Eggersmann & Lang

beautiful stationery design from 1865 and onwards

Paid a visit to the Ruhrmuseum today, this beautifully designed stationery is among the exhibits (photos are taken with a smartphone, so apologies for the low quality are in order).

Eggersmann & Lang, 1890, seem to have made and sold electricity products (based on this guy’s designs). Lahmeyer is still in business.
A. J. Hannemann Maschinenfabrik, Eisen- u. Metallgiesserei, 1907
Deutsche Babcock & Wilcox Dampfkessel-Werke A.-G., 1910
Gummi- & Gutta-Percha-Waaren-Fabrik Emanuel A.R. Blancke, 1865
F. Asthöwer & Co., Tiegelgussstahlfabrik, 1881
Kölner Eisenwerk u. Rheinische Apparate Bau-Anstalt G.m.b.H, 18??
Hermann Müller Armaturen Fabrik Metall Giesserei, 1902
Deutsche Vacuum Oil Company, 1910, today a part of ExxonMobil
Julius Boeddinghaus Fabrik von Doppelspiraldübeln, 1901
Farbenfabriken vorm. Friedr. Bayer & Co., 1906, today Bayer 
Bochumer Verein für Bergbau u. Gusstahlfabrikation, 1867, today a part of ThyssenKrupp.
Elektrotechnische Fabrik Rheydt, 1890, Schorch today
Kölner Accumulatoren-Werke, 1903
Westfälische Drahtwerke, 1900
Annener Gussstahlwerk Actien-Gesellschaft, 1916
Henschel & Sohn Abt. Henrichshütte Hattingen A.D. Ruhr, 1906

Other examples of this kind of stationery can be found on ebay, search for “alte rechnungen”.

Music Blog Scraper

To make the downloading of a bunch of tracks from music blogs a bit easier (like the excellent Freebreaksblog), i’ve made a scraper for these kind of blogs. You can paste a link and the JS will list all links to the soundcloud downloads on that page. If there’s no available download, it falls back to retrieve the (low quality) stream mp3.

The scraper is designed to be used with jDownloader, a download-manager with an enormous amount of features. It also handles the actual retrieving of the download URLs.

Soundcloud Blog Scraper

Source on github

Paypal Gewinnbenachrichtigung

Wir gratulieren – 500 Euro Einkaufsguthaben sind jetzt auf Ihrem PayPal-Konto

PayPal verschickt(e) Mails mit einer Gewinnbenachrichtigung:

Paypal Gewinnbenachrichtigung

Die Mail ist kein Phishingversuch, cue Shitstorm, da sich ein Haufen Leute auf §661a berufen werden (Paypal sich vermutlich auf §119 / §120 BGB).

Grobflächiges Versagen einfach, zusammen mit dem “Willste? Kriegste.” auch tolle Realsatire.

Update: Wie vermutet (aus der Email die Paypal dazu verschickt hat):

Zur Klarstellung: Diese Mitteilung stellt eine Anfechtung der Email vom 7.6.2013 in Bezug auf das Gewinnspiel nach
§§ 119, 120 BGB dar.

Displaying your COD4 stats in a WordPress widget

So, I finally got the thing running. Of course, it turned out to be harder than i thought…

Some things i ran into while implementing it:

  • It’s not exactly possible to read in bytes from a file with JavaScript. This isn’t an issue normally, as the usual environment for JS is the web, but you kind of would expect there’d be a way to do this with WSH. Workarounds exist, but are lacking.
  • PHP and the Google Charts API don’t play along too nicely when you have to deal with JSON encoded Dates. The Google API expects months starting with 0 (e.g. January = 0, February = 1), PHP delivers months starting with 1.

My approach basically boils down to this:

  • Run a WSH script regularly which executes a c program which decrypts the mpdata file, reads in the relevant bytes for kills and deaths.
  • It then makes a GET request to a PHP script which saves the kills, deaths and a unix timestamp to a file.
  • A WordPress widget displays the statistics as a Google Chart after converting the file to JSON.

The code is on github, it’s all very ugly, but working.

 

Posting Call of Duty 4: MW stats to a php script

I’ve started working on a little project which will do the following:

  • Read out the current cod4 stats (kills/deaths) from the local player profile
  • Post it automatically to a php script so it can be displayed (e.g. on this site) using WSH (Windows Script Host)

What i will need to figure out for that:

  • Decrypting the mpdata file in <cod 4 game dir>\players\profiles\<profile name>
  • Read in the correct offsets for kills and deaths in the decrypted file using JS
  • Bonus: Fancy stats with the Google Charts API

The first item on this list is solved by using this guy’s decrypter which can be executed from the script. The code for the decryption is available under GPL so a future version would involve porting this code to JS.

Update: Turns out the whole read some bytes from a file thing is incredibly stupid in JS/VBS.

Update 2: Doing this in C is way easier.