Skip to main content

Posts

No Documentation

I got a kick out of this. Check out more coder/admin comics here .

The Ancient Gaming Noob Discusses Kickstarter

I am a huge fan and regular reader of the blog "The Ancient Gaming Noob" . I've been a gamer since I could use a keyboard, alternating between the qBasic games on my Xerox laptop with double 5 1/2 floppies  (remember Gorillas? I rewrote the script and made the Gorillas different colors! ) to the Apple II's at school (Oregon Trail and Prince of Persia ftw!) Different Colors Recently, The Ancient Gaming Noob has been discussing Richard Garriot's Kickstarter campaign . The discussion is really getting interesting. You have Garriot, a man who lives in a castle and has been to outer space, using a fund raising tool ostensibly designed for those that, well, need money. Garriot's campaign, which as of this writing has nearly completed his goal of raising US$1 million to help fund a new game, may be more of a self-financing marketing tactic than anything. This begs a few questions - does this sort of tactic devalue Kickstarter? What is the ultimate use of Kickst

Electricity

Mehdi Sadaghdar has some very funny (and very smart) videos on his Youtube channel where he performs and explains a variety of electrical tests and principles. Check it out!

Samba 4 and Linux Domain Controllers

Samba 4 is nothing short of amazing. Until recently I was familiar with earlier versions and had done nothing more than mounted cross-OS volumes (to create simple white-label NFS storage devices, for example). Version 4 has hacked some major portions of the Windows kernel functionality and re-worked them in Python.  For example, did you know that a Linux server can be an Active Directory Domain Controller? Install samba-tool and run the following command (assuming your domain already exists):  # samba-tool join MY.DOMAIN DC -Uadministrator@my.domain --realm=MY.DOMAIN Use the 'samdump' operator for Kerberos data to standard output:  # samba-tool samdump In no way would I recommend this for outside of a testing / development environment - there are some key differences between samba 4 AD and real AD (one issue documented so far is that samba 4 uses some NT 4 notions that Windows simply emulates in recent versions, for example  primary and secondary domain controller r

Weekly Links 3/4/13

Fast Company - The Vatican has selected EMC to source roughly 2.8 Petabytes of storage for a project to digitize the Vatican library, home to over 1 million books. Business Week - Skype service in China is actively monitored for certain key phrases that are offensive to the state. When a user inputs these phrases, the conversation is forwarded to Chinese intelligence. Skype is currently owned by Microsoft, and in China is partnered with TOM Online to provide service in the region (like India, China requires foreign entities to be minority stake holders with a domestic corporation in order to do business). Microsoft has not responded to requests to clarify the surveillance features in Skype beyond saying that they adhere to Chinese law when operating there. No word yet on whether American users are monitored as well (at this point, I would be more shocked if they were not) - the Chinese program bears striking similarity to the NSA program that became public shortly after 9/11, at l

Cyber Security Concerns Go Viral This Week

NPR Security Week Mashable LA Times CBS Washington Post Atlantic Council Reason Magazine This week the CIA released its still-classified National Intelligence Estimate (NIE) regarding the threat of cyber warfare to US economic, infrastructure and military assets at home and abroad. China is singled out as the source of an enormous and non-stop sequence of industrial espionage - compromising systems and stealing valuable trade secrets.    Heads of large corporate security interests, while representing a variety of unique approaches, all seem to at least agree that federal regulation should play a larger role in online life. User's real identities should remain authenticated, core infrastructure easily available for lawful intercept, etc. Others argue that corporate attack victims should begin systematically seeking retribution when systems are compromised, terming the approach "active defense" centered often around pro-actively collecting information crucial to

Sending Invoices for "DNS Services" Without Providing DNS Services - A Marketing Strategy?

I have received more than one report that a company that refers to itself as "DNS Services" has been sending out invalid invoices. In each instance, someone receives a physical letter referring to the recipient's website and 'Managed DNS Backup Services' that are being provided and that need to be paid for. To grant legitimacy, the letter directly refers to a pair of name servers - ns3.dnssvc.com and ns4.dnssvc.com. The trouble is, those servers are not name servers, and have not been name servers during the month-long period that I reviewed them (late December 2012 - now). The servers do not respond successfully to any requests on port 53. At the time of this writing, they still do not respond to port 53. Its one thing to make a mistake on an invoice, however I have received two complaints, both with the exact same letter specifying the same DNS information that is incorrect. Both complainants say they have never heard of this company before. DNS Service'