* Posts by ProfessorLarry

28 publicly visible posts • joined 22 May 2011

How do you explain what magnetic fields do to monitors to people wearing bowling shoes?

ProfessorLarry

"It's dead, Jim!"

My wife, who teaches at university, called a few minutes past the hour. "My laptop's dead, won't power on, no brick, and it has the only copy of my notes and PowerPoint. My class is waiting." I knew her well enough to know she had probably already gone through the usual exercises. I thought a few seconds and told her to turn the laptop over, release the two thumb slides on the extended capacity battery, remove it, then reinsert it. "But what the...?" "Just do it." A few seconds later she expressed her thanks profusely and with love.

Those were the days when you could swap laptop batteries on the fly if needed; now you need a toolkit and possibly a soldering iron. I had never had one go all flaky-connection on me, but knew her machine could sometimes get slung around rather casually.

Tech support world record? 8.5 seconds from seeing to fixing

ProfessorLarry

Power Tech

For years I have supplied tech support for my family. My brilliant and tech-savvy wife teaches at university. Calls me as class is about to start. "Help! Laptop dead, totally, I mean dead-dead, Jim." I ask about symptoms, what she's tried, usual diagnostic questions. Thinking cap on. Cap off. "Turn the thing over, remove battery (older Dell with extra cap slide-in), replace battery." "Wow, my hero. It's working now." "Just part of the service, ma'am."

Process of elimination: only thing she hadn't already considered. The battery must have been twisted/jarred loose in her overstuffed backpack.

NASA engineers play space surgeon in bid to unclog Voyager 1's arteries

ProfessorLarry
Pint

Re: Nothing but respect

And among those engineers were software engineers writing tight, reliable, code in very limited memory using then state-of-the-art techniques of modular programming. Their techniques and technical discipline have enabled a long stream of modifications and new code that accommodate to dying hardware and evolving scientific missions. A round of cheers for all!

Voyager 1 starts making sense again after months of babble

ProfessorLarry

Re: Real Time

And hats off to the original software developers. The software for the Voyagers was developed by early adopters of then emerging modular programming techniques for reliability and ease of maintenance and modification. It's paid off with the many successful mission changes since over the extended lives of the Voyagers.

Infosec experts divided over 23andMe's 'victim-blaming' stance on data breach

ProfessorLarry

Re: I just never understand

The genealogical insights are only part of the package. In my case they did not yield much of use, and worse, revealed a vast array of redneck distant cousins I would have no intention of ever having anything to do with. The health info, which is continually expanding is useful, such as, knowing whether or not you are a carrier for certain serious heritable diseases or are prone to selected health issues .

Lapsus$ teen sentenced to indefinite detention in hospital for Nvidia, GTA cyberattacks

ProfessorLarry

Re: "broke into Rockstar Games using an Amazon Firestick, his room's TV, and a phone"

Dang, as a novelist with a string of techno thrillers I am impressed. Nice plot precis. What is your nom de plume? I'll look for the novel on Kindle in a year or so.

Science fiction writers imagine a future in which AI doesn’t abuse copyright – or their generosity

ProfessorLarry

SFWA - Fiction & Fantasy

Not to be a stickler for journalistic accuracy, but as a journalist and longtime member of SFWA, the organization is in fact the Science Fiction & Fantasy Writers Association. One F but two genres.

New information physics theory is evidence 'we're living in a simulation,' says author

ProfessorLarry
Angel

Re: RE: what are we a simulation of?

True, I'm no saint, but I am elsewhere.

Google Street View car careens into creek after 100mph cop chase

ProfessorLarry

Re: Florida driving license

When I was consulting in Moscow back around peristroika (early 90s), I was assigned a driver who consistently sped through red lights. I asked my interpreter about this and he told me the classic Russian joke that this guy was a "Master Driver" who would duly stop when encountering a green light, just in case there was another Master Driver coming on the cross street.

Tesla's Autopilot boasts, safety probed by California AG

ProfessorLarry

Re: EV Version Of Dieselgate?

I owned a 2014 VW Alltrack TDI and was so proud of the mileage I was able to get out of it until I checked the calibration of the odometer and found it was actually reporting nearly 5% over. Indeed, Tesla is playing almost exactly the same game as VW. VW did replace my TDI with a later model TSI after the recall. The mileage is not nearly as good owing to gasoline versus diesel--and the fact that it seems accurate.

Microsoft leaves the Office, rebrands everything as 365

ProfessorLarry

Re: Survey missing option

I still use Office 2010, although I am resigned to someday having to move to the far inferior and quirky 365--if I live that long. When I hear my wife, an academic who shares an office with me, cursing and grumbling over some screw-up as she prepares her class notes and papers and slides, I know that 365 has struck again. Office 2010 under Win 10 just keeps on keeping on.

The many derivatives of the CP/M operating system

ProfessorLarry

Re: Simpler days

Exidy Sorcerer, a name to conjure by. I made h/w mods and hand-coded BIOS enhancements to get mine to do what I wanted. Also had a boat-anchor S-100 system (Cromemco?) with 8" floppies and more s/w & h/w mods to support my own custom music composing s/w that accepted keyboard entered music notation and output wave-table renditions in 4-8 part harmony via a couple of s-100 D-A convertors. (I was working on a commission for an a symphonic piece.) It took mucho machine-language tweaking of the inner loop of the playback s/w to get the Z80 to read and output 4-8 wave tables in realtime. I still have the Exidy in the attic someplace. Fun days. I loved the Z80, which had a much better instruction set than the 8086.

How one techie ended up paying the tab on an Apple Macintosh Plus

ProfessorLarry

I, too, used and liked FP. As a designer, it was a straightforward way to translate visual ideas into web pages. Yes, clunky and ornery and nonstandard, but it worked for what I was working on at the time. Of course, most of us eventually move on from training wheels.

If you fire someone, don't let them hang around a month to finish code

ProfessorLarry

Re: Extra credit

While working in Australia many decades ago, I encountered an outfit that had a paid position called Process Rationalizer whose job was, after the fact, to go in and create all the documentation establishing that the developers had followed procedure--whether or not they had. I once told a QA bigwig about this without naming names, and he went apoplectic, insisting that I expose the perpetrators of such a heinous violation of the true purpose of standards of practice.

First Light says it's hit nuclear fusion breakthrough with no fancy lasers, magnets

ProfessorLarry

Re: Tokamak, or not tokamak, that is the question...

MIT's Commonwealth Fusion Energy SPARC version of a Tokamak (https://cfs.energy/) is far more straightforward, safer, and further along than the First Light gun-and-pellet contraption. By taking advantage of COTS high-temperature superconducting ribbon wire for their magnets and scaling down to achieve higher density, they are way ahead of ITER with it's stadium-size massive and moon-shot expensive boondoggle.

Buying a USB adapter: Pennies. Knowing where to stick it: Priceless

ProfessorLarry

Re: The Old Engineer and the Hammer

How time morphs myths. I first heard a version of this from my father in the 1950s. His was a story about Steinmetz and a huge AC generator with a disturbing wobble. After timing the wobble and working away on a circular slide rule, Steinmetz requested a ladder and a piece of chalk. He climbed the ladder, made an X, and told the client to remove 3 turns of the field coil at that point. Itemized bill submitted after protest: making chalk mark, $1; knowing where to make mark, $999. Nice to see the legacy continues.

Germany advises citizens to uninstall Kaspersky antivirus

ProfessorLarry

Reluctant but Right

I've known Kaspersky since the days when he was still Yevgeny. I'm inclined to trust him and his software but that putz Putin not at all. My SO has been urging me to ditch KTS for years, but I have never had any problems with it and it always behaved itself. To me it was always a technical decision. Not any more. Today I uninstalled it on all my machines and replaced it with Bitdefender. We'll see how that story goes. I've worked in Russia both before and after the fall of the Soviet Union, and I still have friends there. I feel badly that so many innocent, good Russians will pay for the actions of a maniac.

Car radios crashed by station broadcasting images with no file extension

ProfessorLarry

I consulted on interaction design for infotainment systems at a major automotive supplier in the land of bier und wurst. Image processing is an evolutionarily ancient wired-in function of the visual processing system; reading is a late-acquired learned skill. It takes measurably longer to parse, interpret, and make choices among words than among images--enough so that in safety-critical applications it could spell the difference, say, between looking up to see the car running the light in time or not. Of course, it is always best to supply both text and graphic (long ago established by millions of dollars of defense research). Good interaction design practice is to always supply both. (Which is to say certain recent UI trends are taking us in the wrong direction.)

Touch screens for in-vehicle applications are a step backward from real buttons and knobs, but some of that can be mitigated by so-called edge-anchored selection, in which important functions are arrayed adjacent to the edges where the raised bezel provides a physical and tactile anchoring reference. The advantage is small but measurable compared to picking out the right spot to tap in the middle of the screen.

Restoring your privacy costs money, which makes it a marker of class

ProfessorLarry

Re: vaccine response

"If I was immuno-compromised I'd simply stay home."

On full lockdown, probably for years? For the 10.5 million Americans who are immunocompromised?

Burn baby burn, plastic inferno! Infosec researchers turn 3D printers into self-immolating suicide machines

ProfessorLarry

Re: Hardware failsafes?

Autoignition temp of ordinary paper is actually around 480F. But "Fahrenheit 451" is a cooler (ha ha) book title.

HBO slaps takedown demand on 13-year-old girl's painting because it used 'Winter is coming'

ProfessorLarry

Trademarked speech

The idiocy of allowing the trademarking of common, widely used phrases was mapped out and lampooned in my 1995 column "Registered Peopleware," reprinted in _The Peopleware Papers_ (Prentice Hall, 2001). The bulk of the story is constructed almost entirely from trademarked words and phrases, such as "We've thought of everything", "The Best Solution", and "Bad Idea." Pity the poor meteorologist or climate scientist who now can no longer say "winter is coming." [Disclaimer: All trademarks and service marks are the property of their respective owners.]

Airplane HACK PANIC! Hold on, it's surely a STORM in a TEACUP

ProfessorLarry

Real possibilities

"More difficult than you might think" is a far cry from "not possible." The press has been gleefully reporting "experts" and official spokespersons reassuring us that the IFE and critical flight control systems are "separate" systems that are not interconnected. However, in testimony before the US Senate, United president and CEO Jeff Smisek indirectly acknowledged that critical flight systems and passenger Wi-Fi are, in fact, interconnected. "There are clear firewalls between a Wi-Fi system and any kind of control." Firewalls, of course, can be breached, which is what hackers are good at.

Boeing actually deliberately designed passenger cabin and flight systems on the 787 DreamLiner to share network components because it enabled them to save some 900+ kg, meaning there are any number of possible crossover points.

Digital hijacking of a commercial airliner is an unlikely scenario but denial will not make very real and demonstrated vulnerabilities go away. Before Roberts flamboyantly grabbed the spotlight, other security researchers (Teso, Santamarta among them) had demoed techniques to accomplish what he has claimed.

--Prof. Larry Constantine (pen name, Lior Samson, author of Flight track)

Mars needs women, claims NASA pseudo 'naut: They eat less

ProfessorLarry

Small is beautiful

It's all about mass and metabolism. Astronauts on extended missions and Mars colonists should be short people. Put an upper limit of 150-160cm and 50-55kg to qualify and the savings in supplies, fuel, equipment, and construction would be enormous. The savings cascade, because smaller people will need smaller bunks, smaller suits, etc., as well as consuming less calories and oxygen.

Han Solo headed for lengthy stay in bacta tank after Bay Door Control cockup

ProfessorLarry

"Somewhat elderly Ford"? I am sorry, 71 is NOT elderly, not even somewhat. Ford and I are both just kids!

--Larry Constantine (pen name, Lior Samson)

How Britain could have invented the iPhone: And how the Quangocracy cocked it up

ProfessorLarry

Not Invented Here?

History is riddled with tales of inventors who were screwed over or not credited or who just missed out. And very often, history eventually reveals that whatever we may have thought, some widget or technique was actually invented earlier or by someone else. Somebody or some company or some country gets (or takes) the credit, and that's what the history books and the patent offices record. Consider the big Darwin celebrations and the "rediscovery" of Alfred Wallace and how the Royal Society conspired...

Hell, I am co-inventor with a US patent on the technique that Apple used to let users know they were actually ejecting a disc not discarding it in the recycle bin yet never received a shilling or even a thank you. That's just how things work in the real world.

In the frenetic and fractured world of high tech, a majority of good things are no doubt independently "invented" by many people at more or less the same time. Most of them will never be recognized or benefit. And most will not even have a dysfunctional quango to pass the blame onto.

--Prof. Larry Constantine (pen name, Lior Samson)

Prof casts doubt on Stuxnet's accidental 'great escape' theory

ProfessorLarry

I would love to join the conversation

I would enjoy getting into the dialogue, but the moderators seem not to have accepted my post in response to the various comments. I would humbly request the moderators restore/allow my responses.

I do not think being Jewish or not is germane to the discussion; Jews in and out of Israel have many different positions on Middle East politics and are as capable of impartiality (or not) as any other ethnic/religious group.

To Ross K, whether art imitated life or life art is a bit messy in this case. In 2003, I designed a Stuxnet-style attack on U.S. infrastucture as part of my notes for Web Games. It took me 7 years to write the novel, but I finished the manuscript just before Stuxnet was reported in summer of 2010. It took another 5 months for the book to go through editing and revision to make it into print. Bad timing on my part, but again, it hardly relates to expertise or its absence. In any case, I am not trying to tout my expertise, but attempting to argue that there is a reasonable technical basis for questioning Sanger or his sources or both.

I am sorry if some of the technical details are muddled by the format of a live podcast interview. I intend to get a more properly argued and annotated piece published. I did try to clarify some of my intent in the deleted earlier comment. If the moderators do not release it, I will attempt to reconstruct and re-post later.

In any case, my real agenda is to stir up enough discussion that mainstream media begin a closer examination of all of Sanger's claims. I can only comment with any confidence on this one small matter.

--Larry Constantine (pan name, Lior Samson)

ProfessorLarry

Another shilling's worth

I am delighted by the discussion here, since bringing these issues into the open was my immediate agenda. Understand, a podcast interview is not conducive to the most precise semantics or the finest technical details. I want to apologize if I left some unnecessary ambiguities in my ad hoc answers. I turned to that forum (thank you, Steven Cherry) because none of the mainstream media--print or electronic--would touch the story, a curious matter in itself.

As to how wild or widespread the infection was, what I was trying to highlight was that there was never any worldwide indiscriminate spread of Stuxnet by email or Web, as with much malware, but something much more limited based on direct system-to-system connection or sneakernet communication through removable media. As some of the experts here have pointed out, there are some holes (e.g., VPN) that might have allowed Stuxnet to reach beyond the LAN to infect other LANs. In any case, whether 100,000 is a lot of infections or small compared to many other worms, the analysis shows a small number of very tight clusters tied closely to initial points of infection.

I concur that Ralph Langner, a colleague of mine, is probably one of the go-to guys on the PLC side of Stuxnet. And I will underscore, that all my sources are secondary, as I was not directly involved in the forensic analysis.

My main point is that Sanger's narrative is flawed. Whether it is a journalistic failure, sloppy semantics, or disinformation is not for me to say, as I have no access to Sanger or his sources. But the fact that his reporting is being accepted so credulously and that the press is not taking on the story of flaws in his articles and book is troubling.

As to the actual initial infection and route into the facilities at Natanz, my understanding had been that the point of entry was not by directly carrying a doctored USB drive into this highly secure plant, but by infection of adjacent or closely related facilities, with the software then spreading itself as it could until it found the right installation of STEP 7 with precisely the right project files representing the particular frequency-controlled motor configuration. On the other hand, Raviv and Melman, who have sources inside Mossad and the IDF, suggest that the patient-zero USB was carried into the plant by Siemens maintenance engineers under direction of German intelligence (BND) collaborating with HaMossad. I cannot say. What we do know is that in one version of Stuxnet, the first infection (not at Natanz) was within 12 hours of the last compilation timestamp. If accurate, it does suggest that versions might have been hand delivered to specific targets. And it has already been established that Mossad operatives were in Iran at the time.

Perhaps we will someday know the real story, but it is not the one Sanger told, at least on some pivotal details.

--Prof. Larry Constantine (pen name, Lior Samson)

Stuxnet-style SCADA attack kept quiet after US gov tests

ProfessorLarry
Alert

What air gap?

Many in the field have known for years that firewalls are often effectively transparent and airgaps are routinely crossed via many routes. Modern PLCs cannot be fully isolated, because new code must be downloaded by way of PLC programming software the must itself be maintained up-to-date (as I argued over at InformIT and in a new article in Cutter IT Journal).

All the way back in 2003, I designed a Stuxnet-style attack on the U.S. power infrastructure that became the plot driver for the Lior Samson thriller, Web Games (Gesher Press, 2010). I have long argued that bright and determined hackers could pull of a real, devastating attack--no nation-state or clandestine services needed. It's nice to finally be validated, but also a bit unsettling. How long before the attack scenario leaves the field of fiction (as in Web Games) and becomes dangerous reality?