Avani (avani) wrote,

My current favorite line in Peterson/Davie:

However, poor network design is beyond the scope of this book.

The description of various subversive cluster naming schemes is a close runner up. Next time I'm setting up a cluster, I must remember to name my machines up, down, crashed, rebooting, etc. I miss devnull.

Neither of those compares with the last networks lecture, where in the process of trying to explain masquerading attacks, Prof. B went on a long, involved, and very through explanation of how to set up and exploit a fake ATM. Included were details such as the best spots for them to go undetected (strip malls), how to collect and verify PINs, and how to read a magnetic stripe.

Someone asked him how he knew all this, at which point he deflected the question with the sheer power of cool from his knowledge of the technical specs of Blue Gene. Such neat stuff. I wish he had any interest at all in security.. I'd love to work for this man, but all he wants to do is fine tune his supercomputer and go to conferences :-P.

  • [Rant] Dirty Words

    Yesterday's Supreme Court decision supporting the FCC ban on ``fleeting expletives'' seems unreal to me. I have trouble believing that 5 mature,…

  • [RLP] "You're a helluva long way from the pituitary, man!"

    My adviser sent this to our group, and I wanted to share it with enough of you that it seemed easier to post it here. Adapted from the Caltech…

  • File Vault

    If any of you are using OS X's File Vault right now, my semi-professional recommendation has changed to "use it only if necessary" to "turn it off…

  • Post a new comment


    default userpic

    Your IP address will be recorded 

    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.