Monthly Archives: February 2008

Pizza’s not ready


The kids have a little robot thing that they got for Christmas last year. It rolls around and waves its arms and shoots little disk things and blinks its lights — and speaks in this very thick Japanese accent in the worst Engrish I’ve ever heard. It’s hilarious. Some of the more amusing phrases:

  • Ready? Shit. (It’s actually “shoot” but with the accent, that’s what it sounds like)
  • Let’s dance together! Is lovely!
  • I teach you how to dance
  • Uh-oh. Pieces not ready. (though I always hear “pizza’s not ready”)

It also says a bunch of other things that I cannot understand. Whenever I read or hear these kinds of things, I always remind myself that as broken as it is, their English is still better than my Japanese or Chinese, so I shouldn’t laugh. But I do.

Clark off the hook


The NLL has lifted the suspension of Rock coach Glenn Clark after charges were dropped by Toronto Police last week. I wrote about this issue last month; the Rock got beaten by Minnesota in overtime, and after the game, Rock head coach Clark punched a Minnesota player in the hallway near the Rock dressing room. Charges of assault were filed against Clark, and the NLL suspended him indefinitely, which was their way of saying “We’ll let the legal system do our work for us, so that we don’t have to bother investigating anything.” Three weeks later, the charges were dropped, and today the NLL decided that if it’s good enough for Toronto Police, it’s good enough for them. Clark’s suspension lasted all of four games.

If the league is trying to shake of its “bush league” reputation, this isn’t going to help. A coach hit an opposing player here — I don’t care how much he was provoked, he just can’t do that. Another article quotes Clark: “…you’ve gotta be very careful because you can’t put yourself in harms way. You have to be very careful to avoid these types of situations. …the game is performed by passionate people and sometimes those passions get the better of us. The lesson I learned is that you really have to be careful not to put yourself in that position.” (emphasis added) Nowhere does Clark take responsibility for his actions. Nowhere does he apologize. The most important thing is not to get into that situation? How about not to lose your mind when you’re supposed to be in charge?

I still don’t think the police needed to be involved, but I think Clark should have been suspended by the NLL for the remainder of the season and fired by the Rock. I’m disappointed with both the league and the Rock for giving Clark what amounts to a slap on the wrist. He’ll be back behind the bench this Friday when the Rock take on the Buffalo Bandits at the ACC, but I will not be among those cheering his return.

It’s Spring!


On the heels of my last entry only two days ago, I can officially report that it is now spring! That’s right, pitchers and catchers report today to spring training in Florida and Arizona, and they wouldn’t call it spring training if it didn’t happen in spring, right? Time to put the heavy coat in the closet, put the hats and mitts away, and get out the spring jacket!

…says the guy who had to shovel the snowplow droppings at the end of the driveway this morning in order to get out…

Fake automated blogs?


I have my blog “claimed” at technorati.com. I can use this to search around to see if anyone has linked to my blog entries on their own blog / web site. This is how I found out that I’d been quoted by slate.com.

I did a search last night (for no good reason — same reason people Google themselves), and found several of my postings linked to really weird blogs. Each blog is a collection of articles about a certain topic — my posting on security podcasts is linked to in a blog called “Anti-Virus” (I’m not going to link to any of these potentially evil blogs here), the one on skiing is in one called “Ski Resorts”, and the one about Gail being on the TV news is in one called “The Latest Premieres & Debuts”. In every case, the format of the blog posting was exactly the same:


Unknown wrote an interesting post today on
Here’s a quick excerpt
Several lines from my posting

Read the rest of this great post here


Unknown” and “here” are links to my posting, and the title of the posting is the same as mine. Apparently the bot that created these postings has bugs in it; the bit about “wrote an interesting post today on” never has anything after it, and one of the blogs even has SQL errors on the page because the title of the posting they’re hijacking contains quotes. Each of the blogs I’ve found has hundreds or thousands of postings, all in the same format, and all listed as “uncategorized”. All of these “fake” blogs seem to be “Powered by WordPress”. I don’t remember ever seeing these before I created my own WordPress blog as a backup for my existing blog. I have the wordpress blog marked as “block search engines but allow normal visitors”, but it seems to have found its way onto someone’s hijacking list somewhere…

Call me naïve, but I don’t understand the point of these fake blogs with no original content. I’ve heard of “splogs” (SPam blOGS), but these doesn’t appear to be splogs — there are no ads, no links to anything but the blog articles, nothing that might make someone money, as far as I can tell. Now, I’m running Firefox with NoScript installed, so whatever JavaScript is on those sites is not run in my browser, so maybe there is something nasty in the JavaScript.

Or maybe I’m just being cynical. Maybe it’s just someone who’s written a bot that gathers together blog postings in certain catgeories as a public service. And he’s not that great a programmer or hasn’t done enough QA on the bot. Yes, I’m sure that’s it.

I did not Dance Naked last night


Gail and I were supposed to go to the Air Canada Centre last night to see John Mellencamp, but because of the storm, we had to miss it. We had the babysitter lined up, the boys were excited that she was coming over, we had dinner done early, the tickets were in my wallet, everything was ready. We waited as long as we could to make the decision, but the snow kept getting worse and worse as the day went on, and there were some ice pellets and freezing rain mixed in as well. Around 5:30 we made the decision that it was just too risky. If the show was in Hamilton, we probably would have gone, but downtown Toronto is a 45 minute drive with no traffic. With the weather as it was, it would have easily been an hour and a half, if not longer, and getting back after four more hours of snow would have been brutal. So, there’s almost $180 in concert tickets down the drain.

Earlier in the day, I had checked the ACC web site on the off chance that they had cancelled the concert because of the weather (they hadn’t) and was found out that Tom Cochrane and Red Rider were opening the show. I ordered the tickets back in November or something, and had completely forgotten about the opening act, which is surprising, since I was a big Red Rider fan back in the 80’s. They opened for Rush at my second-ever concert at Maple Leaf Gardens back in 1984. I’ve seen Tom Cochrane live a couple of times as well, though I think half his backing band on his “solo” tours were members of Red Rider anyway.

I’ve been a big Mellencamp fan since the early 80’s as well, and last night would have been my fourth time seeing him. He always puts on a great show. I haven’t been all that thrilled with his last couple of albums — the John Mellencamp album had a few good tracks on it (“Your Life Is Now”, “Eden Is Burning”), and Mr. Happy Go Lucky had a few as well (“I Saw You First”, “Just Another Day”), but the rest (including the entire Cuttin’ Heads album) was forgettable. I bought his latest album Freedom’s Road shortly after getting the concert tickets, and I think it’s his best album since Human Wheels Whenever We Wanted.(Update: I listened to Human Wheels again yesterday, and I think this new album is better.) “Someday”, “The Americans”, “Forgiveness”, and “My Aeroplane” are all really good, and “Our Country”, “Ghost Towns Along The Highway”, and “Freedom’s Road” are all flat-out great tracks.

Seeing how much snow fell last night and how bad the roads still are around here tonight, I don’t regret the decision not to go, but it still sucks. I called the ACC last night just before we made the decision and asked if the concert was cancelled and was told that it was not. I then asked if there was any possibility of a refund since we weren’t going to make it, and he confirmed my suspicions that I was SOL.

If Mellencamp comes back to Toronto (or even better, Hamilton!) on this tour, or even the next one, I’m sure we’ll try to go again. I just hope that it’s sometime between May and September.

Aside: For those of you who are not big Mellencamp fans and are curious (or frightened) about the title of this post, Dance Naked was the name of a 1994 John Mellencamp album.

A trip back in time


Last Friday was my annual “ski day” at Devil’s Glen, organized by my second-line manager, Dave. I only ski once a year, though I’d like to increase that to at least a couple of times — maybe I’ll bring the boys out with me, since (a) Gail doesn’t care for downhill skiing, and (b) Nicholas is still free until he’s six. Devil’s Glen has an annual “Men’s Day”, which is when we went last year, but Men’s Day can be pretty busy, so this year Dave decided to have it on the Friday after Men’s Day. There was no free beer or gifts and no prize draws, but it was a little cheaper, the lift lines were almost non-existent and we had less trouble getting tables near each other for the 28 of us, so that was good. It snowed like crazy all day, which made for some treacherous driving on the way home, but the skiing conditions were great.

I used to ski all the time in high school, and now it’s once a year, at most. As a result, whenever I ski nowadays, memories of skiing back in high school come flooding back…

(Everything goes all wavy as we go back in time…)

It’s a Wednesday night in early 1986. I’m sixteen and in grade twelve at Dunbarton High School in Pickering, Ontario. After school ended at 3:30, I put my school stuff in my Adidas bag and head down to the tech wing where my skis and stuff have been stored all day. I find my stuff among the piles of other people’s stuff and head towards the ski club bus. 45 minutes later, we’re at Dagmar Ski Resort in Whitby [This is where I would normally put a link to the Dagmar website, http://www.skidagmar.com, but it’s incredibly lame (no pictures, no map, nothing) so I refuse to even link it]. We get changed, grab our lift ticket, and hit the slopes.

They’re playing CHUM-FM through speakers at the top and bottom of each lift. [This was back when CHUM-FM was a pop-rock station, not the “easy listening” “adult contemporary” “really boring” stuff they play now]. All evening, we hear songs like “These Dreams” by Heart, “Rock Me Amadeus” by Falco, and “Kyrie” by Mr. Mister. I’m skiing with my friends Glen Fujino and Kevin Day (and others, sorry guys but I don’t remember other names). Glen is a better skier than the rest of us, and likes to do goofy things like spin around and ski backwards in a tuck position. The guys I usually hang around with at school (Faisal, Doug, Paul, Glen) aren’t here because they don’t ski. My fourteen-year-old sister is out here somewhere with her friends as well, and every now and again I see her, but she usually ignores me. The big hill right in front of the chalet is called the Big Daddy, and we spend most of our time on that hill. There’s a little mini-mogul run down the right-hand side, underneath the chair lift. From the top of the lift, you can go left to hit the couple of black diamond runs, but they’re not really all that hard. One’s called the Dive Bomber because about halfway down there’s a drop-off; if you hit that with some speed, you can get some airtime. The other direction from the diamond runs, on the other side of the Big Daddy, are some other narrow intermediate runs, and beyond that are some easy ones, including one called Lover’s Lane. Inexplicably, very few jokes are ever made about this name, which is surprising considering the number of teenage boys here. A guy can yell “Hey, let’s go over to Lover’s Lane!” to a bunch of other guys, and nobody will make any “no way, man, I ain’t gay!” jokes you might expect from guys of our age group and maturity level.

At some point during the evening, we hit the chalet for dinner. This is almost invariably a burger and fries, scarfed down as fast as possible so we can get back out skiing again. At the end of the night, we return to the chalet before boarding the bus for a hot chocolate. After that, we pack up our stuff, put it in the holding area under the bus and get ready for the ride home. Glen, who is teaching himself some really weird computer language called “C”, tells silly jokes the entire way home.

(Everything goes all wavy again as we return to the present…)

Things I worry about now when skiing, but didn’t back then: Can I do the more difficult runs without killing myself or someone else? Will the pain in my legs stop at some point today, or just keep getting worse? How badly are they going to hurt tomorrow? Why haven’t I been doing squats for the last month, like I promised myself last year that I’d do this year?

Things I worried about then but not now: how cool do I look? Where are the cute girls skiing?

PaulDotCom and Security Now


I’ve been listening to a podcast called Security Now for a few weeks now. It features security guru Steve Gibson and Leo Laporte (who also hosts another podcast I listen to called TWiT (This Week in Tech)). Gibson is also the author of a hard disk recovery and maintenance tool called Spinrite, and in each SN episode, he reads an email or two from a Spinrite customer talking about how they lost tons of data when their hard disk failed and how Spinrite got it all back for them. This is not security-related in the least, but other podcasts have commercials as well, so it doesn’t really bother me. The podcast itself is pretty good — it’s not super technical (i.e. it’s not directed toward security programmers) but it’s not dumbed down either. Every other episode is Gibson answering questions from listeners regarding everything from online authentication (i.e. when using paypal or stuff like that), to disk encryption to browser security (like cookies and such) to spyware, malware, and viruses.

Last week, I heard of another security podcast called PaulDotCom Security Weekly, so I thought I’d give that a listen as well. My first impression was not very favourable.

Before I go any further, I should say that I’m no security expert, but I am relatively knowledgeable in the area. Computer security has interested me for a number of years, and I am one of the de facto security people at work. I have written (and re-written) pretty much all of the database and communications encryption code in the SQL Anywhere server and client software, and I’m also responsible for other security-related things like permissions, authentication, and auditing. My point is that I’m not ready to start my own security podcast anytime soon, but I am able to at least keep up.

Back to PaulDotCom. The hosts introduced themselves and one of the first things they did was talk about what beer each of them was drinking at the time. Immediately after that, they made fun of Security Now and Steve Gibson by referring to Security Now as a “Spinrite commercial” (and they’re not far off with that, I suppose), and played a bunch of clips from various SN episodes — each clip was one where Gibson had lost his train of thought, or said “um…” a couple of times while trying to think how to say what he wanted to say. Of course putting all the clips together made it sound like Gibson was some moron who didn’t know what he was talking about. On top of that, they are now sponsoring a contest for listeners of PaulDotCom to come up with videos or whatever talking about how they “made the switch” from Security Now to PaulDotCom. This is not a great strategy for first-time listeners — if the first thing you do in your podcast is tell me how much better than the competition you are, you’ve just set your own bar pretty high, and now you have a lot to live up to. They seemed to spend an inordinate amount of time talking about how their podcast is so much better than SN, but it was twelve minutes into the podcast before they actually discussed something security-related. It also seemed a bit hypocritical to talk about SN being a Spinrite commercial, since they asked every guest they had if there was anything they wanted to hawk, like websites or products or anything, and even came right out and said “if you’re looking to hire computer people, send us an email, we know people who need work”.

The word “professional” did not come to mind at all during this podcast. As I mentioned before, one of the first things they did was talk about what beers they were drinking during the podcast. They seemed quite proud of the fact that they were doing this, and referred to it a couple of times later as well. One of them made a simple mistake and amid laughter, one of the other guys jokingly suggested he “have another beer”. Making fun of Gibson and SN was childish (though I did find it quite funny), and there were even a few curse words in there as well. I have no huge problem with cursing in general (as long as my kids aren’t going to be listening), but again, it doesn’t exactly scream “professionalism”.

The weird thing is that it seems to me that PaulDotCom and SN aren’t aimed at the same audience. While SN is aimed at anyone who is interested in technology and security and familiar with computers (but isn’t necessarily a programmer or IT professional), PaulDotCom seemed to assume a much higher level of knowledge. They had a pretty interesting interview with a guy that works on analyzing (i.e. reverse engineering) malware, and how some of the more advanced malware programs try to avoid being detected and also avoid being reverse-engineered by covering their tracks, changing their behaviour if they think they’re being debugged, and even modifying themselves. But they got way into the technical details of how this is done, which I found interesting, but I suspect many SN listeners wouldn’t. They also talked about some other web-based attacks and how they could be defeated, and got into some details on specific routers (i.e. they mentioned specific model numbers and what kind of firmware they were running and so on), but some of these discussions assumed a level of knowledge above my own, and they certainly didn’t stop to explain what they were talking about. The guys at PaulDotCom are certainly knowledgeable, but they seem to assume your level of security knowledge is the same as theirs. Rather than a bunch of security experts explaining things to people less knowledgeable than themselves without talking down to you (which is what I find Gibson does pretty well), this was more like eavesdropping on a conversation between a bunch of security experts who don’t care if you are listening.

If you are a programmer directly involved in writing some kind of anti-virus, anti-spam, or anti-spyware software, then this is probably a pretty good podcast for you. It’s probably the best security podcast for people who are already security experts. For the rest of us, Security Now seems like a better choice, if you have to choose only one. Even with my aforementioned experience in the field of computer security, I still found myself glazing over during parts of the PaulDotCom podcast, because they’d start talking about stuff with no background for those who were unfamiliar with the terms they were using. I mentioned before that Security Now isn’t dumbed down, but having said that, there are certainly times when I glaze over during that podcast as well, because Gibson is going into great detail explaining what a “cookie” is or something like that. But I’d rather skip stuff because I already know it than have to skip stuff because I don’t understand what the hell they’re talking about. To be fair, I will probably continue listening to PaulDotCom at least for a while, because I did find it interesting for the most part. I’m not trying to “defend” Steve Gibson and Security Now, but the next few PaulDotCom episodes better be pretty darned interesting, because the whole “we’re better than Security Now” thing just turned me right off. Since that was the first thing they talked about in the podcast, well, you know the whole thing about first impressions.

Update (Feb 4): I listened to the next episode of PaulDotCom on the way to work this morning, and felt obliged to update this entry, because the next episode was really interesting, and I quite enjoyed it. There was almost no mention of beer and no cursing. They mentioned Security Now but only in reference to their contest. There were a few off-colour sexual innuendo-type jokes, but no big deal. The technical stuff was at a lower level (and by “lower” I mean more technical in nature — definitely aimed at developers and security professionals) than Security Now, which as I mentioned is more aimed at security-conscious people who are not necessarily security pros. I haven’t “made the switch”, in that I still enjoy listening to Security Now as well, but unless the second episode was the anomaly and most episodes are like the first one I listened to (which seemed less focused than this one and I didn’t enjoy as much), I’ll continue listening to both. My first impression of PaulDotCom may not have been very favourable, but my second was pretty darn good.