• Archives

  • Topics

  • Meta

  • The Boogeyman - Working Vacation
  • Coming Home
  • Quest To the North
  • Via Serica
  • Tales of the Minivandians
  • Join the NRA

    Join the NRA!

Today in Geek History

On this date in 1987, Larry Wall released Perl to a newsgroup.  For you non-geeks, this is the equivelant of celebrating the day that someone first demonstrated super glue to the masses.

Perl is one of my favorites.  Honestly, I learned to script in Perl before I learned shell scripting in sh or ksh.  My first tech job in the Army was big on Perl, so I learned Perl as I was learning to be a SysAd.

Perl is a bit of a jack of all trades scripting language, being good at a lot of things, but not as good at most of them as languages that are specialized.  For example, a lot of Internet code used to be written in Perl, but most now is written in PHP or some other language that is specific to the web.

I get the feeling that I’ll still be using Perl in one form or another for a long time.

Christmas Geekery

For those of you who speak in geek, here are a couple Christmas time goodies for you:

The Perl Advent Calendar

The SysAd Advent Calendar

Just trying to warm the souls of the greasy mechanics of the information age.  Nothing says “Merry Christmas!” like a little perl spiced with a bit of OS tinkering.

Thoughts on Wizard Combat and Other Geek Thoughts

OK, bear with me.  Geek talk ahead.  This is important only in that it gets a series of thoughts out of my head that have been swishing around and around for a while.

Like I mentioned yesterday, I just finished watching the last movie in the Harry Potter series.  It’s a good yarn, and the writers and directors did an excellent job in entertaining me.  But some things have been nagging at me.

The finale of the entire series is a huge battle between the hordes of evil Voldemort followers and the small, but plucky band of good wizards centered around Harry Potter.  The good wizards are holed up in Hogwarts and are preparing for a battle to the death.  The entire scope of their protection is to put up some force fields, mine a bridge, and banish the untrustworthy students to the dungeons for the duration.  Once their protection spell on the castle is defeated, the battle pretty much falls down to a large series of single combat encounters.  Individual wizards face off, with the winner living and the loser becoming something to be squeegeed up.  The battle doesn’t go well for our intrepid heroes, and they win only because Harry Potter defeats Voldemort in single combat.

Basically, the wizards are conducting combat in the same way that ancient barbarian warriors and medieval knights did:  single combat between heroes.  There is no magical version of the phalanx or the maniple.  There didn’t seem to be the wizard version of the archer or crew served weapon, and there certainly wasn’t any use of the castle as an urban warfare trap.

Now remember, the good guys have spent several years demonstrating that they are stronger because they depend on each other and work together.  But when it finally comes down to the big battle, they dissolve into little one and two man fighting teams.

Remember, these are beings who have the ability to turn ordinary substances into deadly explosives and poisons, are armed almost exclusively with ranged weapons in the form of spells, and with the aid of brooms can fly like birds.  Where was the “You guys on the Quidditch team take these flasks and start dropping them on all of those bad guys.  Don’t get caught up in the vapors from the explosions.”  or “You guys go down to the owlery and lay down a base of fire with the “Mess a Guy Up” curse while we draw them into the halls of the castle so we can ambush them.”?

This also brings me to something that bothered me about an incident in “The Half Blood Prince”.  Harry Potter learns a pretty effective spell, sectumsempra. Basically, it’s a “Cut that guy into little pieces” kind of curse.  He uses it once, then is so shocked by its effectiveness that he gets rid of the book he found it in.  As far as I can see, he never taught it to anyone else, even knowing that a battle was coming and that his friends would need as many tricks in their bag as they could in order to survive.  This mentality seems to run through the entire story.  “Let’s do the minimum necessary to defeat Voldemort, but let’s never do anything we might have regrets about later.”   Again, the attitude of individual combat and personal limits on how to fight peaks through.

And what do the good wizards do once the battle is won?  Voldemort is dead, and so are a lot of his top lieutenants.  But a lot of bad guys are still around, and what are the victors going to do about them?  Also, the Ministry of Magic is probably still controlled by a Voldemort toady, so what was done to reform the government?  Since we know that Harry’s family is alive 19 years later, we can infer that something was done so that he could show his face in public without someone trying to burn it off, but what?  After the last wizard war, they seem to have held Truth and Reconciliation hearings, where sins were forgiven for all but the worst criminals.  After seeing how badly that worked, can we assume that the good wizards then went on a hunt for the bad guys and exacted some justice in a rather sticky and smoky manner?  If you’ve tried just forgiving and forgetting and got another war as soon as the bad guys could find one, isn’t the next logical step to start putting a whole bunch of people against a wall?

What bothers me about all this is the message it conveys to the young readers.  The bad guys in this tale are basically a gang of bullies and thugs.  The good guys are good ladies and gentlemen.  The good guys fight as gentlemen; the bad guys pull out all the stops.  What I teach my kids is that when faced with a bully, you hold nothing back.  Kick, bite, scratch, grab whatever is handy as a weapon, but the final goal is to stop the threat.   The good guys in these stories seem to be willing to only go so far in fighting, but no further, which seems to be the reason they tend to get their heads handed to them until some hero comes along to save the day.

Anyway, I’m putting way too much thought into a children’s book and movie, but things like this tend to get stuck in a loop somewhere in my cranium, and this is the best way to get them out.  Y’all got any thoughts?

SCADA, SCADA, Shedoobie

Borepatch puts up some good points about IT security in general, and SCADA systems in particular, when he discusses the damage done by vandals using the controller for a water pump to disrupt operations at a water plant in Illinois.

I sort of tongue-in-cheek talked about IT security a few months ago with my 4 Rules of IT Security, and Borepatch added a 5th:  Boot it and they will come.

He couldn’t be more right.

Any system, be it a gaming console, a laptop, a smartphone, or the controllers for a nuclear power plant, can be compromised given access and time.  The ideal is to make it hard enough for someone to get in that they can’t do it before you notice and shut them down.  The least you can do is to know they were there so that you know what was damaged or stolen after they’re gone and you notice it.

So what do you do?

If you’re in IT, you bake security into the cake when you’re designing new software, systems, or products.  You balance user requirements against security best practices, with the scales always tipped towards protecting the information and business that your system services.  You patch early, and patch often, and double-check to make sure that your systems aren’t vulnerable to new vectors of attack.  You retrofit security into existing business processes and systems as much as you can, and you always watch your systems for early signs that someone is doing something nefarious.  And for Cthulhu’s sake, if you’re taking care of SCADA systems, start jumping up and down on your vendor’s desk to get them to do something about the abysmal state of their systems.  Do that about 3 minutes after making sure it’s hard as heck to get to your SCADA from the Internet, of course.

At work, if you’re not in IT, pay attention to the excruciatingly boring security briefings and policies that you’re regularly asked to attend and read.*  You think about what you’re using your computer for, and try to not do anything that will compromise it.  You keep yourself educated enough that you recognize someone trying to trick you into giving up the keys to your particular kingdom.

At home, you are probably your own IT guy, so act like it.  Educate yourself about the technology you have in your home the same as you do about the technology under the hood of your car.  Keep your systems patched the same as you would change the oil in your car.*  A quick pro-tip here:  If the company that produced your operating system announces that there won’t be any more patches to your system, replace it.  They’re not announcing that there isn’t anything left to fix, they’re announcing that they’re giving up for financial reasons. Also, use firewalls, both at the point where the Internet comes into your home, and on your systems.  I’m a Unix and Mac guy, and it pains me to say it, but Microsoft has come a long way in the security realm, so if you’re using Windows, use the built in and bolt-on security software to your advantage.

What else can you do?  If you use USB keys, be wary of putting information that can harm you on something so easily stolen or lost.  If you have to keep your financial or personal information on a USB key, then encrypt it.  Stay out of the seedier areas of the Internet, and always be on the look out for Nigerian princes who want to give you money.  Watch your credit cards, bank accounts, and other business dealings so that you know if someone has compromised your information.  Regularly check your credit report to make sure someone hasn’t gotten hold of your identity and opened a bunch of new accounts in your name.

Basically, take care of your information security the same way you would take care of your physical security. Lock your computer the same way you would lock your doors.  Use the most high-powered technology you can handle to protect your information the same way you would carry the most powerful handgun you can handle to protect your body.

*We enjoy writing and presenting them almost as much as you do going through them, trust me.

**If you don’t know much about the engine in your car or change your own oil, you should probably pay to have someone to regularly service your computer the same way you do your car.

Pretty Neat

Scientists in Washington have announced that the use of an online video game has advanced the science behind anti-AIDS drugs.  The game, Foldit, encouraged game players to find the best way to fold proteins in a virus, and scientists have been able to use the solutions to the puzzles to increase their understanding of the structure and work of viruses.

Crowd-sourcing research is nothing new.  The BOINC focuses on bio-medical and mathematical research.  Basically, a problem is broken down into small bits, and PC’s around the world spend their idle time going through the data and sort the wheat from the chaff to allow for more efficient use of dedicated computing resources.

But this is the first time I’ve heard of actual human interaction being used to do something like this.  Imagine the uses.  It could be used to find solutions to problems that are now done primarily by experts in their field.  Need a new human-usable traffic plan for your city?  Create a driving game that gives points for getting from point A to point B quickest without driving on the sidewalk.  Need to find and bomb the living crap out of some countries nuclear weapons program?  Create a video game that gets hundreds of thousands of people to go through every possible way to do it until you find the best way.  Bonus points if you give the players realistic simulations of military and intelligence units to fight with.

Hopefully, this method is used again.  I might give up my personal moratorium on playing video games to contribute.

IT People I Have Known

I’ve been working in IT for about 20 years, starting out as “that guy” in my office to being a somewhat skilled SySad, depending on the phase of the moon.  Over the years, I’ve noticed that there are a few types of organisms that keep popping up in my little IT ecosystem.

  • The Gadget Guy – This strange animal is always carrying around the new hawtness from ThinkGeek, Apple, Google, or Microsoft.  Examples of this species have paid more for gaming rigs, laptops, cell phones, smart phones, and touch pads than I have on cars over the years.  Can be known by their ability to always find a way to be touching and playing with a new toy, which it will use for about six weeks before it pays out full price for the next big thing.  It is also good at bringing any conversation around to either its latest find or the next big thing that it plans to pre-order and then stand in line for at 4 AM.  This animal is also the person who refuses to support legacy hardware and software, instead using company money to chase the new hawtness in OS, hardware, and programming language.  While usually quite talented, it can be frustrating to take over  a project after they have moved onto the next shiny object, because you have to make heads or tails of their RubyC#PERLJavaJavascriptOnRails magnum opus and keep it up and running.
  • The Project Manager – Some specimens of this start out as actual technical people, gaining experience in what it takes to actually do the jobs they are now trying to schedule.  The ones that seem to pop up in my memory are former DreamWeaver jockeys who figured out how to make a gantt chart after the dotcom bust.  Can be known by their ability to use words like ‘leverage’, ‘synergy’, or ‘enterprise’.  Extreme examples don’t really care whether or not the project they’re managing was successful, so long as it failed on time and on budget.
  • The Technology Manager – This funny animal is a remnant of past times.  They fondly remember setting up compute clusters on a Vax, serial hardware dongles that were used as software licenses, and networking using two inch wide copper wire.  They can be known by their inability to ‘get’ virtualization, security, or really anything that was developed after 1985.
  • The Tusker – This is an evolutionary cousin of the Technology Manager, but is actually quite useful. It also remembers VMS, SNA, COBOL, and all of the other things that were developed for the Apollo missions, and in some instances is still taking care of them.  However, it remembers all of the technical details and can sometimes relate the concepts to new technology.  It may not be interested in learning the guts of KVM, but at least it doesn’t dismiss it as new-fangled nonsense.  Well, not much, anyway.  It is called the Tusker because it’s like an old elephant, who is just hanging on long enough to die happy.  Extreme examples of this group are also known as the RBDP:  Retired But Drawing Paycheck.
  • The Haxor – An example of parallel evolution, in that this creature emulates the behavior and values of the Mall Ninja.  The Black Hat fancies itself as a security expert, and takes every opportunity to try to figure out everyone’s passwords, get into their email, and generally be a nuisance to all who it touches.  Unless forced to by a dress code, it wears old, baggy cargo pants or shorts, and a seemingly endless array of Black Hat, SANS, ThinkGeek, and vendor give-away tee shirts.  Hired to help lock down and protect systems and networks, he visualizes his responsibilities as telling war stories from his latest LAN war and trying to penetrate the systems instead of protecting them.  Talk of configuring iptables and Snort bores this animal, as those are defensive in nature, and it only uses its skills in the offense. 
  • The Old Shaman – Normally, a Unix or Mainframe guy, but some older Microsoft people are gaining this title as well.  These creatures have been working on the same technology for many years, and have the scars to show for it.  Each of these scars is catalogued and the place, time, and event that brought it into being can be talked about at length, especially if multiple Old Shamen were involved and are there to talk about them. While their technology may be old, it is still a powerful force in the company, and these Shaman are the wise old men who will be there to bring along the Gadget Guy and the Haxor when they age out of their adolescence.  Extreme examples have scars from VMS, Windows, and Unix, and can knit beautiful solutions using technology from multiple platforms into works of geek art that will not survive their passing from the scene.
  • The Bushy Tailed NeoPhyte – This newcomer to the ecosystem can evolve into any of the above fauna.  It’s kind of the stem cell of our little ecosystem.  If paid well, it can morph into the Gadget Guy.  If given too much time on their hands, they can become the Haxor.  Eventually, they will evolve into some of the older species.  The Neophyte can be known by the fact that their dominant hand is usually filled with a RedBull or some other sweet concoction, they still wear their college clothes to the office, and may still talk passionately about how they want to use their talents in technology to make the world a better place.  Eventually, their soul will be crushed and they can begin their evolution to the higher forms of life in the IT ecosystem.

include <RIP.h>

Today I learned that Dennis Ritchie, another person who created the technology that has greatly influenced my life, has died:

Ritchie is credited with creating the programming language C, one of the most widely used and influential languages today. He was also one of the creators of operating system UNIX, whose variants — most notably Linux and OS X — are also widely used today.

I’ve been using and taking care of Unix systems since 1990, and was using computer programs written in C long before that.  It’s the technology that I use to make my living, and I don’t think that’s going to change for a very long time.  Yes, there are a lot of newer languages and OS’s out there, but almost all of them are either based on something that Ritchie created or borrow concepts from his work.  There’s something comforting and home-like about getting into a command shell on a Unix box, be it Solaris, HPUX, AIX, or Linux.

Rest in peace, Mr. Ritchie.  An entire generation of geeks owes a lot to you.

#include <stdio.h>

int main (void)
{
printf("Hello, world!\n");
return 0;
}

Trouble in Perpetual Motion

An unnamed contributor over at Skippy’s List describes how an industrious dolt is always more dangerous than a lazy genius:

No more than maybe fifteen minutes go by and I hear my team leader screaming again, “what the f*** are you doing?!” There sits a very confused soldier getting his ass handed to him again. Somehow in the last fifteen minutes he had forgotten that the user name and password were labeled on the keyboard in front of his face, and got frustrated that his network log in wasn’t working. To remedy this he decided the issue was that there was no Ethernet cable plugged in so he found one and tried to plug it in, but then he noticed an obstruction in the port so he whipped out his trusty Gerber and removed it. He then commenced to try and log into the network with an unauthorized computer…our Ethernet switch was just down and we had to move offices.

(Edited for language.)

I hope that the soldier in question was put on human waste destruction detail for a while.

Reminds me of my first job in military IT.  I was tasked with crawling under the floors of our facilities to find unauthorized modems and telephone cables.  Seems that someone had been caught connecting a modem and unsecure telephone line to his classified work computer so that he could work on his classified reports at home, so we had to do a phyisical audit of all of our buildings to make sure no-one else had done it.  Nothing like the deep-lung irritation of 30 year old dust under 18 to 24 inch high suspended floors to make that morning PT run a real picnic.  At least the only critters I found were old snake skins.  Big ones.  Like make me jump up through the floor tiles whether there’s a hole there or not big.  Ahhh, memories.

Privacy, or lack thereof

In other news, the privacy war marches on.

In California, Governor Brown vetoed a bill that would have required police to get a warrant before searching someone’s cell phone, including using it to access on-line information such as emails, journals, location data, mobile banking data, and cloud storage.  Let’s say you get arrested for drunk driving.  Fair enough, you did it, you got caught, you get arrested.  No problem so far.  The police search your car, find nothing illegal in it, so they open up your phone, find out everyone you’ve talked to recently, read all of your emails, look at where you’ve taken your cell phone in the last few weeks, and take a look at all of the things you read online or the files you keep on the net.  Those alarm bells you hear is your mind reminding you of how easy it is to break some little portion of some obscure law these days.  Maybe all they’ll do is snicker at your browsing habits on Amazon, or maybe they’ll report to DHS because you have been emailing back and forth in tech speak to your co-worker from Pakistan.  Either way, they’re going to use the portable magic elf box to dig through a lot of the nooks and crannies of your life.

People, even if all you have is the default security software on your phone, use it.  Set your phone to lock when not in use, and use an unlocking code that isn’t easy to guess.  Yeah, it won’t keep a determined guy in a lab out, but it’ll keep the nice officer on the side of the road from reading your text messages.

Next, we have something that really pisses me off.  The Justice Department has forced Google and another on-line service provider to give up the contact information of everyone a person, who may or may not be associated with the WikiLeaks organization, has corresponded with for two years.  The full text of the emails sent was not requested, so the government is apparently doing a bit of network and schedule analysis on the email traffic.  What gets me is that they didn’t have to get a warrant to do this. All they had to do was get a court order that states that the companies have to turn this information over. For a bonus point, they did this without informing the person that they were under surveillance.  So we’ve got a government agency forcing two companies to provide surveillance information on a citizen without a warrant and without informing the citizen that the order has been made.  For me, that’s a non-starter breach of the 4th Amendment.  If the government wants to know who I’m communicating with, then they should have to convince a judge that I’m breaking the law and  have them issue a search warrant, which should be served to me so that I know that the government is poking around in my life.  Getting the exterior information of my communications and using it to figure out who is talking to whom and when is just as intrusive as reading the actual content of the traffic itself.  The law that authorizes this behavior needs to be declared unconstitutional and thrown in the river with a cement block tied to it.

Don’t get me wrong.  If law enforcement feels that someone needs to be checked out as part of a criminal case, then they should have the tools to look for evidence of these crimes.  But the principle of the warrant should be followed at all times.  Prove that there is cause for someone’s privacy to be violated, get a warrant, and follow it.  All other things seem to erode the part of the social contract that says that the government should stay out of our lives unless it is absolutely necessary for them to intrude.

Yes, I know that it is absolutely trivial in a technical sense for anyone to see anything we do on-line.  But there’s a big difference between what is technically feasible, what is legal, and what is ethical.  The government should have big, clear, bold lines that say “Further than this, thou shalt not go” on them when it comes to the privacy of citizens.  Anything that makes those lines fuzzier adds grease to an already slippery slope.

Quote of the Day

I feel a great disturbance in the Force, as if millions of voices suddenly cried out in terror, and were suddenly silenced.
―Obi-Wan (Ben) Kenobi, Star Wars
In Memorium of Steve Jobs, founder of Apple Computers, the company which introduced me to computers.