Comment Re:Well, yes, I was there... (Score 1) 120
Thanx!
I saw a short section of the German version of that Nova show
Mit den besten Wünschen,
-Cliff
Thanx!
I saw a short section of the German version of that Nova show
Mit den besten Wünschen,
-Cliff
And my thanks back to you, oh Anonymous Coward: The 15 cents in royalties from your purchase of m'book is now helping my kids attend college. Uh, it'll last about 1.3 minutes.
You say that you're managing firewalls - all sorts of possibilities! I had the honor of working with Van Jacobson at LBL when he first researched TCP/IP traffic jams and compression. I was amazed at how much could be done by looking at traffic and thinking about the interaction of traffic, buffers, routers, and network congestion. Wonderful stuff - what looks like a boring problem may be an opportunity for research.
With that in mind, here's my encouragement to you: Go and sharpen your tcpdump & wireshark tools. Figure out what's really happening to those packets. Who knows what you'll uncover?
(blush). Thanks!
Now it's your turn: Go forth and make our networked community friendlier, stronger, more trustworthy, and more useful.
Best wishes,
-Cliff
PS: Of course, you raise a fascinating, self-referential question. How can you tell if this posting is from the real Cliff Stoll? I know it's me - and it's easy to prove in person, but difficult online. For the best proof, well, stop by for coffee. Way more fun than posting online.
It's been a quarter century since I chased down those hackers. Hard to think back that far: 2400 baud modems were rarities, BSD Unix was uncommon, and almost nobody had a pocket pager. As an astronomy postdoc (not a grad student), I ran a few Unix boxes at Lawrence Berkeley Labs. When the accounting system crashed, my reaction was curiosity: How come this isn't working? It's an attitude you get from physics -- when you don't understand something, it's a chance to do research. And oh, where it led...
Today, of course, everything's changed: Almost nobody has a pocket pager, 2400 baud modems are a rarity, and Berkeley Unix is, uh, uncommon. What started out as a weirdness hiding in our etc/passwd file has become a multi-billion dollar business. So many stories to tell
I've since tiptoed away from computer security; I now make Klein bottles and work alongside some amazing programmers at Newfield Wireless in Berkeley. Much fun debugging code and occasionally uncorking stories from when Unix was young.
Warm cheers to m'slashdot friends,
-Cliff
Can this be used as precedent to dismiss all the pending RIAA and MPAA lawsuits? What about reversing past suits whose victims are already in the body count?
Don't I wish.
ba-doom-ba!
while the summary is laudatory, fawning, even, it is not central to the decision
Funny, I had the same reaction when I read it. He seemed like a salesman for Google or something.
I would like to retain your services in this matter. Please list your bank account information so that I may transfer a retainer payment to you. Thank you. Sincerely, Prince Bernard Koffi Austine Nigeria
Dear Prince Bernard,
If you're talking about my bank account, you're barking up the wrong tree
So, if this stands does this mean it's lawful for Google to make the full text available of these books, or not?
Fair use cases are very fact specific. If you start monkeying with the facts, Judge Chin might not feel the same way about it.
Any program which runs right is obsolete.