Forgot your password?
typodupeerror

Comment: Any serious attack will come from domestic botnets (Score 3, Insightful) 136

by _greg (#43177863) Attached to: US Cyber Command Discloses Offensive Cyberwarfare Capabilities

Attacks from identifiable sources in China or Russia are just exploratory research. Any serious attack would be launched from botnets running on computers belonging to citizens and companies in the country being attacked. Counter-attacking will just increase the damage. Poorly designed and maintained computers are like tinder waiting to be set alight and bring down the whole forest.

Comment: Terrorists are forcing us to use insecure software (Score 3, Insightful) 123

by _greg (#41953497) Attached to: The Cyber Threat To the Global Oil Supply

Once again Terrorists are forcing companies to use operating systems and other software well-known to be insecure on critical servers! You will know these Terrorists because of their distinctive clothing: Ties and Business Suits, which are never worn by software and security specialists. Alas, there may be nothing we can do to counter this Terrorist Threat as the Terrorists seem to have taken over our Corporate Boardrooms.

But there's no cause for alarm: everyone knows that the more you pay for software the more secure it is, right? And we can always retaliate against any Cyberattacks, unless of course they come from Botnets installed on our own citizens' computers.

Comment: What will be left after a global cyber war? (Score 1) 177

by _greg (#31853136) Attached to: Military Asserts Right To Respond To Cyberattacks

It's difficult to attack well-designed and maintained computer systems and it's impossible to secure poorly designed systems connected to the Internet.

When the insecure junk we call our county's critical information infrastructure gets seriously attacked, the attack comes from botnets operating in every country including our own. To "fight back" we must destroy every insecure computer on the internet!

What will be left standing? Oh, most OpenBSD systems. Quite a number of well administered Unix and GNU/Linux systems. But will we still have electricity to run them? How much of the infrastructure of the Internet itself will still be left after the war has taken out insecure routers, switches and the DNS system?

My critical resources run on OpenBSD servers behind ghost firewalls. My less critical resources are run under GNU/Linux with liberal use of virtualization and sandboxing. There are a few ways I can still be attacked but then, I'm only securing one geek's home office!

There's nothing to be gained from fighting a cyber war. There's no sane alternative but to secure our infrastructure properly right away.

Comment: Not the same stuff - much worse! (Score 5, Insightful) 276

by _greg (#31783570) Attached to: GNOME 2.30, End of the (2.x) Line

Yes, I DO remember the early days of Gnome and how much better it was than now:
    - automatic save and restore of multi-workspace sessions
    - handy window operations like maximize-vertically and maximize-horizontally
    - easy to change settings like which app to handle movies, etc.
I remember when clicking on a menu button gave an instant response,
not a several second delay for the first time in a session.

Gnome has become bloated and slower while becoming less stable and less powerful.
It is neither easier nor harder for beginners. It has more eye candy.

Gnome clients have also gone downhill: Evolution used to support my mh mail folders.
Now it uses a database that crashes when I try to load my old mail and fails to work
with my rules. It still doesn't integrate the contact manager with the mail rules.

I'd switch to KDE but they've been destroying themselves even faster!

Comment: Special headphones needed for pointy head (Score 1) 1019

by _greg (#30415182) Attached to: Music While Programming?

Perhaps if you could find some "special" orthopedic headphones for his pointy head he could see if music could help him!

Unfortunately, this is classic PHB behavior. "I don't like the look of what you're doing so I'm going to make up a spurious reason to forbid it, and if you challenge my spurious reason I'll perceive it as a personal attack."

_the happy geek

Comment: O/S Permissions Model Broken - try plash (Score 1) 611

by _greg (#30382658) Attached to: Malware Found Hidden In Screensaver On Gnome-Look

The idea that software that I have no opportunity to audit runs with my privileges when I run it is fundamentally broken. There is no way to clean malware that had a network connection long enough to hide a trojan anywhere and then overwrite itself to appear relatively innocuous. While a complete redesign of the way permissions and permission-delegation would be ideal, it is not practical in the short term. Using systems like http://plash.beasts.org/ can help.

Comment: Lots of similar languages create a rut (Score 1) 537

by _greg (#28680897) Attached to: Which Language Approach For a Computer Science Degree?

The languages mentioned in the article are all fairly similar procedural languages. Choosing such similar languages makes it difficult to convey the breadth of powerful programming practices and paradigms. A good programming curriculum teaches all of the major programming paradigms, first using languages which emphasize those paradigms, then multi-paradigm languages, then making sure that the student can use any paradigm in any language. Along with learning one or two procedural languages, one of which should be C, I would recommend Squeak, Clojure, Haskell, Mozart/Oz, Curry and Flora2.

_Greg

Comment: Tax Intellectual "Property" (Score 1) 263

by _greg (#28488903) Attached to: Copyfraud Is Stealing the Public Domain

If non-defensive Copyrights and Patents are a form of property, then let's tax them. When the holder no longer expects to make money from them, they can be sold or given back to the public domain. Heinlein suggested a great way to set property taxes: Let anyone state the taxable value of their property, then that's what it can be purchased for. See his novel "Number of the Beast" for details.

_Greg

Comment: 1 2 3 ... infinity by George Gamow (Score 2, Interesting) 630

by _greg (#26777349) Attached to: Mathematics Reading List For High School Students?

Gamow's book covers some of the most interesting areas of mathematics without excessive simplification or condescension.

Another good book is

The "Language of Mathematics: Making the invisible visible" by Keith Devlin. This is an expansion of his earlier book for Scientific American Library.

Finally, consider mathematics which involves interactive projects with a computer. Turtle Geometry is a great starting place. Advanced students can tackle a professional book on computer graphics and will learn a massive amount of projective geometry and mathematical thinking while having a blast doing it.

_Greg

What is wanted is not the will to believe, but the will to find out, which is the exact opposite. -- Bertrand Russell, "Skeptical Essays", 1928

Working...