Not Old Enough to Remember Punch Cards

I guess it makes me feel a little better on my last day of being able to claim being 34 that there are some of my fellow bloggers out there who still remember programming on punch cards.  The first computer I ever used was one of these.  No punch cards, but it did have a BASIC interpreter, and you had to load and save programs through a MODEM like device onto an audio cassette.  Next machine was this one.  We were lucky to have one with an expansion slot and a high resolution color monitor.  But hey, it had a screaming fast 1MHz 6502 in it, and a whopping 64K of RAM.  It was an aircraft carrier compared to the 16MHz of RAM in the TI.  Of course, the TI’s 3MHz TMS9900 was faster than the Apple, but it never felt it.

By the time I hit college, I was using this machine, which I still have up in my attic, and as of a few months ago, still boots MacOS Version 7.5 just fine.  Most obscure system I ever had the pleasure of working with was one made by this company, and I have more than passing familiarity with Unisys’ line of A-Series mainframes, and its MCP/CANDE operating system.  Not many people left to know what a CS Bus is.  A-Series was an interesting beast.  Did most of it’s I/O through dedicated I/O processors.  The machines were basically designed to move large quantities of data, which is why so many large banks and airlines liked them.  Fault tolerance out the wazoo.  The entire machine could be paused, and the state of every flip flop and register in the system shifted out through a JTAG interface, then shifted back in if corrections could be made.  All the while users would be unaware this was happening.  I worked on those systems back in the days when I was a real computer engineer, rather than an IT monkey.

Attacked by Russians!

All it takes is a few foreign policy gaffes and the Russians are attacking Bitter’s hosting site, and from there mounted attacks on the Blog Bash site, and our PA Gun Rights site.  Pretty clearly they have been emboldened by Obama’s overtures, and are attacking on all fronts.

Took an hour or so to track down how they got in, and remove all the offending code.  I can’t stress enough the importance of hardening your WordPress installation in order to frustrate hackers.  Many hosting providers’s default WordPress installations are awful from a security standpoint.

Best advice is to make as little as possible writable, and if possible, make all files owned by root.  There are only a few places WordPress really needs write access to.  Don’t make your themes writable by default.  If you need to change them, remove write access once you’re done.  When I say write access, I really mean it ought to be owned by someone other than the web server account, with the web server account having no write access.  Get rid of any plugins you’re not using, they are trouble.  Keep everything, WordPress, PHP, Apache, and all your plugins up to date.  If you do all those things, you should keep the Russkie hoards at bay.

Losing the Internet Generation

Texas Republicans need to stop this crap:

“While the Internet has generated many positive changes in the way we communicate and do business, its limitless nature offers anonymity that has opened the door to criminals looking to harm innocent children,” U.S. Sen. John Cornyn, a Texas Republican, said at a press conference on Thursday. “Keeping our children safe requires cooperation on the local, state, federal, and family level.”

Joining Cornyn was Texas Rep. Lamar Smith, the senior Republican on the House Judiciary Committee, and Texas Attorney General Greg Abbott, who said such a measure would let “law enforcement stay ahead of the criminals.”

Two bills have been introduced so far–S.436 in the Senate and H.R.1076 in the House. Each of the companion bills is titled “Internet Stopping Adults Facilitating the Exploitation of Today’s Youth Act,” or Internet Safety Act.

Each contains the same language: “A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user.”

Technologically, that’s next to impossible to enforce, since user information is not currently built into any of the technologies.  It would require businesses and providers to add an extra layer of authentication onto their networks.  In other words, this is an IT nightmare of epic proportions, not even mentioning the civil liberties implications.  Republicans have been driving educated voters from their party in hoards, and it’s especially true in the Philadelphia Suburbs, which even a decade ago was considered a Republican stronghold.  Measures like this is part of the reason why.  I believe the Texas delegation ought to seriously rethink the implications of this bill on the party as a whole.

Kiddie Porn is becoming the new drug war.  There’s no civil liberty or aspect of commerce that where federal meddling can’t be justified in order to stamp it out.  Next time Steele comes soliciting for funds, I might have to send a copy of this bill back in the envelope with “no thanks” written on it.

Hat Tip to War on Guns for the link.

What Happened To Techno-Libertarianism?

The more I look around a the tech leaders of today, the more disappointed I am. When I joined the tech field back in the mid 90s, you could not find a more cantankerous, individualist, and anti-authoritarian gathering of minds this side of a militia group.

But today tech leaders are  hosting flashy, celebrity studded, inaugural parties for Obama.  They are being hired by the campaigns of prominent progressive Democrats.  Over the past decade we’ve gone from Geeks with Guns, to Americans for Gun Safety.  Where we once hoisted the Jolly Roger to do battle with the man, now it seems that the man is increasingly us.  The tech field seems to have most decidedly joined the establishment, rather than standing apart from it. This is not the tech I knew.

My own personal anecdotal evidence bears this out as well.  Tech workers, particularly younger ones, are becoming increasingly progressive and pro-establishment, and less libertarian and individualistic.  Is this a natural progression of the industry?  Is it a generational difference?  I think a bit of both.  Perhaps paradigm shifting technological breakthroughs will always be the realm of out-of-the-box thinking non-conformists, which begs the question of which new breakthrough will attract the next generation of individualist malcontents.

One of My Pet Peeves

As an IT manager, one thing that’s always driven me nuts is the fact that the password policy generally regarded by folks in the industry as “best practices” is actually pretty far from it.

Via Instapundit, this article about Sarbanes-Oxley compliant password policies being pushed by auditors is a breath of fresh air.  My preferred policy would be infrequent password changes, combined with regular password cracking to root weak passwords out of the network.  You do have to impose some degree of complexity in the password, otherwise people will pick ridiculously stupid passwords.  But some IT people go to ridiculous lengths, and frequent password changes only compound the problem.  The writing down or saving of passwords on the network is a far greater risk than the risk that someone will crack or guess your passwords.  All this “security theater” about complexity and duration of passwords might make auditors feel good, but it does you no good if everyone is tacking their passwords under their keyboards.  If I feel pretty good that a user has picked a good password he or she remembers, I don’t have a problem letting them keep it for a while.  If you’re an IT manager responsible for network security, you should be trying to crack your users passwords on a regular basis.

Quarter Century of Macintosh

It was 25 years ago today that the Macintosh was introduced as a commercial product.  A quarter century later, I’m still using one to type this post.  It’s interesting in the videos shown in the link above to see much younger versions of Steve Jobs and Bill Gates.  Also interesting that in their Macintosh promotional video, they felt the need to explain how a mouse works.  They were a completely unknown technology to most people at the time.

New Server, Really This Time

So the brown truck of happiness brought my new energy efficient, little server to power the blog from here on out.  We now have a cavernous 2GB of RAM to operate in, and the 1.6GHz Intel Atom processor should handle web serving fine.  We’re running on Ubuntu Linux 8.10 Server. Now I have just have to find something good to send to Glenn Reynolds so we can open this sucker up and see what she can do.

New Blog Server

Glock is provided for scale, though I think it makes it look bigger than it really is. It’s actually quite small, and hardly makes any noise. Not bad for $250 bucks.

Attention NRA: Let’s Understand Something

New Media ≠ Old Radio

Let’s consider the Wikipedia definition:

New media is a term meant to encompass the emergence of digital, computerized, or networked information and communication technologies in the later part of the 20th century.Most technologies described as “new media” are digital, often having characteristics of being manipulable, networkable, dense, compressible, and impartial.

Although, from the sounds of it, since you don’t know what new media is, you probably don’t know what a crowdsourcing project like Wikipedia is.

Let’s establish that “Rush Limbaugh, Sean Hannity and Glenn Beck, among others” are not new media. That’s old media. In the case of some of them, pretty damn old media.

Seriously, NRA, what the hell are you thinking referring to Rush as “new media” multiple times?!? Just because an old media broadcaster favors your position doesn’t make them part of the new media movement. (NRA’s definition apparently includes any conservative voice, especially if it’s on old radio waves.)

I clicked on this article because tonight’s email alert featured a description about how new media would be under constant threat in the Obama Administration. That definitely got my interest because that would lead educated, tech savvy folks to assume that NRA sees serious value in new media and is going to help look out for our interests when they cross paths with the organization’s core mission. Exciting, right?

This appears to be a piece sent out through Publications, not ILA, the division most bloggers (*ahem* new media producers) work with in the organization. It’s such a disappointment because since I’m meeting with NRA staff in January to discuss the second annual new media outreach event, I would have assumed that most of their divisions “got it” or were “hip to the lingo” by now. Apparently, we still have a long way to go if Rush is considered a new media leader for having an old media radio show. Now I just have to hope that none of the new bloggers, podcasters, and other new media producers I have on my outreach list actually bother reading the column from Wayne. If they do, then I’ll try to embarrassingly cover for them and just say it’s apparently one clueless division that doesn’t get it yet. I mean, come on, the guy has had the same talk show since 1988. There’s nothing new about it.

UPDATE: Oh, the sheer irony of it! Guess what they link to in the same email alert? A blog. Specifically, The Volokh Conspiracy. In case you can’t imagine it, I’ll describe my reaction as something like rolled eyes. And a loud sigh.

UPDATE II: There was a misunderstanding that some thought I believed the email to come from Publications, I did not.  I believed the column itself was written by Pubs and then sent out in the usual Grassroots email.  However, I have since had it clarified that Publications had no part in writing the column.  I apologize for the misunderstanding.  Based on what I did know and also the standard practices I’m aware of in the corporate world, this would be the case.  It’s not at NRA.

The premise that some office at NRA has someone who thinks a 102-year-old technology is somehow “new media” is still a very big problem.  It’s something that still needs to be addressed.  I am just happy to report that it turns out we know it’s not Publications.

Careful Apple

Apple is donating 100 grand to a group opposing the anti-gay-marriage initiative, Proposition 8, on the ballot in California this election.  On this particular issue, I happen to agree with Apple, but I would be wary of a company that donates money to causes.  What happens when Apple donates 100 grand to oppose a ballot measure, say, recognizing the right to keep and bear arms in the California Constitution?  I would never buy another Apple product again, to be honest.

Smart corporations stay out of politics for a reason: it alienates people.  Apple should stick to making great products, and stay out of political fights.

I Need One

An alarm clock you have to shoot with a laser gun in order to deactivate.  Seems like it would be good for making sure you’re awake, and also learning to get your sight picture and aim after being suddenly woken up.

Of course, you’re going to want to make sure you’re picking up the laser gun to turn off the Gun O’Clock alarm clock.  Rumor has it other guns will silence the alarm too, but run the risk of substantial collateral damage.