December 30th, 2006
Lots of death going around lately:
A friend of a friend's greyhound (dog, not bus),
A Brown (James, not the color) (who very memorably described feeling good),
A Ford (Gerald, not the car) (who will always be remembered for his fancy footwork on staircases, despite his athletic background),
and a dictator (Hussein, not Chaplin (sorry -- it was the best I could think of)) (whose own actions will probably be outshone by being the end to some questionable means in a different country from his own).
Soon the death of free time as work cranks up in the new year, though I have an amusing project lined up which will complete my job's absurdity.
relsqui and I have been busy of late. We spent most of yesterday in Santa Cruz. A small measure of normally well hidden creativity (so well hidden that I can't even find it) splattered itself crudely across a plate yesterday. It bears some similarity to the mug I did last year for relsqui's birthday and post-firing pictures will be forthcoming.
New Years plans include driving down to Santa Cruz again to hang out with gemlikeflame, play games (video, board, and card), to be briefly interrupted by celebratory countdown to and observance of the first civil second of the 2008th year of the common era.
I've done precious little work on Ultimate, but some work is better than no work at all. Device drivers and fears of the future are the primary hold up.
Disgaea, Gran Turismo 4, and Max Payne have been the most common games played on the PS2 for us. I wouldn't say I'm losing interest in GT4, but my enthusiasm has dwindled somewhat. Proper controls and better housekeeping will probably revive it in any event.
In other news, level_head revived his poetry challenge. I ought to do the same.
And now, the important stuff:
In addition, there was an amusing hack attempt on b last evening. As near as I can tell, user names were gleaned from my finger daemon and login attempts on those names were tried. Apparently, it was only looking for empty passwords (and -- strangely -- tried a few standard Windows logins).
Well, those who know my system know there's a nethack account with no password. As one might expect, ssh'ing to nethack on boogeyman brings up a prompt and a nethack session. The custom login for that account fouled up this bot so badly that it closed and reopened the ssh to nethack eight separate times before disappearing again.
The name prompt gathered a number of interesting attempts to get a rootkit on the system. All of which failed miserably and can be expected to have failed miserably had they successfully been placed on the system.
So, my security tip for the week -- run an open account whose shell is `which nethack`. It will bring you no end of amusement. Especially if you play nethack. 8)
hmmmm - you shall have to instruct me on its uses masta!