial 55
56
01
02
03
04
05
06
07 raveen wijayatilake features/games Grand Theft Auto
08
09
10 indranil dasgupta ../computers Mac Mini Review
11
12 indi samarajiva ../art OS Tan (Japanese Anime)
13 vinita agarwal Code as Art: Flash
14 indi ASCII Art
15
16 ../photos Digital Photos From Sri Lanka
17
18
19
20 raveen wijayatilake ../p2p BitTorrent
21
22 indi ../security Spyware, Spy-Aware
23
24 Virus, Anti-Virus
25
26 Spam, Anti-Spam
27
28 mahangu weerasinghe features/opensource Opensource
29
30
31
32
33
34
35
36 chintana wilamuna tutorials/linux Ubuntu: Linux for Human Beings
37
38
39 prabath sirisena ../web Taking Back The Web, HTML/CSS
40
41
42
43
44 mahangu weerasinghe ../web Personal Web Server, PHP
45
46 raveen ../chat Google Talk and Jabber
47
48 zafar issadeen ../3D Digital Dreams, 3ds Max
49
50 abhimanyu ghoshal ../photo Bye Bye Red Eye, Photoshop
51
52 chris anderson ../dot-net Introduction to ADO.NET
53
54
55
/it-times/index
56
01
index
02
03
04
05
06
07
08
09
. ::SZEHDPY666ZDENNNHDP52.. ;::: .:.:.: 10
62DENNHE66252255666YYZPPPEHNNNNNNNNHHNNNNHNHHDDDEPZ65cs.
SNNHNS6ss..:;.
622 . .... ..
;;PYNENENNNHNNNNPPZPZZPDHNNNEDZS6 :
; 2sS5ZYYZYYYYYY6665666ZSY6 :
11
. :s;:s;;;;:;sscss;::. . ;:;: : . .: .ssss5625;:;s5Y665;s :;;.:
;;;::::ss;;;:;:;s;:::;55Y6PZYZYZPYPZZZ56;sssc225c2cccs;: .::: .:: : 12
;;;::;:;:ss;.;:sc5YYZPEENHNNHNYZPYNNNNNNNNDE66c25S56522css;.:.: . : :
scs2c522c2255PENNNEHHNNNHEHHNNNNNENH6SPDDHHNHNDDZZ6652526SS62:; ::s
s656262S6DDNNDS52PNNNNDPHENHPH D6NHDHDHDEZZSYYPHNDP5;c22c26622:s.s
:
: .
13
2625sY6HHED6cYDNNNNP ;DPNHNHEN.sN6NNHNDN5YNNNHYS22ZHDD6;s;ss2YS22 ;
5PYHPNNNNEEEEEH6; : 5NDEPPDNN .NNNNPEHN :. DEHN5s ;S662;s:::;22c5 : 14
c2sZ6DDHDDZZPZP62s:: :56ND66DHs2NDYP5Z6N . 6SDNY6. .6c:s;;:. c2 ;
:s;c;. : 65PN6c5YS62 .NPHDZDNNDP6YDN :.5YENZ2;: ss : 15
:.. ; Y6YDS666s:;:. Y66S52PZYD:5 :c566DEZY5s56ENES; ::
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
/it-times/index 55
56
01
02 editorial
03
04 Editing is not an easy task. I personally would have loved (page 39). Yeah, we know you can make cool sites with
05 to fill this issue with everything I got from our contribut- spinning logos using your WYSIWYG editor, but that’s
06
ing writers during the past month. However, there are evil not what we’re talking about. Think cutting edge CSS and
07
things in print media publishing called space constraints XHTML with DOCTYPES and all sorts of other good-
08
09 and layout guidelines and sadly, these we must obey. ies. Now how’s that for acronym soup? Yum.
10
11 Finally, thanks to some hard work on the part of the Edi-
First though, let me tell you what we do have in store
12
for you. You’ve played games by Rockstar before, right? tors (Indi and myself), we’ve managed to give you an ad
13
14 What’s that? You played Vice City till your fingers bled and free issue this time. That’s right folks, October 2005 is
15 would gladly face possible amputation if given a crack at free of all advertisements, preservatives and artificial fla-
16 San Andreas? Thankfully, our resident gamer Raveen has vouring. No Google ads either – it turns out they didn’t
17
gone that extra mile and already finished the game. Does like our Terms of Service.
18
19 he ever sleep? This we cannot answer. His GTA: San An-
20 dreas review on the next page, however, is a must read. Well, after reading what we have in store for you this issue,
21 you’re probably wondering what we left out. Although I’d
22
Mini, mini, mini – that’s all we’ve been hearing about since love to divulge this information, I dare not for fear of
23
24 Steve Jobs came back to Apple. Well, we’ve finally given having my bandwidth capped by the management.
25 in and included a review of the much hyped Mac Mini.
26 Indranil Dasgupta takes his Mini apart (no pun intended) If you think we’re going to get some sleep now that this
27 issue is out – guess again. This, my friends, is the vicious
in search of that elusive Apple ingredient. Flip to page 11
28
to evaluate his findings. cycle of publishing. Like an infinite loop, it never ends.
29
30
31 Naturally, we’ve also included a section that pays homage
32 to the newest Internet buzzwords. Actually, spyware and See you in November,
33
adware are more like old buzzwords. Never mind – buzz-
34
35 words are buzzwords, and Indi takes a long hard look at
36 them on pages 22-23. Till then though, he’s asked me to Mahangu
37 tell you not to blink. They’re watching you.
38
39
40 Finally, what kind of geeks would we be if we didn’t have
41 some tutorials for you. Well, not very good geeks at all, I’d
42 say. We’d be like those social cripples who run Windoors.
43
Is that how you spell it? I forget. Well, for those of you
44
45 who are handicapped by your operating system – we’ve
46 got a great free alternative in the form of Ubuntu Linux
47 (see my current screenshot here). Scared to venture in to
48
unknown territory? Never fear, Chintana is here - now
49
with added command line goodness.
50
51
52 Last but definitely not least, we let our resident web guru
53 Prabhath teach you a little about starting off on the web
54
55
/it-times/editorial
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
by Raveen Wijayatilake 18
19
20
be a breeze. Aiming has been simplified. Pressing the right 21
mouse button zooms in and displays a crosshair. Aiming 22
Controversial storyline. Check. Gory while running becomes possible as you gain experience 23
violence. Check. Crude humor. Check. with weapons. Gain enough experience and you will find 24
yourself wielding dual weapons. Imagine emptying two
Addictive game play. Check. Add im- clips of Uzi ammo simultaneously into an unsuspecting
25
26
proved graphics, hugely expanded granny crossing the road? As you progress through the
27
playing map and new game play, and game, you will be able to train yourself in new forms of
28
physical fighting. You can learn to kick box, which puts
you have an adventure worthy of the down an opponent faster. Learning karate kicks will put 29
an enemy on the ground with one shot, leaving you to 30
Grand Theft Auto name.
stomp him to death to your liking. 31
In San Andreas, you play the role of Carl Johnson. After 32
spending the last 5 years in GTA III’s Liberty City, he is A big addition to San Andreas is the stats system. It’s kind 33
returning to Los Santos to look into his mother’s death. of like a Sims game, but without all the bathroom trips. 34
On arrival, he is picked up by two bad cops who frame There are certain aspects of your character that can be 35
him for the murder of a police officer (who was no doubt built on. Stamina, Fat, Lung Capacity experience with cer-
36
catching on to their crooked deeds). CJ is forced back tain weapons etc. If you eat too much (from the many
37
into the life he once lived, the very life he left Los Santos fast food joints dotted across the map) you will get fat.
This concept should be familiar to players of ‘Black and 38
to avoid.
White’ who have played around with the giant animal. 39
The first order of business is to get his old gang back on When you’re fat, your character will have a potbelly, will 40
the map. The Grove Street Families have lost the respect run slower, not be able to jump over walls or fences and be 41
and influence they once had, and CJ wants to help them the butt end of many insults while roaming the streets. If 42
get it back. You start off with little missions like spray you’re fat, you’ll probably have low stamina, which makes 43
painting on walls, but it soon escalates into the usual GTA you get tired faster and sprint for shorter periods of time. 44
style drive-bys and murders. This time missions are far Likewise, if you work out in a gym, you lose weight and 45
less frustrating, and people who couldn’t finish GTA III become buff. Your sex appeal increases and so will your
46
or Vice City have a good chance of finishing this. Your stamina. You will run faster, jump higher and score better
47
mission objectives are clearly pointed out with colour with your girlfriends, thus leading to weird clothed forni-
cation. Your experience with vehicles has stats too. Drive 48
coded arrows and the works. You do get the odd mission
a car for a long period of time and your experience with it 49
that you have to try several times (several = play all night),
but overall everything is easier than past games. increases. This will tighten the controls and make control- 50
ling your car much easier. Ride a motorcycle enough and 51
The whole feel of the controls haven’t changed since you will be less likely to go airborne when you crash into 52
GTA III, so for veteran players, maneuvering around will that annoying yellow taxi cab switching lanes. As such, 53
this applies to planes and helicopters as well. Though the 54
/it-times/features/games 55
56
01
02
03 stats system does affect gameplay quite a bit, it can be ditions and sunny and dry conditions in others. Fog and
04 ignored most of the time. Even when it can’t be ignored, rain have been nicely done. When it rains, the screen turns
05 it is not a big deal to manipulate the stats. (Need muscle... grainy giving it a wet messy feel. Sunsets are gorgeous.
06 go to the gym) There are very few instances where stats Headlamps from vehicles in the night are pretty cool as
07 are involved with actual missions. One mission requires well, though you might spot the odd bug or two when
that you have decent lung capacity to proceed. (yes, CJ light hits certain objects. Get into a fast car and reach a
08
08
can swim! Finally no more drowning to death) Another good speed and the motion blur kicks in. Nothing like the
09
needs flying skills etc. Every time a stat is updated it is motion blur seen in the NFSU series, but nevertheless it
10 shown on the top left hand of the screen. It will tell you works. The draw distance in San Andreas is really good.
11 which stat has changed and what it means to you. Think: FarCry draw distance, but instead of jungle, place
12 yourself in a city. One thing I’m disappointed about is the
13 Probably the biggest addition to the game is the playing modeling of characters and vehicles. Characters are quite
14 area. It’s enormous. About six times the size of Vice City. blocky and the textures are not up to par. They certainly
15 The map is broken into three cities. Los Santos, San Fier- could have been improved. This of course doesn’t re-
16 ro and Las Venturas. But this isn’t just some basic enlarg- tract from the gameplay at all. You’ll hardly find yourself
17 ing of the playing area. It has been done with style. If you complaining about blocky pedestrians while your speed-
take a trip from one end to the other, you will find thriving ing over them in a sports car. Another Sims like addition
18
cities, des- is control over your
19
20
erts, forest, You’ll hardly find yourself complaining appearance. You
countryside can dress up CJ in
21 and moun- about blocky pedestrians while you’re clothes of your lik-
tains, all bril- ing, get tattoos and
22
23 liantly de-
speeding over them in a sports car. haircuts (Afro any-
24 signed from one?) Fancy clothes
25 the noise of footsteps on sand to the grass or dust that is will increase your sex appeal and you will gain more re-
26 kicked up by a speeding motorcycle. This huge expanse spect, while running around in your underwear will lead
can be a bit of a put off at times though, when you are at to some funny conversations. Before you ask, no... you
27
one end of the map and your mission is at the other. Even can’t get CJ naked (legally, that is). His clothes really don’t
28
then, if you happen to hop on the right motorcycle, your matter to most of the gameplay either. A few missions
29 journey can be quite entertaining. require you to have some fancy threads, but most of the
30 time running around in your underwear will work.
31 Moving on to graphics. I’m not going to be too harsh
32 on this aspect since GTA was never exactly known for The sound in San Andreas is top notch as well. Vehicle
33 it’s visual brilliance. If you want graphics, play games like engines are well done and have an appropriately deep feel
34 F.E.A.R and Chronicles of Riddick. The blur’ish look that to them. Some weapons lack the volume that would have
35 was present in Vice City is gone. Everything is crystal clear been preferred, but most are spot on. Weather effects are
36
now. One thing GTA does manage to do is, create great audible, rainfall and winds add to the visual experience.
atmospheres. It recreates the feel of the 90’s pretty well. The hilarious radio stations that were so popular (to the
37
It also has the ability to give you the feeling that you are in people who had copies with audio that is) are back and
38
a living and growing city. Yes, the weather changes - you haven’t lost the ability to make you giggle. They also have
39 will find fog in certain cities, constant rainy and wet con- some great music, making the whole 90’s feel more re-
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
/it-times/features/games
56
01
02
alistic. You get 11 stations in all, but you tend to listen GTA: San Andreas first shipped with an ESRB rating of 03
to only about three stations overall. The rap station has ‘M’ for mature. That meant anyone over 17 could play the 04
some pretty cool music from Dr. Dre and Tupac Shakur. game. This also meant it could be sold in popular stores 05
The classic rock station treats you to some Guns ‘n Roses such as Walmart. However, the developer, Rockstar, 06
and the like. My favorite though was the talk radio station messed somewhere along the line and the game shipped 07
which gives you some much anticipated comic relief. The with some hidden content that couldn’t be accessed by
08
entertainment provided by the radio makes those really the general user, but could be unlocked using tools the
09
09
long drives across the map that much more bearable. The mod community developed. This ‘hot coffee’ mod is a
way your radio sounds depends on the vehicle you’re in. mini-game where you can engage in sexual intercourse 10
Luxury cars may have some good bass while motorbikes (fully clothed mind you). The objective is to make your 11
and scooters have a ‘three-wheeler speaker’ feel. San An- partner reach the highest level of ‘excitement’. “Remem- 12
dreas has an excellent voice cast featuring an unknown ber, nice guys finish last”. 13
rapper named Young Maylay as CJ, MC Eiht as Ryder, 14
Samuel L. Jackson as crooked cop Officer Tenpenny, co- This turned the already controversial world of GTA up- 15
median David Cross as Zero, Peter Fonda as ‘The Truth’, side down. Big people from big places got involved and 16
Charlie Murphy as the pimp Jizzy and James Woods as things turned ugly. The ‘M’ rating was changed to a AO 17
Mike Toreno. They all give brilliant performances to move (Adults Only) rating. This meant it had to be cleared off
18
the story along without leaving you wondering whether pretty much every big retail store in America. Stores lost
19
they couldn’t do better with the voices. around $50 million from not being able to sell the game.
The game has been banned in Australia. Rockstar is in 20
Aside from the linear campaign through the game, you the process of editing out the naughty bits and shipping a 21
will find a mini-game almost everywhere you look in San ‘clean’ version of GTA which will be given the M rating. 22
Andreas. The usual side missions that occur when you get Obviously, Rockstar is enjoying the publicity gained by 23
into taxis, police cars and fire trucks are still available. In this whole fiasco. Nothing says ‘BUY ME’ to a 15 year old 24
addition, you will be able to get into a truck at night and like a game banned for naughty sex acts. 25
rob houses, stealth being the key factor. Shopping malls 26
will have arcade games, gyms will have boxing challenges,
night clubs will have dance revolution games and get into
Development hiccups aside, San An- 27
a car with some decent hydraulics and you can have a dreas is a very fulfilling experience. 28
hopping contest. Strips clubs let you pay for lap dances, if 29
Considering the high standards of 30
animated females are your thing. If none of this appeals
to you, you can always buy some big guns from your lo- previous GTA games, San Andreas 31
cal Ammunition (or use a cheat... only for entertainment has topped gamer expectations. Re- 32
purposes though) and wreak havoc. It’s really fun to fire 33
a bazooka right into the middle of ten cops, and watch sponsive controls, addictive game- 34
them and their limbs fly. A favorite of mine is parking play, impressive sound and decent 35
cars side by side and blowing up the first in line. What
takes place is a domino effect of car explosions. Very sat- graphics make this a must play for 36
37
isfying if you get it right. Going on a rampage in a tank is any serious gamer. 38
also an entertaining time-killer.
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
01
02
03
Mini
04
05
06
07
08
Me
09
10
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25 by Indranil Dasgupta
26 The Mac Mini under a downpour. Do not try at home. Photo by !efatima (flickr.com/photos/webmonk)
27
Y
28
ou’d be hard pressed to find a with G4 1.42 Ghz processors and a set up
29 computer smaller than the Mini. spacious 80 GBs. The main feature
30 It weighs in at about 1.5 kgs and separating the other two is that the After plugging in my monitor, I
31 measures just 2.5 by 6 inches. Actu- strongest packs an all powerful CD/ found, that the Mini had no PS/2
32 ally, upon first glance, it looks more DVD writer. One problem is that the ports for keyboards or mice. It has
33 like an external optical drive than a stronger siblings don’t have an inter- 2 USB ports for the same purpose,
34 fully fledged Macintosh. It is not un- nal modem available in Asia. All in as well as one Firewire port. Now, as
35 til you notice the large Apple logo at all, however, the strongest model is I did not buy an Apple keyboard or
the top that you understand what it probably your best buy since the dif- mouse I had to make a short trip to
36
really is - a shrunken computer. It is ference in price is almost negligible. the nearest hardware dealer, for two
37
what Apple CEO Steve Jobs calls a converter cables. Now, with both the
38 “BYODKM” (Bring Your Own Dis- ports occupied, I was unable to use
build quality
39 play Keyboard Mouse) system. my USB printer, which was a shame,
40 The Mac Mini’s shell is, believe it or considering the beautiful fonts I had
41 With the Mini, Apple seems to be not, made of metal. This came as inherited with Mac OSX Tiger.
42 targeting the stereotypical irritated quite a shock to me, as I had been
43 windows user on a budget. Priced at thinking that it was just painted plas- I have, however, made a mental note
44 around 50,000 LKR, it is almost equal tic. The build quality, therefore, was to purchase a USB hub, and Apple’s
45
to a full blown PC. The idea is that, quite exceptional. I can’t say for sure, newly released Mighty Mouse, which
existing PC users can plug their stuff but I dare say that the Mini can sur- will let the Mini live in harmony with
46
in to a Mini, and enjoy the Macintosh vive a free fall from about 5-6 feet the printer, mouse, and keyboard.
47
experience at even less cost. (not that I’d try it). The underside
48 After plugging the power cord in, it
comes with rubber pads, providing
49 specs a sturdy and slip free environment was time to turn it on. With trem-
50 for maximum stability. The front of bling hands I pressed the power but-
51 The Mini comes in three flavors. The the Mini contains just one DVD/CD ton, and the Mini purred to life. After
52 lightest comes with a PowerPC G4 slot. All peripheral connections are a few moments wait, it started off
53 1.25 Ghz processor and a 40 GB hard neatly organized at the back. with a short movie introducing me
54 disk drive, while the other two come to Tiger. A few prompts followed in
55
/it-times/features/computers
56
01
02
XP
16
is the most modern of the girls. She
17
dresses like Sailor Moon and wears
18 a XP beret. In the Windows family, XP would
19 be the teenager - trendy, attractive, but not ex-
OS
20 actly wise. In the OS-Tans, breast size often
21 represents available memory, and XP-Tan is
22 the best endowed (sometimes to the point of
23 absurdity). She also has an incredible appetite
24 for system resources.
2000
25
is a sexy, professional, and
26
reliable woman. She wears a
27
trenchcoat but often over nothing more than
Leave it to Japan to Sexualize the Op-er-
28 a swimsuit. She is often portrayed as watching ating System. OS-Tan is a community art-
29 over the clumsy and childish ME-tan. The real form that portrays Windows as Anime.
30 Windows 2000 runs on the relatively stable NT Over time the OS-Tan girls have devel-
31 kernel and is a favorite of sys-ops everywhere. oped their own personalities and ward-
32 With Service Pack 2 XP is actually more re-
robes, but anyone from a casual doodler
33 liable, but 2K-Tan certainly captures the per-
sonality of the Operating System. to a professional graphic designer can
34
contribute their own. The translations of
ME
35
is the clumsy, crash-prone yet the stories are more Engrish than English
36
some-how endearing sister. She’s - but you can still follow the adventures
37 also the first OS-Tan, and the star of most of
38
of the OS-Tans, from the clumsy and
the comics. She wears the Windows ‘!’ error
39 message on her dress since ME was profoundly
crash-prone Windows ME to the book-
40 buggy. The real Window Millenium Edition is ish and reliable Windows 2000. You, the
41 sometimes called Mistake Edition and the OS- Windows user, are Mr Toshiaki to them.
42 Tan captures its personality well. In the por-
43 trait above she is shown in the air, presumably
44
after Dr. Norton gave her an invasive scan.
95
TAN
45
is an older OS-Tan, usually dressed in
46
a traditional kimono from the Meiji
47 period of modernization. She doesn’t under-
48 stand new technologies like USB or broad-
49 band. 95-Tan is an almost motherly figure
50 who rarely shares the adventures of the other
51 sisters. Not that she didn’t have her share in
52 her Mac-Slaying days. 95-Tan has occasional
53 flashbacks where she wields hersamurai sword,
often when the hapless ME-tan disturbs her. by Indi Samarajiva
54
55
/it-times/features/art
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
Code As Art
17
18
19
20
The Flash Programming of Jared Tarbel 21
22
23
24
Symbols and images of all kinds en- beautiful moving imagery of seeds 25
ter and pass through our lives every looking like whirling stars in the sky.
26
second, as they have for centuries. The wonderful thing about this art
People have always relied on images 27
is also its subjectivity, and its mean-
and symbols in order to create some ing from one viewer to the next. One 28
sort of understanding amongst them- may perceive one thing, and someone 29
selves, especially in ancient pre-liter- else another, yet the effect stays the by Vinita Agarwal 30
ate civilizations. People also relied on same - learning through beauty. 31
images and symbols as a tool of self- 32
expression. This visual understand- I’Ching (top right) is a poetry play- 33
ing helps cultivate our own growth ground running on I’Ching prin- 34
as individuals and as parts of nature. ciples and an XML poetry library.
35
Symbols persist in today’s world, User interaction with the model con-
36
from religion to advertising. So many structs the hexagrams common in they are streaming from space, add-
of our acts remain symbolic because life etching used by the Chinese. The ing dimension to your whole experi- 37
there are meanings which cannot be hexagram is displayed in the middle ence It almost manages to become a 38
explained, which transcend meaning. after 5 points on the wheel are cho- mental escape. 39
sen, the first generated by the user 40
Today, through the interactivity of a themselves, each idenitifying a cer- Tarbell’s work shows that the worlds 41
Flash, we can expand that visual un- tain holistic word such as ‘ADVER- of science and art have much to learn 42
derstanding to greater heights. Jared SITY’, or ‘GREAT ENCOUNTER’. from each other, despite their long 43
Tarbell’s Flash movies allow the user In ancient Chinese tradition these separation. It requires a creative ex-
44
to interact with models and symbols points were initially determined by pansion, a thinking out of the box so
45
that are all around us in nature but in- the tossing of coins or sticks but the to speak. Tarbell’s code enables art.
visible to the naked eye. They require The potentials are vast but very de- 46
I’Ching poetry generator does that
a deeper sense of seeing, a sense that through code. Furthermore, through pendant with us as individuals to use 47
was available to us long time ago. automatic wordplay, random words this new interface to its full value. The 48
are chosen for each holistic word to technology will continue to expand. 49
Seeds (top left) is a diagram of sy- form a poem – a substantial mean- We as users may not. Today we need 50
metrical seeds aligned together, the ing to follow your life by. Flash al- new explorers, Digital da Gamas, to 51
same as in nature - in relation to the lows for a sense of magic. Different help guide us through this new world 52
Fibonacci sequence. The relative ro- parts of your mind light up through of realms, technology, beauty and art. 53
tation of 137.5 degrees produces a the floatation of the words as though Explorers like Jared Tarbell.
54
/it-times/features/art 55
56
HHNEHHNHHEHEEDDPPPZPZPEDDDHHDEHHNNHNEEDDHHHHHHHHHHHHHHHEEHHHHHHHHHHNNNNNNPDS
01
HHNHNEEPPPPZZYYYZPDDDDHEDDEEHHHHHHEHEEHHHHHHHHHHHHHHHEEEHHHEEDDDDPPPDDDEENNN
NNNYYYSYZYSYZDNNNNHHHDPDNHNHEEEEDEDDEDEDHEEDEEDDEEHHHHHHEEHHHHHHHEHPP66SSSYP
PYY66PPDEEENNNND6666ZDNHPPDDHHEEDEZZPPDDNHNNNNHHHEEEEHHNNNHHHHHHHEHNNNNNNEHP
02
ZZZDPDDHNHNDZ2;s:2ZYPZZZZPEEHDEDEEHHHHEDEDHHDDEEHHNNHHHEEEEEHHHHHEEEEDEDEDHE
DDDEENNHNSS2c6SZDDDZSYYYPZYSS6DPEEEHDEDPEDDDPPDDPZPDDEDDEHHEEEEHHNNEHEHHHDEP
03
PEENNEESY66YYPPPPDEDDPYYYYYZDPNEDDYZSYYYPPPPHHEEEDEHEDDPDEDDDEEEDDDHHEEDDHHE
HHNDEZZYYPZPPPZDHEDDDDZDHEPPPZEDDDEEDEEHDDPZDEHNNNNHDZZZDHHHHHHHHNHNHEHHHHHP
In its time, canvas and oil-paint was a techno-
04
HEHYZSSZZDDEENNEDZ6SSYEDZZYYPPEDEEDDEHDDPDPPDDYZ2s6YDNDY626PENNHEDPNHDDYZPDP
DPDDEDDDDEEDDDPPPDDEHHEEEENNNNNNHEEEEHDEDEDDPPZPYY656YPHDZSccs26SEPZZEEEEDDP
logical revolution in itself. Then Classical
DPZDDDPHHHEEEDDEHHNNHHPZSYHDDP6SNENEDEPDZDEHDDEEEHPZY66SZEDPP66sc66DZPYDPPPP
05
DZYDPHHEDDPEHHHHHEEEPPZY2566EPPZ62HDHHYP6Y25SYZZYYZPPZS2225SYPP66cc;;52Y6DPP
Art - already reeling from Impressionism and
PDPHEDDZZDDEEEEHNHED6656YY6YHDNHDPY6EEDH2S:c::22666S62YDPPY2556YY25:;Y6s:2sY Cubism - took a direct hit from Photography and
06
PDDDDDDHNNNHEEHY2; sSYPENNDPYSHPEPNDDPZZENSPcc;;25ZDY2cs6PZS5sc;2DDYY66DPPZ6
PHEEEHNEHYYZD652566SS6c; c YcZYY6PPYDSYcc: cS65s sPZY6;s:;S665ssSSY retreated to museums. And then ASCII Art ...
DPPNNEE556Y525SYZYY6::.. ..:;:s:c Y2Z6Y6PY6SSYSZs:. ..;cccs.;66Y6:: .66.: ;
07
PNNSY;;SD2s6Y6S2: .::..;:cs; 2:s:c;S6ZZYSPEYYs::.;sssss:..c2DZ2c.:;c;c changed nothing. It just looks cool.
NENscZEcsc656ss: .::::.. ....: : ;.s:2s6665ZPPDYSc.. .:s522s::cs66ZY.:26:
08
N 266ZZESYs: .::..:. ...:::.. ;:;.c;c;s:cs;:2255YDZY2:
:cZESYc2 .:::.. ..:: ..:.. :.:.;.cscs;.::sc266S62:
:22522s:.55DD226
. Y5: 2s22s
6NNs2 . ::;:.... .::.. .::....
09
E6P s:s:;..::.:. :;:::..
. :.. :.s:sscc22s:c6526SYP5
::.... ..;;s;ccs:;sss2ZZZY::
. 2s5c5cS
s.;.c
ASCII stands for the American Standard Code for
Y.c.s...:..:;:::::::::::....:: ..... . :.. ..::;sscscc56PPSY 5s; Information Interchange. There was a SLSCII,
10
2 ::s...:.... ...::. ....:: .:;sss;;:ss66DD : s
c:;;s::::;;;;;;:.::... ..:.: ::2;22ZZ:s but it got caught up in various committees and
11
s ...::::::.:::. ..::;:;::
;:::;;;::. .::::.... .::::..
;.2cYY6Y
. : c;YY6 the world is still waiting on that. What ASCII
s;s:: ..:;:::.. .. : ; ; 2
12
;.:;;.:..::...:...:.:::.
;:::.ss::..::..... ... ...
.
.:
. s
:
does is convert letters into numbers. It is,
13
:..:.::.:::.... . ... ...
:..:.:;::::::;;;:. .
in short, a Binary-to-English dictionary for
::.:::;::... :::::.. .....
14
...:::: . ...:::::::.. ..
..
.
Computer Tourists. When you type the letter “A”
.;:;;:;::::::....:::.. .. ... the computer looks it up in ASCII to find out
15
:....::.: ::.. .... ...
. ::.:.: .
:..::::.:.:..... .....:.....
... . ..
.
...:
.
what you’re talking about. What you really
16
::;:::;.. . meant to say was 0100 0001.
:.. ......:.. .
;
17
;.:...:...:::
.
:
18
: : .
. ASCII is such low-level code that any document
;:;:;.. .: writen in plain-text (like Notepad) can be read
19
; .
; : ....: on any machine built after 1963. That is, if
20
:.:.:.:::...:
ssc;s.. .:: a computer fits in one room and doesn’t have me-
: .:sccc;:
21. ::SZEHDPY666ZDENNNHDP52.. ;::: .:.:.: chanical pistons, it knows ASCII.
62DENNHE66252255666YYZPPPEHNNNNNNNNHHNNNNHNHHDDDEPZ65cs.
22
SNNHNS6ss..:;.
622 . .... ..
;;PYNENENNNHNNNNPPZPZZPDHNNNEDZS6 :
; 2sS5ZYYZYYYYYY6665666ZSY6 :
. :s;:s;;;;:;sscss;::. . ;:;: :
23 . .: .ssss5625;:;s5Y665;s :;;.:
;;;::::ss;;;:;:;s;:::;55Y6PZYZYZPYPZZZ56;sssc225c2cccs;: .::: .:: :
This makes ASCII a palette for artists who want
;;;::;:;:ss;.;:sc5YYZPEENHNNHNYZPYNNNNNNNNDE66c25S56522css;.:.: . : : to reach anyone and everyone. And the paint
24
scs2c522c2255PENNNEHHNNNHEHHNNNNNENH6SPDDHHNHNDDZZ6652526SS62:; ::s :
s656262S6DDNNDS52PNNNNDPHENHPH D6NHDHDHDEZZSYYPHNDP5;c22c26622:s.s : .
2625sY6HHED6cYDNNNNP ;DPNHNHEN.sN6NNHNDN5YNNNHYS22ZHDD6;s;ss2YS22 ;
is text. When cubicle-jockeys were peering at
25
5PYHPNNNNEEEEEH6; : 5NDEPPDNN .NNNNPEHN :. DEHN5s ;S662;s:::;22c5 : thick green screens through thick black glass-
c2sZ6DDHDDZZPZP62s:: :56ND66DHs2NDYP5Z6N . 6SDNY6. .6c:s;;:. c2 ;
26
:s;c;. : 65PN6c5YS62
:.. ; Y6YDS666s:;:.
.NPHDZDNNDP6YDN :.5YENZ2;:
Y66S52PZYD:5 :c566DEZY5s56ENES;
ss :
::
es, ASCII porn was pretty cool, but with the
27 . c:SSYZ65SZPDPSYS6cs5;
;:;:. :;: :s;:c6YPY.sPPss2;5Y
: ;5 DEHN: s2
.:
. :: : advent of faster computers you got images that
28
. . . ::;cs:. 65 .;:s2 s:: ;ssc::..
.:;:.:::;;::;; .:.:s .
:.:.
::.;
looked like, well, images. You would think
.:. ;: . that ASCII would die out, but the same small
29 . . .:
;: . population of geeks that could stand it in the
.
30 ;: first place is still around. Right now there
..::.. .
31 ..:..
. .
:. .
..
is more ASCII Art than ever, it’s just a much
. 32 .:...
..:... ..
smaller percentage of the whole.
. .... .;:
. 33 ......
. .;.. :. Who makes ASCII Art today? Well, ASCII spe-
.
34
.....
. ..:
. .
.
.. cific sites like www.asciibabes.com (guys too)
. . .
: 35
:.: . .:..
.:.
:
.
;;cs;;22;s
and the comic www.nerd-boy.net (updated often).
36
; : .
s.;.:....
.
.
.;;;:;:;.:
:cscs;s56NNNNYP ; : .
s s The real niche is with hackers and programmers.
;:s:;
37
;.:::::::
..:::....
. ...
.:s2s:s55DPHENNPHs5cc2
.cSYHY2; :.YYSZ6Ycc2
If you buy pirated software the text file that
s;;:;;s:;..;;:::::.. .:. ss55ss. ;..:52PSS contains the Serial Number often has an ASCII
38
;;s;s::;s::. ......... . . : 6
s;;:.::;c::..:.:::..
:..::::;s::::. .::.... .....
.... . c
;
Image to rep the hacker or clan that ripped the
39
;..::ss;s ..;s;::.:::.. . .. software in the first place. And all the fancy
s;;:: .: ::::.:..:..::::.. .
40
: .;s::. :::.:::;:...
:.. . ::. :;:;:....::::..
.
.
:: programs you use are really just text-files at
41
:...... ..::::::::..:::::..
: ....:::. ::. ..:::.....:.::: .
..
.
.:::::;s;....::s;:::s
. ..::: .s;. ::. ..c22S
the end of the day. People who write and read
: ... .;
42
:::;;::
....::.
.:::: .::
.. . ..
..:..:
..ssc2cs;::::: ss66;sZY22:;;
. 2252562ssccccsc56PZDEHNDHNNEHNNH
the code are just staring at text files. They
ASCII Art
;;; .:..:;. .:. :...::.. . . . s:6266652c22cccs266S6SSSY.2 ; 2
43
.:: ::...:
s:;:::: ..:
...:. ...... . : 2:SsDYY5S6SSS6YZPDDDEHHNHEDY6
..:. ... . . s.ScNHNNNNNNNNNNNNNNNNNNNNNNNNNNNNNDEHEEYN
:
.
..
..
..... ..::::: ...::;:::.::
..:::::::... . ::::...
14
... .. ..:::....::::::;:;;:;.
... .... ..:: 15
:.::....:
:... .. . ... . :.:.:: .
. . .....:..... .....:.:.::::..:
16
. ..;:::;::
. ..:...... ..:
17
:::...:...:.;
. ;
.
.
18 : :
:
:. ..;:;:;
19 . ;
:.... : ;
::.
20
:...:::.:.:.:
..s;css
:.:.:.
:;cccs:.
:::; ..25PDHNNNEDZ666YPDHEZS:: . 21 :
.sc56ZPEDDDHHNHNNNNHHNNNNNNNNHEPPPZYY66655225266EHNNED26
: 6SZDENNNHDPZZPZPPNNNNHNNNENENYP;; 22
.;:..ss6SNHNNS
GIF and PNG. If you’re not familiar with those : 6YSZ6665666YYYYYYZYYZ5Ss2 ; .. .... . 226
:.;;: s;566Y5s;:;5265ssss. :. . : :;:; . .::;sscss;:;;;;s:;s: .
23
names you’ve certainly seen them. 99% of im- : ::. :::. :;sccc2c522csss;65ZZZPYPZYZYZP6Y55;:::;s;:;:;;;ss::::;;;
: : . :.:.;ssc22565S52c66EDNNNNNNNNYPZYNHNNHNEEPZYY5cs:;.;ss:;:;::;;;
ages on the net are in those formats, mostly : s:: ;:26SS6252566ZZDDNHNHHDDPS6HNENNNNNHHEHNNNHHENNNEP5522c225c2scs 24
. : s.s:22662c22c;5PDNHPYYSZZEDHDHDHN6D HPHNEHPDNNNNP25SDNNDD6S262656s
JPEG. ; 22SY2ss;s;6DDHZ22SYHNNNY5NDNHNN6Ns.NEHNHNPD; PNNNNDYc6DEHH6Ys5262
: 5c22;:::s;266S; s5NHED .: NHEPNNNN. NNDPPEDN5 : ;6HEEEEENNNNPHYP5
25
; 2c .:;;s:c6. .6YNDS6 . N6Z5PYDN2sHD66DN65: ::s26PZPZZDDHDD6Zs2c
: ss :;2ZNEY5.: NDY6PDNNDZDHPN. 26
26SY5c6NP56 : .;c;s:
The flower above is a JPEG. From left-to-right : ::
::
.
;SENE65s5YZED665c: 5:DYZP25S66Y
2s :NHED 5; :
.:;:s666SDY6Y ;
;5sc6SYSPDPZS56ZYSS:c . 27
..:
you can see that it gets more and more crappy .:.:
:. Y5;2ssPPs.YPY6c:;s: :;: .:;:;
..::css; ::s 2s:;. 56 .:sc;:: . . .
28
looking. This is an illustration (from Wiki- ;.::
. :;
. s:.:. ;;::;;:::.:;:.
.:.
pedia) to show how the compression works. When :. . . 29
. :;
you compress an image it downloads faster. .
:;
30
. ..::..
. .: ..:.. 31
JPEGs, GIFs and PNGs can produce images that ..
...:.
. .
32
look like, well, images and they rule the Net. .. ...:..
:;. ....
.
.
What is interesting is that many free programs ...... 33 .
.: ..;. .
can convert JPEGs to ASCII without you having .
.. .
:..
.
34
.
.....
.
teprid souls like romanm.ch and projects.c505. S22c.. .:: .;s. :::.. .
;;:22YZs;66ss :::::;sc2css..
.
.. . ..
. :::.:.....:::.. .:: .:::.... :
.::.... ;. ... :
42
com/ascii_index.html have coverted film to text. HNNHENNHDNHEDZP65csccccss2652522 .
2 ; 2.YSSS6S662sccc22c2566626:s
:..:.. ::. ::::.
. . . ..::...: .:.
::;;:::
.;:..:. ;;;
Roman has made mini-versions of The Matrix, : 6YDEHNHHEDDDPZY6SSS6S5YYDsS:2 : . ...... .:... 43
:...:: ::.
NYEEHEDNNNNNNNNNNNNNNNNNNNNNNNNNNNNNHNcS.s . . ... .:.. :.. ::::;:s
Spiderman, Terminator and more. They play like EYESYSS2c.
.
;: . : ; . . .
. :.::
.... .....:. . :.::... ;
........:::....;:;:::::;
44
regular movies, only with ASCII instead of im- c ::
. ..;s5Y666622csscc:ssc:; .
;;sss;sc;:;s;:;c2;s:;
:: . ::.. .::::::::::::;;;
::. :::.::..:;::: .s;::;:::;:: 45
ages. c505 has made ASCII music videos of Jimi c : cc;:ssssss;;;ssc222 : :.. ::. :;:::.:;: ..:.;:; 2
2sc:; ;:csss;;;sssss2662s ..::.: :.:.. :::;;;:.. .:::;s;;:;:c:s E
46
Hendrix, Queen, and Led Zepplin. 22ccss . ::scc222562s:
::.::;;sssscs552cccss:
..:::: .. ..:.. :::::::::::;;::....::c: Z2N
.:::::. . ::::..::;:::::::.:. ....:sss:. 6sNND
5YS66565555552cccss:::::::..::........:.::::..... :::::::;:.:;;;:s. 22NNNN2 47
26666662522ccc2ccc2c2s::.::::: ..::... .. ..::.. .:::::. : 22NNNN6Y2
ASCII Spam: In a more insiduous development c556655ccssc2sc;:. . ...:: ..............
:: :..
::::::::::. :;::. .YSNNNE26sc6
... :.;;::::::::;;: .:sZDNNNN6Yc252D
48
Spammers are starting to use ASCII images to ::
:.:.. :.:;;:: :;5ZDNNNHZP2652DYH
. ..:.: :.: ccYNNNNNEYY25;cPSNHH 49
get past word-based Spam filters. Porn sites in .....
: ;.::: s:: ssDNNNHHEPZ6S25ZYNPNHH
. ;.. ;.;.: : SPNNNNHHDZZ66c2YYHDHPNHD 50
particular are using this tactic, so we may see . ..: ; ; s s 2sEENNNNDZZZZY6:s66HPSSEPDDH
: : ; s s Y2NNNNHDZZZPZY2.s6ZNEDPHEDDDDD
51
a resurgence in ASCII as erotic art, harkening .
. : : s 2 5.PSNNNNDPYSPNZY5:2SZNE66DPEEHHHHP
. : : s c S:NDNNNNDD65DNEEs ;5PNHPZ56HDHEDEPDP
back to the days of lonely geeks at teletypes. .:. .. . : s.c D2NHNNDEZP65PHPPc:SYDNEEP6YHDDDHHDDSYE 52
::. .: ..::;.2:Y2HZNNNNPDZDSYDHEH6sc;6SDNP5SYPNHDDEEZPDDD
:....:::::.::... :;::::::..:s;52DSNDNNHEZPDHYPDHDE52cs66HNDYS5SDPDDNHZPPZHHP
;::;::;::;:sc::::::::;;sss2255DZNDNDEDDEDHPHPDPEs:ss66ENDDScYEENEDDDDYZHEDEP
53
;::s;sssss:c2::;;sssss;26SPZDPNDHDHEEHHNZEYESZscs;66ZPHNZ6YZPDDEEEDPPPPZPEH6
5665222222c56565266SYZPDEDEDEDEDDPDENNYESP2S;;2sZYDPHNDYYSPEEHDPPZPDDEEPPPP2 54
S66S6YSSYYSZZZPPPDEDDDPPZZZZDPDPDENNPEs6c526csY5PZEHZS66ZPDPPZZPPDDDPZPPP26H
S65ZSZYPPZYPPZZPZZYZYZZZPPDPDDHHHN6Z2Sc66622Y6ScDDPP6cYZPPPPDDDDDZPPPPPSYHHD
YYSZYZYZZYSZYZZPPZZPPPPPDDEEHHHHDH2S5SSZssZSS5Z6HNYSYSZYPPDNHHHEEPDZZYPDDZP5
55
SSSZYZZZZYSPPPZZZZZPPPPPDDHHEESZ5S5Y6S::s;S55;HHZSS6YYPPEHHHPZY6YDDYZPPPD262
PZZYSZZZYYYZZZYYZYYYYZPDEEEDYZ26256S.:s;EPs DDPD2;S5PDHHNNEDPPDDP66SYDPSZ6SY 56
01
02
03
04
05 Flickr (www.flickr.com) is a community with the stated goals of sharing photos and
06
07
finding new ways to organize them. On both counts Flickr is helping Sri Lanka form
08 a vibrant image online. There are now thousands of photos uploaded and organized
09
on Flickr and you can find them using Flickr’s innovating tagging system. Simply visit
10
11 flickr.com/photos/tags/srilanka or flickr.com/photos/tags/lanka to get a sampling of
12 the visual documentation. This section highlights a few of our favorite images online
13
and their talented photographers.
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
flickr
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53 Hanging Flower by Satyajith (flickr.com/photos/sathyajith)
54
55
/it-times/features/photos
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
“I caught this guy just as I finished buying myself a new pair of flip-flops to replace the pair that had gotten 30
stolen the previous night in Kataragama, Sri Lanka.” Photo and caption by Roman Edirisinghe (flickr.com/ 31
photos/romanedirisinghe) 32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Sunrise, by Juavenita 48
Mahout Resting, by Baba Steve 49
(flickr.com/photos/juavenita) (flickr.com/photos/babasteve)
50
51
52
53
54
/it-times/features/photos 55
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30 Pettah Muslim Women by FredR
31 (flickr.com/photos/fredr)
32
33
34
35
36
37
38
Sunday morning in Sri Lanka, we were up in the moun-
39
tains, at a temple. The kid’s had just finished the hindu
40 version of sunday school... by Saisiv (flickr.com/photos/
41 sai)
42
43
44
45
46
47
The Ancient City of Sigiriya is on the UN World Heritage
48
List. The ruins of the capital built by King Kassapa in the
49 fifth century lie on the steep slopes and at the summit
50 of a 370 m high granite peak. The view from the top is
51 well worth the climb. But look out for the monkeys. They
52 may be more friendly than absolutely necessary... by s_st
53 (flickr.com/photos/49079106@N00)
54
55
/it-times/features/photos
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
flickr
17
18
19
20
Kosgoda Turtle... by s_st (flickr.com/photos/49079106@N00) 21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Puple Lotus by omnia (flickr.com/photos/omnia)
42
43
To get your photos featured here, simply get a free Flickr account (www.flickr.com). 44
45
Since Flickr’s purchase by Yahoo, you can now sign in with a Yahoo user/pass. Simply
46
tag your photos as ‘srilanka’ or ‘lanka’ and they’ll get noticed. In fact, anyone search- 47
ing for visuals of Sri Lanka can see your photos. Flickr is also a vibrant community 48
with comments and ratings, and if you’re a good photographer you can get a lot of 49
attention fast. It is also an awful lot of fun. 50
51
52
53
54
/it-times/feature/photos 55
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15 BitTorrent creator Bram Cohen as Borg, himself, and a woman. From bitconjurer.org
16
BitTorrent
17 epIII_trailer.avi). Banda, who has the
18 complete file is called a ‘Seed’. A per-
19 son who doesn’t have the complete
20 file is called a ‘leech’ or ‘leecher’. Both
these types can be commonly called a
21 changing the face of downloading ‘peer’. (e.g. I am downloading this file
22
23
off 1 seed and 3 leechers. This means
I’m connected to and downloading
24 by Raveen Wijayatilake from 4 peers) So what happens is, a
25
seed sends a different part of the file
26 to each leecher. Each leecher in turn
27 transfers parts of the file to other
28 how it works leechers. This way, if a seed discon-
29 nects, 100% of the file will still be
30
31
32
P eer to Peer Networking (p2p) was
once synonymous with software
such as Napster and Kazaa, as is still
So how does this new ‘king’ of p2p
work? Let’s take a general example
here. Imagine you are in a room with
able to be downloaded since there’s a
full copy amongst the leechers.
the case for most in Sri Lanka. How- three other people. One of these do it yourself
33
34 ever, something new and more so- people (lets call him Banda) has a
phisticated has been taking the world complete jigsaw puzzle with him. The Now that you know how the protocol
35 works, it’s time for some hands-on
of p2p by storm for a few years now. objective is to transfer a copy of the
36 experience. You’ll be happy to know
Basically, someone invented a better jigsaw to each of the other three peo-
37 way to transfer a file from A to B and ple in the room in the most efficient that all software needed to delve into
38 everyone loves it. way possible. Initially, Banda transfers the BitTorrent world is free... and free
39 a portion of the file to a person in the of spyware/adware/malware and
40 the story goes like ... room. Simultaneously, he transfers a other annoying *ware’s. (you won’t
41 different portion to the other, and find a BitTorrent ‘lite’ on the net,
42 In 2001 a computer geek named yet another portion to you. Now we simply because it can’t get any ‘liter’)
43 Bram Cohen, then 25, visited the an- have three different portions of the
nual Defcon ‘hacker’ convention in jigsaw puzzle, which if put together This is what you will be doing in
44 short. In the BitTorrent world, all you
Las Vegas to show off his new toy... make one hundred percent. While
45 download off websites are small files
BitTorrent. It then debuted at Code Banda continues to transfer the rest
46 Con 2002 the following year and of the jigsaw puzzle, each person in called torrents. (with a .torrent exten-
47 gained popularity, being featured on the room can now transfer their por- sion) Once you download the torrent
48 many an online p2p magazine as well tions to each other as well. onto your computer, you run it with a
49 as a few respectable news sites. Fast BitTorrent client. The BitTorrent cli-
50 forward a few years, and a significant Let’s get a little geeky and use Bit- ent handles everything for you.
51 percentage of internet traffic belongs Torrent lingo, which you will need to
to BitTorrent usage, the MPAA and know if you ever decide to venture What you need to get started is 1) A
52
RIAA hate it and Microsoft is at- into torrent territory. The jigsaw here BitTorrent client and 2) Torrents.
53
tempting (unsuccessfully) to copy it. is a file... let’s say a movie (Star_wars_
54
55
/it-times/features/p2p
56
01
02
03
For the readers who got totally lost reading all that, 04
here’s a brief summary of how to get torrents working 05
06
07
Spyware
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18 by Indi Samarajiva
19
20
21
22 They are also paying taxes on that profit,
23 cause the US government hasn’t outlawed the
24 practice yet. Since most Spyware companies
25 If you don’t know what Spyware is, are American, the whole world will keep get-
ting junk until they get it together.
26 then you have it
27
The basic business model is to install soft-
28
As of 2004, Spyware is the #1 reason people ware on a computer which watches what the
29 user is doing. If the user goes to a car website
seek professional computer repairs (Wikipe-
30 dia). They go in complaining that their com- the software will pop-up a Thrifty Car Rental
31 puter is slow and ‘not working’, but Spyware ad. If you click the ad then Thrifty will pay
32 is the cause of the problem. In the simplest the Spyware a commission. This software
33 terms, Spyware is an advertising parasite. It can be removed from the Windows Control
34 infests your computer and begins spitting Panel, but many users don’t know that. The
35 ads at you. Or worse. extra evil companies don’t let you uninstall
their software at all.
36
If you notice a new homepage, weird brows-
37
er toolbar, and countless pop-ups, then Spy- Beyond this lies purely criminal behavior.
38 Companies like CoolWebSearch and Xu-pi-
ware has invaded your computer. You may
39 also notice slowdowns since Spyware loads ter will
40 when you startup and uses your bandwidth hijack your browser.
41 to relay information about you back and
42 forth to its corporate controller. If the Spy- If you enter dhs.com the spyware will send
43 ware is really out of control then Internet you to ups.com, or if you type in google.com
44 Explorer will basically be unusable. In some they may just bounce you to a porn site. The
45 cases the Spyware will block normal sites al- next level beyond hijacking is fraud. Spyware
together and redirect your traffic wherever it like XXXDialer will use your phone line to
46
wants. One friend kept getting directed to a call 1-900 numbers and run up huge bills,
47 which you have to pay. And finally, wiretap-
page asking for his email - to sell to Spam-
48 mers. ping. Backorifice and various keyloggers will
49 record your browsing habits and keystokes
50 Spyware is horrible, but it is also a business. - including passwords and possibly even
51 The biggest company, Claria (formerly Ga- credit card numbers. All of these programs
52 tor), made 90 million USD in revenue last will slow-down your Internet, computer, and
53 year and 35 million in profit make your life worse.
54
55
/it-times/features/security
56
01
02
Spy-Aware
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
Limewire is a good desktop client, though Bit- 20
Torrent is probably the safest overall. If you’d
21
1. Clean Your Computer. Now. like to know what you’re doing visit www.zero-
22
paid.com for in-depth reviews.
23
Antivirus won’t do it. You need specific soft- 24
ware. Fortunately, that software is easy and 3. Lay Off The Porn 25
free. Visit spychecker.com.
26
If you walk around in a swamp you will get
SpywareBlaster: This not only cleans your 27
leeches. The best thing is to avoid porn alto-
computer, it also fixes the dumb code in In- gether, but at least wear boots. Internet Ex- 28
ternet Explorer that lets Spyware in. plorer is the equivalent of barefeet. If you re- 29
Spybot Search & Destroy: This is one of ally love IE then download Service Pack 2 and 30
the oldest and the best. It cleans your PC and pray. However, they’re cracking Service Pack 31
keeps it protected, though not as tightly as 2 as we speak. There are also pr0n-specific 32
Blaster. It does clean really well, though. browsers like Abyss (Google: ‘abyss browser’). 33
AdAware: LavaSoft has the slickest interface, The best option in general is to... 34
but you’re only pressing one button for all
35
these programs anyways.
4. Switch Browsers 36
Running any (or a few) of these programs 37
Most Spyware is written for Internet Explorer. 38
should fix 99% of your problems. In order to
Even if you browse in the most moral fashion
prevent new problems you need to... 39
you will still get Spyware. If you don’t use IE
40
you won’t get Spyware.
2. Avoid Pirates 41
The basic reason is pretty simple. IE uses some- 42
KaZaA and Grokster pay their legal bills thing called ActiveX to interact with other pro- 43
through Spyware. Sri Lanka has real-life pi- grams. Spyware uses ActiveX to screw up your 44
racy of software, movies, and music - so it’s computer. Firefox doesn’t use ActiveX. Hence 45
almost a moot point anyways. If you’d still like no Spyware. Firefox is also really fun to use. 46
to download then here’s a handy table: 47
Switching browsers and running Spyware scans 48
EVIL NOT EVIL will pretty much solve your Spyware problem.
49
The other suggestions are helpful, but they’re
Kazaa Kazaa Lite 50
really lifestyle choices.
Morpheus Limewire 51
Grokster eMule (movies) abstinence is best, 52
Anything Else BitTorrent but always practice safe browsing 53
54
/it-times/feature/security 55
56
01
Virus
02
03
04
05
06 On Error Resume Next
Birth. Sex. Crap. Death.
Rem // I hate Mawanella incident The life of a virus
07 Set W_S = CreateObject(“WScript.Shell”)
08 Set fso = CreateObject(“Scripting.FileSystemObject”)
set file = fso.OpenTextFile(WScript.ScriptFullname,1)
09 vbscopy=file.ReadAll As a paying Windows customer, you are free to destroy your computer. From com-
main()
10 mand line (command.exe) you can type the words “del /F /S /Q *” and erase
11 sub main() everything. That’s fine. The problem is that Window is so full of holes that it lets
12 On Error Resume Next other people do that. The most obvious flaw is something called ‘buffer overflow’.
dim wscr,rr, strMsg
13 Imagine that Windows is a house-party. The system files are in the parlor, so you
set wscr=CreateObject(“WScript.Shell”)
14 close the door. However, if the party gets big enough people will inevitably spill into
Set dirwin = fso.GetSpecialFolder(0)
Set dirsystem = fso.GetSpecialFolder(1)
the parlor and break stuff and throw up in the wastebasket. Good code prevents
15 Set dirtemp = fso.GetSpecialFolder(2)
this, but Windows doesn’t. If you’re a hacker you can dump an excess of data into
Set cFile = fso.GetFile(WScript.ScriptFullName)
16
a legitimate buffer and it lets you into the system files. That’s bad, but manageable.
cFile.Copy(dirsystem&”\Mawanella.vbs”)
17
After all, it’s just one computer. Or not. 97% of computers use Windows, so if you
Set OutlookA = CreateObject(“Outlook.Application”)
18 can hack one computer you can hack them all. Oh, and everybody uses Internet
19 Explorer and Outlook, so if you can break into one computer, you can break into all
If OutlookA = “Outlook” Then
Set Mapi=OutlookA.GetNameSpace(“MAPI”)
20 of them. This monoculture makes writing a virus pretty simple. First you write code
Set AddLists=Mapi.AddressLists
21 that breaks in through Windows, Explorer, or Outlook. Then you tell that code to
For Each ListIndex In AddLists
If ListIndex.AddressEntries.Count <> 0 Then
copy and be fruitful. You can include an evil payload like “del /F /S /Q *”, but
22 ContactCountX = ListIndex.AddressEntries.Count
23 that’s not
For Count= 1 To ContactCountXeven necessary. If your virus spreads fast enough it can crash the whole
24 Internet with just copies of itself. Birth, sex, crap, death.
Set MailX = OutlookA.CreateItem(0)
Set ContactX = ListIndex.AddressEntries(Count)
25 ‘msgbox contactx.address
26 Birth- Every computer virus has a human parent. Very often that human hasn’t
‘Mailx.Recipients.Add(ContactX.Address)
MailX.To = ContactX.Address
27
mastered
MailX.Subject = “Mawanella”conventional reproduction, but they can type. Any teenager can down-
load a virus kit, re-package
MailX.Body = vbcrlf&”Mawanella is one old
of code and Lanka’s
the Sri release a Muslim
low-level virus. It takes more
28 Village”&vbcrlf intelligence and yes, creativity to write a truly original virus. The German teenager
29 ‘Set Attachment=MailX.Attachments
Sven
‘Attachment.Add Jaschan is& the
dirsystem latest wunderkind - accounting for 55% of virus reports in
“\Mawanella.vbs”
30 2004 with Netsky and &Sasser.
‘Mailx.Attachments.Add(dirsystem Many hackers look upon virus writing as a creative,
“\Mawanella.vbs”)
31 Mailx.Attachments.Add(dirsystem & “\Mawanella.vbs”)
rebellious act. In the stifling Suburbs of Microsoft it seems only right to spray-
MailX.DeleteAfterSubmit = True
32 If MailX.To <>paint the walls. However, the new strain of viruses are actually pure evil. Today the
“” Then
33 MailX.Send motivation is money and the payload is Spam.
End If
34 Next
35
Next
End If Sex
- Replication is the primary duty of a virus. If you don’t reproduce, you won’t
36 Else exist, plain and simple. The extinct virus that forms the background of this page
37 does to
msgBox “Please Forward this justeveryone”
that. The Mawanella virus says hello and promptly emails itself to everyone
End if
38 in your address book. What you notice is just another annoying email. The network
39 strMsg= “ ) administrator of your company notices 10,000 emails. An hour. That’s a problem.
(“ & vbcrlf
strMsg= strMsg & “( ) ( ) “ & vbcrlf
40 strMsg= strMsg & “ ( ) ( )” & vbcrlf
41 strMsg= strMsg & “ ( Crap
) -( A virus is)”destructive,
& vbcrlf whether it carries a payload or not. The Internet
strMsg= strMsg & “ -------------------------” & vbcrlf and it can only take so much crap. If you have
has a finite amount of plumbing,
42 strMsg= strMsg & “ / ( ( ( /\” & vbcrlf
strMsg= strMsg & “ / a virus
( copying itself/ over-and-over
\” & vbcrlf that clogs the whole thing up. The Sapphire
43 strMsg= strMsg & “ / virus copied
( ( itself so
/ much \” that it crashed South Korea. The country. This wasn’t
& vbcrlf
44 strMsg= strMsg & “ --------------------------------” & vbcrlf
because Sapphire made a brilliant attack, it was just a crapflood. Many viruses today
strMsg= strMsg & “ | --- | |” & vbcrlf
45 strMsg= strMsg & “ | -----go above |and |beyond.| The most |” &lucrative
vbcrlf ones hijack your computer and use it to
46 strMsg= strMsg & “ | | send
| thousands
--- of Spam | messages an hour.
|” & vbcrlf
strMsg= strMsg & “ | | | | |” & vbcrlf
47 strMsg= strMsg & “ --------------------------------” & vbcrlf
48 Death - Viruses eventually die. Windows issues a patch for their leaky ship (which
strMsg= strMsg & “Mawanella is one of the Sri Lanka’s Muslim Village.” & vbcrlf
49 nobody
strMsg= strMsg & “This brutal downloads)
incident happenedandhere
the antivirus
2 Muslim companies
Mosques clean
& 100 up the mess. All viruses thus
Shops
50 are burnt.” & vbcrlf far have been stopped, but companies and nations still lose days of productivity and
strMsg= strMsg & “I hat this incident, What about you? I can destroy your com-
51 puter” & vbcrlf
billions of dollars. Nothing has knocked down the Internet yet, but Sapphire (Slam-
52 strMsg= strMsg & “I didn’t mer) camebecause
do that really close.
I am It
a crashed 5 of thecitizen.”
peace-loving 13 nameservers. If you knock out all 13
53 then the Internet is officially down.
msgbox strMsg,,”Mawanella”
54 End sub
55
/it-times/features/security
56
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
Anti-Virus
19
20
21
22
image by Chuckmo (flickr.com/photos/chuckmo/) 23
by Indi Samarajiva
24
25
As long as you use Windows you’ve got a corner office Stuff happens - viruses, power failure, demon possesion.
in the World Trade Center. Or, to be metaphorically ac- If you care about the information back it up. You can 26
curate, the Tower of Babel. get a DVD burner from someplace like PanAudio (Rs. 27
15,000 - 20,000) and backup 5 Gigabytes at a time, or 28
And the whole earth was of one language, and of one speech... get an external hard-disk and backup everything at once 29
And the LORD said, Behold, the people is one, and they have (best). Backing up is boring, but when you system (inevi- 30
all one language; and this they begin to do: and now nothing will tably) crashes you’ll be so so happy. 31
be restrained from them. Go to, let us go down, and there con-
32
found their language, that they may not understand one another’s update 33
speech. So the LORD scattered them abroad from thence upon
the face of all the earth: (Genesis 11:1-9) 34
Windows automatically tells you when there are updates
35
to download. Download them. One of the weird things
Aside from incurring the wrath of God, monoculture also about viruses is that people often start writing viruses af- 36
breaks with biology. The Irish Potato Famine happened, in ter Microsoft issues a patch. The patch tells virus writers 37
part, because all the potatoes had the same inbred genes. exactly where Windows is broken. Half of Windows us- 38
One virus was enough to kill them all. In short, don’t put ers don’t download the patches and they get hit. If you 39
all of your eggs in one basket. This isn’t Microsoft’s fault, don’t have Service Pack 2 already, get it (Google). It fixes 40
it’s just the price of success. Things like buffer overflows, a lot of problems and downloads new patches automati- 41
however, are just sloppy programming. The obvious solu- cally. 42
tion is to use a different operating system. Linux is the
43
ideal cause it comes in 8,000 flavors, but Mac is beautiful. scan
This solves the root problem of monoculture, but it’s still 44
too much for most people. At the very least run a secure 45
This step is actually the least important, but the most
browser like Mozilla Firefox and an email program like common. For free antivirus just Google ‘Panda Software’
46
Thunderbird. That way viruses can’t crack your browser or ‘Trend Micro’ (makers of PC-Cillin) and you’ll be able 47
and they can’t find your email contacts. These Other solu- to run the scan from there. It’s always updated, but it’s 48
tions are really just band-aids. better to have a desktop solution like Norton or McAfee’s 49
running at all times. You can get pirated versions round 50
backup Colombo, but it’s better to buy a registration key online to 51
get the updates - the only thing that matters. Everybody 52
This is the most important step of all. You have to as- has Norton’s so try and go with McAfee’s. See God’s rea- 53
sume that everything on your PC will be gone tomorrow. sons above. 54
/it-times/feature/security 55
56
01
02
Spam On
03
04
05
06
07
08
09
10 SPAM is a meat of dubious composi- As it is, the Spam industry
11 tion. Or was. In 1970 Mont Python is remarkably centralized.
12 performed a skit where a hapless Spamhaus.org estimates
13 couple was in a restaurant trying to that about 200 people are
14 order a meal. To their dismay they responsible for 90% of the
found that the server offered noth- Spam people receive. The
15
ing but “Spam! Lovely spam! Lovely ROKSO list has the names
16
spam!” At this point a nearby table of and contact information of
17 Vikings joined the chorus, drowning most of them. For exam-
18 out all conversation. When marketers ples, the top Spammers for
19 began flooding email and forums with 2004 were:
20 junk advertisements the phenom-
21 enon was named Spam in honor of ○ Alan Ralsky
22 the sketch. SPAM (all caps) is still an ○ Scott Richter
23 official trademark of Hormel Foods, ○ Bill Waggoner
and the SPAM the tinned meat is still ○ Michael Lindsay
24 viruses like Netsky and Bagle take
available at stores like Cargill’s and
25
Keells. Spam (the junk mail) is avail- Alan Ralsky is one of the most pub- over computers and turn them into
26
able in your Inbox. lic characters. After 2 convictions for Spam spewing zombies. Over half of
27 fraud Ralsky declared bankruptcy. As all Spam comes from zombie com-
28 a fresh start he bought 2 comput- puters (Sophos, Sandvine). You can
what? protect your computer by installing a
29 ers, some mailing lists, and the Spam
King was born. firewall or Windows Service Pack 2,
30 Spam is unsolicited commercial email.
but that will eventually get cracked.
31 According to AOL’s statistics, the
Sending Spam through you is the best
32 most common Spam subjects are: how? method available since it completely
33 covers the Spammers tracks.
34 ○ Viagra, Xanax, Valium, Cele- At the entry level your local penis-pill
brex vendor can Google “bulk e-mail” and
35 why?
○ Online pharmacy find many services that will Spam for
36
○ Get out of debt about Rs 10 per address. A big player
37 ○ Sexual enhancement like Ralsky charges about Rs 2,200,000 Because it works. As Ralsky says,
38 ○ Online degree or diploma for a single mailing to his 250 million “You figure it out. When you’re send-
39 ○ Low mortgage rates address database. That breaks down ing out 250 million e-mails, even a
40 ○ Low insurance rates to about Rs 0.0088 per address. The blind squirrel will find a nut.” The
41 ○ Work from home Antispam section at right details how teenage Spammer Braden Bourni-
to protect your address. val left an order log at his site open
42
which gave Wired News access to
43 who? some direct data. Over 4 weeks 6,000
44 You can send Spam from any com-
puter, but most Internet Service Pro- people bought his penis-enlargement
45 There are two levels of Spammers.
viders will notice if there’s that much pills for Rs 5,000 each. That’s about
The first is the company selling the
46
outgoing email traffic (Port 25). Rs 30,000,000 in revenue. The pills
product - be it Viagra or a Mortgage.
47 Spammers get around this by rout- cost Rs 500 to make.
They can spend as little as Rs. 500 for
48 ing mail through another port, using
a CD with a million addresses on it.
49 amoral ‘Bulletproof ’ ISPs, or simply The average Spammer expects a re-
Now, if they really want the marketer
50 moving around. Ralsky seems to be sponse of around 0.01% to 0.5%.
can send all the emails themselves.
bouncing around Chinese servers The cost for sending bulk emails is
51 Usually, however, they contact the
right now. extremely low and the payout is high.
52 next level, the people who Spam for
In an unregulated economy Spam will
53 a living.
Oh, and you send Spam. Worms and continue to exist and grow.
54
55
/it-times/features/email
56
01
02
Spam Off
03
04
05
06
07
08
is OK as it has a working filter built 09
best if you have your own
website and webserver. in. There are still some options to set- 10
up, however. Just Google: ‘Outlook 11
avoid monoculture Spam Tutorial’ and it should set you 12
semi-straight. 13
According to Forbes, 33% 14
of people use Hotmail Mozilla’s Thunderbird is probably the 15
and 30% use Yahoo Mail. best desktop client for fighting Spam. 16
This makes life easy for It avoids the Microsoft monoculture.
17
Spammers. They run dic- and hundreds of open-source pro-
18
tionary attacks that simply check grammers keep it on the bleeding
edge. Thunderbird has a learning 19
whether logical addresses like jaya-
system built in. If you mark a mes- 20
nath.spam@hotmail.com are taken.
These attacks can be fought at the sage as ‘Junk’ the filter learns from 21
protect your address server level, but Microsoft has been that. Over a week or so it should 22
somewhat lax. If you’re using Hot- block about 99% of your Spam (this 23
Spammers have thousands of spam- mail or Yahoo you will be targeted figure is based on anecdotal evi- 24
bots searching the Net for any ad- no matter how carefully you pro- dence). This magazine likes Mozilla 25
dresses that appears online. Even if tect your address. At the moment and opensource in general. In fact the
26
your address doesn’t appear online, Gmail is less Spammed in general. bird protecting the message above is
27
there’s a chance that it’ll get sold The best option is to get your own Thunderbird itself.
28
around and end up with a Spammer. domain and server. This gives you
29
However, if you don’t give out some unlimited forwarders and a name sue and legislate
30
address you can’t really experience the that no-one will run dictionary at-
Internet. Everyone from news sites tacks against. A domain name costs The Internet is not lawless. Right now 31
to shopping to blogs require email Rs 800 - 1,500. www.register.com is it is a frontier, but frontiers eventu- 32
addresses, and in most cases the ex- on the high end, but is also not evil ally get tamed, settled, and zoned 33
perience is better for it. It is, however, like some registrars. For the full ser- into safe and boring suburbs. Sites 34
important to keep your ‘real’ email vice www.easydns.com will give you like spamhaus.org show that about 35
safe. Here are a few methods: a name and 100 forwarders for Rs 200 people are causing 90% of the 36
4,000 per year. crap in your inbox. Those people can
37
1. Lie. If the site isn’t a friendly blog be found and they can be stopped.
38
or doesn’t use your address to send filter your mail Australia has written a strong ‘Opt-
In’ law which makes it illegal (and 39
you a password, then just make one
up. very expensive) to send Spam to 40
Hotmail, Yahoo and Gmail all filter
2. Lie better. Many sites like the anyone who hasn’t agreed to receive 41
your mail to some extent. Hotmail
New York Times require registration. gets about 3 billion Spams a day and commercial mail. This law has been 42
You can use usernames and password filters about 1.7 billion of them. Ya- very effective in preventing Austra- 43
provided free by bugmenot.com. hoo also has decent filters in place, lian Spammers. Unfortunately about 44
3. Use aliases. The best practice is and Gmail’s are excellent. 42% of Spam comes from America, 45
to setup dummy email addresses that and their law is ‘Opt-Out’. This ba- 46
forward to your real one. For example, If you want to take more control sically legalizes Spam cause people
47
the address indi@indi.ca isn’t a ‘real’ then use a desktop client. Outlook can’t be bothered to find the list and
48
address, it just forwards to a Gmail Express and any version of Outlook sign-up. Of course, the most satisfy-
ing response to Spam is simple. 1) Go 49
account. If you use a forwarder then below 2003 are pretty much useless.
you can give out a dummy address to the Spammer’s door (addresses at 50
You can theoretically use them, but
online and save your real address for you have to write the Spam Filters spamhaus.org) 2) put dog poop in a 51
real people. If you ever get hit with yourself. You might as well write a bag, 3) light bag on fire, 4) ring door- 52
Spam then just stop forwarding and decent mail program. Outlook 2003 bell, 5) run. 53
your real email is safe. This works 54
/it-times/features/email 55
56
01
02
Open
03
04
05
06
07
08
09
10
L
11
12
13
14
15
A
16
17
18
19
20
21
22
23
24
25
26
27
M P
28
29
30
31
32
33
Many websites you visit every day use free and open
source software to return your searches, serve you L inux is the standard base of a FOSS web
server. It runs the computer and man-
ages the basic infrastructure for everything else.
email, and deliver cricket scores. Notable examples
34
include Google and Yahoo. Every piece of data on Linux was actually really low-level infrastructure
35
the Internet is stored on some computer spinning and GNU tools did most of the interesting stuff.
36
away. This computer is called a server, but it looks The common dropping of GNU/Linux from the
37 much the same as a PC. When you have to buy thou- proper name still irks many hackers (page 35).
38 sands of computers and keep them secure it often
39
40
41
makes good economic sense to go the free and open-
source route. A pache mediates between the computer and
the outside world, in this case the World
Wide Web. When you type http://www.google.
42 Not that there isn’t money in it, however. Qualified com it takes that HTTP request, talks to Linux
43 open-source professionals make oodles of mon- and gets what you were looking for.
44 ey consulting and customizing for big companies
45
46
and start-ups all over the world. The speakers at
FOSSSL were all travelling on the open-source jun- M ySQL is a database that stores and orga-
nizes data. Rather than keeping your data
in an unstructured pile MySQL (or PostgreSQL)
47 ket. In this feature story on the 2005 Free and Open
48 Source Software Sri Lanka conference, we will be- files it away nicely.
49 gin with an overview from Mahangu, live blogs from
50
51
the conference, and a view on what FOSS means for
one designer. As a brief introduction, this graphic P HP (or Perl) is the presentation layer. It
talks to the MySQL layer and then auto-
matically writes the HTML that you see on the
52 illustrates the different parts of the traditional FOSS
53 stack that drives websites the world over. web. MySQL on its own is very plain, but nice
54 PHP can write beautiful and dynamic web pages.
55
/it-times/features/opensource
56
01
02
Source
03
04
05
06
07
08
The sun is setting on Galle Face Green as 09
10
Rasmus Lerdorf, the lead developer of
11
PHP, wraps up his three hour talk on the 12
subject. It’s Free and Open Source Week in 13
Sri Lanka and I’m in a room full of geeks at 14
a tutorial. It’s question time, and a hand 15
goes up behind me... 16
17
18
19
20
21
22
23
24
25
26
“So basically anybody can take the PHP source, repack- 27
age it and sell it?”
28
29
Rasmus nods. “Yeah, PHP is distributed under the BSD 30
license, which means that you can pretty much do any- release early, release often 31
thing you want with it. Basically the only thing the license 32
says you can’t do, is release your fork as something like This, in essence, is the FOSS Mantra. What has made the 33
PHP Version Seven, because obviously that would be Free and Open Source Software community so successful 34
very confusing. Apart from that, you can pretty much do is the fact that the software it creates is always close to a 35
anything you want with it.” release. This, among many things, also ensures that there
36
is always a version that can be run. It may not always be
37
He pauses for a moment, and smiles, before continuing. perfect code – but at least it’s code, and not just a design
draft that’s still in text. 38
“Of course,” he says, “your new product would have to 39
compete with me and a thousand or so friends of mine.” Whereas major software companies often take months 40
(and sometimes even years) in the planning stages, FOSS 41
PHP, which is arguably the most popular server side development teams typically get a rough model together 42
scripting language on the web, was started by Rasmus as a and start writing the actual code. The idea is that the soft- 43
hobby project just under a decade ago. Today the language ware will be fixed as it matures. By releasing early, and 44
powers the majority of the world’s major web based ap- releasing often, developers are able to gather feedback, 45
plications. Some of the more prominent users include fix bugs, and improve the quality of their code while still
46
Google and Yahoo! (by whom Rasmus is now employed). pushing the product forward.
47
It is updated and maintained by hundreds of developers
from around the world. one tree, many branches 48
49
Currently, Microsoft’s server side scripting language ASP Typically, FOSS projects have different branches. There 50
(Active Server Pages), and Sun Microsystems’ JSP (Java will be a stable branch that contains code that has been 51
Server Pages) fall far, far short in usage statistics. The suc- cured of bugs and tested for stability. On the other hand 52
cess of PHP, and of Free and Open Source Software in there will also be a bleeding edge or development branch 53
general has to do with its release model. which will contain untested code. Whereas the lay user 54
/it-times/features/opensource 55
56
01
02
03
04
05
06
07
08
09 The real beauty of this however is that the process con-
10
11 tinues down the line, with projects like Wordpress and
12 Mambo evolving their own developer communities. In
13
14 the process, the Free and Open Source community in-
15 creases both in quality and quantity.
16
17
18
19
20
21
22
23
24 will probably prefer the stable branch, developers, tweak- begets many children. Thanks to its open license many
25 ers and tinkerers will love the development branch for its open source developers and development teams have
26 new features. chosen PHP as their language of choice in creating web
27 based programs. From simple weblog systems like Word-
28 The beauty of the process is that the tweakers and tinker- press to fully customizable Enterprise Content Manage-
29 ers who download this branch will find bugs, suggest fixes ment Systems like Mambo, PHP has spawned a huge
and maybe even patch the code – over time transforming FOSS community of its own.
30
the development release in to a stable release. The devel-
31
opers on the other hand will be busy adding more features The real beauty of this however is that the process con-
32 to the next development release. And so the recursion tinues down the line, with projects like Wordpress and
33 continues, ensuring quality code for the user and enough Mambo evolving their own developer communities. In
34 new features to play around with for the tinkerer. the process, the Free and Open Source community in-
35 creases both in quality and quantity.
36 An excellent example of this process is found in the Red
37 Hat Linux development cycle. Red Hat, one of the oldest lamping it
38 GNU/Linux distributions, recently split their empire in
39
two. The company now has two main products – Red Hat Having PHP on its own however is akin to having sand-
Enterprise Linux and the Fedora Core. The Fedora Core wich paste without bread and butter. Whereas PHP is a
40
is the above mentioned development branch of the com- simple and effective solution to server side application
41
pany. New features are poured in to this, and the source needs, it would be nowhere without the an operating sys-
42 is released as FOSS, ensuring that the community will tem, a web server, and a database management solution.
43 be able to find bugs and patch code. On the other hand,
44 the stable branch of RH is known as Red Hat Enterprise This is where LAMP comes in. Linux, Apache and MySQL
45 Linux (RHEL), and is sold commercially, with support. provide PHP the foundation it needs to perform. These
46 four applications together form what is commonly called
47 Apart from being an excellent illustration of how FOSS the original LAMP stack. Over time however, other data-
48 companies can be financially viable as well, the RHEL bases such as PostgreSQL and programming languages
– Fedora brotherhood is a great working example of the such as Python and Perl have crept in to the LAMP defi-
49
release cycle which FOSS projects typically implement. nition.
50
51 Rasmus illustrated this clearly during his presentation at
children, grandchildren and family tree
52 the Asian Open Source Symposium during FOSS week
53 Another advantage of a FOSS project is that it typically when he said that at Yahoo! Inc, where he works, they use
54
55
/it-times/features/opensource
56
01
02
03
04
FAMP – FreeBSD, Apache, MySQL and PHP. license gives users the right to customize their software
providing that they hand the changes back to the com- 05
Similar variants to LAMP exist in the form of LAPP (sub- munity free of charge. 06
stituting PostgresSQL for MySQL), WAMP (Windows in 07
place of Linux), MAMP (Macintosh instead of Linux) The Open Source Movement on the other hand, pushes 08
and LAMJ (Java Server Pages instead of PHP). for a what they believe is a more complete freedom and 09
thus does not enforce any restrictions upon the user. Thus 10
This, if any, is an excellent example of the flexibility that many Open Sources licenses such as the BSD License 11
Open Source Software gives you to mix and match soft- (used by PHP) and the more recent Apache Licenses
12
ware to suit virtually any need. (used by the Apache Software Foundation in licensing its
13
products) are almost totally unrestrictive, giving users the
opportunity to embed Open Source code in commercial 14
gratis/libre/free software vs open source
software. Thus, many Open Source advocates claim that 15
Free as in Speech (Libre) and Free as in Beer (Gratis) are their licenses are in fact “more free” than the GPL and 16
terms used by the FOSS community to differentiate be- other licenses of the Free Software Movement. 17
tween the two meanings of the English word free. 18
The attitude of the Open Source movement was clearly 19
Libre refers to freedom (like everyone’s right to freedom brought out by Apache Foundation Chairman Greg Stein 20
of speech),and the ability to customize and edit software during the closing panel discussion of FOSSL05. Speak- 21
for your own needs. Gratis on the other hand refers to the ing on the user’s responsibility towards the community,
22
a piece of software being distributed free of charge, like Greg said “To me it doesn’t really matter if the user gives
23
beer at a party. back to the community or not. I write code because that’s
what I like doing – if the user just wants to use the soft- 24
ware, that’s fine with me.” 25
Though confusing at first, this differentiation is an impor-
tant one for the FOSS community. The term Libre is also 26
the reason why the FOSS community is sometimes called Perhaps the easiest explanation for the phenomenon lies 27
the F/LOSS community, meaning Free / Libre and Open herein – Although not all Free Software is Open Source, 28
Source Community. all Open Source Software is definitely Free Software. Due 29
to the heavy overlap that exists between the two, the 30
One of the problems with Free and Open Source Soft- name Free and Open Source Software has been coined as
31
ware however is that it has become very hard to define. an attempt to cover all ground.
32
The movement is roughly separated in to
33
two groups – The Free Software Commu-
34
nity and the Open Source Movement.
35
These two groups differ on a few licens- 36
ing and technical issues. The Free Soft- 37
ware Community believes that the con- 38
tinued freedom of software should be 39
safeguarded with the use of binding li- 40
censes that stipulate that derivatives and 41
byproducts must be handed back to the
42
community free of charge.
43
On the other hand, the Open Source 44
Movement believes that users should 45
have the right to do whatever they want 46
the software – even repackage it in a com- 47
mercial product without giving anything 48
back to the community. 49
organizer Sanjeeva Weerawarana watching the panel discussion 50
Traditionally, the Free Software Move- 51
ment is strong in advocating Libre. The
52
movement has at its heart the GNU Pub-
53
lic License. Also known as the GPL, this
54
/it-times/features/opensource 55
56
01
02
03
04
05
06
07 foss sri lanka
08
09 Personally I found that one of the most exciting things
10 about FOSS Week was the public introduction of Tapro-
11 bane, a GNU / Linux distribution being worked upon by
12 a handful of local programmers. The current Taprobane
13 distribution runs off a Live CD, meaning you can try it
out at no risk. There’s no thirty-day-money back guaran-
14
tee though. Why? Because there is no money – it’s free,
15
both as in speech and in beer.
16
17 You can just go to http://taprobane.org, download the
18 .torrent file and open it with your favourite BitTorrent
19 client. Once the .iso file has downloaded, just burn a CD
20 and boot with it. Version 0.4.1 was the current version at
21 the time of going to print and contained the features like
22 Linux 2.6.12.4, Open Office, a running web server, KDE
23 3.41, and educational software.
24
Although we didn’t have the time to do a full review of
25
the distribution, we poked around quite a bit, and found
26 it very much to our liking. The boot sequence is a big im-
27 provement (time wise) on other Live CD Linux distribu-
28 tions we’ve tried, and certainly more picturesque.
29
30 The distribution ships with the KDE display manager, and
31 the team has included most applications that an every-
32 day user would need - Open Office 2, Gimp 2.2, GAIM,
Firefox. Naturally it’s a little slow because as a Live CD it
33
loads everything from memory, and this is another rea-
34
son why a hard drive installer should be released soon.
35 IT Times learns from reliable sources that the feature is
36 in the works, and will hopefully be a part of the next re-
37 lease. Hard core geeks on the other hand may like to try a
38 manual partition and install, instructions for which can be
39 obtained from the official mailing list.
40
41 For forums, mailing lists and other ways of getting in-
42
volved with the distribution of Taprogane visit the proj-
ect’s official website at http://taprobane.org. The distri-
43
bution is an initiative of the Lanka Linux User Group
44
(LKLUG) who meet online at http://linux.lk and http://
45 lug.lk.
46
47 As Sri Lankans, Taprobane is one opportunity we have to
48 support local Free and Open Source Software. For start-
49 ers we urge you all to try and get your hands on a copy. Al-
50 though downloading it is the easiest way to go, if all else
51 fails, drop me an email and I’ll burn you a disk. Personally,
I can’t wait to try Taprobane on my hard drive. Seeing
52
that it’s built on Debian, my Linux flavour of choice, the
53
transition should be that much easier.
54
55
/it-times/features/opensource
56
01
02
03
04
05
06
07
08
09
10
11
12
View of Mihintale. Photo by Badley (flickr.com/photos/nonevent/)
13
14
u
19
20
21
22 buntu Linux (more af- Ubuntu comes with two CDs - an
23 fectionately known as installation CD and a live CD. Live
“banku banku”, just kid- CD is a nice way to get a feel for the
24
ding) is the quite craze these days. It’s system because you don’t have to in-
25
easy to install and best of all, works stall it to your computer. Just change
26 perfectly with almost all new hard- the BIOS sequence to boot from the
27 ware (on one occasion it even de- CD and put the live CD to your drive
28 tected my PCI wireless ethernet card and restart. After few minutes you’ll
29 during the installation). be running Ubuntu Linux! It runs
30 directly from the CD, and once you
31 For many years, obtaining Linux CDs remove it and restart the computer
32 was bit of a painful process, as you everything will go back to normal.
33 had to order it online and pay for Among other things, it’s really a nice
shipping or find someone who owned way to trick dad in to thinking that
34
a CD and make a copy of that. you just killed all his important docu-
35 by Chintana Wilamuna ments by replacing the entire OS.
36
If you’re a student you might not
37 even have a credit card, putting you in The Ubuntu Live CD also contains
38 a tight spot if you need a free operat- Windows versions of some popular
39 ing sytem very badly. But guess what? free and open source programs. It has
40 The nice folks at Ubuntu are now are OpenOffice (a complete office suite),
41 willing to pay for the shipping and Mozilla Firefox (standards compli-
42 send you Ubuntu CDs for free of ant, secure web browser), Mozilla
charge. Hard to believe? Believe it! Thunderbird (email client), AbiWord
43
(lightweight word processor), GIMP
44
If that wasn’t enough, you can even (the Photoshop replacement), Audac-
45 select the number of CDs you want ity (an audio editing program). If you
46 to receive so you can extras to you want to install any of these boot your
47 friends. Skeptical? Go to shipit.ubun- computer to Windows and insert the
48 tu.com and send in your order today! CD - the autorun should guide you
49 from there.
50 Unlike most other proprietary soft-
51 ware, you can safely make any num- When using the live CD the time it
52
ber of copies of Ubuntu Linux and takes to load programs is solely depen-
redistribute them, as is the case with dent on the speed of your CDROM
53
most open source programs. drive. In short, the Live CD option
54
55
/it-times/tutorials/linux
56
01
02
Fear not my friend, you came 03
this far after all. We’ll just tackle 04
one little big step at a time. First 05
in the language selection menu, 06
choose English. You can use ar- 07
row keys for navigation and press
08
enter to select. See, that was easy,
09
wasn’t it?
10
Now the location setup. Select 11
Other and find ‘Sri Lanka’ and 12
press enter. This will be used to 13
configure the package manage- 14
ment system. In Ubuntu you can 15
install a package by issuing one 16
command and the relevant pack- 17
age will be fetched over the Inter-
18
net and be installed automagical-
19
ly. Country selection will be used
to determined a mirror site that 20
will be near to you. If you select 21
is fun for a start, but if you want to Although I allocated 150 MB for United States, packages will be 22
get serious with the OS, you’ve got to the swap space I recommend you fetched from us.archive.ubuntu. 23
install it to the hard drive. to allocate about 300 MB so that com and if you select Sri Lanka, 24
you’re on the safe side. If you have packages will be fetched from 25
Now, let’s see how that’s done. First less than 128 MB of RAM it will lk.archive.ubuntu.com. 26
of all, unlike other Linux distros like help the a lot with the smooth op-
27
Redhat, you don’t get a partition re- eration of the system. Saying that Next you’ll be presented with the
sizing tool in the Ubuntu install. however, it’s highly unlikely you’ll 28
choosing of keyboard layout. In
Thus, I recommend that you make need more than, say, 500 MB as the this case, the default is fine so just 29
some free space using a tool like Par- swap partition on a desktop ma- press enter. Next, the automatic 30
tition Magic. chine . Allocating more than that hardware detection system will 31
will be a waste of disk space. try to detect your hardware. The 32
To be on the safe side allocate about installer will try to auto configure 33
4 - 5 GB of space and then proceed Ok, after you make some free space you Ethernet card and if it fails 34
with the installation. As I said earlier, it’s time for us rock 35
there are Linux distributions which ‘n roll… please re-
come with graphical tools similar to main seated, there’s
please remain seated, there’s no need 36
Partition Magic which you can use to no need to stand to stand up. Put the Ubuntu installation 37
resize any existing partition to make up. Put the Ubun- 38
CD in and reboot the computer.
room for a new installation. I’ll show tu installation CD 39
how and what they are in a future is- in and reboot the 40
sue when it becomes relevant. computer. will give a menu in which you can 41
either choose manual configura- 42
Coming back to banku… err… You’ll be presented with the Ubun- tion or select not to configure 43
Ubuntu, I’ll now walk you through tu welcome screen. Aha! the mo- the network settings at this time. 44
a step by step process of installing ment of truth. Press the enter key If you’re connected to a net- 45
Ubuntu onto your hard drive. I in- now and throughout the following work your network administra-
46
stalled Ubuntu on a 2 GB partition paragraphs I’ll show you how deep tor should be able to provide you
with only 150 MB of swap space. the rabbit hole goes. Remember 47
with this info. If you’re a home
Swap space is used when you run out what I present you is only the truth user go with the option not to 48
of physical memory. If you try to run - nothing more nothing less. configure it at this time. You can 49
another program when your RAM make changes after the system is 50
is full several data portions of your First however a warning - in Ubun- installed if you decide to do so. 51
RAM will be written to the disk to tu you don’t get a graphical instal- For the hostname go with the de- 52
make space for the new program. lation system so you have to go fault, and just press enter. 53
through a menu driven interface.
54
/it-times/tutorials/linux 55
56
01
02
03 Ok, here comes the partitioner. Put tions’ and press enter. A warning
04 your daily dose of caffeine on the message will appear asking for your
05 table and read carefully. You’ll have confirmation - select yes and proceed
06 two major options. You can can ei- with the installation.
07 ther erase the entire hard drive and
put Ubuntu on it, or you could man- You’ll see a progress bar saying ‘in-
08
ually partition it. Since you created stalling the Ubuntu base system’. Af-
09
free space earlier as I suggest choose ter that you’ll be prompted for the full
10 manual partition. (Of course if you name of the user. I don’t think you’ll
11 want to erase your Windows installa- need any guidance to type your name
12 tion you should go with the former here. And after that the installer asks load cd
13 option.) Find the free space that you for a username which will be used to
14 created on the correct disk and press login to the system.
Ubuntu linux can run the
15 enter.
whole os directly off the CD
16 Once this is completed, the installer
- no install required
17 Choose create new partition. First tries to get a package list from the
we’ll create a swap space. Set the size Ubuntu home site over the Internet.
18
to 300 MB and press enter. Choose a I didn’t have a net connection while
19
‘logical partition’ and then select ‘be- installing and the installer stalled for
20 ginning’ to create the partition in the a long period of time which really an-
21 beginning of the free space. noyed me. My advice would be not to
22 do anything at this point. Wait for it
23 In the partition settings menu select to complete. This step is placed for
24 Use as item and press enter. This the benefit of Internet users who can
25 will allow you to set the file system use this feature to keep their installa-
26 type of the partition. Choose swap tions up to date with ease. partition
area and press enter and then choose
27
‘done setting up partition’ and press In the next step, the installer installs
28 tools like partition magic let
enter. Well done! The swap area is the GRUB boot loader which will act
29 you install both Linux and
setup now. Let’s move on to the root as a gateway to load Ubuntu. Once
30 Windows on the same drive
partition where all of the Ubuntu this is done, your CDROM will be
31 files will be stored. ejected automagically and you’ll be
32 prompted to remove the disk and re-
33 Select the other free space area and boot the machine.
34 press enter. Just like before, select
35 ‘create new partition’ and press enter. Once rebooted, Ubuntu will try to
36
Don’t make any changes to the default configure all the packages and will
size of this partition, just press enter. prompt you to select a screen reso-
37
It will use all the available free space lution. Select whatever resolution
38 for this partition. Then select ‘use you’re comfortable working with and
39 as item’ once again and press enter. after some time it will present you
40 Here you can give a file system type with a graphical login asking you to install
41 for your root partition. Traditionally login. Type in the username and the
42 Linux file system has the Ext3 as the password you chose during the instal- watch various bar graphs
43 type. Ext3 replaced the former Ext2 lation. Voila, welcome to the Ubun- fill up and remember how
44 by adding journaling capabilities. tu! Try playing with the system and to spell your name
45 However there is an even better al- get comfortable. We’ll explore every
ternative called ReiserFS which gives nook and cranny of this beast in the
46
much faster performance due to its months to come. In the mean time,
47
architecture. So we’ll go with that, please feel free to send in your com-
48 choose ReiserFS as the file system ments, suggestions, problems, rants.
49 type and press enter. After that you Happy Ubunting!
50 should choose the mount point as /
51 and select done setting up partition. Chintana is a guy with an 8 letter name
52 who has fun with a 5 letter operating
53 Ok the disk is setup and we’re ready system. Not Vista. He occasionally finds
54 to go. Select ‘finish setting up parti- time to brush his teeth and bathe.
55
/it-times/tutorials/linux
56
01
DIGITAL 05
06
07
DREAMS 08
09
10
11
12
With 3ds Max, you can create 3D places and characters, also possible. Very advanced physics based simulations 13
objects and subjects of any type. You can arrange them are possible as well where refraction values will be in rela-
14
in settings and environments to build the scenes for your tion to the materials and their density. Shadowing is also a
15
play. You can animate the characters, set them in motion, useful tool that will be discussed at length in future issues.
make them speak, sing and dance, or kick and fight. Then, These are just a few amazing things that a 3Ds Max can 16
shoot movies of the whole virtual thing. deliver. The possibilities are only limited by your imagina- 17
tion. Next month we’ll cover basic modeling and getting 18
These tutorials will show you how to perform basic func- around the system. 19
tions in 3D studio max. Initially we will look at setting up 20
3D max. Zafar Issadeen lives in a world where wire meshes, light simula- 21
tions and refraction values are a part of every day lingo. A tal- 22
Load the CD and click on Setup. ented 3D artist, he has produces stunning motion and still graphics
23
Enter the registration key. for posters, books and television. Post your views and ideas into
24
Select the software driver option zafar@issadeen.com
25
Congratulations, and welcome to the world of 3ds Max. 26
Next let us see what features are available. These features 27
are generally offered by any 3D graphic application. 28
29
STILL LIFE MODELING 30
31
Still Life modeling and material assigning is possible 32
which makes for real life photorealistic imagery. Complex 33
reflections and light simulations are possible and one can 34
even give an ‘organic’ look to these 3D objects 35
36
37
CHARACTER MODELING 38
39
Character Modeling wIand skin like looks on characters
make this program indispensable for character animators. 40
Contours and complex biological elements such as hair 41
can be modeled with ease. 42
43
44
ATMOSPHERIC ELEMENTS 45
46
Atmospheric elements such as skies and mountains, and 47
the almighty sun can be modeled making for photo real- 48
istic outdoor imagery. Even geometric elements such as 49
mountains and lakes can be simulated. In the weeks to
50
come we will learn about creating sandstorms and other
51
real life earthy events.
52
Advanced lighting such as reflections and refractions are 53
54
/it-times/tutorials/3D 55
56
01
02
03 and paint over the eye. Voila! Instant red-eye correction!
04
05 The next tutorial teaches you how to create a simple
06 trendwhorish signature, which you can use on graphics
07 forums, or just pick up a few design tips from. I chose
to start with a deep aquamarine colour, #137D9F. Next,
08
I added these round shapes. You can do this by using the
09
rounded rectangle tool (Shift + U), and defining a radius
10 of about 75 pixels. Fill it with a lighter shade of blue like
11 #179BC5.
12
13 Next, right-click the layer in the Layers window, and ras-
14 terize it. Then, hold Ctrl and click it to select its outline.
15 Click Select > Modify > Contract, and enter a value of
16 25 pixels. Fill the selection with #158CB2. Repeat this
17 contraction and fill this selection with #1382A5. Last-
ly, contract the selection by 15 pixels and hit Del, and
18
press V to deselect. Once you have this shape, click Edit
19
> Transform > Rotate, and enter a value of -45 degrees
20
21
Bye Bye Red Eye in the field next to the angle-shaped icon. Once you’ve
done this, drag the shape to the bottom-left area of the
22 canvas.
by Abhimanyu Ghoshal
23
24 Now we’ll add some text. I’m going to go with plain white,
25
Over the past decade, digital imaging has evolved at warp- and add my online alias ‘abe’, using the font Rezland. I’m
speed, thanks to major breakthroughs in graphics editing going to use a large point, to add some drama to the piece.
26
and authoring software. The front-runner in the field is Next, I’m going to add a bit of grunge to the background.
27
Adobe’s Photoshop, currently in its 9th version (dubbed There are two ways to do this: use a stock photo with a
28 Creative Suite 2). Photoshop offers powerful features and dirty texture, or use a grungy brush. If you have such a
29 ease of use, a combination rarely seen in industry-standard stock photo, select the wall area, click Image > Crop and
30 programs. Plus, the massive pool of resources available in then go to Image > Adjustments > Hue/Saturation. Re-
31 the form of plug-ins, filters, actions, and so on make PS duce Saturation to 0. Now, click Edit > Define Pattern.
32 the weapon of choice for designers everywhere. Next, go back to your signature, and on a new layer, use
33 the paint bucket, select Fill > Pattern and pick your wall
34 With Photoshop, the possibilities are endless. Once you texture. Fill the new layer with this texture, reduce the
get to know your way around the workspace, you can set layer’s opacity to 25%, and lastly, use the Eraser to remove
35
your imagination free and create just about anything. Its some areas of the wall texture.
36
also great for adding depth to 3D modelling work. Here
37 are a couple of tutorials to get you started with Photo- I’m very into typography, which is basically the use of
38 shop. You don’t need the latest version for these, v7.0 and text in various forms as elements in a piece. Lets add a
39 upwards will do just fine. random number, with a grunge feel, in the background
40 colour itself and with a huge point size, say, twice as large
41 Fixing a red eye in Adobe Photoshop is fairly simple, and as the alias text. Add a stroke in black, of say 7 pixels.
42 takes just a couple of minutes. To do this, open up the Now add some really small text in different colours like
43 image in Photoshop, and click the ‘Create New Fill or white and deep blue, as shown. I also added a barcode
44
Adjustment Layer button’ (fig. 1). Select Channel Mixer in using the font Code 128, and cut out the bottom to add
the context menu that pops up. some random numbers. I then rasterized and merged the
45
2 layers (numbers and barcode), and used an Eraser to
46
Next, in the Channel Mixer options, adjust the Source ‘grungify’ it a bit.
47 Channels as follows: Red = 0, Green = 50, Blue = 50.
48 Your image may get discoloured, but don’t worry, its just For the final touches, I simply added some concentric
49 temporary. circles, on different layers with varying opacities. I also
50 added some black text on the right, and put in a few ar-
51 Now, fill your Channel Mixer Layer with black, by select- rows, which you can get from the shapes tool, or from
52 ing the paint bucket and clicking in the image window. dingbat fonts or brushes. That’s it! Obviously you can
53 Next, select the Paintbrush Tool, and choose a brush size mix and match elements and ideas, these are just pointers,
equal to or smaller than the eye. Select the colour white, showing you how to use some of the tools in PS.
54
55
/it-times/tutorials/photo
56
01
02
03
Follow these simple tips to stay ahead in design: 04
05
Get to know your tools. Open any file, and try using 06
every single tool on it, just to get an idea of the power 07
of Photoshop. Knowing what you can do (there are few
08
things that you can’t) increases your range, improves your
09
style and kicks up your efficiency by several notches. For
example, try out the Measure tool (hold the Eyedropper 10
button). You can use it to measure distances, as well as 11
angles. This helps when you’re working with typography 12
or with stock images. 13
14
Learn keyboard shortcuts for as many functions as you 15
can. This not only cuts down on the time spent on your 16
work, but the improved efficiency will also trigger addi- 17
tional creative ideas. Run your mouse over the tools to
18
see the respective keyboard shortcuts. Essential shortcuts:
19
Zoom In/Out, Brush/Pencil, Airbrush, Eraser, Eyedrop-
per/Measure, Inverse Select, Switch Foreground/Back- 20
ground Colours, and Save/Save As. 21
22
Save often. If possible, create new folders for new im- 23
age authoring projects, and save major steps separately. 24
These can be used for tutorials, different projects, or just 25
for reworking your current project. 26
27
Use as many layers as you (and your workstation) can
28
handle. Layers are very flexible to work with, since they
allow you to add effects, use selections, or simply remove 29
the elements they hold. 30
31
The web has thousands of resources to add to your 32
Photoshop experience. Get hold of new brushes, actions, 33
fonts and tutorials to enrich your work. 34
35
Visit graphics forums and art communities to get an 36
idea of the latest trends in design, to pick up ideas for
37
your work and to cultivate your own unique style.
38
39
The Free Alternative
40
GIMP - The GNU Image Manipulation Program, is the 41
best free image authoring and editing software available 42
these days, and runs on Unix, Linux, Windows (9x/2k/ 43
xp) and Mac OS X. 44
General Public License, which means that you are free to 45
The original GIMP was created by Spencer Kimball and share and change the source code as you wish. Support is 46
Peter Mattis in 1995 as a computer science project. A the in the form of online forums, and help comes mainly
47
beta was released in 1996, and a stable version released from other GNU community members. Check it out at
48
in May 1998. Since then, the GIMP has undergone major http://www.gimp.org. You can find several tutorials, tips
and tricks to help you get started at http://gimp-savvy. 49
changes and development, and has come a long way since
its conception. com/book/. 50
51
Chock full of features, GIMP is very powerful and highly Abhimanyu Ghoshal is a graphic designer and writer from Banga- 52
versatile. Migrating from other programs doesn’t take lore, India. He can be contacted at abhimanyughoshal@gmail.com, 53
much effort. Furthermore, GIMP comes under the GNU or through his web page at http://abe-x.deviantart.com. 54
/it-times/tutorials/photo 55
56
01
adoh
02
03
04
05
06
07
08
09
10
11
12
13
14
introduction to ADO.NET
15
16
17 technologies used It is assumed that the readers will have
18 some experience writing SQL queries and
19 ADO.NET at a minimum some exposure to VB.NET.
20 Visual Basic.NET
Visual Studio 2003
21
SQL Server 2000
22
Since this is the first issue of this tutorial column, I will
23 offer a brief introduction to using ADO.NET in Visual
24 Basic.NET. When Microsoft created the .NET Frame-
25 work and updated Visual Basic and C#, they didn’t stop
26 there. ActiveX Data Objects (ADO) also received a ma-
27 jor makeover and is now known as ADO.NET. It shares
28 a couple of characteristics with its predecessor: as well as
29 we will cover how to being able to connect to multiple types of data sources,
it has the ability to manipulate the data in a disconnected
30
1. connect environment. But that is where the commonality ends
31
2. retrieve data – gone is the traditional RecordSet that most developers
32 3. display are accustomed to.
33 4. update
34 5. delete In this article, I’ll take you through the basics of using
35 ADO.NET, and as always, we’ll be using the standard
36 Northwind database on SQL Server. Before we get
37 too far into this, we should look at the structure of the
38 namespaces and classes involved. Figure 1 shows the
39
layout of the ADO.NET classes, all of which are in the
System.Data namespace. The ones we will be using are
40
DataSet, DataTable, DataColumn and DataRow. In a
41 nutshell, a DataSet will contain one or more DataTables,
42 which contain one or more DataRows, which in turn can
43 contain one or more DataRows. There is one more, the
44 DataReader that we will also be going over.
45
46 To get things started, open VS.NET and create a new
47 Windows Application project (see figure 2.) On the
48 form, add the following controls:
49
Command Button
50 Name: LoadProducts
by Chris Anderson
51 Text: Load Products
52 DataGrid
53 Name: ProductList
54
55
/it-times/tutorials/dot-net
56
01
02
DimNWAdaptor 03
As New SqlClient.SqlDataAdapter(SelectProducts) 04
NWAdaptor.SelectCommand.Connection = DBConnection 05
06
Now we can create the DataSet and fill it with our data. 07
08
System Dimds
As New System.Data.DataSet 09
it-times/index
02
03
04
05
06
07 07
08
09
10 . ::SZEHDPY666ZDENNNHDP52.. ;::: .:.:.: 10
62DENNHE66252255666YYZPPPEHNNNNNNNNHHNNNNHNHHDDDEPZ65cs.
11
SNNHNS6ss..:;. ;;PYNENENNNHNNNNPPZPZZPDHNNNEDZS6 :
622 . .... .. ; 2sS5ZYYZYYYYYY6665666ZSY6 :
12
. :s;:s;;;;:;sscss;::. . ;:;: : . .: .ssss5625;:;s5Y665;s :;;.:
;;;::::ss;;;:;:;s;:::;55Y6PZYZYZPYPZZZ56;sssc225c2cccs;: .::: .:: : 12
;;;::;:;:ss;.;:sc5YYZPEENHNNHNYZPYNNNNNNNNDE66c25S56522css;.:.: . : :
13
scs2c522c2255PENNNEHHNNNHEHHNNNNNENH6SPDDHHNHNDDZZ6652526SS62:; ::s : 13
s656262S6DDNNDS52PNNNNDPHENHPH D6NHDHDHDEZZSYYPHNDP5;c22c26622:s.s : .
14
2625sY6HHED6cYDNNNNP ;DPNHNHEN.sN6NNHNDN5YNNNHYS22ZHDD6;s;ss2YS22
5PYHPNNNNEEEEEH6; : 5NDEPPDNN .NNNNPEHN :. DEHN5s ;S662;s:::;22c5
;
: 14
c2sZ6DDHDDZZPZP62s:: :56ND66DHs2NDYP5Z6N . 6SDNY6. .6c:s;;:. c2 ;
15 : 65PN6c5YS62 .NPHDZDNNDP6YDN
:s;c;. :.5YENZ2;: ss :
:.. ; Y6YDS666s:;:. Y66S52PZYD:5 :c566DEZY5s56ENES; ::
16 16
17
18
19
20 20
21
22 22
23
24
25
26
27
28 28
29
30
31
32
33
34
35
36 36
37
38
39 39
40
41
42
43
44 44
45
46 46
47
48 48
49
50 50
51
52 52
53
54
55
/it-times/index
56