Geek Stuff category archive
War on CyberHype 0
The BBC reports some sensible comments. No doubt they will be lost in the rush to sell scary books and make scary headlines (emphasis added):
Bruce Schneier claims that emotive rhetoric around the term does not match the reality.
He warned that using sensational phrases such as “cyber armageddon” only inflames the situation.
Mr Schneier, who is chief security officer for BT, is due to address the RSA security conference in San Francisco this week
Speaking ahead of the event, he told BBC News that there was a power struggle going on, involving a “battle of metaphors”.
(snip)
His point of view was backed by Howard Schmidt, cyber security co-ordinator for the White House.
“We really need to define this word because words do matter,” said Mr Schmidt.
“Cyber war is a turbo metaphor that does not address the issues we are looking at like cyber espionage, cyber crime, identity theft, credit card fraud.“
The portion I put in bold illustrates part of the reason for the success of the “cyberwar” hype.
Unscrupulous persons do lots of different nasty things.
Nasty things done with computers have in common one thing: they are done on (gasp!) computers.
Many persons, even those adept at using individual computer applications, such as a web browser or an office suite, have no idea how a computer or a network does what it does. Therefore the hypesters can fool persons into thinking that the many nasty things are actually one nasty thing–“cyyyyyyyyyyybeeeeerwaaaaar”–because they are done on (gasp!) computers.
They can therefore write white papers, sell scary books, get interview gigs on telly vision, and, perhaps most significantly, get lucrative consultancy gigs writing more white papers, promoting more scary books, and appearing in more interviews on the telly vision.
I’m not saying there is no reason to worry. Both individual computer users and system admins should practice safe HEX.
But there’s no reason to predict cybergeddon.
Jeopardy 0
I’m rooting for Watson.
Watson, by the way, runs Linux.
Watson is made up of ninety IBM POWER 750 servers, 16 Terabytes of memory, and 4 Terabytes of clustered storage. Davidian sontinued, “This is enclosed in ten racks including the servers, networking, shared disk system, and cluster controllers. These ninety POWER 750 servers have four POWER7 processors, each with eight cores. IBM Watson has a total of 2880 POWER7 cores.”
HuffingtonAOL 0
I haven’t visited the Huffington Post regularly for almost two years. I used to visit it almost daily, but it’s gotten too cluttered and OMG celebrities! a la Gawker and TMZ for me. About the only time I go there is when Bob Cesca has a new piece.
AOL’s purchase of HuffPo is likely the next step on HuffPo’s march to frivolous irrelevance, but, hey! frivolous irrelevance sells these days. It’s easier than thinking.*
With those thoughts, I commend to your attention this prediction for the fate of HuffingtonAOL.
________________
*Me, I try to be relevantly frivolous.
Twits on Twitter 0
Dick Destiny gets real. A nugget:
No, not really. I indicated I didn’t have interest in the story that Facebook and Twitter had been significant to the Egyptian uprising.
I did see that US-made M1 tanks were laying smoke screens and refraining from shelling and machine-gunning crowds.
Which doesn’t jive with the regular make-stuff-up things passed off by US media.
Facebook Frolics 0
The internet is a public place.
Facebook Frolics 0
Words have consequences.*
The students–three 14-year-olds and a 13-year-old–were arrested yesterday at school and charged with aggravated stalking, a felony.
_______________________
*Unless you are Republican or Fox News “personality.”
Facebook Frolics 0
Good-bye, Mr. Chips:
A hacker has pleaded guilty to stealing more than 400 billion virtual poker chips.
In court Ashley Mitchell admitted penetrating the systems of online gaming firm Zynga to steal the chips.
He laundered the haul via a series of Facebook accounts in a bid to escape being caught.
Make TWUUG Your LUG 0
Learn about the wonderful world of free and open source.
What: Monthly TWUUG Meeting.
Who: Everyone in TideWater/Hampton Roads with interest in any/all flavors of Unix/Linux. There are no dues or signup requirements. All are welcome.
Where: Lake Taylor Transitional Care Hospital in Norfolk-Employee Cafeteria. See directions below. (Wireless and wired internet connection available.)
When: 7:30 PM till whenever (usually 9:30ish) on Thursday, February 3.
Directions: Lake Taylor Hospital-1309, Kempsville Road, Norfolk, 23502 (Kempsville Rd. at Lowry Rd.) 461-5001
Pre-Meeting Dinner at 6:00 PM (separate checks) at Uno Chicago Grill, Virginia Beach Blvd. & Military Highway (Janaf Shopping Center). Accessible through the Janaf parking lot or directly from the ramp from Virginia Beach Blvd. to Military Highway north.
Twits on Twitter 0
John Cass of the Chicago Trib takes on Deion Sanders, Jay Cutler, Carlton Fisk, and news reporters’ fascination with twits (emphasis added):
Cutler couldn’t play, the Bears lost and Sanders decided to tweet to all his fans that Cutler had no guts. A few other morons followed suit, then many ignorant, anonymously malicious fans joined in.
Sports reporters mined these seething electronic nuggets, although I don’t think they went to journalism school to report on the electronic equivalent of what was scribbled on the urinal wall in a gas station.
Follow the link to find out what Carlton Fisk has to do with all this.
Facebook Frolics 0
Heh.
The page belonging to the 26-year-old Zuckerberg, the Facebook founder who was named Time’s Man of the Year in 2010, was hacked some time on Tuesday.
The message left by the hacker read: “”Let the hacking begin: If facebook needs money, instead of going to the banks, why doesn’t Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a ‘social business’ the way Nobel Prize winner Muhammad Yunus described it? What do you think? #hackercup2011”.
(snip)
Embarrassingly for Facebook, more than 1800 people “liked” the update before the company took down its chief executive’s page. Facebook has made no public statement about how the hack occurred.
Facebook Frolics 0
Add another one to the list of reasons I’m losing interest in college football.
If you think the fuss over the NFL draft is over the top (face it, televising the draft is a strategy for ESPN to sell more NFL-related ad time and nothing more), consider this:
Facebookers have started harassing high-school athletes over what colleges they sign with. A high school star from Mississippi has quit Facebook:
“I got a lot of trash talking by both schools on Facebook, but that didn’t have a lot to do with it. But when you start getting my mom involved and my family involved, that takes it to a whole another level.”
On Tuesday, C.J. Johnson said goodbye to Facebook with this post:
“This is my last Facebook post and I’m gonna leave facebook with this. Linda Johnson has never worked as a house worker making 100,000 dollars a year and I will not be a Mississippi state bulldog and I’m not considering Mississippi state anymore bc you have constantly comment on my page send me crazy inboxes and has made my recruiting experience a living nightmare. Goodbye facebook.”
It’s only a damned game, for Pete’s sake.
Coincidently, I received this picture in an email about five minutes before stumbling over that news item (picture below the fold):
Twits on Twitter 0
Alex Beam wonders about the Library of Congress Twitter archive:
Now you could hear a pin drop.
Follow the link to see how many persons have twitted the article.
Next up: Archiving old “While You Were Out” phone messages–but only the pink ones.
Geek Cred 0
I know it is a silly thing to be excited about, but I am still excited about it.
I’ve made enough posts at LQ to qualify as a “Senior Member.”
Rep’s not bad either.
3,994 more posts and I get to be a “Guru.”
I think I got me some geek cred.
All joking aside, when I was first learning my way around Linux, LQ was indispensable to me. The folks there are quite tolerant of newbies and willing to answer questions, even when they are badly asked.
It is nice to be able to pay it forward.
Facebook Frolics 0
Oh, for the good old days, when teepeeing someone’s front yard was the be all and end all.
Actually, the most ambitious stunt I remember was when some of my classmates stole an outhouse–yes, some country folk still had outhouses back then–and left it in someone’s driveway. Never did find out whose privacy they spirited away.
“All those calls resulted in a police response,” Dalton said.
On Oct. 16, the teen called 911 and reported that a gunman had shot and slashed several people at the Telford Inn on Route 45. Some people were dead, he said, and others were injured. There was a “massive response” as authorities from more than five jurisdictions flooded the area, closing down the normally busy highway shortly after 4 p.m.
On Oct. 18, Harrison Township police learned about the Clearview threats on Facebook and turned to the prosecutor’s High-Tech Crime Unit for assistance.
The teen faces seven charges, including bias intimidation, disorderly conduct, and conspiracy.
Net Neutrality 0
Shaun Mullen lays out the issue as clearly as can be. A nugget:
Comcast, for its part, has twice been caught red handed trying to choke off peer-to-peer traffic. It backed off both times, but is now suing the FCC for the right to control the Internet tap as it sees fit. And lurking in the background is the aforementioned threat to innovation.
Cable companies, phone companies, and other providers of the internet connection pipelines are utilities and should be treated as such.
Their job–and charges–should begin and end with making sure the pipes are working. End of story.
Twits on Twitter 0
Phil Sheridan is writing about a football game. His words have wider application:
I wonder about the “genius” part.
Twitter is the pet rock of communications technology.
Facebook is its Cabbage Patch Kid.
(All that guff about “Twitter Revolutions” says more about media’s masturbatory fascination with gadgets than it does about Real Life.)
Facebook Frolics 0
El Reg takes a look at Facebook’s current security practices.
It’s conclusion: Somewhere between non-existent and lousy:
Facebook may talk a good game but a quick search (viewable only if logged into Facebook and safe providing you don’t click on the links) shows hundreds of victims have installed a rogue app that falsely promises the ability to “see who has viewed your profile”.
Facebook ought to have someone searching for such scams and stamping them out, something that isn’t happening as yet. “Often I see these scams spreading for days on end, with no obvious action taken by Facebook,” Cluley said.
Twits on Twitter 0
Streaming at Funny or Die.







