I worked in ITG, Microsoft’s internal technology group (AKA operations) in the mid-late 90s, as well as Microsoft’s internal security group. ITG owned the internal USENET server; it was run on a machine under someone’s desk (maybe not literally, but it was recycled hardware well behind the current state of the art hardware). It did just fine – until it didn’t. It was falling over under extreme load, which it shouldn’t have. Looking into it, it was clear one user was downloading huge amounts of child porn via USENET. I was one of the few UNIX guys in tools, so it fell to me to add specific logging to see exactly what this guy was up to.
I saw the logs, which consisted of username, timestamp, subject, and file names (since these were UUENCODEd or MPACKed, this was a simple grep-like operation). That’s it. I didn’t see the pictures, videos, or any of that – I saw subjects and filenames.
I was really fucked up by this experience. I don’t know how cops handle this. Maybe I’m a wilting violet and should have just manned up and powered through it, but it disturbed me.
I write this article as a sidecar to a tweet from yesterday where I complained about how graphic people are on MSN Messenger when they don’t think anyone is looking. Nothing I read there was obviously illegal, but it was depraved.
When you see this type of button lock, the default combination is 2&4 at the same time, then 3. This has proved true for “secure” doors in the Federal building as well as every demo gun safe I’ve played with in a store. I bought a gun safe with one of these locks, and following the instructions and being very careful ended up with a lock that had a combination of 2&4, 3. Never buy something with this style of lock.
Take this and make a million: EZ bake rifles. Sell clones of the Remington 700 action made in parts that slap into a jig, heat in the oven, and braze together.
80% lowers without a milling machine.
Apparently spring assist was always legal here, but the law was clarified two years ago. Auto knives are still verboten for proles, though.
Wrote an installer to download and unzip git repos from the internet. Someone else baked it into another installer, claiming that it was in there; running it seemed to produce no network traffic, but the files showed up. Suspecting they had merely downloaded the files and baked them into the installer (defeating the whole purpose of the exercise), I fired up WireShark and saw no traffic – they said I was Doing It Wrong. Fine, cleared all of my caches, unplugged the network cable, ran installer. Files showed up. They’re now “looking into it”.
In WireShark I trust.
Coworker was talking about his neighbors complaining that when his dad moved out, he didn’t sell to someone within his minority. I said if it bugged them that much, they should have bought his unit. “That’s what my dad said!”
Now I’m reminding coworkers older than me of their parents. I should think young thoughts.