Sunday, 21 March 2010

The Major Oil Leak That Wasn't

Last November I set off in my van to do a 200 mile trip up to Manchester. However, after 40 miles or so she sprang a major oil leak and I ended up being towed home by the RAC. It's taken me a while to find out and understand what went wrong and it turns out to be an embarrassingly stupid mistake on my part. Rather than keep it to myself however, I thought I'd write it up in some detail, in the hope that it benefits somebody else.



As you can see, my van's engine, like most, is not entirely stock. For one thing it has a progressive carb with a paper air filter, and for another the heating system is not connected up. One of the first things I did when I got my her was to block up the gaping holes in the fan shroud where heater pipes would be attached. Given that the Manchester trip was to be a significantly longer drive than I'd ever done before, I'd decided to attend to a few other things too, including blocking up the holes where said heater pipes, and a stock air filter's warm air intake hose, would go through the rear tinware.

All of the above is as it should be but I'm mentioning it here because it gives context to the mistake that I did make. The fact is that if you look around you'll see a lot of VW engines with these orifices left gaping; and they shouldn't be. The ones in the fan shroud will result in air being blown back into the engine bay rather than being sent to cool the cylinder heads. Gaping holes in the tinware will result in warm air from the lower engine being sucked back into the engine bay.

So what was my mistake?

Well, the oil filler neck has a connection which, on a stock engine, has a hose connecting it to the air filter; thus, you might think, as I did, allowing the crankcase to breathe filtered air. Replace the stock air filter (often done when a non-stock carb is used) and you might not have a place to connect this hose. Have a look at a few dub engines with non-stock carbs and you'll see that the breather on the oil filler neck is often left unconnected to anything. This did not strike me as being a good thing and in my bid to close up 'unnecessary' orifices, I put some tape over it to stop any crud getting in there.

As I discovered later, the crank case is in fact more inclined to breathe out though that tube as it takes air in through a (surprisingly to me) unfiltered opening behind the pulley wheel. The tube on the filler neck connects to the stock air filter not to supply it with filtered air but so that the oily vapour it breaths out goes into the carb; to be burned up in the engine rather than dumping it elsewhere. Block the pipe on the oil filler neck, as I did, and the crank case will breathe its oily breath out behind the pulley wheel. Result: the pulley wheel flings the oil all over the engine bay.

Combine my faux pas in closing that vent with topping up the oil to the max (she always leaks a bit so I expected to lose some on the trip) before I set off and I was all set for the incident that followed. This part of the story is worth telling because it helps to show why it took me a while to find out what went wrong. So, in a nutshell:

I pulled into a service station, smelled oil, and when I went around the back I found that there was oil sprayed all over the back of the vehicle (it must have been hitting the hot engine and vaporising) as well as all over the engine bay. In a bid to save a potentially dry engine I grabbed a can of oil and glugged it in fast. Well, most of it went in. However a good deal didn't so by the time the RAC man arrived there was additional oil, spilled by me, all over the place making things look even worse. It's also important to note (we'll see why shortly) that because I just glugged it in, there was now way too much oil in the engine.

So the RAC man arrives and a can of degreaser and a shed load of paper towels later the engine is somewhat cleaner and we're trying to work out where the oil came from. We drive down the road half a mile and take another look. This is where having glugged too much oil in the engine plays it's part in the story because of course it's immediately been forced out of the vent behind the pulley and thrown all over the engine bay.

Of course we didn't realise at the time that this is what was happening so we conclude that there's a major leak somewhere that we can't see. The greatest concentration of oil seemed to be on top of the tinware over no. 4 cylinder (where I've marked an X on the photo accompanying this post) and as we could see that it wasn't coming from the oil pressure switch or anywhere like that, we figured that the oil cooler was a likely candidate, it being hidden away, up top, on that side of the engine. Given that accessing the oil cooler is an engine out job we concluded that my trip to Manchester wasn't gonna happen and the RAC man towed me home.


I've already explained what the problem turned out to be but it took me several weeks of research to find and piece together the parts of this puzzle.

One of the first things I did was to post the photo shown above on VZi but I felt fairly sure that the oil cooler was the most likely cause of the problem and was kinda distracted by the idea of swapping the engine with the one in my (project) Beetle to get myself back on the road ASAP. So nobody thought to question my diagnosis and it wasn't until a while later, when watching the Bug Me Video on stripping/rebuilding an engine, that I began to realise that oil from the cooler is unlikely to end up on top of that tinware. Of course with hindsight it's obvious why there was a concentration of oil there. Clue: consider the direction in which the pulley wheel rotates and where most of the oil it flings/flicks is going to end up.

My first breakthrough came when I stumbled across some information about a "sand seal". For those who don't know, and to air my new knowledge, this is something that's needed on dune buggies to prevent sand from getting into the crank case through the vent behind the pulley wheel. WHAT? There's a vent behind the pulley wheel?

This in turn lead me to find an article about crankcase ventilation over at
Rob & Dave's Aircooled Volkswagen Pages which pretty much describes the problem. Oh how I wish I'd found that sooner but I have to say that when I did I was sceptical that the amount of mess I'd seen in my engine bay was down to just that. However, having cleaned up my engine, unblocked the breather, and syphoned out a litre of excess oil that I'd glugged in when I panicked, she's working just fine.


Coda:

You can get little "breather filters" (SSP part no AC115551) to go on that filler neck connection. I've heard they can leak oil but they've got to be better than nothing and certainly a hell of a lot better than what I tried. On closer examination however I found that the rectangular filter on top of my carb had a connector for a hose. The filter was fitted with this hidden away around the back; which is why I hadn't seen it before. I've turned it around however there's still an issue in that the most direct path for the hose would be at risk of fouling the fan belt. This would not be the case with a stock filter.

For now I have a long tube, taking a path over the generator and around the back of the carb to connect the breather to the filter. However I'm also investigating other possibilities ranging from returning to a stock set up, to installing twin carbs and a breather box. More about that in a future post.

Sunday, 21 June 2009

Blocking Bots

In previous posts relating to my LAMP server (see tags) I've described how I use PHP to write iptables rules so I can keep various ports closed when I'm not actually using them. Something else I use it for is to block IP addresses from which bad bots are operating. This technique is discussed and documented on various other sites so I'm not going to give details full details here. However, in a nutshell my scheme involves:

1. Using robots.txt to designate a directory into which bots should not go.

2. Inserting hidden links on various documents that link to a file in the above directory. Humans will not see these links (because they are invisible) and well behaved robots (that pay attention to robots.txt) will not follow them either. Thus the only things that will follow those links are bad bots.

3. My hidden links point to a PHP script which write a new iptables rule, thereby blocking the bot. An entry is also made in a database recording the time and request that blocked the bot.

4. Bots will often operate using addresses from pools that are used legitimately at other times, so it's important to release the blocked addresses after a suitable period. I have a cron job to run a script that checks the database and releases anything that has been blocked for longer than a specified period.

This has been working well for some time however more recently I've been seeing something else in my server reports that I wanted to do something about; attempts to access urls such as these:

//Admin//scripts/setup.php
//MyAdmin//scripts/setup.php
//admin//scripts/setup.php
//phpMyAdmin//scripts/setup.php

There's usually a great long list of them trying lots of variations. Something else I've seen quite a bit of is this kind of thing:

/index.php?gzip=0&file=/etc/passwd

Again, the usually attempt the same, or similar things with any .php they can find.

Now provided that all of your other security is in place then attempts such as these shouldn't be a problem however, they are clearly attempts to break into the server. As such whatever is generating them is making a nuisance of itself and should, in my humble opinion, be told to **** off at the first available opportunity. So I've added a few more lines to httpd.conf

RewriteRule scripts/setup.php /var/www/cgi-bin/ip_blocker.php
RewriteCond %{QUERY_STRING} /etc/passwd
RewriteRule ^(.+) /var/www/cgi-bin/ip_blocker.php

The first line looks for urls that contain "scripts/setup.php" and redirects them to my blocking script. Obviously if you use anything on you server where that would be part of a legitimate request you need to modify that, but I don't, so I can use it. The next two lines do a similar redirect on any request where the text "/etc/passwd" appears in the query string.


Note that because I wanted these rules to apply to all of the virtual sites on my server, I've put these rules such that they apply to the main server and told all of the virtual sites to inherit them using:

RewriteOptions inherit

Note however that despite them appearing before the virtual server directives in the httpd.conf file, the virtual server directives are processed first. Thus it is important that none of the virtual server rules end with [F] as this would result in a match there halting the processing of rewrite rules before these are run.

Enjoy, unless you're a bot. ;-)

Sunday, 15 March 2009

Passwords

The issue of 'having a good password' is something that comes up in conversation from time to time although I generally suggest that, even if you think you know you what that means, you should do some research (because things change), I realise that most of my friends won't bother and that it might help of few people, those that can be bothered to read it, if I were to do a write up of my current understanding of what is a good password.

The reason I say 'current understanding', and suggest that things change, is because that is my experience; and I don't just mean my own understanding, but that of the 'industry' as a whole. While there are things that have always been regarded as insecure, there are also lots of things that were regarded as secure but are now regarded as a risk. This is largely because, as the speed of computers has increased, the crackers (people who try to break into systems) have more powerful tools at their disposal. For example I have an old programing book containing code for a 'password generator' that works be randomly choosing a couple of three or four letter words and sticking them together to create a password. These days the crackers use programs that attempt to get in by trying common dictionary words, both forwards, backwards, and stuck together in combinations. These days a password that uses actual dictionary words is regarded as relatively insecure.

A Perfect Password



A perfect password would be a completely random collection of letters, numbers, and punctuation marks. Why? Because if it is truly random then the only way for somebody to crack it is to try every possible combination. This does not mean that such a password is uncrackable; but it means that of all the passwords that we could use, this is the hardest to crack.

So, if we know what a perfect password is, why don't we all use them? And the answer is that we are human and we find them difficult to remember. There's not much point having a great password for your desktop computer if it's written on a post-it note stuck to the monitor; partly because it's could be a security risk and partly because if you lose the bit of paper you are locked out.

The security risk aspect of having a post-it note on your screen depends of course on what the password is for. For example, if I had the root password for my server (at a server farm) written on the side of my monitor at home then the only person who sees it besides me is my wife and I'm pretty confident that she's not interested in hacking my server. The post-it note is inaccessible to a cracker unless they come around to my house and although I am sure there are a whole bunch of folks on the Internet who might like to gain access to my server, I doubt very much that they'll go that far.

Doing The Math



Okay, so I've said that a random collection of characters is best and while that might seem obvious it's worth taking a few moments to consider exactly why that is the case:

If I ask you to pick a letter of the alphabet you have 26 choices. If I ask you to differentiate between upper and lower case that doubles to 52. If I say to include digits then you gain another 10 possibilities giving 62 options. If we add in punctuation marks then we increase it further but I am going to leave them out (I'll explain why later).

So you have 62 options for a single character. Now I ask you for a second character you have 62 choices for that one too. That's 62 options for the first one and 62 options for the second. Thus for our two character 'password' there are 62x62 options (which is 3844 possibilities). Each additional character multiplies the number of possibilities by 62 so by the time we have a 6 character password we have 62x62x62x62x62x62 which is 56,800,235,584 possibilities. Now unless our password happens to be the very last password that a cracker tries, they aren't going to have to try all of them, but with that many possibilities to go at the cracker is going to have to try a hell of a lot, or are they?

Bear in mind that our 56.8 billion possibilities include all possible 6 letter dictionary words, peoples names, and dates of birth. However these will be a relatively small percentage of the total number of options. Just for the fun of it, let's look at dates and let's say that I'm trying to guess your date of birth, wedding anniversary, child's birthday or other 'secret' date that you may have used as a password:

There are 12 months in a year, each of which has a maximum of 31 days. Chances are that your date is within the last 50 years so for a DD-MM-YY date (6 digits) I have 31x12x50 options which is 18600 possibilities. Now that's a lot for a human but a password cracking program could work through them in a matter of minutes.

Add every name and dictionary word, forwards and backwards, into the equation and our cracker program still only has to deal with a tiny fraction of the number of possibilities that it would have to deal with if we use a truly random password. Of course a cracker could write a program to try totally random passwords but they don't need to because many, many people out there will use a name, date, dictionary word or something else and a program that tries these first will give them access to a lot of systems.

How To Remember It



Okay, so now that I've (hopefully) sold you the idea that a password should be random, how do we go about remembering such a password?

Well one option that we already mentioned is to write it down and while there are a lot of cases where this would be a security risk, there are a lot where it is not a problem. I don't have my server password written on a post-it note but I do have a document on my computer that lists a whole bunch of passwords and PIN numbers that I didn't have any choice about and that I don't trust myself to always remember. The file is backed up so there's no chance of me losing it, and it's password protected (with a good password of my own devising) so to get in there a cracker would need to access my computer and crack that password. In other words, it is HIGHLY unlikely, so although the passwords are 'written' down, they are safe. Of course this still leaves me with the problem of how to remember the password that protects the file, and this is where my technique for remembering a random password comes into play, however I now have a confession to make: it isn't random!!!!!

What? Not random? Well, no, but almost. Let me explain:

My wife's name, let's call her Anne, would make a really poor password. First of all because it's only 4 letters and secondly because it's a name. However let's solve the length problem by adding letters from her surname until we have 6. Hell, let's be different and create a 7 letter password. Assuming that our surname is Jones we now have 'AnneJon'.

Now that's still pants as a password and of course if she'd been called Deborah then we wouldn't have needed the extra letters from the surname and it would be even worse. So, to improve things, let's change some of the letters to numbers that look a bit like them such that we get '4nn3J0n'. Now let's reverse it: 'n0J3nn4'.

Immediately it is looking a lot more random however that number swap is a common technique, and so is reversing a word. Plus, a name is a bad starting point in the first place. Clearly this gives us two areas that we can improve on: our seed word and our encryption' technique.

Now we still want to be able to remember this thing so rather than using one seed word, let's use three. Let's say I want a password for my account at Amazon, that my wife's name is Anne Jones and that I was born on the 04/03/64. By converting the site name to upper case and taking a character from each seed in turn we get: AA0Mn4An0Ze3OS6Nm4ith. However, I only want 7 characters so let's take the first 7 (because I can do that in my head without having to write anything down) and I get: AA0Mn4A.

Now that isn't truly random in the sense that it's been generated using two pieces of personal information and a modified (converted to upper case) site name but given the huge number of pieces of information that I could have used as 'seeds' and the huge number of ways in which I could manipulate them, it will be close to impossible for somebody else to guess at. In the example I used the site name, my wife's name, and my date of birth, in that order, and converted the site name to upper case. I could have used my fathers middle name, the registration number of the first car I ever bought, my sister's birthday, the last letter of each word in the first line of the song that was playing when I met my wife, the last 6 digits of my phone number or any number of other pieces of information as seeds. Furthermore I could have 'encrypted' them by reversing them, taking only the first and last letters of the names, using just the odd number letters, omiting vowels, or dozens of other techniques.

The important thing is that rather than using a memorable password I'm using memorable techniques to generate what is to all intents and purposes a random password. If I decide upon a set of seeds and a set of techniques and always use the same ones then I will always know how to generate my passwords. Note that by using the site name (or system name or something that I strongly associate with it) as one of the seeds, I can use the same seeds and my encryption techniques for the others and have different passwords for different sites/systems. Using the scheme above as an example, my password for eBay would be 'EA0Bn4A' and my password from GoogleMail would be 'GA0On4O'. What's more it means that if I register on any forums or shop checkout systems that store member/customer passwords in an unencrypted form, then a malicious person at the company can only see my password for their system; a password that gives them no clue about what I might be using on other systems.

Before we finish, I would just like to step back to my earlier decision to exclude punctuation characters when we were calculating how many possibilities there are for a six character password. Now that I have explained my technique for generating passwords it should be obvious why I did this: because the kind of seeds I suggest don't include punctuation symbols. You could however build in punctuation symbols at the encryption stage. Just in case you are thinking that 56.8 that we calculated before aren't enough.

Domain Names

From time to time I encounter people who need a domain name so I thought I'd share my thinking about choosing one:

Choosing a domain name is like naming a child in that you're as well to give it some very careful consideration because, although it's not impossible to change it again later, it can be rather difficult. In another way however, it's not at all like that because while there are a lot of people called, for example, Andy Slater, there is and can only be, one www.andyslater.com


Things to consider when choosing a domain name:
  1. Availability
    As stated above, every domain name has to be unique so if somebody has already registered the one you'd like, although you may be able to buy it from them for some exorbitant sum, it's probably just a case of hard luck.
    You can find out if a name is available at places like http://www.uk2.net
    On the front page of their site is a box where you can type the domain name that you're interested in registering and click a button to see if it's available. Chances are that your first choice won't be so be prepared for some disappointment and for some considerable time spent thinking up alternatives.
    Please note that if you are planning to ask me to host your website on my server that the whole thing is a lot easier if your domain name is registered via UK2 but please contact me before jumping in.

  2. www.
    Pretty much all domain names start with www. so you don't need to worry about that bit.

  3. .com? .co.uk? .net? .info?
    The bit at the end is called the extension and there are various different ones available. However:

    1. .com is the one that's best known. If people can't remember your extension, .com will probably be the first one they'll try so it's well worth having.

    2. Search engine results show your domain name including the extension. If you've ever used a search engine to find something you want to buy then you'll be aware that much of the time you end up looking at shops in the USA. Amongst the results however you will see sites that have a .co.uk extension and this is a valuable clue that the site is based in the UK. When I'm shopping, I make a beeline for the ones with a .co.uk extension. Thus if you are selling to the UK market, a .co.uk extension can be a bonus.

    There are many other extensions available. Check UK2 as described above for a list of what they have i.e. those available in the UK (you will see other country specific extensions when you're browsing which have to be registered in those countries). However, unless you have a good reason for using something other than .com or .co.uk, I'd stick with those. For a business I'd be inclined to want both.

  4. Name Length
    Short names are best. eBay, Amazon, Google, etc. Short and snappy. I used to run a business from a site called www.themodelmakersresource.co.uk and found that the domain name was too long to fit on till receipts, too long to get printed onto pens for promotional purposes, etc, etc. Doh!

  5. Hyphens and Underscores
    You can't use spaces in domain names but you can use hypens and underscores. If your desired name contains more than one word you could therefore:

    1. Join all the words together: www.themodelmakersresource.co.uk

    2. Use hypens: www.the-modelmakers-resource.co.uk

    3. Use underscores: www.the_modelmakers_resource.co.uk

    Although I said you could use underscores, I recommend that you don't. It's not common practice and is bound to cause confusion; people will mistake them for hypens and spaces.
    Note also that for business purposes it's probably wise to obtain all variants. You can for example access Games Workshop's site with:
    www.gamesworkshop.com
    www.games-workshop.com
    www.gamesworkshop.co.uk
    www.games-workshop.co.uk
    Smart move guys. Note however that eBay, Amazon, Google (businesses that were Internet businesses from day 1) and the like only need half as many domain names to cover all the options. Even smarter.

  6. Memorability
    My experience with The Model Makers Resource has shown me that on the web, unless you can become a household name, you're at the mercy of the search engines if you want people to 'stumble' across your site. Obviously the more memorable your name, the better your chances of people coming straight back to you rather than heading for the search engines. The Model Makers Resource Ltd is too long and clumsy for most folks to remember. There's also an issue about whether "model makers" should be one word, two words, or hyphenated and arguing that your choice is correct according to the dictionary is of little value if potential customers are failing to reach you because they are typing it in wrong.
    It is strange, but it is a fact that I would often hear people outside my shop saying "Oh look, The Model Makers Resource Centre". The sign did NOT have the word 'centre' anywhere on it but for some reason people just seemed to add it on the end. What chance have they got of remembering the domain name if they can't even read the company name off the sign above the shop window correctly?
    It's a bad name and more 'field testing' would have told me that before I invested in it.

  7. Spelling
    If you're a business, having a name that's easy to remember has to be a smart move. Even if you're not a business, obscure spellings, or things that people have difficulty in spelling, are best avoided. Choosing something that you have to explain or spell out every time you tell someone your domain name over the phone is a bad move. Choose something such that when you tell people your domain name, their first guess at how to spell it will be correct.

  8. Keywords
    'Keywords' are words that people type into search engines when they are looking for something. Having a keyword in your domain name can enhance it's position on the list (it's ranking). Perhaps more important, the search engines are fickle after all, is the fact that your domain name is displayed and can be used to say something about you.
    When I was setting up The Model Makers Resource, having the word 'model' in the name was on my list of priorities. Part of the trouble I had finding a domain name was that the word 'model' can be used in more than one context. You've got model kits, catwalk models, data modelling, model citizens and a huge range of other things. As a result, pretty much every domain name I though of was already in use. I did find one short one, models-uk, uk-models or something like that; however, all of the other 'variants' were taken up by competitors, model agencies and in one case a rather nasty porn site. I decided to steer clear.
    If you can slip a keyword into your name it's certainly worth considering but I believe that there are more important issues, as listed above, and I wouldn't compromise them for the sake of inserting a keyword.
    At the end of the day, Boots (the chemists) don't seem to have suffered from having an inappropriate name although one is inclined to wonder what ever became of Mr Chemist the cobbler?


That's about all I want to say on the subject of choosing a domain name. Hopefully you'll find some of it useful. Hopefully I haven't scared you off the idea of having a website altogether. The things above are things to CONSIDER. You don't have to comply with all or even any of it. If you're wanting a website for fun then you can probably ignore most of what I've said. The same is true if you wanted a website to which you can direct people as a means of answering a question that somebody has asked you. If your site is for business and you will want people to be able to find it and remember it without your jotting the name on a bit of paper for the, then the more of the above that you can take into consideration, the better.

HTML Special Characters

This document used to live on one of my websites however it doesn't really fit in there any more. I still need it though, so I've moved it here.

For the benefit of those who don't know, HTML special character codes are codes that you can use when writing HTML content and the exist for a number of reasons:
  1. Some characters don't appear on the keyboard. Special character codes provide a means of entering them.

  2. Some characters, the greater-than character for example, have a special meaning in HTML. If you want a browser to display those character rather than trying to interpret them as the part of an HTML tag, you need to use the special character code.

  3. Some characters are language and/or character set dependent (currency symbols being a good example). You need a way to force the viewers browser to display the correct character. Special character codes provide a way of doing this.

The list below is far from complete. There are many more codes to define all kinds of symbols and foreign characters with accents, umlauts and the like. The following list however shows the codes that I use the most frequently.

CodeCharacterDescription
&&ampersand
&lt;<less-than sign
&gt;>greater-than sign
&nbsp;nonbreaking space
&pound;£pound sterling
&euro;euro
&copy;©copyright
&trade;trademark sign
&reg;®registered trademark
&deg;°degree sign
&plusmn;±plus or minus
&sup2;²superscript two
&sup3;³superscript three
&frac14;¼one-quarter
&frac12;½one-half
&frac34;¾three-quarters
&times;×multiplication sign
&divide;÷division sign

Monday, 31 December 2007

A Brief Safari

I used Safari briefly when I first got my MacBook and also had a dabble with Camino. However I was used to Firefox from my PC days and, more importantly, had been finding FireFTP (an FTP plug-in for Firefox) very useful so I switched back to Firefox. In recent times however I've been using Webmin when I need to upload/download files to/from my servers and haven't used FireFTP in quite a long time. In fact I've shut down the FTP service on my servers as mentioned previously. I've also noticed lately that of the various pieces of software that I use, Firefox is the one that's most likely to lock up such that I have to force it to quit. (Audacity comes in second - but I don't use it nearly as much - and GIMP just bombs out occasionally when I'm rotating images). Given that Apple also claims that Safari 3 is faster than the fox I thought that maybe it was time to give it another try.

Issue number 1 was how to move all my bookmarks from Firefox to Safari but this turns out to be relatively simple. Safari's File menu has an Import Bookmarks option and although I had to search around a bit to find this out, all you need to do is navigate to Firefox's bookmarks file at
~/Library/Application Support/Firefox/Profiles/xxxxxx.default/bookmarks.html
and the job is pretty much done. At the same time I deleted most of the US biased crap that Safari had loaded by default. Grrr.

Issue number 2 was the lack of a "New Tab" button. Apple-T works as a short-cut but when I'm browsing then my hands are more likely to be on the mouse than the keyboard so the lack of a button is, to my mind, a real oversight on Apple's part.

Issue number 3: If you click on a link then under 'normal' circumstances it will open in the current window/tab. You can configure Safari such that holding down the Apple key when you click will open it as a new tab. However if the web site's author has set the link to open in a new 'window' using the target tag, that's exactly what Safari will do: open a new window. Firefox gives you the ability to force such links to open as a new tab. Safari doesn't so unless you happened to be pressing the Apple key at the same time, you end up with a new window. Grrr.

Issue number 4 is the Google search box up there on the toolbar. Now while Firefox merely defaults to Google.com but allows you to use other search engines, Safari doesn't give you any choice at all! According to what I've read on the web, this is all about money. It hadn't occurred to me before but it's fairly obvious when you think about it that sooner or later, anybody manufacturing a half decent browser with access to several search engines is going to be offered a few quid by one of them to have theirs at the top of the list.

Now while whatever arrangement Apple and Google have come to is, I'm sure, all very nice for them, it's a bit of a bummer for us. As a matter of fact I do use Google most of the time but I like to use Google.CO.UK not Google.COM and the current set up won't even let me change that. I also use Wikipedia fairly regularly and while it generally comes up with a high rank on most Google searches, that isn't really the point. Putting Google.co.uk and Wikipedia links on the bookmarks bar is probably the easiest option however, as the Customise Toolbar option presents the URL box and Search mechanism as a single entity you're pretty much forced to leave it there as a constant reminder that it's there for Google's benefit and bollocks to the rest of us. Grr.

I began to look for other options and found details of a couple of hacks (which may or may not work with version 3) for changing the search engine, and also for converting the New Bookmark button into a New Tab option, however both involved messing with the Safari code in ways that didn't appeal. Over on macupdate I found AcidSearch 0.7b4 and Safari Enhancer 3.3.1 which looked promising. The latter even offers a new tab button but on closer inspection I realised that neither of them supports version 3 of Safari. Doh!

By this point I was getting a little cheesed off with the whole thing and had pretty much decided that I was going to switch back to Firefox. Along the way however I had noticed Inquisitor 3. I hadn't paid much attention as it describes itself as "Spotlight for the Web", thus making it sound far in excess of what I was looking for. However I had already begun to draft this blog entry (so that in 6 weeks time I could remind myself why I was still using Firefox), and I figured I'd give Inquisitor a quick try for the sake of completeness.

My initial impressions of were good and if the search is your only major gripe about Safari then I suggest you check it out. However it still isn't as quick 'n' easy as the one on Firefox.

Additionally:

1. I like the error console on Firefox which has proved extremely useful on a number of occasions for solving problems with Javascript (Safari doesn't appear to have one).

2. The "View Source" option on Firefox has a nicer display. Not something I use a lot but it comes in handy.

3. I also like the Firefox option to switch off styling and get some idea of what a page looks like to a bot or a text reader.

Okay, so maybe I'm being a bit petty now, but add those niggles to my earlier gripes and it probably won't come as any great surprise when I tell you that the Safari icon is no longer in my dock and that I'm finishing off this post in Firefox.

I guess I could try Internet Explorer instead.

Ha ha.
Ha ha ha.
Ha ha ha ha ha ha ha.

Wednesday, 31 October 2007

Nobody (A Halloween Story)

A slight detour from my usual subject matter today because The Goldfish has cajoled me into writing a 'spooky' story for JackP's Halloween Story Collection. So, if you are seated comfortably, we shall begin:


It came as no surprise to Alan that nobody met him at the school gate. For a short while after mummy went to live with the angels, daddy had come instead. But life had to go on they said and he was a big boy now. Daddy had to go back to work and Grandpa John lived only just around the corner. Too far for his old legs, but near enough for a big boy like Alan to walk there on his own.

So nobody took Alan's hand at the gates and enquired about his day in school. Alan forgot to count the cedar trees at the side of the road and recalled the day's events while walking to the place where it was safe to cross. Nobody watched over him as he looked right and left, and right again, before going straight across the road.

Just a little further along, and around the corner, and there was Grandpa John looking our from the window of his house. The door was open before Alan had opened the gate and run up the garden path, and as Grandpa John welcomed him in Alan turned and waved good bye.

"See you tomorrow" he shouted.

Grandpa John looked out to the empty street. "Who are you calling to?" he asked.

"Oh, nobody" Alan replied.