Teaching a New Dog Old Tricks - Ii Acknowledgements

Total Page:16

File Type:pdf, Size:1020Kb

Teaching a New Dog Old Tricks - Ii Acknowledgements A Macintosh-Based World Wide Web Starter Kit Featuring MacHTTP and Other Tools by version 1.0 (September 26, 1995) copyright © 1995 by Eric Lease Morgan and Apple Computer ________________________________ Teaching a New Dog Old Tricks - ii Acknowledgements ...................................................................................... i About and how to get this book ....................................................................... iii Distribution ................................................................................. iii Hardware and software used to create this book ...................................... iv Overview and demonstration page .................................................................... 1 Demonstrations ............................................................................. 2 Teaching a New Dog Old Tricks ......................................................... 3 See Also ..................................................................................... 4 Client/server model of computing ..................................................................... 7 Uniform resource locators (URLs) .................................................................... 9 Scheme ...................................................................................... 9 Examples ..................................................................... 10 "Common Syntax" ....................................................................... 10 Examples ..................................................................... 11 Path ......................................................................................... 11 FTP path statements ........................................................ 12 HTTP path statements ...................................................... 12 WAIS path statements ...................................................... 13 Gopher path statements ..................................................... 13 See Also ................................................................................... 14 Macintosh-based WWW Browsers .................................................................. 15 Summary .................................................................................. 16 America Online Web Browser .......................................................... 16 eWorld World Wide Web Browser ..................................................... 17 MacWeb ................................................................................... 18 The popup menu ............................................................ 18 Stylizing text ................................................................. 19 Unique features .............................................................. 19 Hostlist management ........................................................ 19 Summary ..................................................................... 20 NCSA Mosaic ............................................................................. 20 Custom Menu ................................................................ 20 Annotate ...................................................................... 20 Kiosk mode .................................................................. 21 Customizing the HTML .................................................... 21 Adding MIME type information ........................................... 21 Summary ..................................................................... 22 Netscape ................................................................................... 22 Licensing and cost .......................................................... 22 Speed ......................................................................... 23 Hotlist management ......................................................... 23 Security ....................................................................... 23 Usenet news ................................................................. 24 "Netscapisms" ............................................................... 24 Summary ..................................................................... 24 ________________________________ Teaching a New Dog Old Tricks - i TCP/Connect II ........................................................................... 25 Configuration ................................................................ 25 Cacheing ..................................................................... 25 Hotlists ....................................................................... 26 Helper Applications ......................................................... 26 Summary ..................................................................... 26 Hotlist and URL utilities .............................................................................. 27 Clay Basket ................................................................................ 28 Cyber Link ................................................................................ 29 CyberFinder ............................................................................... 30 Duke of URL .............................................................................. 31 GrabNet .................................................................................... 32 Hotlist Grabber ........................................................................... 32 Hotlist Sorter .............................................................................. 33 Hotlist2HTML ............................................................................ 34 Internet Site ................................................................................ 34 URLKey ................................................................................... 36 WWW Helper Applications ........................................................................... 37 See Also ................................................................................... 37 Acrobat Reader ............................................................................ 38 Drop Stuff w/Expander Enhancer ...................................................... 39 Fast Player ................................................................................. 39 Ghostscript (MacGS Viewer) ........................................................... 40 GIF Converter ............................................................................ 41 GraphicConverter ......................................................................... 42 JPEGView ................................................................................. 43 MacBinary II+ ............................................................................ 44 MacGzip ................................................................................... 45 Sound Machine ........................................................................... 45 SoundApp ................................................................................. 46 Sparkle ..................................................................................... 47 Stuffit Expander .......................................................................... 48 Tar for the Macintosh .................................................................... 49 Extending WWW Browsers with AppleEvents and AppleScript ................................ 51 See Also ................................................................................... 51 Flypaper ................................................................................... 52 Example #1 - Dear Santa ................................................... 52 Example #2 - Ask MacAlcuin .............................................. 53 Scripting WWW Browsers .............................................................. 54 Example #1, Sending AppleEvents from HyperCard ................... 54 Example #2, Sending AppleScript from HyperCard .................... 55 Possible Uses ................................................................ 56 WebRunner ................................................................................ 57 Writing ascpt Scripts ........................................................ 57 WebRunner Problem #1 .................................................... 58 WebRunner Problem #2 ................................................................ 58 Macintosh-based HTTP servers ...................................................................... 59 FTPd ....................................................................................... 59 httpd4Mac ................................................................................. 60 ________________________________ Teaching a New Dog Old Tricks - ii MacHTTP ................................................................................. 60 WebSTAR ................................................................................. 61 Bringing Up a MacHTTP Server .................................................................... 63 Initially Testing Your Server ............................................................ 63 Editing Your First HTML Document ................................................... 64 MacHTTP Can Handle the Load ........................................................ 64 See Also ................................................................................... 65 MacHTTP configuration .............................................................................. 67 Directives, the Meat of machttp.conf
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • May1991 • Contents • News and Announcements News and Announcements HP Laserjet Iiisi
    UNIVERSITY OF MINNESOTA •Information Services • Volume 7, Number 7 Newsletter May1991 • Contents • News and Announcements News and Announcements HP LaserJet IIISi ........................... 129 • HP LaserJet IIISi Defective IBM Monitors ................. 136 Holiday Hours: Memorial Day ..•.•.... 136 Hewlett-Packard recently announced the LaserJet IIISi, a new 300 New IBM Laptop: PS/2 L40 SX ...... 137 dots per inch (dpi) laser printer; to date it is the fastest printer IBM PS/2 Hard Disk Errors: available through the Microcomputer Discount Program. The I 60MB & 160MB Problem ........... 138 IIISi prints at 17 pages-per-minute; this speed enables it to print Free Updates: many documents in the time it takes to physically move the paper FileMaker Pro and Claris CAD ..... 140 through the printer. The LaserJet IIISi comes with a one-year on­ ZEOS 386SX Notebook In Helpline .. 141 Novell NetWare Discount ............... 141 site warranty. At press time the HelpLine in Shepherd Labs did Microsoft Evaluation Site ............... 142 not have a IIISi available for testing. Reviews and Services A New Network Product from David Systems .................. 130 Fonts l Free Text: A Concor~ance Program The IIISi supports printing portrait and landscape oriented fonts : for the Macintosh ...................... 131 on the same page, and it comes with the fixed-width internal fonts Job Listings via Public Access .•...... 132 shown in the table below. Macintosh High Resolution Slide and Print Output ......••................ 134 1.4 Fixed-Width Fonts Portrait Landscape Training Resources ...........•............ 146 Word mark: Graphics Standard ........ 147 Courier Medium 10 point, 12 point 10 point, 12 point Courier Bold 10 point, 12 point 10 point, 12 point Columns Courier Italic 10 point, 12 point 10 point, 12 point Book Center Notes Line Printer 8.5 point 8.5 point Tech Fair Specials to May 17 ....
    [Show full text]
  • C Powerclmlluling
    C PowerClmlluling Everything you need to know about setting up and operating your PowerTower Pro™ system Ma(OS Mac and the Mac OS logo are trademal1<s of Apple Computer, Inc., used under license. Part number 72810 Rev. number 960823 erPro User' ide Part number 72810 Rev. number 960823 Power Computing Corporation © 1996 Power Computing Corporation. All rights reserved. Under copyright laws, this manual may not be copied, in whole or in part, without the written consent of Power Computing. Your rights to the software are governed by the accompanying software license agreement. Power Computing Corporation 2555 North Interstate 35 Round Rock, Texas 78664-2015 (512) 388-6868 Power Computing, the Power Computing logo, PowerTower, and PowerTower Pro are trademarks of Power Computing Corporation. Mac and the Mac as logo are trademarks of Apple Computer, Inc. All other trademarks mentioned are the property of their respective holders. Every effort has been made in this book to distinguish proprietary trademarks from descriptive terms by following the capitalization style used by the manufacturer. Every effort has been made to ensure that the information in this manual is accurate. Power Computing is not responsible for printing or clerical errors. Warranty information about your system may be found beginning on page xv. Other legal notices are found in "Regulatory Information" on page 151. PowerTower Pro User's Guide For Technical Support, Call 1-800-708-6227 Support Information For basic customer and technical support information, as well as product information and other news, visit our Web Site at: http://www.powercc.com Direct or Dealer Support? Customers who purchased systems directly from Power Computing should contact Power Computing for assistance.
    [Show full text]
  • Browser Versions Carry 10.5 Bits of Identifying Information on Average [Forthcoming Blog Post]
    Browser versions carry 10.5 bits of identifying information on average [forthcoming blog post] Technical Analysis by Peter Eckersley This is part 3 of a series of posts on user tracking on the modern web. You can also read part 1 and part 2. Whenever you visit a web page, your browser sends a "User Agent" header to the website saying what precise operating system and browser you are using. We recently ran an experiment to see to what extent this information could be used to track people (for instance, if someone deletes their browser cookies, would the User Agent, alone or in combination with some other detail, be enough to re-create their old cookie?). Our experiment to date has shown that the browser User Agent string usually carries 5-15 bits of identifying information (about 10.5 bits on average). That means that on average, only one person in about 1,500 (210.5) will have the same User Agent as you. On its own, that isn't enough to recreate cookies and track people perfectly, but in combination with another detail like an IP address, geolocation to a particular ZIP code, or having an uncommon browser plugin installed, the User Agent string becomes a real privacy problem. User Agents: An Example of Browser Characteristics Doubling As Tracking Tools When we analyse the privacy of web users, we usually focus on user accounts, cookies, and IP addresses, because those are the usual means by which a request to a web server can be associated with other requests and/or linked back to an individual human being, computer, or local network.
    [Show full text]
  • Hypertalk: the Language for the Rest of Us
    HyperTalk: The Language for the Rest of Us Kyle Wheeler January 18, 2004 Contents 1 Introduction 1 Introduction 1 There is, perhaps, no piece of software written by Ap- ple Computer, Inc. more prone to generating extreme 2 History 1 emotions in its users than its operating system. Next 2.1 TheBirth ................ 1 below that, however, is HyperCard. Designed and re- 2.2 TheLife................. 2 leased in 1987 by Bill Atkinson [7], HyperCard was an 2.3 TheDeath................ 2 instant success. Leveraging the power and simplicity 2.4 TheLegend ............... 2 of its scripting language, HyperTalk, designed by Bill Atkinson and by Dan Winkler [1], HyperCard demys- 3 Goals 2 tified the art of creating software. The language has a grammar and syntax similar to English, and as such ap- 4 Syntax Semantics 3 pealed to computer hobbyists, teachers, and the uniniti- 4.1 Implementation Notes . 3 ated alike. The commands HyperTalk uses are similar to 4.2 Objects ................. 3 those used by the Macintosh Toolbox, the base-level API 4.3 Messages ................ 4 of Apple’s Macintosh operating system, and the logical 4.4 Handlers................. 4 structure is similar to Pascal and organized in an event- 5 Bibliography 4 driven manner [8]. A BNF 6 A.1 Scripts.................. 6 2 History A.2 Expressions ............... 6 A.3 Ordinals and Positions . 7 2.1 The Birth A.4 Chunks and Containers . 7 HyperTalk was born as the core scripting language of A.5 Objects ................. 7 the HyperCard application, developed by Bill Atkinson1 A.6 Commands . 8 for Apple Computer, Inc. in 1987 under the condition A.6.1 Command Nonterminals .
    [Show full text]
  • A/UX® 2.0 Release Notes
    A/UX® 2.0 Release Notes 031-0117 • APPLE COMPUTER, INC. © 1990, Apple Computer, Inc. All UNIX is a registered trademark of rights reserved. AT&T Information Systems. Portions of this document have been Simultaneously published in the previously copyrighted by AT&T United States and Canada. Information Systems and the Regents of the University of California, and are reproduced with permission. Under the copyright laws, this document may not be copied, in whole or part, without the written consent of Apple. The same proprietary and copyright notices must be afftxed to any permitted copies as were afftxed to the original. Under the law, copying includes translating into another language or format. The Apple logo is a registered trademark of Apple Computer, Inc. Use of the "keyboard" Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple Computer, Inc. 20525 Mariani Ave. Cupertino, California 95014 (408) 996-1010 Apple, the Apple logo, AppleShare, AppleTalk, A/UX, ImageWriter, LaserWriter, LocalTalk, Macintosh, Multifmder, and MacTCP are registered trademarks of Apple Computer, Inc. Apple Desktop Bus, EtherTalk, Finder, and MacX are trademarks of Apple Computer, Inc. Motorola is a registered trademark of Motorola, Inc. POSTSCRIPT is a registered trademark of Adobe Systems, Inc. 031-0117 UMITED WARRANTY ON MEDIA Even though Apple has reviewed this AND REPLACEMENT manual, APPLE MAKES NO WARRANTY OR REPRESENTATION, If you discover physical defects in the EITHER EXPRESS OR IMPLIED, manual or in the media on which a WITH RESPECI' TO THIS MANUAL, software product is distributed, Apple ITS QUAll1Y, ACCURACY, will replace the media or manual at MERCHANTABILITY, OR FITNESS no charge to you provided you return FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Macuser 9504 April 1995.Pdf
    APRIL 95 3.0 Processors / Accounting Packages ClarisWorks High-Resolution Laser Printers / Word / $3.95 APRIL 1995 FIRST MAC CLONES HOT NEW MACS (That Don’t Come From Apple) PLUS Word 6.0 Showdown Which Word Processor Is the Right One for You? New Net Traveler Your Monthly Guide to the Internet Hot Reviews Quicken 5.0 ClarisWorks 3.0 Star Trek CD-ROM CONTENTS APRIL 1995 / VOLUME 11 NUMBER 4 41/ The MessagePad 120: one of three REVIEWS & QUICK CLICKS new Newtons. Epson Stylus Color and Tektronix Phaser Polaroid SprintScan 35 The speedy 140 Two affordable color inkjet printers Polaroid SprintScan 35 scans slides and take aim at home users as well as business film at a higher resolution than its more buyers. / 45 expensive competition. / 66 Epson ES-1200C and PixelCraft Pro MapInfo 3.0 Sporting a revamped Imager 4000 Buyers can choose between interface and more-powerful analytical two scanners that deliver professional- tools, MapInfo shines at making sense of quality color without costing an arm and a geographical data. / 67 leg. / 51 Connectix QuickCam It’s cute, NEW ON THE MENU Visioneer PaperPort Reading documents it’s cool, and it captures video at electronically reaches new levels of a bargain price. / 69 PowerPC Pippin Apple’s multimedia elegance and convenience with this $399 CD-ROM player. / ZMac Utility of the scanner. / 56 Art Explorer and Flying Colors When Month E-mail-address translator. / crayons don’t cut it, computer art New PDAs From Apple and Sony. / programs may. / 69 Word 6 Fix Microsoft offers free patch.
    [Show full text]
  • Apple Macintosh Models!
    March 1993 $2.95 The Journal of Washington Apple Pi, Ltd. N E If you count on your Macintosh®, count on setvice from Falcon. Nationwide service means P.~con's range ofse rvice programs include: a quicker response. • Installing equipment and/or software al your site. Let the cxpens make sure )'Our ~tlm is up and With il.S network of Service Ccntl'11i and Service running right. Partners, Falron proviclcs equipment service nationwide. • Perfonning warranty service at your site. Can )'OU fach center is fulfy stocked with commonfy-needed pans afford to wait for standard warranty servia:? and features the latest in diagnostic t'l:1ui pmen1. • Installing upgrades (at our fudlity or al your site). fach center is also pan of our nationwide Service Make sure new cards, memory, and drives are cor­ Coordination System. So, if you nt'Cd help, the onfy rectly installed for maximum perfonnance. number you need to call is 30 1-386-1816. Tiiat's our national Falcon Service Hotline • Perfonning critical repairs on a timr/materials or contract basis (at our facility or at your site). Our comprehensive inventory • While-you-wait estimates and repairs at one of our delivers parts without delay. service depol.S (on a time and materials basis). • On-site contracts with response times tailored to fach offalcon's Service Center.; maintains an )'Our specific needs and budget. c.xtensne inventory of common~·- needed pans. And • Self.maintenance. our Landover, MD, center maintains an even larger stock to suppfy our regional center.;. So you don't Protect your investment in ~;:~;,..:: __,......,...~_...
    [Show full text]
  • Longitudinal Characterization of Browsing Habits
    Please cite this paper as: Luca Vassio, Idilio Drago, Marco Mellia, Zied Ben Houidi, and Mohamed Lamine Lamali. 2018. You, the Web, and Your Device: Longitudinal Charac- terization of Browsing Habits. ACM Trans. Web 12, 4, Article 24 (November 2018), 30 1 pages. https://doi.org/10.1145/3231466 You, the Web and Your Device: Longitudinal Characterization of Browsing Habits LUCA VASSIO, Politecnico di Torino IDILIO DRAGO, Politecnico di Torino MARCO MELLIA, Politecnico di Torino ZIED BEN HOUIDI, Nokia Bell Labs MOHAMED LAMINE LAMALI, LaBRI, Université de Bordeaux Understanding how people interact with the web is key for a variety of applications – e.g., from the design of eective web pages to the denition of successful online marketing campaigns. Browsing behavior has been traditionally represented and studied by means of clickstreams, i.e., graphs whose vertices are web pages, and edges are the paths followed by users. Obtaining large and representative data to extract clickstreams is however challenging. The evolution of the web questions whether browsing behavior is changing and, by consequence, whether properties of clickstreams are changing. This paper presents a longitudinal study of clickstreams in from 2013 to 2016. We evaluate an anonymized dataset of HTTP traces captured in a large ISP, where thousands of households are connected. We rst propose a methodology to identify actual URLs requested by users from the massive set of requests automatically red by browsers when rendering web pages. Then, we characterize web usage patterns and clickstreams, taking into account both the temporal evolution and the impact of the device used to explore the web.
    [Show full text]
  • Introduction to MLAB the Royal Road to Dynamical Simulations
    Introduction to MLAB The Royal Road to Dynamical Simulations Revision Date: September 24, 2015 Foster Morrison, author Turtle Hollow Associates, Inc. P.O. Box 3639 Gaithersburg, MD 20885 USA Daniel Kerner, editor Civilized Software, Inc. 12109 Heritage Park Circle Silver Spring, MD 20906 USA Email: [email protected] Web-site: http://www.civilized.com (301) 962-3711 c 1992-2014 Turtle Hollow Associates, Inc. Contents Preface ii 1 BASIC MATHEMATICS AND ITS IMPLEMENTATION IN MLAB 1 1.1 What You Need to Know ................................ 1 1.2 Getting Started with MLAB ............................... 2 1.3 Foundations of Mathematics ............................... 2 1.4 Sets ............................................ 3 1.5 Numbers, Prime, Rational, and Real .......................... 4 1.6 Try Out MLAB ...................................... 6 2 PROGRAMMING IN MLAB 10 2.1 More Numerical Analysis vs. Analysis ......................... 10 2.2 Legendre Polynomials .................................. 11 3 VECTORS AND MATRICES 13 3.1 Vectors .......................................... 13 3.2 Matrices, Linear Algebra, and Modern Algebra .................... 14 3.3 Arrays ........................................... 16 3.4 Functional Analysis .................................... 16 i 4 LINEAR DYNAMIC SYSTEMS AND MODELS 19 4.1 Difference Equations ................................... 19 4.2 Differential Equations .................................. 21 4.3 Generalizations ...................................... 23 5 LINEAR DYNAMIC SYSTEMS WITH INPUTS
    [Show full text]
  • TECHNICAL UPDATE David Herren Middlebury College
    TECHNICAL UPDATE David Herren Middlebury College Welcome to the second Tech Update • Desktop Video & Graphics, column! In this installment we'll be expos­ • Lab Management, and ... ing you to a number of announcements made since the last column went to press. OK, so there will be a Miscellaneous as While the last edition focused almost exclu­ well. Forgive me. sively on the Kodak PhotoCD technology, in this edition we'll take a look at several FOREIGN CHARACTER SETS AND technologies from recordable compact discs WORD PROCESSING to multi-script word processing. WorldScript Before we tum to the llnews11 however, I want to once again make an appeal to read­ Many of you will have heard rumors, at ers. My own area of expertise is not so broad least, of a new feature of Apple Computer's as to cover all aspects of language and tech­ System 7.1 operating system for Macintosh nology-my focus is firmly rooted in com­ computers called "WorldScript." At the time puting-and thus I will rely heavily upon of this writing, WorldScript is not a com­ your contributions. If you read about an mercially available extension to the interesting technology relevant to language Macintosh operating system so any instruction, or see a presentation of a new comments here should be considered pre­ technology that you think might be interest­ liminary. ing to our readers, please forward that infor­ mation to me (see my Internet address at the Word processing in non-Roman charac­ end of the column). ter sets such as Japanese, Arabic, or Chinese requires special consideration.
    [Show full text]
  • RSA Adaptive Authentication (On-Premise) 7.2 Integration Guide
    RSA® Adaptive Authentication (On-Premise) 7.2 Integration Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks RSA, the RSA Logo, BSAFE and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of EMC trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. License agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Note on encryption technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
    [Show full text]