Via The War on Spam and The Spam Weblog:

Hackers hijack federal computers. Apparently the DOJ discovered, during their crackdown on cybercrime, that hundreds of Department of Defense and Senate computers had been turned into zombies.

Nice.

Can we really be sure they were only used to send spam? After all, zombies are generally the result of viruses, worms or trojans that install backdoors, so that the attacker can run anything on the system. Setting up a distributed and disguised spam-sending network just happens to be the most profitable application right now, but you can bet there are a lot of people out there who would love to take over — or just look through — US military computers.

I don’t know about you, but I find this really disturbing.

“Would you like to play a game?”

I accidentally hit ctrl-H in our computer system today…..and it acted like backspace. I have never before run into a modern, GUI-based program where that would happen. Then again, I don’t recall ever trying it, either.

Well, I signed up with Gravatar, mainly so I could test the plugin.

Basically the idea is that you can define an avatar that will follow you around the Internet, anywhere you post. All that’s necessary is for the site you’re commenting on to be Gravatar-enabled at the time someone visits.

The one thing I’m not entirely thrilled about is that it uses your email address as the basis for your ID. They really didn’t have many options to choose from, since most blog comment forms only have space for your name (not always unique), email address, and website (not everyone has one). To avoid publishing addresses accidentally, they one-way encrypt it using MD5. (MD5 is a hash function, so while you can have two systems generate an MD5 signature from the same data to see if it matches, you can’t restore the original from the signature.)

If you’re interested in Gravatars, head over to their site, see if you agree with their policies, and if you enter your email address when commenting (don’t worry, current and future WordPress versions never display it outside of the admin area), your avatar will show up next to your comments.

Anyway, once I had gravatars showing up, I had to find a layout that (a) looked good and (b) worked in IE. (Yes, that again.) Continue reading

When I worked at a computer lab in college, the main security focus was preventing lab visitors from screwing around too much with the computers. We just ran Windows NT and locked it down as hard as possible. The worst network-based threat I remember facing was WinNuke, and that was just as likely to be another lab tech. Some of the early email viruses started circulating while I was there, but since it was a public lab, we didn’t provide any email programs; people would telnet into the mail server and use Pine. (This was pre-Hotmail, too.)

In my wired-for-ethernet campus housing, however, all bets were off. I watched people remotely controlling each others’ computers as pranks, or discovering hackers had gotten onto their systems from halfway across the planet, and figured it was safer to use Linux most of the time. This actually got me in trouble with the network admin at one point, who decided I must be running a server and shut off my port. It did at least teach me to disable services that were turned on by default, though I saw no indication that anything on there was actually being abused.*

Firewalled

Then there were firewalled environments. Still back in college, we rigged up my parents’ house for a home network. My brother put together a Linux box to dial into the Internet and act as a gateway, and effectively everything inside the network was safe from direct attacks. No point in internal firewalls, and since everyone was savvy enough to avoid the really nasty stuff (which was easier at the time), virus scanners were only a precaution, rather than a necessity.

For the past few years I’ve mainly worked with Continue reading

I’ve been thinking about adding memory to the PowerBook for a while now, and for various other reasons we ended up at Fry’s last night. I figured, we’re here anyway, why not at least price the RAM?

Well, here’s a big fragging “Why Not:” I couldn’t remember the exact specs required. There was, however, a chart listing various laptop models, and the employees could look up requirements by model in the computer. The problem there was that I knew it as “the new 12″ PowerBook G4,” not as “Model A1010,” so they ended up (as near as I can tell) pulling up the specs for last year’s PowerBook (the 1 GHz instead of the 1.33 GHz). Naturally, the two models use different kinds of RAM.

When we got home last night, I cracked open the manual to compare the specs. Tonight, I waded through the Fry’s return line, and this time I brought the manual along — as I’d intended to do in the first place.

Everything went smoothly except for one glitch. The memory slot is covered by a panel with four size #0 Phillips head screws. I do have a size #0 screwdriver, and three of the screws came out easily. One of them refused to move, and the head ended up getting stripped somewhat. Eventually I was able to get it.

So, now the laptop has gone from having the smallest amount of memory at 256 MB (barring the ancient Mac clone in the closet) to having the most memory of all our computers at 1.25 GB.

Well, it’s official. After months of rumors and vague announcements, Netscape 7.2 has been released!

It’s been just over a year since AOL closed down Netscape and spun off the independent Mozilla Foundation. Despite the uncertainty of that transition, no one can deny that Mozilla has flourished. People everywhere are switching to Firefox and recommending it on security, usability, and capability grounds.

It’s really quite surprising, particularly since Netscape the company no longer exists. But Mozilla has been marching ahead, and all that stood between AOL and an updated Netscape was updating their proprietary features, like the AIM sidebar and access to AOL email, to work with the new Mozilla code.

For the past year, I’ve been advocating that people switch from Netscape to Mozilla, since it seemed the best upgrade path. (Someone on Mozillazine pointed out that AOL is actually promoting the Mozilla connection — an interesting switch.) I’ve been skeptical about the new version actually materializing, but here it is.

I’m going to stick with Firefox myself, but for Netscape fans and those looking for the full browser suite (complete with AIM/ICQ)…

A new version of XFN has been released, with a few changes and a few new attributes. (XFN, the “XHTML Friends Network” is a simple way of adding information to a link to indicate your relationship to that person.)

New relationship types include kin and contact, expanding the family and friendship dimensions, and me. The primary reason to add me seems to involve linking together profiles at multiple social networking sites – Friendster, Orkut, etc., but it brings up an interesting question:

How do you handle a site run by more than one person? We’ve had XFN info on this page since sometime last year, and it’s worked, because we share mostly the same circle of friends. But we also have links to our individual websites. Should these both be marked “me?” Presumably not, since the separate sites wouldn’t represent the same person. Perhaps something to consider for XFN 1.2?

ยปAll pages site-wide with this tag