Schneier on Security
A blog covering security and security technology.
« Another Interview with Me |
| Good Uses for RFID Chips »
February 29, 2008
Friday Squid Blogging: Giant Snow Squid
Pictures from the 2008 Dartmouth Winter Carnival.
Posted on February 29, 2008 at 4:09 PM
• 8 Comments
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
Looks more like an octopus attacking a submarine.
Fraudulent Squid Blogging! ;P
Artistic license renders unnecessary realistic anatomic details of genus or species. The artist(s) could even have formed tentacles from ivy, being in the Ivy League, although that would have reduced the white effect—speaking of which, Dartmouth's American Lit. department (they do have one, don't they?) could have petitioned for a cameo appearance by Moby Dick.
I had read an article a while back about Bruce using a honey pot to track down a person who had hacked his company's site or was DOSing the company for some reason and politely asked him to stop rather than turn him in to the cops.
Ive searched for a few hours and cant locate this article, if anyone can point me in the right direction it would be greatly appreciated. Thank you.
I like the cats better, I doubt this squid will do any cable-cutting.
I go to these sites and want to participate, but the always ask for an email ~ if you take it you get taken. The number of domains doing matches the kids-lying percentages. Cats don't lie, they have scant cognative presence.
Maybe cats should design our email system.
Am i missing something, I dont understand what is so significant about Squids...
If some site asks for a mail address that you don't feel like giving out because you don't intend to participate that much, just use mailinator.com. You can make up the mail address on the fly and it works whenever you need it. it is completely insecure, so make sure you lie in all the other fields they might ask you for as well.
Thanks, Mike - about 30% of my initial probes get defeated for lack of that information: I understand how to use that type of tool. Here is an example [fasten rockerback latches, bury the dead and close all phone converstations b4 reading]
Case Supervisor: ( on phone to Clarice ) "Click the display button for
Clarice: "It says hit any key."
Supervisor: "What's going on ?"
Clarice: Where's the "any" key ?
DH: The posts in this area contain the requested details a few backlinks away. There is an improbable time-clustering of undersea international data-cable failures, which when taken with other current events suggests a rich area of research. My cat eats cables, but I keep it for rodent control.
Schneier.com is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc.