Saturday, October 29, 2011

Preventing page content from being indexed

You can post information on your website that contains information that you don't want the Google Search engine finding and including it in their index.

You can either add the page in question to a robots.txt file or you can add a Meta Tag to the page so that the page is not indexed.

That way someone who is looking to find information on themselves, which  call "Narcisurfing",  they have to follow links on pages that they know about or have found by making searches.

Page tracking

I formerly used both Google Analytics and my web server visitor logs to determine who had visted and what pages they had accessed.

I have since replaced this with just Google Analytics as I no longer run the Linux web server.

Update: 18 April 2012.
A search found this page and a new page was generated with the contents that were previously on this post.

Monday, October 24, 2011

How to look in Google Cache

If you find that the page that you are accessing on this website is not what you were expecting you may be able see the page that it replaces by looking in the cache of the search engine that you used.

Below is an example of a Google search that that found my website:

To see what is in the Google cache for the page that appears in the SERP (Search Engine Results Page) click on the "cached" link.

Other search engines such as Microsoft's Bing and Yahoo have similar page cache display methods.

  • How a cache visit is recorded by Google Analytics
  • More about why I am interested in Google Cache visits
  • What is an Organic Result?
  • Why and how I have removed content from search engine cache
  • Looking at a cached page when you are using Bing
I am more interested in the mechanics behind how Search Engine Cache is maintained and how people access it rather than what can be found in Google Cache. The examples that I give are from searches that I have seen finding my website and blog. The search terms and the associated pages visited are a way of me trying to determine what and why visitors are looking for.

Wednesday, October 19, 2011

Link Local Network Addressing

The mechanism by which local IPv6 addresses are assigned to devices on a network.

A link-local address is an Internet Protocol address that is intended only for communications within the segment of a local network (a link) or a point-to-point connection that a host is connected to. Routers do not forward packets with link-local addresses.

Local-link addresses ..........are normally only used to assign IP addresses to network interfaces when no  external, stateful mechanism of address configuration exists, such as the Dynamic Host Configuration Protocol (DHCP), or when another primary configuration method has failed.

Please Stop

Rogers Yahoo Mail

I use multiple email addresses that were supplied to me by Rogers as part of my Internet package.

I do not use the Primary account to carry out my main communications, I reserve its use for system messages from Rogers in the event that they need to contact me about my account and service. I not not use my Rogers account for my main communications.

I (used to) have a "catch-all" re-direct on my domain name so that all mail to me gets sent to my primary email account. I generally do not use my primary email address for general communications. If I give my email address to a 3rd party I still use an alias.

Tuesday, October 18, 2011

You Tube Downloader

I have a working You Tube Downloader.

There are many pieces of software that are available to do this but many are nothing more than "shill-ware" and function by capturing the You Tube video in real-time and then saving it in a format likley to be only compatible with the program that downloaded it. The reason for this is to encourage you to buy other products from the company that gave you the downloader.

Other reasons why the popular You Tube downloaders are of secondary usefulness is becuase of copyright restrictions. It is not a good idea to offer a program that can capture the video streams so that they can saved to your drive and then uploaded again to file sharing sites.

The program that I have is a command-line Python script that was developed by Phil Lewis and needs to have a Python interpreter installed on your computer.

Files downloaded are in the .flv format as they are processed using the RTMP library and FVStreamer programs. The .flv files can be converted to any format you desire for playback on devices such as the Apple iPad and Touch. The .flv files will play on your computer without conversion using the VLC player.

The script has to be run from the command prompt and the install of Python for Windows confuses this as there is a GUI that is provided in addition to the interpreter.

The confusion for me, but then I know that I am stupid! is that the youtube-dl script had to be run from the command line with an argument that was at least a URL for the YouTube to be downloaded. This was not possible if the Python interpreter was run using the menu option that the Python for Windows installs as a default. To run the script you have to go to the Python directory and run it from a command prompt from there. I guess that you could make the path of the computer such that the interpreter can be found from anywhere.

YouTube Downloader by Ricardo Garcia Gonzalez - running in Python command prompt


Monday, October 17, 2011

Pageinsider returns a listing of the previous owner of

Some of the other listings you may find for this earlier version of include a photographic essay of Toronto Northern Ravine - Alexander Muir Memorial Garden

The previous owner has nothing to  do with The Technology Muse. 

Sunday, October 16, 2011

More Blog Spam

I really wonder why some people bother in sending Blog Spam to me.

I very much doubt that Veronica has any clue about Search Engine Optimization or she would not be spamming insignificant blogs as "The Technology Muse".

In addition, this blog is not a website. I have one and it does not need the help of outfits such as Rank High S E O.

I don't have any competition, so is is not relevant about "outranking"


I know your website is important to you, and I was wondering if I could go over a few things.  I work for a marketing company, and wanted to show some businesses, visually, how they compare to the websites on the first page -- Truly understand why your competition outranks you on the Search Engines. 

We have been doing this for years and are great at what we do.  We have an extremely knowledgeable staff that sincerely analyze your site; showing you exactly how to increase your rankings. 

I'm asking for the opportunity to show you what I can do for your business before you pay a dime.   I can do it in 10 to 15 minutes depending on your questions.   

I need the best way to reach you and any comments you want me to consider before I do your research. 


Rank High SEO
P.O. Box 286 Newport Beach, CA 93472

Thursday, October 13, 2011

AVG - A lost cause

I just discovered I still have one of my machines running AVG Free.

NO! I don't want to install AVG Free 2012! - I have pulled off AVG from most of my computers - this is worse than the NOD32 experience.

Wednesday, October 12, 2011

Google Plus +

G+ - Google's answer to Facebook and Twitter

The trouble is that I remain to be convinced that Social Media is something that benefits the consumer or just something that the providers of these networks see as a business opportunity.

I wasn't invited to participate in the beta trials - I would not have taken it up even if I had. The "Real Name" issue is a deal breaker for me as the ability to maintain an alias or anonymity is important to me.

A quote from Google:
Our ultimate ambition is to transform the overall Google experience, making  t beautifully simple, almost automagical as we understand what you want and  can deliver it instantly. This means making identity and sharing into all of  our products so that we build a real relationship with our users. Sharing on  the web will be like sharing in real-life across all user stuff. You'll have  better more relevant search results and adds. Think about it this way. Last  quarter, we shipped the Plus and now we're going to ship the Google part.

By the "Google part" I guess they mean all the Social Web motherhood?

The "+" button
This is Google's method to capture activity streams.

Tuesday, October 11, 2011

The New Sharing

This I think is something that is going to come back and bite!
More and more "Social" Apps are asking and getting access to your personal data. The premise behind this is that when you share your data then you will doing yourself a favour and you will get some sort of reward. These rewards can take the form of more and more useful information for you and even some sort of financial benefit.

These benefits can be in the form of coupons or discounts for products and services. I maintain that the price you have to pay in loss of control of your information it too high. I am not alone, I have recently (April 2012) seen a few articles that point this out and there are also articles dating back to 2010 when Facebook announced their Open Graph Interface/Protocol. What Open Graph allows programmers of Facebook Apps is to get access to Facebook users profile data. The way that it is supposed to work is that you have to give the App permission to do so. However, the fact that the mechanism exists to allow the retrieval of your personal data and also that many companies cannot be trusted makes the whole situation one that is fraught with potential to abuse.

Chilling Effects Clearing House

The Chilling Effects site contains a wealth of information pertaining to Internet rights and legal issues.

It maintains a database of requests for the removal of information from the Internet and other violations of copyright.

If Google receives a complaint filed under the DMCA or a copyright infraction claim it make take down the reference to that work in accordance with the "safe harbor" provision of the DMCA. This protects ISPs and network providers from liability if they take down material if they receive a complaint.

When such a "take-down" has been made an entry will be made in the's database and you can search that for entries.


This is a start page for various scripts that I| have looked at:

Monday, October 10, 2011

Blackballed by Canon

Either I have been blackballed by Canon or I have fallen off their developers email list.

The question is: Do I care?

The last version of the SDK that I attempted to download the process that Canon use to approve and allow downloads from their servers was "screwed up", The invitation to download after the filling of the on-line form did not arrive. It was not as if I did not make the application and it was not that I had the application refused - it was just that I heard nothing. I guess that could mean the same thing?

I blogged on the fact that I was having problems with the download and I also had a page on my website. I did not make a further application as I was not interested in carrying on with the development using the SDK as I saw no point.

I continue to blog about the versions as I see them released. I did not receive an application to download version 2.11.

I also continue to see searches that find this blog that are from those that are looking for places to download the SDK. I am of the opinion that there are two things at play here, the first is that Canon have problems in communicating with developers and could be over-protective in who they allow download their software. The second is that they could have read what I have written about them and have blackballed me. I really doubt the second thing as I am really not that important.

Update 18 July 2012:
I see that there are searches still being recorded from those looking to download version 2.11 - it is NOT on my intranet.

If you actually read what I have written above you will see that I do not have the latest version of the SDK. I realize that many that are looking for a download link do not take the trouble to read the content of the sites that they find them. Also, in many cases the links that you will find are scams on sites that just want you to sign up for their file sharing scheme.

Saturday, October 8, 2011

Please stop

Please remove all information about myself. The information of my address and so forth is my private information. I wish not to be continuously harassed by Bill Poplawski, who is a criminal and that has stolen from the company that unfortunately we gave him a chance to work for. He has done nothing but harassed our family, driven by our home and break our windows. If this is someone that you really want to continue to entertain, well, it goes to show your character too, and I am sure, if you met with Bill, you would not want to be associated with him. By the way, I feel very much taken advantage of by him as he needed help and a fresh start so I was paid for food, glasses, clothing, gas, cigarettes and a car to drive, and once I decided to stop helping him, he began this hate campaign against my family and I . We have been to the police and have formal complaints against him. If you would like a great project, dig into his past. His full name is William Poplawski. He needs to move on with his life and we would appreciate that you do not continue to add the fuel to his fire.
And if you really want to know on how he trades information with the police whenever he is out of money, he sets up drug dealers in Saskatoon and Edmonton.

If you would like to have more of a dialog, lets get on a call together about safe disk. It was a joint venture between bit defender and oneworld to help drive their sales and the project failed. Anyone that purchased safe disk insurance was dealt with. The volumes were not there to support the company, which almost bankrupted the company.

perhaps you should look at actual facts versus half cocked information, I prefer that facts are talked about, not assumption. It is just poor etiquette.
Thank you,
Wayne to -  10/8/11

I might had had some sympathy for him if he had not tried to threaten me and appear to impersonate the person he is referring to in this email

I did look at the information on the Innovation Place and not only did I find that Oneworld were located there, but a new company, Core Data Recovery, seemed to be at the same location.

As I still had no desire to talk with Wayne McAlpine and I was pretty sure that he was the "bully" I had heard about, I continued with my research. I was also now curious to know what all the fuss was about and what the connections to Terry Bradshaw, David Nagorski and other VATSIS people.

Update: Glendale, Ca

Tuesday, October 4, 2011

Acer AO722-0465 - AO722-0490

11.6" SNB with 1366 x 768  AMD C-60 APU (Radeon HD 6290)

The AO722-0490 is a Netbook and only has 1024 by 600 screen resolution.

If you install a clean copy of Windows 7 on the 0465, or upgrade it to Professional or Ultimate, you will have problems in finding drivers for the HD 6290 graphics. You will probably reduce the screen resolution to 800 by 600.

I am currently running an AO522 with a C-50 APU  - 1280 by 720 on a 10.1" screen. I also own a AO522 with a C-60 (Netbook with 1024 by 600 resolution). I do not notice much of a difference between the C-50 and C-60  but the extra screen resolution is the key to why my first 522 is far more use. This could also be said for the 722 with a slightly bigger physical screen and 1366 by 768 resolution. (This resolution is the most common  for Sub Notebooks - and is the same as the Lenovo X100e  that I also have control over.)

Perl Scripts