Absence and Upcoming Events

There is a fresh guide in queue, ready for review and then release. It’s related to image dimensions and PHP. Originally, it was to be released yesterday, however it depends on some elements that need styling. It will be out some time this week.

Almost two years have come and passed since I originally created Cran-Berry, and it has grown stale. There are two potential replacements, both have been mocked up. One is more of a grunge theme (similar to the Cran-Berry 2 Mockup 1).  The other is more of a natural progression from the current Cran-Berry. The biggest changes to note are a slight narrowing of the over all page size, a change in the navigation setup, wider article space, taller footer, and some tweaks to make the site more navigable in mobile browsers (on the Motorola Droid). Currently, the plan is to update on April 23rd, the 5 year anniversary of this blog on Weblogs.us.

There is also a new plugin in the works. It is already written, and in initial user testing. Unlike WP Trainer, which has barely seen the light of day, this plugin will be released as public beta in April.

Breadcrumb NavXT will receive an update in either April or May. At the moment, I need people to test out the SVN trunk. It contains a vastly rewritten settings page (doesn’t look different, but the code behind it is). Currently, the bcn_breadcrumb_trail class is more or less the same as in 3.4.1. So there is some work still left to do. Finally, if you are using the WP SVN trunk, you’ll need to use the Breadcrumb NavXT SVN trunk, it contains some minor fixes to reflect changes in the WP API in 3.0.

-John Havlik

[end of transmission, stay tuned]

Notes on Trustworthy Computing

How much is security worth to you? What about freedom? Currently, the Internet is akin to the Western United States in the 1800s. It is mostly a lawless land, unorganized, untaxed, and full of roaming bad guys. The commercial sector is exploiting it more and more. And in turn, is being harassed by the bad guys (crackers). Some foolish individuals, and organizations, wish to expel all of the bad guys from the Internet, and fund it with a tax on all Internet connections. Not only is this an ineffective waste of everyone’s money, it will make things worse.

Microsoft’s Scott Charney wishes to frame the issue of computer viruses in the same manner as their biological counterparts. He boasts, “I actually think that the health care model, particularly related to the World Health Organization and the Center for Disease Control …might be an interesting way to think about the problem.” While the idea itself is not new, the implications tend to draw heated debate. And, after the H1N1 and Avian Flu scares that did not materialize during the last decade, following too closely in the footsteps of the WHO and CDC would be foolish. However, having a procedure for containing and cleaning up virus outbreak is beneficial.

Charney continues, “Why don’t we think about access providers who are doing inspection and quarantine, and cleaning machines prior to access to the Internet?” With the bandwidth shaping technologies out today, a third party real time traffic scanner for malicious activity is possible. However, the first hurdle to this is the issue of privacy. With the real time scanner, the carrier could look at data that was once forbidden. Looking at packet destination won’t work as botnets become more sophisticated and operate in a more peer to peer fashion. Thus, content analysis will become necessary. This will drive both the botnets and legitimate users to encrypt all network traffic. Which is the second issue, real time scanners will become ineffective in the arms race against the bad guys.

Creating a WHO of computer viruses will cost money. Charney suggests a compulsory internet tax for all connected individuals. He even goes as far as suggesting that “…it’s a public safety issue…” Since when has the Internet been vital for public safety? If we, as a global community, are so dependent on the Internet for day to day life, maybe the roll of the Internet needs to be rethought. Twenty years ago, most people had never heard of the Internet. Today, most use the Internet just for logging into Facebook and playing Farmville or some other worthless time sink. Contrary to what Hollywood would have you believe, infrastructure–such as nuclear power plants–does not have vital components exposed to the Internet (e.g. the plot in Live Free or Die Hard could not happen). Why should one, who is responsible and maintains good security practices, pay to clean up the computer of some idiot who still believes that a Nigerian prince is going to give him (or her) a large sum of money. Recent viruses have not been self propagating, and the idea that the actions of one idiot will cause everyone else to get infected is invalid. The last major auto infecting worm was Blaster, and that was back in 2003 (Sasser does not count as a patch was available before it went public).

If a WHO of computer viruses is necessary, maybe it should be funded the same way that the quit smoking organizations are, charging the software vendors. Microsoft, in particular should pay. It is their insecure OS (Windows XP), and their ignorant user base that has caused the problem. They need to educate their users as to why UAC is good, and should not be disabled or ignored. Mr Charney, that is your organization, do not push your burden onto us.

-John Havlik

[end of transmission, stay tuned]

Stupid Phishers

Last night at 10:20PM CST, the droid’s green status light started blinking. It was an email on one’s school email. Titled “An Important Message From The University of Minnesota”, the message claimed that one needed to provide information in order to retain one’s email account after a mail server upgrade. 25 minutes later the message was sent again. The email, in it’s textual entirety is as follows:

Dear Webmail User,

Due to high volume of unused account on our server and the upgrade of The University of Minnesota webmail Service, we hereby request every webmail account holders to submit the below information for our server upgrade purposes.

Name:

Email:

Password:

Department:

failure to submit the above information may lead to automatic closure of your webmail account as we are upgrading our server to serve you best.

We appreciate your continued co-operation.

Well, let’s see here. Let’s start with information the sender already had (if they were legitimate). Anyone that has a University of Minnesota email can find the full name of any UMN email address, so asking for one’s name was not necessary. Second, asking for one’s email address, why? Seriously, emails don’t just randomly appear in inboxes (well truth be told, gmail has delivered mail not addressed to one, in one’s inbox before).

Now onto the information that sender doesn’t need to know (to do their job, assuming they are legitimate). One’s password, which one did they want, the email one? Oh wait, with the way the University does its online authentication, the password would be one’s x500 password. The fact that the University uses a global authentication system means that the password is irrelevant for email servers (or any individual server for that matter). Never mind the fact that you should never, under any circumstances send a password via email (especially to unknown recipients). Finally, the request for one’s department. Well that one makes even less sense. One’s department is completely irrelevant to one’s University email account.

At one point, one was tempted to reply with fake information (possibly containing highly inflammatory language). Looking at the headers, one found that the email was sent through Yahoo’s mail servers (originating from att-entries@att.net), the reply to address was securies.edu@gmail.com (feel free to sign this address up for copious amounts of spam, send fake replies to undermine their Phishing operations, or do both).

If all of that wasn’t enough to place the message into the spam/phisher bin there was the top image, linked from a non UMN website. The phisher also used a footer that official UMN email has not used for at least a semester now.

-John Havlik

[end of transmission, stay tuned]

WordCamp Minneapolis 2010 – It’s On

That’s correct, there will be a WordCamp in Minnesota this year. It will be held on November 13th, at the Egan Community Center. Mark your calendars as this will be an exciting and busy, day-long event for users and developers of all skill levels. Additional information will be made available in the coming months.

Oh, and I will be speaking at this event. More information regarding this, including the topic will be announced this summer.

-John Havlik

[end of transmission, stay tuned]

One’s Boxes: 1997-2010

A good friend, JD, posed about his favorite home built computers since his first in 1997. So, one thought it would be appropriate to share one’s computing history.

Let’s start back, a long, long time ago, in the year 1997. That was the year one received one’s fist computer. It was nothing special, a salvaged embedded computer with a Pentium 100Mhz, with a 1GB 2.5″ drive and 32MiB of ram. When one received it, there was no OS on the hard drive, so one had the pleasure of learning how to install Windows 98 on it. Unfortunately, one does not have any photos of it, and the case has since been recycled (If one still had the case it’d be a nice mini-ITX case).

Fast forward a few years to February of the year 2000. This is when one built the fist and only, all new parts, computer. It had a Pentium 3 866Mhz (Coppermine core, 133Mhz FSB) in a slocket adapter to fit into a Soyo Slot 1 motherboard. It was equipped with 256MiB PC133 SDRAM, a 20GB 7200RPM Western Digital Caviar Hard Drive, a Creative Soundblaster Live, and an ATI Rage Fury Pro. The best thing was it had no problem playing all of the games one had at the time. Some time later, one upgraded the video card to a Nvidia Geforce MX 4000, upgraded the CPU to a P3 1.0Ghz, added a 200GB Western Digital Caviar SE, added a 16X Pioneer DVD burner, and added 512MiB of PC133 SDRAM.

Fast forward to February of 2006, one acquired a second hand Athlon 1.4Ghz (Thunderbird, 266 FSB). Joining it was an ATI Radeon 9600 (completely passive), the Creative Soundblaster Live from one’s previous box, and 512MiB of DDR ram. For storage, it had a 20GiB single platter Fireball drive, and one’s 200GB Western Digital Caviar SE. Eventually, one of the sticks of memory flaked out, and one replaced it with a 512MiB stick of DDR400.

After a few short months, in May of 2006, one upgraded again to a P4 2.0Ghz (Northwood, 400Mhz FSB). This was a brief stint when one did use on board sound, since the Intel motherboard supported 5.1 audio. One equipped it with 1.5GiB of DDR memory (mixed speeds), and a 160GB primary drive. Later, this was upgraded to a P4 3.0Ghz (Northwood, 800Mhz FSB) and the video card was upgraded to a Nvidia Geforce 6600GT.

Now, skip ahead to about a year ago, January 2009. One upgraded to a second hand Celeron 430 (OC’ed to 2.4 Ghz using a “pin” mod), with 4GiB of DDR2 800 memory, a 250 GB Western Digital RE drive, and a Radeon x800XL. This was one’s first system to have a SATA hard drive, and it had Windows 7 Beta installed on it. A month or two later, one upgraded the video card to a Radeon 4830 (and subsequently OC’ed it a little), and installed a Creative X-Fi Titanium. A few months later, the Celeron 430 was replaced with a Core 2 Duo E8500, a Blu-ray player was installed, and Windows 7 RC was installed on the hard drive.

Finally, we’re at the current box. One took the CPU, memory, Blu-ray player, and sound card, installed them in a new case (the very nice Lian Li PC-A05B). Windows 7 Pro (64bit), was installed onto a Intel X-25M (Gen 1), and a 300GB Western Digital Velociraptor was installed for storage. The motherboard was upgraded to a Gigabyte P45 chipset board. In the not so distant future, the PSU and video card are going to be replaced (to a Corsair 650HX and a Radeon 5800 series card), hence no cable management had been done yet.

-John Havlik

[end of transmission, stay tuned]

3 Comments Updated: