The First Amendment is not just for artists

So this young NPR intern named Emily White wrote a breathtakingly clueless defense of her choice to steal music rather than to pay for it, her ridiculous argument boiling down to it being more “convenient” to steal than to purchase. She apparently doesn’t see how her actions hurt the very artists she claims to admire.

Over at the Trichordist blog, musician David Lowery wrote a rebuttal to White. Lowery is the force behind the bands Cracker and Camper Van Beethoven. I’m a big fan. I own a number of Cracker CDs and even got Lowery’s autograph after Cracker swung by Raleigh for a show a few years ago. Some of my money wound up in Lowery’s pocket and I’m happy with that. He earned it.
Continue reading

The Art of Deception

The recent LinkedIn password crisis got me looking for good book on hacking. Sadly, Kevin Mitnick’s book The Art of Deception is not that book. On the foreward page of the book, one reader scrawled a message that said:

WARNING! THIS BOOK COULD HAVE BEEN A MAGAZINE ARTICLE, FOR ALL ITS SUBSTANCE!

I got through about ten pages before I concluded that the previous reader was right. Mitnick’s a terrible writer, with many of his sentences tend to ramble and lack focus. It reads as if he was told by his editor to fill x pages and so he put little thought into what he is trying to say.

What’s more, much of what he says doesn’t rise beyond simple common sense. It’s not entirely Mitnick’s fault, as network security became far more sophisticated while he was serving time for his crimes. While he might have been a big fish when he was arrested in Raleigh in the early 90s, his hacking methods don’t compare to those used today. For instance, Mitnick recommends against writing down passwords, even though most security experts now agree that this policy encourages people to use simple, easy-to-remember passwords that can be easily cracked. Even if Mitnick was up on the latest techniques, though, it’s likely he can’t reveal these techniques due to terms of his parole.

What we’re left with is a book that is actually pretty boring. I’m a guy who enjoys learning about network security but even I can’t bear to finish this book.

Computer Security Session 1: Passwords, Overview

In light of LinkedIn’s password disaster, I found this advice on choosing passwords to be very helpful:

Passwords are like housekeys for computer services. They are intended to be secrets that allow you to access resources, but deny access to others.

Here are some questions to ask yourself about passwords:

What are the passwords protecting?

If one password is breached how many other computer services become vulnerable?

Who else knows your passwords? How much do you trust them?

What services have your passwords? How much do you trust them?

How many passwords do you have to manage?

How do you manage your computer passwords?

via Computer Security Session 1: Passwords, Overview « KW FreeSkool.