Avani (avani) wrote,

My current favorite line in Peterson/Davie:

However, poor network design is beyond the scope of this book.

The description of various subversive cluster naming schemes is a close runner up. Next time I'm setting up a cluster, I must remember to name my machines up, down, crashed, rebooting, etc. I miss devnull.

Neither of those compares with the last networks lecture, where in the process of trying to explain masquerading attacks, Prof. B went on a long, involved, and very through explanation of how to set up and exploit a fake ATM. Included were details such as the best spots for them to go undetected (strip malls), how to collect and verify PINs, and how to read a magnetic stripe.

Someone asked him how he knew all this, at which point he deflected the question with the sheer power of cool from his knowledge of the technical specs of Blue Gene. Such neat stuff. I wish he had any interest at all in security.. I'd love to work for this man, but all he wants to do is fine tune his supercomputer and go to conferences :-P.

  • [RLP] Is Science as Important as Football?

    I find this article very insightful. He makes the case that as a culture we expect children to learn by doing in sports (which we understand), and…

  • [Rant] Dirty Words

    Yesterday's Supreme Court decision supporting the FCC ban on ``fleeting expletives'' seems unreal to me. I have trouble believing that 5 mature,…

  • [RLP] Keating 5

    I used to think that McCain was not so bad. Lawrence Lessig explains the Keating 5 ethics scandal:…

  • Post a new comment


    default userpic

    Your IP address will be recorded 

    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.