Replace my computer with an iPod? I don’t think so…

Walter Mossberg of the Wall Street Journal penned an article the other day about how the Personal Computer era may be ending, to be replaced by … I’m not really sure, I guess he’s saying purpose built devices for particular purposes. Actually, the way I read his article, I think he’s saying that the “component build” model appears to be a poor one to use for things like iPods, but the technology media seems to have picked up on this being someone yet again predicting the end of the personal computer.

I’m pretty sure that Mr. Mossberg didn’t actually intend to predict the end of the personal computer. That’s been done so many times before its almost laughable. Network Computers were hyped and died in the mid ’90s. We’ve had several generations of game consoles that were supposed to kill the personal computer. And now ubiquitous devices like iPods and web browser/camera/music player/pda/cell phones are going will be the death nell that removes that machine from under your desk.

Bill Gates has responded to this kind of thing before, and apparently he’s written a letter to the WSJ for this one (although I’m not a WSJ subscriber, so I can’t read it). To be honest, Bill, you are wasting your time.

Continue reading Replace my computer with an iPod? I don’t think so…

Blog spam, content theft, and other fun things

When I converted my site to a “for real” blog using WordPress about a year ago after nearly a decade “pretend” blogging, it was like I’d moved into a nice, upscale neighborhood. The neighbors were friendly and reasonably intelligent, and everyone’s yard was tidy. The rare comments to my site were reasonably intelligent, and were obviously written by real people who were actual visitors.

Continue reading Blog spam, content theft, and other fun things

High end keyless car security …less secure than a key

If you buy an upscale new car today or in the near future, say a BMW, Mercedes, or Cadillac, there’s a good chance that you won’t have a key. Instead, you’ll have a little fob- sort of like the keyless entry control you are likely used to. To start the car, you’ll just push a button- the car will have confirmed that you have the right fob and will allow you to start the engine (or not). No key to pull out of your pocket or fuss with. This all sounds very high-tech and convenient. Unfortunately, the
methods used by the car and the keyfob to validate each other are pretty porous….easily crackable
. Even easier than the keyless entry system. And unlike the keyless entry system, they let you start the car and drive away as if you own it. The article I link to above lays things out pretty clearly, but here’s the gist of it. Remote keyless entry fobs are “active”: they have have a battery and broadcast a signal only when you press the button on the fob. The new keyless ignition systems work the opposite way: the fobs are passive, and the car continously sends out a signal looking for the authorization response. Someone with some basic computer equipment can pick up that signal, identify its nature, and try a simple brute force attack until the car responds. The encryption code (key) used by the cars is a relatively weak 40 bit cryptographic length- for comparison, your web browser supports a 128 bit key. A 40 bit key can be broken by a laptop in a matter of hours: possibly much faster if the thief has some clues such as those given by the car sending out its query signal. Since getting a response means the thief can actually start and drive away in the car without a hitch, and since most cars with this system today are in the $60,000 + range, hacking the code is worth the effort. David Beckham of soccer fame has had his BMW sport utility vehicle stolen this way not once, but twice. Apparently, the manufacturers of the cars using these systems don’t think their vulnerability to hacking is worth worrying about. For myself, I’ll probably think twice if I happen to one day be looking at cars with this keyless ignition feature…

Ultimate Tag Warrior, Ecto, and other fun things

I have become increasingly intrigued with the concept of “tagging” in blogs over the past year or so. Tagging is a way for someone posting a blog entry (or other web content) to include some sort of categorization hints in the form of keywords. Specialized search engines like Technorati can then use those keywords to present “similar” content.

Continue reading Ultimate Tag Warrior, Ecto, and other fun things

Sigil’s Vanguard to be published by Sony, Microsoft punted…

A few years back, several of the key players in the development of EverQuest left. Brad McQuaid, Jeff Butler, and numerous others set out on their own to form up a new game company (Sigil) to develop a new game (Vanguard). Microsoft funded Sigil, and there were great expectations amongst some gamers regarding how much better Vanguard would be than anything Sony could make.

Continue reading Sigil’s Vanguard to be published by Sony, Microsoft punted…