google – Grey Panthers Savannah https://grey-panther.net Just another WordPress site Sat, 13 Dec 2025 07:37:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 206299117 Adding your Google Calendar entries to the iOS calendar https://grey-panther.net/2025/12/adding-your-google-calendar-entries-to-the-ios-calendar.html https://grey-panther.net/2025/12/adding-your-google-calendar-entries-to-the-ios-calendar.html#respond Sat, 13 Dec 2025 07:37:24 +0000 https://grey-panther.net/?p=1462

Noting this here in the hopes that it will be useful for somebody (or even me :)) in the future, since it took me longer than I expected to figure this out.

Scenario: you have a Google account with entries in Google Calendar that you would like to see on your iOS device (iPad / iPhone). Some (well, many) sites suggests that you need to install Google Calendar on the device. This is in fact not necessary!

All you need to do is to link your Google account with the native iOS Calendar App by going to Settings > Apps > Calendar and under “Accounts” add your Google Account. È voilà! That’s all folks! Hat tip to this article for reminding me about the procedure.

PS. You might need to do an additional step for the shared calendars, as described by Scott Hanselmann here: go to https://www.google.com/calendar/syncselect and select the calendars you want to be sync-ed to the iOS devices. I’m not sure if this is needed, since I’ve done it several years ago and it was already enabled when I recently set up a new iOS device.

PS. PS. There is now a new option for ad blocking for iOS devices that is well worth considering: uBlock Origin Lite for iOS.

Image taken from John Davey’s Flickr album with permission.

]]>
https://grey-panther.net/2025/12/adding-your-google-calendar-entries-to-the-ios-calendar.html/feed 0 1462
How to post high-quality videos to Google Video https://grey-panther.net/2011/10/how-to-post-high-quality-videos-to-google-video.html https://grey-panther.net/2011/10/how-to-post-high-quality-videos-to-google-video.html#respond Tue, 11 Oct 2011 08:58:00 +0000 https://grey-panther.net/?p=41 If you have Google Apps for Business, Google Video is still the preferred method of storing videos "in the cloud": it is easier to embed into Google Docs and probably more importantly – it can be truly private (you can only access it if you are logged in with the correct account – as opposed to YouTube where you can "hide" the video, but still anyone with the link can access it).

To post a high quality video to Google Video you only have to do:

  1. Upload the video
  2. Wait

I kid you not :-). While initially the uploaded video is of poor quality, apparently it gets processed in the background and later on (in my experience: it takes around 30 minutes to process 1 hour of uploaded video) a high quality version will be available.

HTH

]]>
https://grey-panther.net/2011/10/how-to-post-high-quality-videos-to-google-video.html/feed 0 41
Sending an X-Face email with Perl+GMail https://grey-panther.net/2010/04/sending-an-x-face-email-with-perlgmail.html https://grey-panther.net/2010/04/sending-an-x-face-email-with-perlgmail.html#comments Fri, 02 Apr 2010 13:17:00 +0000 https://grey-panther.net/?p=109 In the latest Software Freedom Law Show Bradley mentioned the X-Face email header and challenged listeners to send them an email containing the X-Face header. So here is the small Perl script I’ve whipped together to send them an email trough GMail:

use strict;
use warnings;
use Net::SMTP::TLS;

my ($from, $password) = ('[email protected]', 'MySuperSecretPassword');
my $mailer = new Net::SMTP::TLS(
  'smtp.gmail.com',
  Hello => 'smtp.gmail.com',
  Port => 587,
  User => $from,
  Password => $password);

$mailer->mail($from);
$mailer->to('[email protected]');

my $data = <<'EOF';
X-Face: "8.]Z_3ptuNK'CA~DM>M,G.T(h=1.y9"0gXW3V91E:dw2?|&G2R(?/no'F2g4%8Fv.
 J1p5K-^1epKXxIG)mj4}nGWTi<=iz8n)bUVhLu}MXRFl9"J%'=-;IfMXcuPK>-%^;$uW87O/B
Subject: Hello X-Faced World!

email body.
EOF

$mailer->data();
$mailer->datasend($data);
$mailer->dataend();
$mailer->quit();

The code is largely based on this snippet: Sending Mail Through Gmail with Perl. The X-Face header was generated using the Online X-Face Converter (yes, I know that there is a Image::XFace module, but it was very cryptic – it didn’t mention supported input / output formats). One word of warning: if you are using ActivePerl under Windows, Net::SMTP::TLS isn’t available in the default module list (AFAIK, because of encryption restrictions), so you might need to experiment with alternative package sources or using Linux :-). I’ve also tested the script with an email account I control (using Thunderbird with the Mnenhy plugin – which can read but not create X-Face emails) and it worked nicely.

There you have it: how to use an old (from the 1980s according to Wikipedia) method for embedding pictures which is not supported by most of the email clients 🙂

]]>
https://grey-panther.net/2010/04/sending-an-x-face-email-with-perlgmail.html/feed 3 109
Migrating feeds over to Google Feedburner https://grey-panther.net/2009/02/migrating-feeds-over-to-google-feedburner.html https://grey-panther.net/2009/02/migrating-feeds-over-to-google-feedburner.html#respond Wed, 25 Feb 2009 07:48:00 +0000 https://grey-panther.net/?p=384 474975762_67c1c8a5bf_oI migrated over the feeds from Feedburner to Google Feedburner. Everything seems to went well and hopefully there won’t be any problems. All you need is to signed into your Google Account, after which you try to sign into Feedburner and it will automatically offer to bind the Google account to your Feedburner account. Hopefully the old URL’s will all work (they seem to at the moment). Some useful links:

If you are using Feedburner, you might want to sign into your account to migrate over to Google (the deadline is AFAIK the 28th of February).

Image taken from dannysullivan’s photostream with permission.

]]>
https://grey-panther.net/2009/02/migrating-feeds-over-to-google-feedburner.html/feed 0 384
Browser Password Manager test https://grey-panther.net/2009/02/browser-password-manager-test.html https://grey-panther.net/2009/02/browser-password-manager-test.html#respond Wed, 04 Feb 2009 15:58:00 +0000 https://grey-panther.net/?p=424

This is rather old, but still good (originally found it via the Pat’s Daily Grind blog): a security company did some tests with the password manager included in different browsers. And of course they slapped not one but two sensationalistic titles on it (“Google Chrome Receives Lowest Password Security Score” and “Safari Ties for Last Place”). You can’t blame them, because sex Paris Hilton sells 🙂

However, there are some discrepancies between their test results and the ones reported by users. Also, the developers of Chrome responded in a very detailed and well reasoned post which pointed out that some of the assumptions would actually break websites like Facebook and still not add more than a small security barrier which can be overcome.

It is exactly because situations like this why testers should contact the vendors before they publish the results. However that seems to have become a kind of a lost art, nowadays everybody seems to want to rush out the door with “news”.

Image taken from Max (Tj)’s photostream with permission.

]]>
https://grey-panther.net/2009/02/browser-password-manager-test.html/feed 0 424
Google broke the Internet! https://grey-panther.net/2009/02/google-broke-the-internet.html https://grey-panther.net/2009/02/google-broke-the-internet.html#respond Sun, 01 Feb 2009 07:21:00 +0000 https://grey-panther.net/?p=433 Short summary: Google maintains a list of “malicious URL’s”. This list is used both to offer warnings on the search results and to warn users in third-party applications (like Firefox 3) via the Google Safe Browsing API. The format of the blacklist is such that arbitrary subelements of the URL can be used. This is done because it is often the case that one domain only hosts malicious pages, so it makes sense to blacklist the entire domain. Because of human error the URL “/” ended up on the blacklist. This effectively matches all the URL’s, which resulted in two things:

  • Google declaring all sites potentially harmful
  • Firefox3 declaring all the sites “potentially harmful” and showing the “red curtain” for them

In conclusion: even though my Belgian friend thinks otherwise, Google broke the Internet for a short time. Good things it’s over.

]]>
https://grey-panther.net/2009/02/google-broke-the-internet.html/feed 0 433
Preventing your site from becomming a spammer heaven https://grey-panther.net/2009/01/preventing-your-site-from-becomming-a-spammer-heaven.html https://grey-panther.net/2009/01/preventing-your-site-from-becomming-a-spammer-heaven.html#respond Thu, 15 Jan 2009 12:36:00 +0000 https://grey-panther.net/?p=452 An other resource to help webmasters keep their new years resolution:

Preventing Virtual Blight complete with video and slides 🙂

]]>
https://grey-panther.net/2009/01/preventing-your-site-from-becomming-a-spammer-heaven.html/feed 0 452
GHDB mirror https://grey-panther.net/2009/01/ghdb-mirror.html https://grey-panther.net/2009/01/ghdb-mirror.html#respond Thu, 08 Jan 2009 15:29:00 +0000 https://grey-panther.net/?p=471 Seeing that the GHDB (Google Hacking DataBase) might soon disappear (the site was offline for weeks recently for example), I grabbed a mirror of it and put it up on a free hosting website (no, not that one) – enjoy it while it lasts:

  • the main page
  • a link to each individual entry – this was needed because the navigation system was based on javascript :-(, and HTTrack – although amazingly it was able to find all the links, it wasn’t able to modify the JS such that the navigation works.
  • If you want to download all the pages at one, grab them here (the extension is .JAR, but in fact it is just a ZIP file – as all JAR files are ZIP files)
]]>
https://grey-panther.net/2009/01/ghdb-mirror.html/feed 0 471
The hacker mindset https://grey-panther.net/2008/12/the-hacker-mindset.html https://grey-panther.net/2008/12/the-hacker-mindset.html#respond Thu, 04 Dec 2008 09:41:00 +0000 https://grey-panther.net/?p=559 Is it just me, or does the pharese “adding third party gadgets to gmail” cry security vulnerability? I’ve read this posting from hackaddict, and it made me curious: just what can you do from a Google Gadget?

A little googling around (no pun intended :-)) lead me to this presentation: Xploiting Google Gadgets: Gmalware and beyond (warning, PDF!). After reading it and doing my own poking around, here are the conclusions:

  • As with almost every gadget/widget type service, you have to include a JS snippet on your page, meaning that you have to trust the provider (Google in this case).
  • This JS generates an IFRAME and the 3rd party content is hosted in the IFRAME (using the gmodules.com domain). This stops it from interacting with your page, however it does not stop gadgets from interacting with eachother. This means that one malicious gadget may compromise other gadgets on the same page.
  • The Google Gadgets API gives access to some of the users information by design to promote “social” use of the gadgets.

My conclusion is: if possible avoid adding third-party JS to sites. Also, Google had the possibility to do a better job of securing the system, and they didn’t, which is a shame… One obvious thing which they could have done is to register a multitude of domains (gmodules0001.com, gmodules0002.com, …) and from the embed script give each module a separate domain, which would reduce their ability to communicate between themselves dramatically.

]]>
https://grey-panther.net/2008/12/the-hacker-mindset.html/feed 0 559
Google spam – aka I’m back https://grey-panther.net/2007/12/google-spam-aka-im-back.html https://grey-panther.net/2007/12/google-spam-aka-im-back.html#comments Sun, 02 Dec 2007 14:14:00 +0000 https://grey-panther.net/?p=796 My workload has lightened a little and hopefully I can continue to blog more frequently. But enough of this, let’s get to our main subject:

Recently I’ve been seeing a growing number of spam which links to Google instead of the spam site. The idea is (probably) to avoid filters which check the link targets to determine if the message is spam. The links looks like the following:

http://www.google.com/search?hl=en&q=[some query unique to the site]&btnI=I=Im+Feeling+Lucky

What this does is does a query for which the spamvertized site comes in at the top of the results and simulates a click on the I’m Feeling Lucky button, making Google act as a redirector.

IMHO Google could fix this easily by refusing to redirect from links if the Referer header doesn’t point to a Google domain. While in general basing security decisions on the Referer header is not a very secure option and it can break clients which don’t send Referer headers (for privacy concerns for example), in this case it would be a very transparent solution:

  • if the users has a desktop based mail client, the Referer header will be empty, preventing the redirection
  • if the user has a web-based mail client (Hotmail, Yahoo Mail, GMail, etc), the Referer header will point to that instead of a Google domain, preventing the attack (or, if the user has disabled the sending of the Referer headers, it will be blocked as in the previous case)
  • if the user copy-paste’s the link (because some SPAM comes as text mail), it will have no referer link again.

There are two potential things which get broken by this: (a) people who have Referer headers turned off and (b) third party software / sites which rely on this service. For (b) the answer is pretty clear: this is a functionality provided by Google as is with no guarantees (ie. it’s not a documented interface). As for case (a), if they use the I’m Feeling Lucky button, they are SOL. There might be the possibility to work something out by using cookies, but maybe the number of people who have both the Referer header turned off and want to use the special button is so small, that the tradeoff (less SPAM / inconvenience a few people) is worth it.

]]>
https://grey-panther.net/2007/12/google-spam-aka-im-back.html/feed 3 796