• 0 Posts
  • 61 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle

  • My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.

    Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.



  • Back in the 90’s before the days of Windows 3.0 I had to debug a memory manager written by a brilliant but somewhat odd guy. Among other thing I stumbled across:

    • A temporary variable called “handy” because it was useful in a number of situations.
    • Another one called son_of_handy, used in conjunction with handy.
    • Blocks of memory were referred to as cookies.
    • Cookies had a flag called shit_cookie_corrupt that would get set if the block of memory was suspected of being corrupt.
    • Each time a cookie was found to be corrupt then the function OhShit() was called.
    • If too many cookies were corrupt then the function OhShitOhShitOhShit() was called, which would terminate everything.


  • Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.

    With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.







  • Exactly. Tor was originally created so that people in repressive countries could access otherwise blocked content in a way it couldn’t be easily traced back to them.

    It wasn’t designed to protect the illegal activities of people in first world countries that have teams of computer forensics experts at dozens of law enforcement agencies that have demonstrated experience in tracking down users of services like Tor, bitcoin, etc.








  • Worked in a small Unix team under a broader IT department at a university. The manager of our team was awesome in part because his attitude was “I deal with all the university politics so you can focus on your work”. Anybody who has worked at a large university knows what the politics can be like.

    The VP of IT retired and the replacement was hired from an IT department at another university. The new VP’s overall policy was “We will do things this way because that’s how we did it at my old university”. Within about 6 weeks we had a round of “layoffs” that targeted our manager and one other manager that was also known to push back against the university politics. They were the only two people let go out of a department of roughly 100.

    Within about a year of that happening every last member of our tight knit Unix team left for greener pastures.