Edward III & the 6 worthy men of Calais

"Continuing to Calais, Edward [III] began a lengthy siege. … Calais Surrendered in August, 1347. Edward was particularly lenient in not killing the garrison and population for resisting him. Six of the towns Burgesses were ordered to appear before him with ropes around their necks and the town’s keys, and to submit to his will, Philippa persuaded him not to execute them." [The Medieval Combat Society; also see Edward III. of Windsor – The Story of the Siege of Calais for a longer version]

Edward III & the 6 worthy men of Calais Read More »

The pinata syndrome

From “Celebrities face the ‘piñata syndrome’” in The L. A. Times:

As a result, every story has an abbreviated life span, accelerating the demand for more news. Ultimately, this adds up to exaggerated expectations of celebrities. If they can’t maintain their public persona, they’re devoured for our entertainment instead.

“I call it the piñata syndrome,” says publicist Howard Bragman, founder of the Hollywood PR firm Bragman Nyman Cafarelli. “It’s really about the media. They’re only lifting you up so that they can take sticks and beat you and see what comes out.”

The pinata syndrome Read More »

Great band names, part 24

So Jans & I are talking at the Broadway Oyster Bar last night, and all of a sudden Jans says, “Have you ever noticed how many diseases and other medical terms would make great band names? Like The Multiple Lacerations. Or The Compound Fractures.”

“You’re right!” I replied. “How about The Bleeding Ulcers? And The GI Tracts!”

Got any other ideas?

Great band names, part 24 Read More »

Secret movies in the Paris underground

From Jon Henley’s “In a secret Paris cavern, the real underground cinema” (The Guardian: 8 September 2004):

Police in Paris have discovered a fully equipped cinema-cum-restaurant in a large and previously uncharted cavern underneath the capital’s chic 16th arrondissement. Officers admit they are at a loss to know who built or used one of Paris’s most intriguing recent discoveries. "We have no idea whatsoever," a police spokesman said. …

Members of the force’s sports squad, responsible – among other tasks – for policing the 170 miles of tunnels, caves, galleries and catacombs that underlie large parts of Paris, stumbled on the complex while on a training exercise beneath the Palais de Chaillot, across the Seine from the Eiffel Tower.

After entering the network through a drain next to the Trocadero, the officers came across a tarpaulin marked: Building site, No access.

Behind that, a tunnel held a desk and a closed-circuit TV camera set to automatically record images of anyone passing. The mechanism also triggered a tape of dogs barking, "clearly designed to frighten people off," the spokesman said.

Further along, the tunnel opened into a vast 400 sq metre cave some 18m underground, "like an underground amphitheatre, with terraces cut into the rock and chairs".

There the police found a full-sized cinema screen, projection equipment, and tapes of a wide variety of films, including 1950s film noir classics and more recent thrillers. None of the films were banned or even offensive, the spokesman said.

A smaller cave next door had been turned into an informal restaurant and bar. "There were bottles of whisky and other spirits behind a bar, tables and chairs, a pressure-cooker for making couscous," the spokesman said.

"The whole thing ran off a professionally installed electricity system and there were at least three phone lines down there."

Three days later, when the police returned accompanied by experts from the French electricity board to see where the power was coming from, the phone and electricity lines had been cut and a note was lying in the middle of the floor: "Do not," it said, "try to find us." …

There exist, however, several secretive bands of so-called cataphiles, who gain access to the tunnels mainly after dark, through drains and ventilation shafts, and hold what in the popular imagination have become drunken orgies but are, by all accounts, innocent underground picnics.

… the Perforating Mexicans, last night told French radio the subterranean cinema was its work.

Film noir in the Parisian catacombs. Secret bars and telephones. Scuttling down drains for secret assignations. "Do not try to find us." I’m swooning just thinking about it!

Secret movies in the Paris underground Read More »

How many variables can we track?

"New research shows why it doesn’t take much for a new problem or an unfamiliar task to tax our thinking. According to University of Queensland cognitive science researchers …, the number of individual variables we can mentally handle while trying to solve a problem (like baking a lemon meringue pie) is relatively small: Four variables are difficult; five are nearly impossible. …

It’s difficult to measure the limits of processing capacity because most people automatically use problem solving skills to break down large complex problems into small, manageable ‘chunks.’ A baker, for example, will treat “cream butter, sugar and egg together” as a single chunk — a single step in the process — rather than thinking of each ingredient separately. …

The researchers found that, as the problems got more complex, participants performed less well and were less confident. They were significantly less able to accurately solve the problems involving four-way interactions than the ones involving three-way interactions, and they were (not surprisingly) less confident of their solutions. And five-way interactions? Forget it. Their performance was no better than chance.

After the four- and five-way interactions, participants said things like, ‘I kept losing information,’ and ‘I just lost track.’" [How much can your mind keep track of?]

How many variables can we track? Read More »

Why are we bad at estimating risk?

Bruce Schneier: "Why are people so lousy at estimating, evaluating and accepting risk? That’s a complicated question, and I spend most of Chapter 2 of Beyond Fear trying to answer it. Evaluating risk is one of the most basic functions of a brain and something hard-wired into every species possessing one. Our own notions of risk are based on experience, but also on emotion and intuition. The problem is that the risk analysis ability that has served our species so well over the millennia is being overtaxed by modern society. Modern science and technology create things that cannot be explained to the average person; hence, the average person cannot evaluate the risks associated with them. Modern mass communication perturbs the natural experiential process, magnifying spectacular but rare risks and minimizing common but uninteresting risks. This kind of thing isn’t new—government agencies like the FDA were established precisely because the average person cannot intelligently evaluate the risks of food additives and drugs—but it does have profound effects on people’s security decisions. They make bad ones." [The Evolution of a Cryptographer]

Why are we bad at estimating risk? Read More »

Do you like sentences?

Annie Dillard on writing:

A well-known writer got collared by a university student who asked, “Do you think I could be a writer?”

“Well,” the writer said, “I don’t know. . . . Do you like sentences?”

The writer could see the student’s amazement. Sentences? Do I like sentences? I am 20 years old and do I like sentences? If he had liked sentences, of course, he could begin, like a joyful painter I knew. I asked him how he came to be a painter. He said, “I liked the smell of the paint.”

Do you like sentences? Read More »

A walkway of the dead

I was walking around on Wash U’s campus a while back – I don’t remember where, exactly – when I looked down and noticed that I was walking over bricks that had been “donated” by folks who had given money to WU. This is standard practice a lot of places: donate $$$, get a brick with a message on it written by you.

As I walked, I was struck by the idea that many of the bricks were dedicated to people who had died. Further, one day all of the people listed on those bricks would be dead. Although it was a macabre thought, I realized that this was a walkway of the dead.

A walkway of the dead Read More »

My first book – Don’t Click on the Blue E! – is out!

For all those surfers who have slowly grown disenchanted with Microsoft’s Internet Explorer web browser, Don’t Click on the Blue E! from O’Reilly is here to help. It offers non-technical users a convenient roadmap for switching to a better web browser – Firefox.

The only book that covers the switch to Firefox, Don’t Click on the Blue E! is a must for anyone who wants to browse faster, more securely, and more efficiently. It takes readers through the process step-by-step, so it’s easy to understand. Schools, non-profits, businesses, and individuals can all benefit from this how-to guide.

Firefox includes most of the features that browser users are familiar with, along with several new features other browsers don’t have, such as a bookmarks toolbar and window tabs that allow users to quickly switch among several web sites. There is also the likelihood of better security with Firefox.

All indications say that Firefox is more than just a passing fad. With USA Today and Forbes Magazine hailing it as superior to Internet Explorer, Firefox is clearly the web browser of the future. In fact, as it stands today, already 22% of the market currently employs Firefox for their browsing purposes.

Don’t Click on the Blue E! has been written exclusively for this growing audience. With its straightforward approach, it helps people harness this emerging technology so they can enjoy a superior – and safer – browsing experience.

Read two sample excerpts: Counteracting Web Annoyances (651 kb PDF) & Safety and Security (252 kb PDF).

Translated into Japanese!

Buy Don’t Click on the Blue E! from Amazon!

My first book – Don’t Click on the Blue E! – is out! Read More »

SSL in depth

I host Web sites, but we’ve only recently [2004] had to start implementing SSL, the Secure Sockets Layer, which turns http into https. I’ve been on the lookout for a good overview of SSL that explains why it is implemented as it is, and I think I’ve finally found one: Chris Shiflett: HTTP Developer’s Handbook: 18. Secure Sockets Layer is a chapter from Shiflett’s book posted on his web site, and boy it is good.

SSL has dramatically changed the way people use the Web, and it provides a very good solution to many of the Web’s shortcomings, most importantly:

  • Data integrity – SSL can help ensure that data (HTTP messages) cannot be changed while in transit.
  • Data confidentiality – SSL provides strong cryptographic techniques used to encrypt HTTP messages.
  • Identification – SSL can offer reasonable assurance as to the identity of a Web server. It can also be used to validate the identity of a client, but this is less common.

Shiflett is a clear technical writer, and if this chapter is any indication, the rest of his book may be worth buying.

SSL in depth Read More »

Crack Windows passwords in seconds

This is an oldie but still a goodie – or a baddie, if you use or depend on Windows. Back in 2003, researchers released tools that enable the cracking of Windows passwords in an average of 13.6 seconds. Not bad, not bad at all. CNET has a nice writeup titled Cracking Windows passwords in seconds, which explains that the best way to guard against the attack is to create passwords that use more than just alphanumeric items. In other words, read my SecurityFocus column from May 2004, Pass the Chocolate, which contains this advice: “… you should use a mix of at least three of these four things: small letters, capital letters, numbers, and symbols. If you can use all four, great, but at least use three of them.”

If you want to download and test the security of your Windows passwords, you can grab the software at Ophcrack. You can get source, as well as binaries for Windows and Linux. There’s even an online demo of the software, in which you can paste a hash of the password you’d like to crack and get back the actual password. Nice!

Crack Windows passwords in seconds Read More »

Mozilla fixes a bug … fast

One of the arguments anti-open sourcers often try to advance is that open source has just as many security holes as closed source software. On top of that one, the anti-OSS folks then go on to say that once open source software is as widely used as their closed source equivalents, they’ll suffer just as many attacks. Now, I’ve argued before that this is a wrong-headed attitude, at least as far as email viruses are concerned, and I think the fact that Apache is the most-widely used Web server in the world, yet sees only a fraction of the constant stream of security disasters that IIS does, pretty much belies the argument.

Now a blogger named sacarny has created a timeline detailing a vulnerability that was found in Mozilla and the time it took to fix it. It starts on July 7, at 13:46 GMT, and ends on July 8, at 21:57 GMT – in other words, it took a little over 24 hours for the Mozilla developers to fix a serious hole. And best of all, the whole process was open and documented. Sure, open source has bugs – all software does – but it tends to get fixed. Fast.

Mozilla fixes a bug … fast Read More »

BSD vs. Linux

As a Linux user, I don’t have a lot of daily experience using BSD. Oh sure, I use it on a couple of servers that I rent, but I certainly have never used it on the desktop. And while I certainly understand the concepts, history, and ideas behind Linux very well (although there’s always more to learn), I don’t really know that much about BSD. So it was a delight to read BSD vs. Linux.

“It’s been my impression that the BSD communit{y,ies}, in general, understand Linux far better than the Linux communit{y,ies} understand BSD. I have a few theories on why that is, but that’s not really relevant. I think a lot of Linux people get turned off BSD because they don’t really understand how and why it’s put together. Thus, this rant; as a BSD person, I want to try to explain how BSD works in a way that Linux people can absorb.”

In particular, I thought the contrast between the non-unified nature of Linux and the unified nature of BSD was pretty darn fascinating. As the author points out, this is not to criticize Linux – it’s just the way it is. It’s not a value judgment. Here’s the author on BSD:

“By contrast, BSD has always had a centralized development model. There’s always been an entity that’s “in charge” of the system. BSD doesn’t use GNU ls or GNU libc, it uses BSD’s ls and BSD’s libc, which are direct descendents of the ls and libc that where in the CSRG-distributed BSD releases. They’ve never been developed or packaged independently. You can’t go ‘download BSD libc’ somewhere, because in the BSD world, libc by itself is meaningless. ls by itself is meaningless. The kernel by itself is meaningless. The system as a whole is one piece, not a bunch of little pieces.”

11 pages of really interesting, well-explained analysis. If you’re a Linux user, go read it. You’ll learn about the other great open source OS.

BSD vs. Linux Read More »