I was thinking about Star Wars, the “bringing balance to the Force” prophecy, and RPG character alignments, and realized that while you can neatly map the Jedi and Sith to good and evil (Anakin’s confusion notwithstanding), you can’t map them so neatly to order and chaos.

The Sith are a chaotic organization. They thrive on emotional chaos, they spread chaos to meet their ends… but when they get in charge, they impose order on everyone else.

The Jedi are extremely ordered. They try to purge emotions, they deny attachments. They’re hidebound by tradition. The organization is very structured. And yet they fight not to impose order but to protect it. The Jedi actually strive to preserve the balance of law and chaos.

I’m actually reminded a bit of Michael Moorcock’s Eternal Champion series, in which the cosmic balance between order and chaos is treated as its own faction. The Eternal Champion, in his various incarnations, always fights for the Balance, bringing order to Chaos worlds and chaos to Order worlds.

So the Sith are chaotic, but impose order, while the Jedi are ordered, but fight for balance. The problem, of course, is that the Jedi are not balanced themselves. Anakin does three things to correct this:

  1. He destroys the old Jedi order
  2. He destroys the Sith (two decades later)
  3. Destroying the Jedi ensures that Luke and Leia, heirs to the Force, will grow up as people first, Jedi later.

Luke and Leia have the opportunity to re-create the Jedi without all the baggage that dragged the old Jedi order down… and they can rebuild it with Jedi who are actually in balance themselves.

If you’ve been paying attention to computer security, you already know that spam, viruses, and organized crime have been in bed together for at least a year. The recently-discovered theft of 40 million credit card numbers [edit: originally linked to Yahoo News] illustrates this point clearly:

CardSystems was hit by a virus-like computer script that captured customer data for the purpose of fraud, [MasterCard spokeswoman] Gamsin said. She said she did not know how the script got into the system. The FBI was investigating. (emphasis added)

Given the current porous state of many networks and operating systems, and the general public’s attitude that catching a computer virus is as inevitable as catching a cold, I’d guess it got into the system the same way most spyware does. An email attachment squeaked by the filters. Someone installed a tool that claimed it would make their web access faster. Someone got a well-designed phish, followed the link, and got infected by a backdoor because their browser was behind on security patches. Someone brought a laptop home, plugged it into their insecure home network, and brought back a virus.

Sadly, I expect we’ll be seeing a lot more of this.

Update June 20: Netcraft is reporting that it was indeed lax computer security that did them in:

MasterCard International said it “worked with CardSystems to remediate the security vulnerabilities in the processor’s systems. These vulnerabilities allowed an unauthorized individual to infiltrate their network and access the cardholder data.” Officials at affected institutions were not specifying the vulnerability and exploit used to breach CardSystems’ security. (emphasis added)

Netcraft seems to think it was likely their website, which runs on Windows 2000 and IIS 5, and they go on to promote their own security consulting services. So it’s not entirely an unbiased look at the incident.

An interesting read on the Most Lucrative Movie Franchises, not so much for what it gets right, but for what it gets wrong.

Tonight’s premiere of Batman Begins marks the sixth in the series. And that’s only counting the “modern” era of Batman flicks, dating from 1989’s Batman from director Tim Burton.

Sixth? Are they including the cartoon Batman: Mask of the Phantasm? If so, why not Batman: Sub-Zero? (Curiously, the table on page two only indicates five Batman films.)

And where do they get four Lord of the Rings films? I suppose they could be counting the Bakshi cartoon, but what about the Rankin-Bass Return of the King and The Hobbit?

Where are they getting their numbers?

A mortgage spam:

THIS IS OUR CLOSING TRY

We have made an effort to speak to you on many occurences and now is the time to respond! … However, based on the fact that our previous attempts to speak to you have failed, this will be our last notice to gain for you the lower rate. [Emphasis added]

Please!

5.3 4.9 near Yucaipa just minutes ago.
7.2 off the coast of Crescent City early yesterday morning.
5.2 near Anza Sunday morning.

Quakes measuring 5+ are fairly common. CA gets several each year.

Three in a week, aside from aftershocks, is unusual.

Of course, the craziest was probably the two unrelated 7+ 7.3 and 6.5 quakes in Landers and Big Bear that hit within hours of each other back in 1992.

The new Opera 8.0.1 includes an experimental feature called Browser JavaScript. It’s a collection of client-side scripts that automatically corrects known errors on websites as they’re displayed. Opera downloads updated scripts once a week.

It’s an extension of the User JavaScript concept. Firefox’s Greasemonkey is basically the same thing, and it’s gotten a lot of attention as a method for correcting or enhancing sites. The key difference is that these scripts are centrally maintained, and automatically updated.

Browser JavaScript is disabled by default, and can be turned on by putting Browser JavaScript=1 in the [User Prefs] section of your opera6.ini file.

(via Opera Watch)

Over the last few days, one of the viruses going around (probably a Mytob variant) has been trying to send its “Your account is being suspended! Open this file now!” come-ons. It forges the return address as support@example.net, admin@example.net, etc. We block any incoming mail using these addresses before it even gets to our virus scanner.

Now here’s the weird part. We’re also getting bounces sent to another domain we manage, let’s say another-example.com. Both sets are coming from someserver.another-example.com.br!

I think that the virus is finding itself on another-example.com.br and not recognizing the country-specific domain name, misreading it as just another-example.com. It then looks up the mail server, finds our domain, and targets both.
Continue reading