Florida wildlife and my run-in with Humphrey

A few weeks ago, Robert LaFollette, our creative director, was shooting wildlife at Honeymoon Island (a beautiful local nature park).  He was trying to get close to an owl and almost stepped on a very large rattlesnake.  He ran like hell and didn’t (probably fortunately) have the presence of mind to take some pictures.  (Robert is an extraordinarily talented photographer who has had his wildlife photos published — I highly recommend looking at his blog here).

Well, I got a Canon Rebel XTi for Christmas and have been getting involved in wildlife photography with one of my sons. And so we went out last weekend to Honeymoon Island to take some shots.  Unfortunately, it was a very windy day, so I wasn’t able to get many pictures of the birds.  We got a few pictures of some ospreys and many up-close shots of an armadillo (since animals aren’t hunted on the island, they have no fear of humans and you can get quite close). 

IMG_2145

A bit disappointed (but still thoroughly enjoying the beauty of the place), we were walking back on the trial when I heard my son say “Daddy!!!”.  I looked down to see this huge rattlesnake.  This thing was a giant, and I was just walking right by him.  I backed away, started shooting and then my son and I watched in awe as he slowly meandered across the trial.

IMG_2194

IMG_2199

IMG_2218

IMG_2226

Robert and I have named this big old rattler Humphrey.  He’s also our informal mascot for our new VIPRE technology. Next week, I’ll blog some pictures of Hudson, another predatory animal…but that’s for next time.

Alex Eckelberry

Sunbelt Weekly TechTips #40

Should we tear down the Internet and start all over?
The global network that we now know as the Internet was not, contrary to popular belief, carefully designed by Al Gore. Instead, it “just grew that way” out of the military and university sponsored ARPA (Advanced Research Projects Agency) project. It was based on protocols that were designed with no real concern for security and that never anticipated the huge volume of traffic, nor the types of traffic (such as streaming audio and video) that go over the ‘net today.

Now some university researchers are saying that we should scrap the whole thing and start over. I don’t know about that. Sure, we might end up with something much better in the end, but the interim phase might be awfully painful (think about the disruption caused by major road reconstruction projects). Read more about the idea here.

Support a cause or charity as you chat
Microsoft has a new initiative whereby they will share part of the Windows Live Messenger advertising revenue with various organizations such as the Red Cross or Sierra Club each time a user starts an IM conversations using WLM. You get to choose the organization you want to support, by joining the program here.

Buying online without a credit card
Want to take advantage of low online prices but don’t have a credit card or don’t feel comfortable sending your credit card info over the ‘Net? You’re in luck; it seems more and more online retailers are now accepting “nontraditional” payment methods such as PayPal and Google Checkout. Read more here.

Vistareliablit7127371231777Vista Reliability Monitor
Another new feature in Vista is the Reliability Monitor, which has been added to the Performance tool that you may be familiar with from Windows XP. When you try to open the Reliability and Performance Monitor from the Administrative Tools menu, you’ll be prompted for elevation of privileges. Then in the console, click Reliability Monitor in the left pane and you’ll see the System Stability Chart and System Stability Report in the right pane. Here you can see a history of hardware and application failures, software installations and uninstalls and other reliability-related information. This makes it easy to see if, for example, the installation of a program or driver corresponds with the time you started to experience application failures. You can see a screenshot of the reliability monitor here.

How to get and use more Vista gadgets
The sidebar is one of the cool new features in Vista, but you aren’t limited to just the sidebar gadgets that come with the OS. You can find all sorts of new ones here. Note that you can install the same gadget more than once; for instance, I have a simple digital clock gadget that’s installed in five instances, one for each of several time zones I want to keep up with.

Have more gadgets than will fit on the sidebar and don’t like having to use the arrow buttons to move to the second sidebar “page?” Did you know you can detach gadgets from the sidebar and place them on your desktop? Line them up on the other side of the screen or on a second monitor to create a “second sidebar.” You can take a look at my sidebar gadgets on my April 15 blog post.

How to keep your frequently used programs secret in XP
Don’t want others who use your computer to know what programs you use most frequently, or just want to keep a specific program from being displayed in the Most Frequently Used Programs list? Do this for each program:

  1. Start the registry editor.
  2. Navigate to the following key: HKEY_CLASSES_ROOTApplications and find the program that you want to hide
  3. Create an empty string value named NoStartPage
  4. Close the registry editor and restart the computer.

Don’t fall for the “Microsoft Lottery” scam
This one has been making the rounds for a while now, but some folks are still getting taken in. The email message purports to be from Microsoft, announcing that you’ve won a big lottery prize. If it sounds too good to be true, it usually is. This is just a variation on the old Nigerian scam. Read more here.

Hack: Move the My Documents folder in Windows XP
This is a hack that should only be used if, for some reason, you can’t move the My Documents folder to another location (normally, you right-click on My Documents, choose Properties, then Move). This method involves editing the Registry, so be sure to back it up before you begin just to be safe. My Documents is a “shell folder” which Windows treats as a special type of folder. Here’s how:

  1. In the Registry Editor, navigate to: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerUser Shell Folders
  2. Double click MyDocuments in the right pane.
  3. In the Value Data field, type the new location path and click OK.

This moves the folder but not its contents. You’ll have to move the current contents manually (drag and drop or cut and paste in Explorer). If you aren’t comfortable editing the Registry, you can install TweakUI for XP and use it to move the folder. You can download it from the Download list in the right hand column here. You can also read more about moving shell folders here.

Again, this method is recommended only if all other options fail.

Vista won’t start after you install XP in a dual boot configuration
I’ve heard from several people recently who bought new computers with Vista preinstalled, but they want to install XP. However, they don’t want to wipe out Vista; they want to be able to dual boot between the two. Unfortunately, installing XP after Vista can cause Vista to be unbootable. KB article 919529 explains why and provides the solution.

How to delay loading of specific services in XP
Sometimes, especially with older computers, you might need to delay loading of some Windows services in order for the computer to boot properly. You can control how services are loaded by editing the Registry. For instructions on how to do it, see KB article 193888.

Can’t access XP computer on the network?
Are you having trouble accessing an XP computer on your home or office network? A friend of mine recently installed Vista but couldn’t get his Vista machine to access resources on his XP machine. Turns out this is a registry configuration issue that can be easily fixed by a simple registry edit. Thanks to Jeff for the tip. For instructions, see KB article 913628.

Until next week,

Deb Shinder

Are the Open Sourcerers Selling You a Bill of Goods?

Here goes Deb again on one of her rants… and here comes the comment storm 😉 Personally, I’m a pretty big fan of open source and believe that it’s got a place — maybe not on my Mom’s computer, but certainly in many other areas. Anyway, read on and comment away… — Alex

It’s “common knowledge” in some circles that open source software is “better” – but is it true? Does software really want to be free? Is software created by committee really more secure? Do those who push open source (or at least some of them) have something besides software to sell?

I hear it all the time: open source is supposedly more inherently secure than proprietary commercial software, because it’s “peer reviewed.” That’s the magic that the open sourcerers invoke, but they’ve never really explained to my satisfaction how opening up the kernel to any and everybody can make a program more secure. I can see how it could make for more features, but I can’t see how it makes for more security.

The ironic thing is that many of those same people who tell me that open source software is more secure are also warning us that we can’t rely on information we find in Wikipedia. Why? Because it’s open to any and everyone to post articles. It follows the same “peer review” model as open source software. So why is being open a bad thing in one case and a good thing in the other?

I have nothing against open source software. I just don’t buy into the “it’s better because it’s open source” propaganda. I use some open source programs, and although they generally don’t work as well and aren’t as user friendly as commercial programs, the price is right. My dad always told me that, in general, you get what you pay for, so I don’t expect as much of something I’m not paying for.

But open source doesn’t always mean it’s free, either. Let’s take a look at Linux, for example. Depending on the distribution, prices run the gamut from free download to hundreds of dollars. Open source server software can be quite expensive. Even when the software doesn’t cost anything upfront, there may be hidden costs involved in using it. Because the free versions don’t provide any technical support, there are plenty of people making money supporting open source products. And if your time is worth money (mine certainly is), time spent compiling a kernel or writing your own drivers is going to cost you.

Of course, some people would prefer to spend $500 in extra time than $200 out of their pockets, and that’s their choice. But you have to admit it’s a bit insidious, sort of like the way people who never see all that money coming out of their weekly paychecks seem to think the government is giving them some sort of gift when they get their tax refunds. But as the website for the GNU project (which developed licenses for open source software) says, “Free software is a matter of liberty, not price.”

Now, if you’re a programmer type who wants to be able to rewrite the program code for your own purposes, open source is a great choice for you. But the vast majority of regular computer users just want software that works and don’t want or need access to the source code. I had a friend who ranted and raved about Microsoft operating systems for years. Finally, about a year ago, he decided he’d had enough and he was going to run Linux from now on. Within six months, he was back to XP. Why? “I never realized how easy Windows really is to use until I tried Linux.”

In fact, I have a lot of friends who complain incessantly about how bad Windows is and talk about what a great idea open source is, but who are still using Windows. If you ask them why, they tell you it’s because “Microsoft has a monopoly.” Huh? There are dozens of distributions of Linux available. Some of them are free. There’s nothing stopping those folks from wiping Windows right off their hard disks and running open source. So why don’t they?

Another thing my dad always told me was that actions speak louder than words. I respect the open source advocate who actually uses open source software. I don’t put much credence in the complaints of the Windows bashers who keep on using Windows.

And if you really believe in “freedom” when it comes to software, how about letting those of us who prefer to use Windows do so without condemning us for that choice? It doesn’t matter to me what software anyone else uses. So why are the open sourcerers always trying so hard to convert me?

Does software really want to be free? I guess some of it does and some of it doesn’t. It’s just as silly to expect every software company or developer to give their products away as it is to expect Sears to give away refrigerators and furniture. Sure, you can go to Craig’s List and find all sorts of appliances and such that are free for the asking. And if that’s the way you choose to outfit your house, that’s fine with me. But don’t look down on me if I choose to pay for my new dishwasher, okay?

At least if my store-bought dishwasher doesn’t get my dishes clean or my paid- for programs don’t work the way they’re supposed to, I feel justified in complaining about it, and maybe I’ll even get something done about it. If I find myself stuck with a hunk of junk that some stranger gave away or my free download hoses my system, what am I going to do? Ask for my money back?

How about you? Do you buy the idea that being “open” makes software more secure, or automatically makes it “better” or somehow morally superior to closed source software? Have you tried open source operating systems? Did you come back to Windows or do you still use Windows for some of your computers? If so, why? Do you get tired of being looked down on because you haven’t gone “pure open source?” If you use both open source and proprietary software, what do you like and dislike about each?

Deb Shinder

New blog on event log management

Ages ago (Sunbelt was founded in 1993, so we’re a rather ancient company by today’s standards), we had our feet firmly in the Windows NT system management space — and did quite a bit of business in event log management. Then we made the move into security software and the rest is history. 

But we still keep an eye on the market and have many friends in the business.  One of those companies is Dorian Software and Andy Milford over there has started a new blog just on event log management.  You can see it at http://eventlogs.blogspot.com/.  If you’re into event log management or analysis, it’s worth putting the site into your RSS feed.

Alex Eckelberry

ADFSL conference

I’ll be speaking at the ADFSL 2007 Conference on Digital Forensics, Security and Law this Friday. The conference is being held on April 18-20, 2007 in Arlington, Virginia USA just outside Washington, D.C. My discussion will center on “context” in digital forensics, vis-a-vis malware and other external factors that can often by exculpatory in a forensic examination. If you’re at the conference, feel free to come on over to say hello.

Alex Eckelberry

Google buys DoubleClick. And is now the most powerful behavioral marketer on the planet.

The acquisition of DoubleClick by Google is not surprising from a business standpoint — they now have a big footprint in the third party ad network space. And I think it makes sense.

But wow. It boggles the mind as to how much consumer data that Google now has available to it.

Think about it. Information on searches, email usage, download habits, video viewing and all the rest, with the information from DoubleClick’s massive datastream of information from cookies and sites.

Gulp.

Alex Eckelberry

Omerta still dealing with fake Omerta malware

A few weeks back, I blogged about fake Omerta “software” that was actually some pretty nasty malware. The folks at Omerta are still dealing with this fake stuff.

If you play Omerta, only deal with the official Omerta software from the Omerta site — not these fake versions which use the Barafranca name.

Current rogue Omerta sites (these sites all serve malware):

www(dot)barafranca(dot)lx(dot)ro
barafranca(dot)iwarp(dot)com

(There may be others.)

Omerta1239888888888
Omerta1239888888888a

Alex Eckelberry

Insuring data breaches

Tech//404, a new venture by insurance company Darwin, sells insurance for losses due to technology and security failures. And they now publish a “Data Loss Archive”, a sort of repository of horrible acts of corporate data theft (it has potential, but should it only has a number of recent events and really should have an RSS feed).

They also have a “Data Loss Calculator”, a rather grim calculator that lays out the cost of data breaches — but it has zippy sounds (insurance company folks are such wild and crazy people.)

Corpdatlos12312388888
Datalkwe123123

Of course, the human costs of data breaches — ruined credit, stolen identify, etc. — are far harder to calculate.

Alex Eckelberry
(Hat tip to Bespacific)

Spam with malware links

Something we’ve seen lately are a number of attempts to use spam as an infection vector for spyware using social engineering tricks. However, unlike past attempts with things like “a postcard greeting is attached”, these spams feature striking images and a link to a website that has malware on it.

Recently, we saw the fake IE 7 download, which attempted to get users to download an “IE 7” which, in fact, was malware. Then we saw the Britney Spears spam, which had a link to a malware installer using the ANI exploit. Click the picture. Life becomes unpleasant. The sort of thing.

Fakeie123123123123_small[1]
Britney12387777123

Today, we’re seeing the “Hot pictures of paris hilton nude” spam, which also gets you to a site which attempts to use a number of now-patched exploits to install malware on a system (and the picture itself isn’t even of Paris Hilton, it’s Jenna Jameson). It’s the same gang that did the Britney spam.

Parishilton2188384747

Alex Eckelberry
(Thanks Francesco and the rest of the team)

Sunbelt Weekly TechTips #39

Vistabook1299888841Read any good (Vista) books lately?
Now that many of you have upgraded to Vista, or bought new computers that come with it pre-installed, you may be looking for a good book to help you navigate all the changes in the interface and new features. I recently read Windows Vista Inside Out from Microsoft Press, written by Ed Bott, Carl Siechert and Craig Stinson, and found it to be a comprehensive manual (over 1000 pages) that will help you master the basics without making an avocation of hunting through the Help files. You can get it from Amazon at a great price here.

Decreased performance on multiple processor computers running XP SP2
If you’re running Windows XP with Service Pack 2 on a multi-processor system that supports processor power management features, you may find that performance is slow or that you encounter other unexpected behavior. If this happens, you need the update that can be downloaded from the link in KB article 896256.

Change Analysis Diagnostic Tool for XP
If you want to track changes made to certain parts of the operating system, you can download the Change Analysis Diagnostic Tool, which scans the computer and displays recent changes to software programs, hotfixes and downloads from Windows Update, Browser Helper Objects, drivers, ActiveX controls and changes to loaded applications and startup objects. More information and a download link are available in KB article 924732.

Deepfish aims to make mobile web browsing better
If you’ve tried to visit traditional web sites with Pocket Internet Explorer and other web browsers made for smart phones and Pocket PCs, you know it can be a less-than-pleasant experience. But that may change soon. It’s still in early beta testing, but Microsoft’s Deepfish technology is expected to making browsing the web on your mobile phone or handheld computer a lot more like surfing on your desktop computer. You can read more about it and view a demo here.

Bring your computer to work, give up your privacy?
The 10th Circuit Court of Appeals ruled last week that if you bring a personally owned computer to work and connect it to the network, you give up your expectation of privacy for the data stored on that computer. The case came about as the result of a warrantless search of a personally owned computer in the workplace that was found to contain child pornography. A key point was that the owner of the computer didn’t use a password to prevent others from accessing it. The password functions much like placing a “no trespassing” sign on your property – it demonstrates your intention that the land or computer be private. Read more about the case here.

Easytran2349988Transferring files and settings from another computer to Vista
If you upgrade your current computer from XP to Vista, it will keep all your data where it belongs and most applications should work. But if you buy a new machine, or wipe the hard drive and start over with Vista, you can use the Easy Transfer Wizard to port your data and configuration settings to the new machine. Just run the Vista installation DVD on the XP system and select Transfer Files and Settings From Another Computer. Or if you don’t have the installation disc, you can run the wizard on the new computer and copy the program files to a USB drive or burn them to CD or DVD to run on the XP machine.

This feature will migrate files and folders, email and contacts, user preferences (such as wallpaper, taskbar options, accessibility options, network printers), Internet settings and Favorites and application settings for Microsoft programs and a large number of third party products. For more info on how to use the Easy Transfer Wizard, click here.

How to save keystrokes in IE
Typing URLs into the address bar of the web browser can get tedious, but you don’t always have to type that entire address. You probably already know that IE automatically adds “http://” when you begin a URL with “www” but did you know that it will add “http://www” to the beginning and “.com” to the end of whatever you’ve typed if you then press CTRL+ENTER? So, to go to my web site at www.debshinder.com, you only have to type “debshinder” and then hit CTRL+ENTER, saving a number of keystrokes (Note that this also works in Firefox 2.0.0.3).

How to completely clean out the Temp folder in Vista
If you use the Disk Cleanup utility in Vista to clean out your Temp folder, you may be unknowingly leaving hundreds of files there, because it only lists the files that are more than a week old. If you want to adopt a “no temp file left behind” policy, you have to empty the folder manually. Here’s how:

  1. Click Start and in the Search box, type %temp%
  2. This will open the Temp folder, which is located by default in the UsersAppDataLocal path on the drive where Vista is installed.
  3. Manually highlight all files by pressing CTRL+A.
  4. Press Delete or right click and select Delete from the context menu.

User question: Can’t hide inactive icons anymore in XP
Suddenly I can’t hide the inactive icons on the system tray anymore. The check box to hide them is checked, and it worked just a few days ago, but suddenly it doesn’t work. I’m using XP. It’s not a major problem but it’s annoying. Can you help?

ANSWER: Try this: Right click the taskbar and select Properties Customize. If you see that all the items there are set to “Hide when inactive,” set one of them to “Always hide.” If the system tray then starts working normally, you can reset the item back to “Hide when inactive” and it should continue to hide and display normally. This has worked for a number of other users. If this doesn’t work, you might try restoring the system to a system restore point made prior to the occurrence of the problem.

Troubleshooting Vista upgrade error messages
Microsoft has created a collection of links to KB articles that pertain to various error messages you may encounter when upgrading to Vista. See the list in KB article 930743.

Until next week,

Deb Shinder

Social Networking and Chatting your Life Away

Social Networking is one of the most popular online pastimes these days, especially among the young. Sites such as MySpace, Facebook and Friendster have become world famous as virtual “places” where people with similar interests can find one another and “hang out.”

One of the first social networks on the web was Classmates.com, which has been around since the mid-1990s. Millions of people have signed up as free members, listing the schools they attended throughout their lives and browsing the lists of other members to find their former classmates. There’s a catch, though: if you want to be able to send email to another member or post on the message boards, you have to buy a “premium” membership, which costs from $2.46 to $5.00 per month, depending on the duration of your commitment. That doesn’t mean the site is useless if you don’t pay. For example, it carries announcements of upcoming class reunions. And the site has expanded to include not just your previous schools, but also former workplaces and military assignments.

There are other social networks for people of a particular ethnic background, music fans, car enthusiasts, pet owners, sports fans, those in certain professions, and so forth. Many social networks are aimed at people looking for romantic relationships. They all have one thing in common: the point of all social networks is, well, socializing.

A common goal of social networkers is to collect online friends, that is, to be linked to as many other users as they can. In that respect, it’s not unlike the typical real-world high school. In many social networks, people can use whatever names they want and profile information isn’t verified, so some participants create false identities and pretend to be something they aren’t. In that respect, I guess it’s not unlike the typical singles bar scene.

Because many social networking sites are targeted at or attract children or teenagers, there’s been a lot of concern over the last few years about privacy protections. In addition to sexual predators, identity thieves roam the social networking world, looking for victims. Some of the social networks have rules designed to protect personal information; for instance, only registered users may be able to see your profile. In some cases, such as Classmates.com, email is sent through a “double blind” system whereby if you want to send a message to another member, you send it through the system and it’s forwarded to that member, so you never know the member’s email address.

Illegal and dangerous activities aside, some parents, educators and psychologists have concerns about the amount of time young people spend on social networking sites. Of course, spending too much time socializing on the Internet was possible, and popular, long before social networking sites proliferated.

And thanks to technological developments, it’s getting easier and easier to spend excessive time at virtual socializing, both online and off. Whereas “first generation” Internet users had email as their primary means of electronic communication, today’s users prefer “real time” communication such as instant messaging and other means of live chat, including text messaging via cell phone. Sure, we had the old Internet Relay Chat (IRC) back in the olden days, but it took at least a little technical savvy to get it going, and with Internet connection time costing up to $25 an hour (that’s what I paid for my first CompuServ account), only the idle rich could afford to chat the night away every night. Today for not much more than that same $25, you can get a whole month of unlimited access, and at speeds that allow you to do things like stream audio and video.

Thus, today we’re not limited to sitting and typing messages back and forth to one another. We can do high quality video conferencing with multiple participants, using inexpensive software and hardware.

While some lament the fact that people today are becoming more isolated, going out less frequently and spending more time at home (often online) in the wake of 9/11, others point out that we’re socializing more than ever; we’re just doing it in a different way. The number of people with whom the typical teen has a conversation over the course of a week is probably much greater than that of a teenager twenty years ago, as long as you count electronic conversations as well as face-to-face ones. Advocates of computerized chatting would also point out that it’s safer than venturing out to meet people in the real world and exposing your physical being to strangers.

No wonder chatting has become so popular. And now, if you don’t have time to chat, your online acquaintances need never know. MyCyberTwin (www.mycybertwin.com) is new techonology that allows you to create a virtual persona that will do it for you. You teach the “twin” to respond to questions and participate in conversations as you would. Made by an Australian company, the cybertwin web site was launched earlier this month and allows you to create a “24/7 online presence.”

The application is known as a “chatbot,” but this implementation is more sophisticated than previous incarnations in that it allows you to train the bot to emulate you. And you can go back and read the conversations that your twin had in your absence. Of course, if it becomes popular, we may have bots chatting with bots – they won’t even need us human anymore at all.

Are these activities mostly a waste of time, or a valuable new way to establish interpersonal relationships?

Are teens who spend a lot of their free time chatting online demonstrating anti-social behavior, or are they just engaging in a different form of socialization? Do you prefer online chat to face to face interaction, or know someone who does?

Would you use a chatbot or “cyber twin” to stand in for you when you don’t feel like chatting?

Would you feel silly if you discovered that you’ve been having deep, personal conversations with a bot?

Deb Shinder

Protectwin (dot) com hijacks user desktops

Sunbelt researchers have today identified protectwin(dot)com as purveying some pretty nasty spyware: Braveysentry (a rogue antispyware application) as well as a zlob fake codec.

Protectwin12998834214

Protectwinn12q49988

Alex Eckelberry
(Credit to Sunbelt researcher Patrick Jordan)

Correction: The site installs Braveysentry (a rogue antispyware application) that uses a trojan installer that generates the fake alerts, hijack’s user desktops, and installs the rogue antispyware application. This same trojan (winstall.exe 2005 -2006, now xpupdate.exe 2007) is also used via a fake codec page to appear as a zlob fake codec but is really the same winstall/xpudate trojan installer.

Ani exploit fixed. Germany gets a tax-free holiday.

Elfo2006

It turns out that by fixing the ani exploit, Microsoft inadvertently broke more than just the few applications we know of. It also broke ElsterFormular, which according to AV expert Andreas Marx:

“…has to be used by ALL companies, if they want to declare their VAT tax, their license tax as well as their income/wage tax if they are not using the service of a tax advisor. Companies need to declare their taxes either monthly or every quarter, depending on the money they need to pay.

For monthly payments (this means, for March 2007), the taxes need to be declared by April 10, 2007 and if you need to declare it quarterly, the taxes for Q1/2007 needs to be declared by April 10, 2007, too. If you don’t declare your taxes in a timely manner, you can get fined, of course.”

Well, of course, a patch is available now but Andreas is concerned that this fix won’t be known by loyal Germans anxious to pay their taxes, because the German version of Microsoft’s advisory doesn’t mention ElsterFormular, only the English-language version does (something which I’m sure Microsoft will fix very soon).

But for those non-advisory-reading Germans, since the hotfix is planned for a rollout next Tuesday, Germans may not find the tool working until Wednesday — hence meaning that they may miss the tax filing deadline of April 10th.

This little eddy lends significant credibility to Microsoft’s arguments as to why they have to go through such an exhaustive process to get patches out, since so many things can break. Regardless, I’m still very pleased that Microsoft broke their patch cycle to fix this exploit, which was not a trivial one.

I just hope Fritz comes out ok.

Alex Eckelberry

Ok, Bambi’s gone, but can someone help Fritz?

Bambi Francisco has resigned from MarketWatch because of her involvement in vator.tv, a sort of youtube for businesses (entrepreneurs upload videos pitching their business, looking for help, etc).

Fritz1239888Ok, that’s all well and good, but can someone please help Fritz, the earnest Tyrolean toy maker adverting on vator.tv for help marketing his wooden toys in America? These toys are really nice!

And Bambi, good luck — sometimes these things happen for the best.

Alex Eckelberry
(More tittering about Bambi at ValleyWag)

Another CounterSpy Enterprise 2.0 preview webcast thingie

I actually missed doing the webcast earlier this week because of the flu. Greg Kras did the whole thing by himself (nice job, Greg!).

However, I’ll will be doing a webcast with Greg next Tuesday. Feel free to join in for the fun. From our marketing department:

Webcast: Preview Of CounterSpy Enterprise V2.0

Alex Eckelberry and Greg Kras will be giving a preview CounterSpy Enterprise 2.0 next Tuesday. If you want to take a look, please join us:

A Preview of CounterSpy Enterprise 2.0
When: Tuesday, April 10, 2007 2:00 PM (EDT)
To join the day of the event please visit:

https://www.livemeeting.com/cc/sunbelt/join?id=92SSQC&role=attend&pw=XR*mw9Z

Meeting ID: 92SSQC
Attendee Meeting Key: XR*mw9Z
Audio: 1-620-782-8200
(Toll-free) 1-888-468-4618
Participant code: 104764

Alex Eckelberry

Massive regulatory tome describes acceptable Robot activity

If you’re a fan of robots, you’ll get a kick out of this article — the Japanese government has drafted massive guidelines as to the safe operation of robots.

Man v machine

Asimov’s three laws:

— A robot may not injure a human being or, through inaction, allow a human being to come to harm

— A robot must obey orders given it by human beings except where such orders would conflict with the First Law

— A robot must protect its own existence as long as such protection does not conflict with the First or Second Law

A selection from the Japanese Ministry of Economy, Trade and Industry guidelines:

— Via a structure of general regulation and the adoption of that regulation, the planning, manufacturing, administration, repair, sales and use of robots shall observe the need for safety at every stage

— The reasonably predictable misuse of robots shall be defined as the management, sale and use of next-generation robots for purposes not intended by manufacturers

— There should, in principle, be no serious accidents such as fatal accidents involving robots, and the frequency of such accidents should be lowered as far as possible. Affordable multiple security measures should be taken in case one protection method alone is insufficient

Link here.

Alex Eckelberry
(Thanks to Frank)