Fiberloops
Lust: Fiberloops.com allows you to search geographically for fiber (local, long-haul, lit, and dark), wireless towers, and carrier hotels.
I want an OC192 straight into my car.
Lust: Fiberloops.com allows you to search geographically for fiber (local, long-haul, lit, and dark), wireless towers, and carrier hotels.
I want an OC192 straight into my car.
Since I bought Pearl Harbor on DVD yesterday, I thought I’d share with you my impressions of the movie:
“Love story.. love story.. love story.. love story..*yawn* love story.. *yaaawn* love story.. lo–OOH BLOWIN STUFF UP YEA! YEA! BLAMMO! YEA! BOOOM! BLOWIN STU–… ‘Intermission’? What? Insert Disc Two?! What?! … Screw this. I’m going to bed.”
The Eudora mail client has a nice little feature called “Moodwatch” that is intended to determine if an email might be offensive to a recipient. I don’t think Eudora ever considered someone might be sending Anthrax lyrics, as you can see here.
Remember folks: “Popular hacker software includes “Comet Cursor”, “Bonzi Buddy” and “Flash”.”
To see a dorky little easter egg for PHP 4.0, append the following line to the URL of any page that parses PHP: ?=PHPE9568F36-D428-11d2-A769-00AA001ACF42.
Grr. My three-day weekend ended with a grumpy ‘Add me to your Do Not Call List’, as I got a courtesy wakeup call from the nice folks at Edge Teleservices. Edge is the third telemarketing company ‘representing’ DirecTV that I’ve requested not to call my home in as many weeks. If I ever had any desire to purchase DirecTV service, be guaranteed that I don’t now.
I wonder if this is the home telephone number and street address of Art Calhoun, the Edge Teleservices manager? I hope not. It seems to me that someone whose primary occupation is the invasion of the privacy of others would strive for quite a bit of their own privacy.
Monkeys + Poo = At least several minutes of entertainment.
More IPsec stuff: @stake Research Labs, formerly L0pht Heavy Industries, has recently released pdd. From the webpage:
pdd is “the first tool of its kind for forensic analysis of Palm OS platform devices. [It] is a Windows-based tool for Palm OS memory imagingand forensic acquisition. The Palm OS Console Mode is used to acquire memory card information and to create a bit- for-bit image of the selected memory region.“
A windows server that a customer handles got exploited and used as an FTP repository for a few hours last week. While driving to Pennsylvania for Thanksgiving, I walked him through applying an access control list (ACL) to his router’s ethernet port to stop the abusive traffic. He’s become much more interested in how ACLs work, so today when the topic was mentioned on NANOG‘s mailing list, I forwarded this long list of network security links to him. Like most lists of links, some are more useful than others. =]