Skip to content

Old Mac CDs #2 Gaiden: HyperGlot ICON Resources

This is another followup to the The Macintosh Demo Applications CD Version 1.1 post. It’s the last one, and it’ll be really quick, I promise.

One of the demos, or demo groups, rather, was for HyperGlot Software Company, who made several language-learning applications. I peeked at the ICON resources for the general HyperGlot demo; the demo was written with HyperCard, so these ICONs are used as small images for buttons, like the icon for a pause button. And these images are, well, let’s go with “precious.”

HyperGlot Demo's ICON resources open in ResEdit's resource browser

It would take far too much space and time to explain why each and every one of these icons is a work of art, and really their fabulousness speaks for itself, so I’m going to leave the commentary track to the reader. If you pinned me down and forced me to choose my absolute favorites, they would be 9539, 10191, 11555, 19141, 21021, 23357, and 26905. But they are all equally masterpieces.

Old Mac CDs #2 Gaiden: Finder icon masks

This is an ancillary post to my previous one on The Macintosh Demo Applications CD Version 1.1, based on an observation I made while preparing the icon images for the application list. Before I begin, I need to provide a brief overview of file icons in the classic Mac OS, starting with I believe System 7.

Continue reading ›

Old Mac CDs #2: The Macintosh Demo Applications CD Version 1.1

Well, I’ve actually gone ahead and made a second installment, which officially makes “Old Mac CDs” a feature!

This one is another Centris 610 CD: The Macintosh Demo Applications CD Version 1.1 (CDRM-1044940)

The Macintosh Demo Applications CD Version 1.1 disc

Continue reading ›

small update

This blog now has a profile page.

For the first time since its registration three years ago, quiteajolt.com has content.

Google search suggestions for “messiah”

Google's search suggestions for "messiah," with the third one highlighted: "messiah obama"

Old Mac CDs #1: Apple Chronicle

Starting up a new feature which, in the spirit of this blog, will not even pretend to have a regular update schedule. I’ll be taking a look at some old Macintosh CDs I find lying around, giving you pictures and descriptions of content and all that good stuff. I’m planning on sticking to CDs bundled with Macs or otherwise distributed by Apple, but if I find any other interesting ones, I’ll post ’em up too. We’ll see how much content I can milk out of this.

First up: Apple Chronicle (CDRM-1023150)

Apple Chronicle CD

Continue reading ›

The longest word that can’t be expressed as a URL hack

Colin and I were playing Domainr, which is a pretty fun and fantastic site for generating domain hacks. Of course, I already own the best one (wait what), but there’s still a ton of joy in finding out, among other things, that quiteajo.lt is available! (although I’m sure it won’t be five seconds after I hit “Publish”)

Actually, Domainr also produces quite a few things that aren’t technically domain hacks, because a domain hack, by virtue of the first word in the phrase, is a domain name. Domainr searches for top-level domains anywhere in the input string, and if there’s spillover text after the TLD, Domainr will slop the rest of the text over into a first-level directory. For example, in addition to quiteajo.lt, Domainr also produces quitea.jo/lt and qu.it/eajolt. As far as I know, there isn’t a term for this, and I’m not really comfortable with calling it a domain hack, so I’m just going to call it a “URL hack” because the word or phrase forms the whole URL (without the scheme, but I think we can just assume it’s HTTP).

Finding the longest word that can’t be a domain hack is boring: just find the longest word that doesn’t end in a top-level domain. So I’m kind of curious about what’s the longest word that can’t be expressed as a URL hack.

Continue reading ›

Pumpernickel packaging

packaging for Mestemacher brand Westphalian Pumpernickel with whole kernels, showing a man and a woman two seconds away from passionate face-sucking

Wait, will eating this make me irresistible? Should I have been buying this years ago?

Is the guy really into her at all or is he staring off into the distance, thinking of delicious sandwiches?

Did he just eat before the embrace? Is she getting a noseful of pumpernickel breath?

Which of the two people does “no preservatives” apply to? Both?

What the hell, Slashdot

Slashdot, you’ve heard of Slashdot, right? You’re on the internet, of course you have. News site covering the latest developments in hardware, software, programming, video games, copyright laws, and so on. The first clause of the tagline summarizes it well: “news for nerds.”

I was cleaning out my inbox today, when I found a year old e-mail from Slashdot giving me the details about a password reset for my account. This took me somewhat by surprise, because I didn’t even remember signing up for a Slashdot account in the first place. I was about to trash the e-mail when I noticed something unusual, something that a “news for nerds” site could not, would never have sent me. So in disbelief was I that I requested another password reset, just to see if the new e-mail would have the same thing. And it did:

Your new password is **********. Your old password will still work until this password is used. Go to the URL below to log in:

<http://slashdot.org/index.pl?op=userlogin&upasswd=**********&unickname=CHz16&returnto=%2Flogin.pl%3Fop=changeprefs>

Make sure you then CHANGE YOUR PASSWORD!

I’ve obviously censored the generated password from the first paragraph. Now, sending passwords by e-mail is not a particularly good practice, but unfortunately it is rather commonplace, and here Slashdot only sent me a temporary password, so that’s not what caused me to double take1. Notice that I’ve censored the quote twice, because the password is also in the login URL.

If you follow the link in the e-mail, you get taken to a page to change the generated password, this time with the URL <http://slashdot.org/login.pl?op=changeprefs¬e=Please+change+your+password+now!&oldpass=**********>. Again, the password is embedded in plaintext in the URL.

Slashdot why are you putting passwords in URLs what the hell dude

In Slashdot’s defense, this is only a temporary password that is sent in the e-mail and put into the URLs. The e-mail tells you to change the password to a real one, and the link even sends you directly to the password change page. As far as I know, it never sends an e-mail out with your real password, nor does it put your real password in a URL.

Well, except that Slashdot doesn’t actually force you to change the password from the generated one. You can navigate to a different page and it won’t complain at all. So I guess that really could be your real password it displays in URLs after all.

If you instead don’t follow the link at all and manually go to the login page to enter the generated password, all Slashdot does is take you back to the front page. No passwords in URLs, no reminders to change your password, just a swift redirect like nothing ever happened. So there’s a silver lining here, in that all Slashdot has done is sent you your password in plaintext. That’s it!

1: The thing that made me double take is also not the fact that the final ampersandquestion mark in the link is URL encoded as %3F, while all of the other ampersands arethe first one is not. ^

So I’m using EPSON Scan,…

Professional Mode scan dialog

… but one part of the interface kind of confuses me:

Continue reading ›