Entries from August 2005 ↓

Sydney. NIN.

I returned from Sydney on Saturday evening, and although I was going to do my own take on the experience, my travelling companion has done a marvelous job of recounting the adventure.

I will however point to some photos I took while there, over here.

Using the sun to create fuel cells

Using the sun to create fuel cells

One quote that will disrupt the proponents of wind farms:

Nocera cites a calculation by Caltech chemist Nathan Lewis that power demands in 2050 will be so great that just to keep carbon dioxide emissions at twice preindustrial levels, a nuclear plant would have to be built every two days. There’s not enough room on the planet’s surface for other widely touted solutions such as wind and biomass to have much impact.

Pedantic man

While trying to find out the NZ Telco plans for the internet infrastructure here, I stumbled across this. Being pedantic and frustrated at being unable to have a worthwhile say in the next election I wrote the following letter:

Dear Sir/Madam,

The following paragraph:
“The existence of software with known vulnerabilities running on machines connected to the Internet is exploited by individuals (“hackers”) who for whatever reason like to compromise computer security. Sometimes hackers just look at systems they have penetrated, other times they cause damage by changing or deleting files. Hacking into web servers to deface web sites is quite common, and has been done to many organisations including the CIA. Web site defacements are currently running at about 20 per day across the whole Internet [http://attrition.org/mirror/attrition/stats.html], with an increasing trend. Having a high public profile, particularly one concerned with security, increases the attempts made to deface a site. All organisations with web sites need to remain vigilant about the security of their machines and monitor them for any evidence of break-ins.”

…misuses the term hacker. Hackers do not cause damage to a system and rarely intrude systems that don’t belong to them. The term you mean is “cracker”. Also, these crackers do not compromise computer security – it is the errors in the software that compromise security, crackers just exploit the errors.

From WordNet2.0:

n. a programmer for whom computing is its own reward; may enjoy the challenge of breaking into other computers but does no harm; “true hackers subscribe to a code of ethics and look down upon crackers”

Sorry to be pedantic but the proliferation of the term “hacker” when “cracker” is largely due to the media and I feel a government report should use the correct terms.

Their response was:

Hi Joel,

Thank you for your comment. While we can see the validity of the point you have raised, the paper in question is five years old and it is not the policy of the New Zealand government to retroactively edit its documents. We will have to let the error stand.


Ah well, it was nice they responded to me. I expected to be ignored!

Information wants to be free

Such a classic hacker quote, but I only just found out its source:

Stewart Brand, the editor of the Whole Earth Catalog, said it while speaking at the first Hacker’s Conference in 1984. The transcript of the conference printed in Brand’s May 1985 issue reads: “On the one hand information wants to be expensive, because it’s so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.”

Plus a silly meme that is going around, type your name + “is” into google, these are some of my favourites:

  • Joel is full of colour
  • Joel is only inferential
  • Joel is one of the most famous names in the software
  • Joel is placed between Hosea and Amos in the canon
  • Joel is everyone’s little reading buddy

I should add on that “Joel is sore” from turning a shower all the way to HOT while half asleep. Feels like sun burn.

What do you get?