Statto has an article on his blog about using his digital camera to take infared pictures which is worth a look, if you’re even vaugely interested/bored/geeky/a physicist/all of the above. He’s taken some fascinating pictures of infared remote control beams and things through filters, and provided a little bit of an informative background as to why it all looks like it does, too. Go look.
Tag: technology
Man And The Machines
There’s a fascinating article on LegalAffairs.org (the self-styled “magazine at the intersection of law and life” on artificial intelligence and legal/ethical/socialogical considerations relating to it. Despite disagreeing with a few of it’s points, it’s well-written and excellently-presented. Go read it.
In case the site stops publishing the article, I’ve made a copy, below. Click on the ‘next page‘ link to read it here.
Bug In Internet Explorer… But How Do I Tell Anybody?
This morning, I found a bug in Internet Explorer. I wasn’t using it, of course, but I’d sent a Macromedia Flash file to a colleague by e-mail, who opened it in IE, but couldn’t.
It turns out that Internet Explorer can’t cope with opening Flash (.swf) files from the local file system, if the filename contains an apostrophe (e.g. “Dan’s Pictures.swf”). Crazy little bug, but I’ve tested it a little and it seems that this really is the case. But how do I report it?
Microsoft‘s web site, despite a redesign, is a sprawling mess. Eventually I gave up and submitted it as a ‘feature request’. I submitted PNG-support as a feature request, too, because it would be nice if sites like Abnib looked as good to the unwashed masses of IE users as it does to users of real web browsers.
Google Of The Future
Google Suggest is the newest crazy invention from the guys at Google Labs… and it’s actually pretty cool! Go give it a go…
ATOM Feed Of Your GMail Inbox?
Checking my GMail account this morning, I noticed an unusual icon in the lower-right corner of the browser window:
It turns out that Google‘s GMail service seems to be testing an ATOM feed – a kind of syndication feed (similar to those used by weblogs and news sites – see Scatmania’s ATOM feed) that can be ‘subscribed’ to from your desktop computer.
Right now, the GMail feed looks pretty bare:
Nonetheless, this is an interesting turn of events – didn’t Google recently say that no other automated mail checking tools were to be used except for their own GMail Notifier (sorry, can’t find a news story to link)? But now it looks like they’re working on developing a format by which anybody can ‘subscribe’ to their own inbox (although probably only using a web browser – the non-browser-based XML readers seem to have difficulty with cookies, which are likely to be required.
It’s all interesting.
Security Engineering
A secure password does not make a system secure. No password – in fact, no authentication system – is entirely bulletproof. The key when designing a password-based access system, and choosing passwords, is to balance an equation. You must make the effort required to crack the password more valuable than the data the password protects. This will force the attacker to attempt another approach – there is no value in them continuing to try to break the password.
When laying barbed wire, we do not attempt to completely block access to the defended area (the enemy will just stay put and bring in tanks), unless we want to bring in enemy tanks (to, for example, ensure that they aren’t elsewhere!). We lay out barbed wire in a pattern that requires infantry to take a longer route in order to get in, in order that we can shoot at them more on their way. When laying barbed wire, there is never any doubt that the enemy will penetrate it, given enough effort.
When I tell people that no password is completely secure, and describe all that is above to them, they sometimes don’t believe me, or see the relevance. So here’s another example I came up with this morning:
When people install burglar alarms in their houses, they think they are doing it to prevent burglars. But this doesn’t work, otherwise the number of burglars would be expected to go down as the ratio of houses with burglar alarms has increased. No; a burglar alarm does not prevent burglars – what a burglar alarm does is makes the effort (in this case, the chance of getting caught) not worth the data protected (your TV, VCR, computer, etc.). So the burglar goes elsewhere – perhaps to steal less valuable stuff, but from somewhere that the effort is substantially lower. Burglar alarms don’t stop burglars – they redirect them.
But if the value of the data you’re protecting increases, then the equation disbalances, and it becomes worth the effort. If you start keeping stacks of gold bars in your living room, our burglar will probably risk getting caught to try to nab them. Or they might spend time getting the experience and equipment needed to disarm your alarm first. Or they might watch your daily patterns; see if you sometimes forget to arm the alarm, or maybe they’ll bribe your ex- to share with them the code.
There’s the basics of security engineering. Now, here’s the bit I missed:
Hackers are a very complicated set of people, of all manner of ages, disciplines, experience levels, and motivations. An important factor with many hackers is that, regardless of the possible value of the data, the effort taken to break into the system is irrelevant as a deterrent! Many hackers see more challenging systems as a ‘challenge’, and try to break into these systems just to prove that they can. Imagine your suprise when you find that your house has been broken into and all the gold bars in your living room have been autographed by some greyhat.
Now go change your passwords.
TromaNightAdventure!
I’ve finished TromaNightAdventure, a WikiGame on RockMonkey. It’s at version 0.9, so far, because there’s still a few things I’d like to do with it (like add a “hints” page, for example!). But nonetheless, if you’re a Troma Night fan, you ought to go play it!
Windows XP SP1 Honeypot Breached In 200 Seconds
The internet is becoming a scarier and scarier place.
In a recent “honeypot” study, a Windows XP computer with Service Pack 1 was infiltrated in just 200 seconds, without even opening a web browser.
For the less techie-minded, a “honeypot” study involves setting up a new PC with a new operating system (in this case, a Windows XP SP1 machine) and connecting it directly to the internet to see how it is attacked and to what end. In this case, all they did was connect said computer to the internet… and less than four minutes later, it had been compromised by an attacker. Within half an hour, it was receiving instructions to act as a bridge to attack other computers.
Four minutes isn’t long enough to download and install ZoneAlarm. It certainly isn’t long enough to install Service Pack 2. And all across the globe, newbie PC users are buying off-the-shelf computers with no firewall, taking them home, and connecting them to the internet, basically ‘volunteering’ their computers and their bandwidth to be zombies and attack others around the world, relay spam, or share their files with anybody, anywhere.
If anybody needs help securing their system, just give me a shout.
Blogspam A Problem… No More
As I’ve mentioned in previous posts, I’ve been getting more than my fair share of blogspam of late. I’ve been spending about twenty minutes every three or so days clearing out the ‘moderation’ queue and updating my keyword lists. Worse still, some spam has been getting through nonetheless (hopefully I’ve always been quick to remove it, and so none of you – my readers – have had to see any of it).
So: I’ve implemented a new anti-blogspam solution: whenever you post a comment to my weblog from now on you’ll be asked a simple question. The answer is usually obvious… to a human… but very difficult to automate a computer to answer. I appreciate any feedback on this (why not leave a comment to this post), and I’ll let you know whether it fixes the problem. And, of course, if it does, I’ll offer my code snippet back to the WordPress development team in order to include it, perhaps, with a future version: or, at least, offer it to friends of mine who use similar blog engines and are troubled by spam.
I need sleep.
In other (almost equally geeky) news, I’ve been spending a good deal of time working on my new RockMonkey WikiGame – TromaNightAdventure. If I can keep up a reasonable development rate on it this weekend (which could be tough – I’ve lots to do, and Gareth is visiting and keeps distracting me with cool technology like GPS devices and VoIP telephones), it’ll be ready on Tuesday evening. Watch this space.
Popularity Of The Welsh Language
<ROFLMAO>
Want a giggle? Go to Google and type “old dead language” into the search box (with or without the quotes… either way), and hit “I’m Feeling Lucky!”.
This is the follow-up to my experimental googlebomb the other week. I’ve had my fun, now, and I actually believe it’s possible (I was skeptical when I first read about it, but it turns out that Google really is that easy to manipulate) to pull off a googlebomb of this scale with my limited resources.
In other (equally geeky) news, I’m starting to have trouble with blogspam, and my usual keyword/IP/link-count filters aren’t catching it all… might need a reprogram.
Somebody Writes Of Half-Life 2
Somebody on slashdot writes of Half-Life 2:
Doom 3 tried to generate atmosphere through the lack of light and the monster placement that was obviously designed to scare you. After a while it degenerated into one big black scare job to me, and wasn’t very interesting as a result.
On the other hand, I felt that HL2 did an awesome job of generating atmosphere, without the darkness. That last part was especially interesting to notice. When was the last time you were scared in a computer game while in broad daylight? Or in a peaceful zone? And to continue onto gameplay, when was the last time you had an idea of killing an enemy in the middle of a firefight, and that creative idea that would’ve been impossible in older games simply worked? Yes, I’m talking about the physics engine, and I haven’t seen gameplay this varied since wielding a cursed blanket in NetHack.
I’m willing to sacrifice bump mapping everywhere for the ability to throw bladed flying machines at enemies.
Yum.
My Very Own Googlebomb
Partially out of curiosity, partially to point out a flaw in the #aber multipass system, I’ve made my own little googlebomb. For those of you who don’t like reading, a googlebomb is where you manipulate the way that popular search engine Google into falsely linking with great priority a page that it probably should not. I’m sure you all remember “French military victories” and “Weapons of mass destruction”?
Go to Google, type in “Stuii should fix this”, and hit “I’m Feeling Lucky”. You’ll be taken to the #aber multipass page of a user who has never existed, a user called “Stuii Should Fix This”.
It’s a pain that when people search for ‘AvaPoet’, the first result is what should be my multipass (but it expired long ago). However, there’s obviously still a lot of places linking to it, so people keep getting that page whenever they look for me. Grr.
In any case; the theory’s been demonstrated plenty of times before… I just wanted to do it for myself. Yay.
Error Message Of The Day
SmartRacer
Yesterday lunchtime I finished writing a program that suddenly makes our working day that little bit more exciting – SmartRacer.
SmartRacer runs quietly in the system tray of as many users want to run it – currently Matt, Haagen, Gareth and me… but I’m trying to get Alex involved, too.
When you click on the system tray icon, the race begins! A couple of quick UDP broadcast packets are passed around the network, and everybody on the subnet who’s running the program is presented with racing-style “start lights”… 3… 2… 1… GO!
At this point, all participants will race – on their wheely-chairs – around the central ‘island’ of tables, in a clockwise direction, and attempt to be first to return to their own place and click the “Finish” button. Overtaking is rare – but permitted – and usually quite aggressive. As each player returns to their desk a “score” table is presented to everybody, with all participants times appearing in ‘minutes’ (heh), ‘seconds’, and ‘hundredths’.
Of course, players can choose not to participate in any particular race by clicking the “I’m Not Playing” button. The wimps.
You can download SmartRacer here, to play at your own workplace – SmartRacer.exe (64kb). It runs on Windows 98/ME/2000/XP/2003, and requires the Microsoft .NET Framework.
If Architects Had To Work Like Web Designers
This blog entry amused me today… it’s true that people don’t seem to treat web engineering as a discipline that requires any kind of planning or organisation. Jon knows what I’m talking about.