General

Fiberloops

Lust: Fiberloops.com allows you to search geographically for fiber (local, long-haul, lit, and dark), wireless towers, and carrier hotels.

I want an OC192 straight into my car.

Pearl Harbor

Since I bought Pearl Harbor on DVD yesterday, I thought I’d share with you my impressions of the movie:

“Love story.. love story.. love story.. love story..*yawn* love story.. *yaaawn* love story.. lo–OOH BLOWIN STUFF UP YEA! YEA! BLAMMO! YEA! BOOOM! BLOWIN STU–… ‘Intermission’? What? Insert Disc Two?! What?! … Screw this. I’m going to bed.”

Anthrax

The Eudora mail client has a nice little feature called “Moodwatch” that is intended to determine if an email might be offensive to a recipient. I don’t think Eudora ever considered someone might be sending Anthrax lyrics, as you can see here.

Grr

Grr. My three-day weekend ended with a grumpy ‘Add me to your Do Not Call List’, as I got a courtesy wakeup call from the nice folks at Edge Teleservices. Edge is the third telemarketing company ‘representing’ DirecTV that I’ve requested not to call my home in as many weeks. If I ever had any desire to purchase DirecTV service, be guaranteed that I don’t now.

I wonder if this is the home telephone number and street address of Art Calhoun, the Edge Teleservices manager? I hope not. It seems to me that someone whose primary occupation is the invasion of the privacy of others would strive for quite a bit of their own privacy.

PDD

More IPsec stuff: @stake Research Labs, formerly L0pht Heavy Industries, has recently released pdd. From the webpage:

pdd is “the first tool of its kind for forensic analysis of Palm OS platform devices. [It] is a Windows-based tool for Palm OS memory imagingand forensic acquisition. The Palm OS Console Mode is used to acquire memory card information and to create a bit- for-bit image of the selected memory region.

Thwarting the Wily Hacker

A windows server that a customer handles got exploited and used as an FTP repository for a few hours last week. While driving to Pennsylvania for Thanksgiving, I walked him through applying an access control list (ACL) to his router’s ethernet port to stop the abusive traffic. He’s become much more interested in how ACLs work, so today when the topic was mentioned on NANOG‘s mailing list, I forwarded this long list of network security links to him. Like most lists of links, some are more useful than others. =]