How painfully boring! How totally disrespectful of the original series.
Oh how much I am not buying your excuses (from both of you).
Brian Herbert publish Frank Herbert‘s bare Dune 7 notes if you dare!
How painfully boring! How totally disrespectful of the original series.
Oh how much I am not buying your excuses (from both of you).
Brian Herbert publish Frank Herbert‘s bare Dune 7 notes if you dare!
“Inside Cyberwarfare” which I am reading slowly but steadily, proves to be a prophetic book. Chapter 10 describes a methodology similar to the one that seems to have been used in the RSA hack.
This book continues to amaze me in so many levels.

Happy SysAdminDay!
Thanks to @gtzi the following quote by Herbert Swope came to my attention:
Just like your Postmaster, or your System Administrator, be him either junior or senior. Impossible tasks and system administration go hand-in-hand…
I try Gambit Scheme almost once a year, therefore I am a casual user at best. It may be because Racket comes with a fullfilling environment and a book. But now with Gambit REPL on the iPad, this is going to be more frequent. It reminded me the days of LispMe and the Palm IIIx years ago.
Update: A few days later I wondered whether there exists a good calculator for the iPad. And then it struck me: I already had a Polish Notation one: The Gambit REPL.
Thanks to Bluefire Reader I can now read ePubs and PDFs with Adobe DRM (like the ones I’ve bought from ebooks.com) using the iPad.
I copy from “Inside Cyber Warfare“:
“For instance, a cyber attack might shut down a system, rendering it inoperable for some time, or a cyber attack might cause an explosion at a chemical plant by tampering with the computers that control the feed mixture rates. The results of those attacks mirror the results of conventional armed attacks, previously only achievable through kinetic force, thus satisfying the instrument based approach.”
The book was published in 2009. This quote is taken verbatim from “Solving the Dilemma of State Responses to Cyberattacks” which is again dated April 2009.
Stuxnet was detected around July 2010. Sort of Life imitating Art…
Update: Shortly after I pressed [Publish] my twitter stream was filled with mentions of “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History“.
Fresh tweet from DJB: Ed25519: high-speed high-security signatures. My admiration for DJB highly surpasses my hatred for qmail.
Dedicated to those people who insist that http://www.example.com and http://example.com must point to the same thing. Like I’ve said before, they are not the same thing, they are supposed to be equal only in the eyes of the inexperienced, and yes they are one more place for configuration errors (and user confusion) to emerge. Example (valid as of 2011/07/02 12:24):
This Virtual Directory does not allow contents to be listed.