jp.jpg (13389 bytes)

CHAOS MANOR MAIL

A SELECTION

Mail 120 September 25 - October 1, 2000

read book now

HOME

VIEW

MAIL

Columns

BOOK Reviews

emailblimp.gif (23130 bytes)mailto:jerryp@jerrypournelle.com

CLICK ON THE BLIMP TO SEND MAIL TO ME

  The current page will always have the name currentmail.html and may be bookmarked. For previous weeks, go to the MAIL HOME PAGE.

FOR THE CURRENT VIEW PAGE CLICK HERE

If you are not paying for this place, click here...

IF YOU SEND MAIL it may be published; if you want it private SAY SO AT THE TOP of the mail. I try to respect confidences, but there is only me, and this is Chaos Manor. If you want a mail address other than the one from which you sent the mail to appear, PUT THAT AT THE END OF THE LETTER as a signature.

I try to answer mail, but mostly I can't get to all of it. I read it all, although not always the instant it comes in. I do have books to write too...  I am reminded of H. P. Lovecraft who slowly starved to death while answering fan mail. 

Day-by-day...
Monday -- Tuesday -- Wednesday -- Thursday -- Friday -- Saturday -- Sunday
 
atomz search

Search: type in string and press return.

 

or the freefind search

 
   Search this site or the web        powered by FreeFind
 
  Site search Web search


Boiler Plate:

If you want to PAY FOR THIS there are problems, but I keep the latest HERE. I'm trying. MY THANKS to all of you who sent money.  Some of you went to a lot of trouble to send money from overseas. Thank you! There are also some new payment methods. I am preparing a special (electronic) mailing to all those who paid: there will be a couple of these. I am also toying with the notion of a subscriber section of the page. LET ME KNOW your thoughts.
.

If you subscribed:

atom.gif (1053 bytes) CLICK HERE for a Special Request.

If you didn't and haven't, why not?

If this seems a lot about paying think of it as the Subscription Drive Nag. You'll see more.

Highlights this week:

Search: type in string and press return.

 

LAST WEEK                             NEXT WEEK

line6.gif (917 bytes)

 
This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

TOP

Monday  September 25, 2000 

Dr. Pournelle,

Enjoy your column as always. Here is my 2 cents on the Orb and DVD Software on Win2000.

I have custom built machine - ASUS P3B-F, PIII 450, 196MB RAM. I just swapped out my Kenwood 52X for an ASUS 8x/40X DVD. Also have a Sony CD-RW, 13GB Maxtor IDE, 30GB Maxtor IDE (connected to a Promise Ultra 66), Elsa Erazor X, Creative SBLive and a USB Castlewood ORB. I needed some DVD decoder software, tried a few demo's and decided on Intervideo's WINDVD (http://www.intervideo.com/jsp/Home.jsp) Works great on WinME

I decided to install Win200 Professional this past weekend on this same computer. Used Partition Magic 5.0 (started from a WinME boot-floppy since WinME does not go into DOS mode anymore) to split my primary drive into two 6 GB partitions. I then installed Win2000 with out a single problem. Both OS's are available for boot when Win2000 starts.

During the install Win2000 found the attached USB Orb and assigned a drive letter. No problems here.

I then installed WinDVD, except for having to obtain the activation key from the web site it installed fine. Popped Blade Runner (one of my favorites of all time) in to the DVD, WinDVD auto-started and the movie was playing within seconds.

This may not help much, but wanted to let you know that it is not a lost cause.

Enjoy your work. Any plans for another epic novel with Larry Niven? Along the lines of the "Mote in God's Eye" or "Lucifers Hammer"?

-Ed Gallagher

I need to find a good Windows 2000 DVD decoder program. Shouldn't be a problem. We continue to have no difficulties with the ORB.

One of the pleasures of discussing things with you is that you keep up with your old field.

I remember the twin studies. What I don't remember is the extent of the variability in the environments the separated twins grew up in. Were some of them abusive? Makes a big difference, in my experience.

I talked with someone very familiar with the plight of orphans in China. He tells me that orphans have no chance compared with their peers because they do not have parents who are "on them like white on rice," keeping them focused on their schoolwork. For this reason the kids don't do as well in school. They pull down class averages. School administrators don't like this, so they try to discourage such children from attending their schools. Many kids (apparently this varies by city) do attend public school. But many kids do not, and the societal opportunities available to these kids differ greatly from those of kids with parents (including adopted kids). This is the kind of environmental difference that is difficult for heredity to overcome.

I believe, then that within certain limits people do rise to their potential; but outside those limits they may not. The question is, where is the dividing line for any particular individual? Is an abusive environment beyond the divide?

The problem with my chimney sweep example was that there was no matched comparison subject. There was certainly more than environment at work in his case: regardless of how smart his father was, his mother had a temperament that caused her to participate in the breakup of a two-parent-plus-child(ren) relationship (note I am not blaming either party) and enter into a relationship with a man who abused her biological son. One could argue with some success that her temperament is heritable, and her son's relative lack of success is at least in part due to his inheriting something of his mother's ways.

Where I trained they did lots of research on the inheritance of psychiatric disorders and psychological traits. The results were ugly: most everything nasty that people do is heritable.

Yet there is room for modulation by the environment. Based on research from Scandinavian adoption records, we know that children of alcoholics who are adopted at birth and never know who their parents are, are much more likely to become alcoholics than similarly adopted-out children of non-alcoholics. But group the results differently: of the offspring of alcoholic parents, those raised in alcoholic homes are more likely to become alcoholics than those raised in homes with little access to alcohol. An environmental effect. Smaller than the hereditary effect, but there.

So, as any sane observer would conclude from simply looking at people, it ain't nurture, it ain't nature, it's both. That doesn't say that my chimney sweep would really have been my colleague if he had been raised in a less-abusive home, but who knows?

My conclusions about the complicated questions and answers on heredity and environment are:

1. Be careful whom you reproduce with. 2. Try to provide a good environment for your kids.

As for public policy, I advocate providing humane environments for children in schools. For many minority students, for example, the stern teacher of my past has been replaced by the abusive teacher who doesn't like having minority kids in her class or the teacher who provides no discipline in her class.

For many non-jock students, jocks are allowed to do as they please and bully whomever they choose. This is bad for the bullied and bad for the bully. In the case of Columbine, they pushed the wrong kids too far.

Ed Hume

ANy damn fool knows that. I know it...

Jerry

Perhaps someone can help me with this.

I am running Outlook 98. It keeps coming up with an 89% zoom. I would like it to have a 150% zoom so I can read the messages without my reading glasses (I remember from the pre-Windows days that you advocated large monitors for this reason).

I can set a message at 89% zoom, and each subsequent one will come up with that until I hit an HTML-formatted message. After that, all the messages are in some other squirrely zoom percent.

Q: where does Outlook bury its bodies? I've tried to find every likely OFT and DOT file with no success so far. Outlook Help, of course, answereth not. After hours on this, I give up. Now I ask for help.

Thanks

Ed Hume www.pshrink.com


I got this in a discussion group, and it is published with permission. It was sent to the New York Times without much hope that they would publish it:

349 Words

To The Editor of The _Times_: _ Let us say that we did not invoke the death penalty for nuns who murder, but did for all other murderers. And let's say that we found, as no doubt we would, that nuns had a lower murder rate than did the non-nuns. Would the _Times_ conclude that the death penalty does not deter?

Now let us say that we _did_ invoke the death penalty for nuns who murder, but not for all other murderers. And let us say that we again found, as no doubt we would, that nuns had a lower murder rate than did the non-nuns. Would the _Times_ conclude that the death penalty _does_ deter?

Of course not. It would be obvious that other factors-for example, the differentiated tendency to violence of nuns and non-nuns-causally overwhelmed the deterent effect of the death penalty even if there is such an effect.

But this is precisely the fallacy committed when the Times infers that the death penalty doesn't deter from the fact that states that don't invoke the death penalty have lower murder rates than states that do (Sept. 22). A cursory glance at the Times graphic makes clear that the states that don't have the death penalty are states that are far, far more homogeneous, more northern, and less urban than the states that do invoke the death penalty, states whose higher murder rates are clearly related to heterogeneity, urbanization, and geography.

These is nothing in the data presented by the _Times_ that argues against (or for) the belief that the states that impose the death penalty do so because they are the states that have to impose the death penalty, and that their doing so does, in fact, lessen the murder rate.

I don't know whether the death penalty deters, but I do know that arguments such as those accepted by the _Times_ retard our attempts to find out.

But perhaps I shouldn't be surprised. It was the _Times_, after all, that ran the headline proclaiming that the crime rate is down despite the fact that there are more people in prison. _Despite_?

Steven Goldberg Chairman Department of Sociology City College City University of New York

There are about 5 sociologists I consider worthy of paying attention to. As for the rest, well, most social scientists know neither humanities nor science. Pity, but there is is. We were fortunate in my grad school to have Paul Horst, who made us go take mathematics from the maths department...

But if you live in NYC it would be worth going to CCNY to study with Dr. Goldberg.


From: Stephen M. St. Onge saintonge@hotmail.com

subject: Why we have spam 

Dear Jerry:

This story tells it all. A kid in NJ allegedly made $285,000 spamming idiots into buying various penny stocks that he'd previously purchased. They'd read his 'this stock is set to move' e-mails, buy it, and of course all that demand in a thin market would guarantee it moved.

Perhaps we should encourage spam, and such associated scams. As somebody or other ;-) said, "Think of it as evolution in action."

Best, Stephen

Before you yell at your kid to get off the computer and go outside to play, check this out: A New Jersey teenager made over $285,000 by illegal trading on the internet. Turns out that Jonathan Lebed would buy a penny stock, then send out thousands of bogus email messages, saying that the stock was going to soar in price. What's amazing about this story isn't that a 15 year old kid made over a quarter million bucks on-line, but that so many idiots believed his bogus emails and bought those penny stocks.

At Gibbleguts we strongly recommend that you stick to twisted humor sites instead. -The only thing you risk losing is your breakfast.

© 2000, Gibbleguts.com


Howdy Jerry,

Have you seen this article?

http://www.flatoday.com/space/explore/stories/2000b/092400b.htm 

I've been a huge fan of the X-33 program. It is really too bad to see it mired in the bureaucratic BS.

What are your thoughts on this?

Thanks. Later.

Greg Lenderink, aka, CyberRanger cybrrngr@frii.com -- CyberRanger, cybrrngr@frii.com 

Unfortunately the X-33 never was an X program. One day I may have to make clear what is and is not. X-33 grew out of briefings I gave Congress but alas it became corporate welfare. And that is what it remains. It is NOT an X program.


>>The ability to make a jest of death has long been common and even prized among soldiers, or at least soldiers I have known.

Sailors too, Dr. P! Sea story: Fresh-outa-boot-camp sailor sez, "What happens if [system X] doesn't work?" Leading Petty Officer replies, "We're all gonna die." Ghoulish, knowing laughter from the assembled sailors.

The test works -- rumors to the contrary, the USN really does test stuff ashore before underway trials -- and our new seaman recounts the whole story in a letter home.

Mom &; Dad have to be peeled off the overhead, whereupon they ship off a letter to Ye Friendly Local Congresscritter.

Your Kursk story wasn't disrespectful to the sailors who died. It was, I think, a first cousin to 'whistling past the graveyard.'

Beat Army.

Rod McFadden Whose titles include, for the record, both "Captain" and "Master Mariner." Centreville, VA Yes, you may publish my email address.

Beat Army indeed. Talk about mixed emotions in this household! Anyway, thanks.


Dear *Dr. * Pournelle

On Friday, Sept. 22, you wrote: >...my title, which I earned, is Dr. not Mr. and I am rather proud of it.

This brings up an interesting point. I too am a Ph.D. (Chemistry, U.B.C., 1996), but I do not use "Dr." socially, nor do the vast majority of the other "doctors" I know. To the general public, it is a confusing title and has the appearance of puffery. Professional use is different; on my business cards, I am Dr. B.P. Hollebone, Ph.D.

I think that this is a generational difference. There are a lot of Ph.D.s out there now, certainly a much higher fraction than when you got your degree. A doctorate is no longer the signifier of accomplishment that it used to be. Maybe I am blase simply because I know so many (and come from three generations worth, male and female). Anyway, to my mind, Jerry Pournelle, NY Times best selling author, Hugo winner, is much more impressive than Dr. Jerry Pournelle, Ph.D.

If you prefer to be addressed as Dr. Pournelle, I will do as you wish. But as my grandfather used to say, you can call me anything you like, as long as you don't call me late for dinner.

Kind Regards, Bruce Hollebone: hollebon (at) cyberus.ca

I really don't insist on titles at all, and most readers send notes to me as "Jerry" which is reasonable since that is the way the editors refer to me in the magazines, and I write as close to personal letter style as I can. But if one is going to call me names, then one may as well use my proper title...


Dear Dr. Pournelle, 

Spam. How I hate it. Today I got mail from my dad. He's in his early seventies, a bit older than you, and while he knows how to do the basics with his PC, e-mail, web surfing, and editing journal articles (see http://www.asprs.org/ ) with Word, he still has to be talked through installing new software or changing anything that isn't on the menu bar. He was on a Sierra Club backpack last week (I wish I was in the shape he's in!) and when he got home found dozens of messages "most for porn sites or sites promising all sorts of money". He replied to them asking to be unsubscribed "most came back as undeliverable. How can someone send a message with an invalid return address?"

Of course I told him never to confirm the validity of his address like that. I also told him to contact his ISP, the police (porn is, basically, illegal in Utah, especially small towns in Southern Utah) and gave him the e-mail addresses for his senators and congressman (through the U.S. Congress web site at http://thomas.loc.gov/  ). I told him to attach the porn spam. Senator Hatch (or his designated peon) is just gonna love that!

Now, my father's a smart man, BS from Stanford, PHD from Ohio State, not afraid of technology, but modern OS shells just seem to confuse the heck out of him. He did well with the DOS command line, and touch types. I find myself in the position of having to help my father with these problems when I am in Virginia and he is in Utah. How do I go about explaining forged headers, RBLs, spam filters, etc. to him when I can't explain how to install Word? Part of the problem, of course, is that I'm a programmer and can't translate 'programmer' into 'user'.

Both my father and I regard censorship with the same dread that you probably do, but it would be nice if there were an easy way to filter this stuff. It's only going to get worse and I don't know what to do.

On another, but related, note. You should try to take the time to read "Secrets &; Lies" by Bruce Schneier, the author of "Applied Cryptography". It's about the difficulty, if not impossibility, of protecting ourselves in the digital era. Terrifying book. Discusses the various attacks, the reasons for them, who launches them. And the response to the attacks. "The war on drugs seems to be the root password to the U.S. Constitution" (P 52). The lack of privacy. The fact that there is no Constitutional Right to Privacy, probably because the authors didn't think that it was necessary. After all, if you want privacy, close and lock the door, or just walk out into the woods. There were no wireless bugs or parabolic mics in those days. Or large corporate databases, accessible through a warrant, either.

Kit Case kitcase@starpower.net 


please see http://www.theatlantic.com/cgi-bin/o/issues/2000/10/harper.htm 

header for the article entitled "Shoot to Kill" is:

<<In the post-Columbine world, police departments all over America are adopting new, no-nonsense SWAT-team tactics

by Timothy Harper>>

This article is very apropos to the ongoing discussion in Mail.

charleshahn@my-deja.com Freedom is never free, but it is never more costly in the long run than the alternatives prove to be.


Dear Dr. Pournelle, 

Given a perfectly administered system of justice (does anyone REALLY want 'perfect justice'? Think about it.) the death penalty would be acceptable. We would know that the murderer, rapist, whatever, was guilty beyond any shadow of doubt. I know, the Constitution requires only 'beyond a reasonable doubt', but we are talking about the ultimate penalty here. One for which there is no recovery from error. I believe that it was Justice Holmes who said "Better that a thousand guilty men go free than one innocent man be hanged". The situation today, in many states, seems to be that a certain number of 'accidental' executions are acceptable. Of course, raising the standards for execution, via extended appeals and hiring the best attorneys (at public expense), to raise the certainty that it is fairly administered is so expensive that it would be less expensive to impose life without parole. Life without parole keeps the criminal off the streets just as affectively while allowing for the possibility that they may, at a later time, be released if there was a mistake. I think about the problems in the Ramparts division of the LAPD, and I wonder.

Kit Case kitcase@starpower.net

What I have here is mixed emotions. Justice consists of giving to each what he deserves (well, technically it is a firm an fixed intention to do that); and some people probably deserve death. On the other hand, some deserve life and we can't give that to them. Why be in an hurry to deal what what we can give? But I think few innocent people are executed. In some cases they may be executed for the wrong crime. I doubt we will settle the issue, since so many of us are ourselves unsure of how it ought to be settled. Which still does not excuse flawed arguments.

TOP

 

This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

TOP

Tuesday, September 26, 2000

 

In looking at the links page I realized don McArthur has been with us from nearly the beginning. Thanks.

Dr. Pournelle, 

I backup all of my data files to my wife's computer (and vice versa) over our home network. I wrote the batch file (below, after my sig) to automate the process. I keep a shortcut on my desktop. When it is launched, it creates the mapped network drive connection to the remote computer, uses XCOPY to copy any new or altered files to the remote directory, then it deletes the mapped network drive. The list of files transferred is appended to a text file for examination. You could use the Windows scheduler to run this every night. Long live the useful DOS batch files! 

Don McArthur http://www.mcarthurweb.com 
**************************************
"Forget World Peace - Visualize
Using Your TURN SIGNAL"
**************************************

: **************************
: A batch file to copy new and
: altered files from Don's
: computer to Sandy's computer
: for backup. Set the DOS
: window to close after
: execution using the Properties
: in Windows Explorer.
: **************************

: **************************
: First create the mapped network
: drive, using the drive letter
: E: and the remote shared directory
: \\SONY\BKUP_DON.
: **************************

NET USE E: \\SONY\BKUP_DON /YES

: **************************
: Now check to see that the
: mapped network drive exists.
: If it doesn't then the network
: is down or the other computer
: is off, so quit.
: **************************

IF NOT EXIST E:\nul GOTO end

: **************************
: OK, the mapped drive is there.
: Let's XCOPY any new or updated
: files in my C:\My Documents
: subdirectory there.
: /e is all directories
: and subdirectories, even if
: empty; /y is without confirmation
: for overwrites; /c is continue
: if errors; /m is copy only files
: with the archive bit set, then turn
: it off; /k is copy attributes.
: Redirect the standard output to a
: text file so that we can see which
: files were backed up.
: **************************

XCOPY C:\MYDOCU~1\*.* E:\ /E/Y/C/M/K >> c:\windows\backlog.txt

: **************************
: Now we'll disconnect the mapped
: network drive.
: **************************

NET USE E: /DELETE

::end
: **************************
: End the batch file.
: **************************

Sign in back of a garage: Visualize being towed... Thanks.


Dear Jerry,

Regarding your Monday 9-25-2000 Byte column where you state: "I can also report that OUTBACK, the Outlook Backup shareware program I told you about last month, continues to work like a charm, and is now highly recommended."

I downloaded the software to try at one of my customer sites. They're upgrading user systems &; it sounded like a great way to save and restore the user's email. I've tried it on several systems running Win95-2, Win98, Win98se and Win2Kpro with exactly the same result on all: the backup goes flawlessly, but upon restore I get a dialog box about the Registry being corrupted and the restore failed. When OutLook 97 is opened the contacts and email is there, but the address book is empty. They use OutLook 97 since the vertical application that runs their business won't work with the newer versions (or any other vendor's). I have not tried it with any other OutLook version.

John G. Ruff. J R u f f @ E x c i t e . c o m

Thank you. I have never tried Outback with 97, as I don't use 97. I will see what others who do use it think.


Jerry,

Thought you might want to have a look at this. Very, very interesting website dealing with securing personal privacy. Don't know if it is on the up and up, but if it is seems a sensational idea. If it catches on it might just solve a swarm of annoying internet problems.

Worth a look

www.onename.com 

I've no connection, etc.

Mark Huth mhuth@coldswim.com

 I'd still love to get into space someday.

Thanks. I'll try to look at it although I suspect other readers will get there first. And I'd like to be Mayor of Luna City some day...


Hi Jerry,

It's not my intention to start any fires, but I think that this is a very important topic.

I read the wired article (http://www.wirednews.com/news/culture/0,1284,38945,00.html) you posted and found it disturbing, but not for the reason you may think.

I quote from the article:

<QUOTE> In conjunction with Microsoft, the AAP has set up an initiative to deal with on-line piracy that focuses on coming up with better encryption methods, creating more realistic ways to enforce copyright laws, and educating the public about the problem.

In addition, other programs are being implemented to identify copyright violations, pursue violators and work with law enforcement agencies. These efforts focus on monitoring and responding to the unauthorized reproduction and distribution of books, as well as the unauthorized distribution of information or programs that help to break security technologies. </QUOTE>

While I *strongly* believe that it's wrong (and illegal) to steal someone else's work and give it away, it's the "unauthorized distribution of information or programs that help to break security technologies" that bothers me.

Have we lost our ability to reason? Is breaking an encryption scheme now the same thing as stealing?

This is nonsense. If I *own* the e-book or DVD (in the case of DeCSS) in question, I have every right to do whatever I like to it. If I want to solve the puzzle of how the data is being hidden, then it is of no concern to anyone else. Even if I tell others how I did it, that is of no concern to anyone else. However, If I take that copyrighted information (encrypted or decrypted) and give it away, that is where an injustice has been done and I should be held liable for the offense.

An accurate analogy is that of free speech and free press. I can *say* or *print* what I like, no matter how offensive. However, If I *act* in such a way that it violates the rights of another individual, those same rights that I so highly prize, then I have committed an offense and should be held liable (not to mention being a hypocrite).

The fallacy here is that people are assuming the commission of a crime, from two different perspectives, where there is none. First, they are assuming that anyone who possesses the tools to commit a crime, will. Second, they are assuming that the "unauthorized" decrypting of information is a crime in itself. Neither of these are valid assumptions. If a person has broken the encryption scheme of a document (be it an e-book, a DVD, or anything else), then clearly they intend to violate the copyright of the owner, right? Wrong (see comments on DeCSS, below). The same faulty reasoning is being applied to gun control today; If I own a handgun, then clearly I intend to commit a crime with it (or I at least need to be watched by the Powers That Be, "just in case"). Just because an individual has in their possession something that is considered "questionable" or "suspect" by the Powers That Be, those same Powers That Be are *assuming* that that individual will commit a crime with them.

This is frightening. If that same logic were applied to nuclear weapons, then the world would have ended long ago.

Scenario 1: <your enemy here> has nuclear weapons - given. Conclusion 1: Those weapons can destroy American cities - given. Irrational Leap 1: Those weapons *will* destroy American cities - huh? Action 1: Take irrational leap and, in self defense, launch a preemptive strike - So long and thanks for all the fish.

Scenario 2: An individual has a piece of software that can decrypt documents - given. Conclusion 2: That software can be used to violate copyright law - given. Irrational Leap 2: That software *will* be used to violate copyright law - what the? Action 2: Take irrational leap and, in self defense, sue/arrest the perpetrator - Goodbye liberty.

Granted, this is a bit of a ridiculous analogy, but the logic is the same.

This isn't just paranoid rambling folks, this *is* the logic being used in these cases. It has already happened with the DeCSS (De-Content Scrambling System) program for DVD's. In the interest of writing DVD player software for use on the Linux operating system, a couple of programmers wrote an application that will decrypt the content of DVD movies (there were no DVD players that would work on Linux at that time.) They placed their creation in the public domain. Well, since this *potentially* allows the subversion of the DVD region coding, the MPAA (Motion Picture Association of America) has been attempting to put a stop to it. They have *successfully* sued one web site (http://www.2600.com/) for simply having *links* to other web sites containing the software. With that success under their belt, they are now actively going after other sites all over the web. If you want to view the transcripts of the trial, go to the 2600 web site - I hope you find them as frightening as I do.

I certainly don't have all the answers here, but I do know one thing: This is a very scary path we are heading down. The foundations of law and society *must* be based upon sound principles, not on fond wishes that don't hold up under scrutiny.

For those who value logic and reason, one quote constantly comes to mind when peering into the modern arena of American politics:

"abandon every hope, who enter here." - Dante Alighieri

Regards, Ken Paul

You make a great deal more of that than I do. The SETI experiment has shown how to gang small computers to a super super super computer. Brute force decryption will get easier and easier. Preventing it is difficult and enforcement is nearly impossible.

Of course the more laws the more SELECTIVE ENFORCEMENT, which translates to, with enough laws, ARBITRARY POWER; and that I think is what one should worry about. Needless laws without number negate the whole notion of the rule of law.

Hi Jerry,

Just one observation. The biggest problem with the death penalty in America that I see as an Dutch foreign national beside the fact that mistakes are irrevocable is that in a Republic the death penalty would make sense. Only America is no republic in the sense that every person is trained from his youth to be a responsible citizen.

The whole debate reminded me of the book Starship Troopers by Robert A. Heinlein. One of his observations in the book was that it is very unfair not to punish children when they are young committing crimes and not teach them their own responsibility, because they are children and after that punish them the moment they turn eighteen because now they are adults. I guess that's why I think the death penalty in the US is unfair, especially when considering the apparent racial bias in people actually put to death.

Joost Teigeler

(and excuse the English, my reading skills are a lot (and I mean a lot) better than my writing and I never know if I use Dutch or English constructions in my sentences)

Well said. Thank you.

Dear Dr. Pournelle:

In reading today's correspondence in mail I am reminded of one of my favorite quotes regarding the death penalty: "He deserves death. Deserves it ! I dare say he does. Many that live deserves death. And some that die deserve life. Can you give it to them? Then do not be too eager to deal out death in judgment. For even the very wise cannot see all end."

Gandalf the Grey, Book 1 Lord of the Rings as written by J.R.R. Tolkien

I thought the sentiment closely mirrored your own statement.

Once again thank you for all of your efforts and good works.

John Wm. Zaccone zaccone-law@juno.com

I have always found that line if not decisively persuasive, at least compelling attention. Gandalf, of course, was an angel or something like one.

 

 

 


Dear Jerry,

On your current view you suggest that links and information regarding programs that your users finde useful would be welcome. For this reason I send to you the link to and a description of the most useful (to me, anyhow) program which I have downloaded to my system (and it's FREE too).

The program is called "Pop Up Killer", the name is descriptive and adequate. It kills pop-ups. I have run this program on my 98 box and my ME box with success and limited resource drain (about 2% on the ME box and 1% on the 98 box). It is capable of learning which windows you wish to kill through an easy to use interface and thus far I have been unable to detect any packet transmissions coming from it, which indicates to me that I'm either not very good at detecting spyware or it just does not have any in it. The only problem I have had with it is a minor one where it will close some untitled pop-up windows that I wish to have open. For this I simply end task it prior to going to a site with pop-ups I wish to view and restart it afterward. This program gets a four out of five rating from me (nothing ever gets a five unless I'm offered some form of payola).

The link to this program is http://software.xfx.net/mainindex.htm . It can also be had from any number of download sites such as CNets download.com and tucows.com.

Also, regarding your posted transcription of those poor souls in that sub. It was in poor taste and I wet myself laughing. You owe me for dry cleaning. Keep up the good work!

Warmest regards, Rev Chris Boatright. Tualitan, OR.

P.S.

Hurry up with Mamelukes I just finished Storms of Victory and await "The Time" with eager anticipation.


Dear Jerry:

Hope you are feeling better. As for new little programs, Microsoft with ME has released a new version of TweakUI, version 1.33, that helpful little user interface adjuster we've all loved for years: it has been thoroughly updated with new features added, seems just as small and handy as before. I've loaded it on W98 and W2000 systems; no problems. It's at:

http://www.microsoft.com/windowsme/guide/tweakui.exe 

Funny, as you may remember MS dropped Tweak completely on W98SE, and only the "cognoscenti" knew where to find it on the original W98 CD, but now it's back.

All the best--

Tim Loeb

Thanks. Tweak is extremely useful.


Be very very careful with your revamped Links page - you may need infinite degrees of separation and good luck getting it - MPAA is reported to say in its warning letters e.g. http://remco.xgov.net/dvd/mpaa.shtml 

"On August 17, 2000, a federal district court in the Southern District of New York confirmed that offering, providing, or trafficking in DeCSS, or any other device designed to circumvent CSS, violates the DMCA. The district court granted a permanent injunction against (1) posting on any Internet site, or in any other way manufacturing, importing or offering to the public, providing, or otherwise trafficking in DeCSS or any other technology primarily designed to circumvent CSS, and (2) linking any Internet web site, either directly or through a series of links, to any other Internet web site containing DeCSS."

I have not looked for case law (yet) but there is an argument the new copyright act prohibits the use of technology capable of being used to violate DMCA whether the technology is used for copyright violation or not. Co-Dominium style restraints on research and development anyone? Sort of like being prosecuted if you use a slim-jim tool or a wire coathanger to get into your own car. The mind boggles, imagine the implications for password recovery in enterprise business applications, or for low level data recovery from problem hard drives. Perhaps the lobbyists crafted the act for selective enforcement to force self censorship

Clark

Clark Myers 

Amazing. In this land of the free. And the artists get nothing: the record companies have used the law to take away everything from the creators to keep it for themselves.


Dr. Pournelle,

Please do not post my name or email address, as I have some fear of retribution.

An amusing ethical dilemma presented itself to me tonight... A bulk emailer made the mistake of scanning my computer for an unprotected SMTP (mail) server. Whenever someone does a specific or detailed portscan of my computer, I often make a casual check to see if they have shared their hard drives or have a web site up at that ip address.

Lo and behold, this spammer had 2 hard drives shared with no password protection. Clearly visible were folders with such names as "bulk email howto" and "smtp hijacker".

I am sure you see my dilemma... Does the flood of email spam I receive every day warrant an active response, with an equal aggravation factor? Should I simply forward the ip address to someone who enjoys hacking people's computers, so they can gain complete control over this computer? Should I inherit my meek 6x2 plot of earth, and do nothing?

Keep in mind that I did ABSOLUTELY ZERO "HACKING", I simply opened a web browser and typed file://thispersonsipaddress

I wonder if an informal poll would make good column fodder? "What would YOU do if you had complete access to the hard drives of a bulk emailer?"

I am afraid of what I would do.

 

 

 

TOP

 

This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

TOP

Wednesday, September 27, 2000

I am shocked. Simply shocked. Mr. Holsinger sends:

www.latimes.com/news/asection/20000927/t000091708.html 

DOD contractors give campaign contributions to Congress-critters who vote military procurement funding for military equipment given to Columbia for its anti-drug campaign. 


Jerry,

Pursuant to your request for obscure but helpful programs, my submission is for Winhex. Winhex is a great program for editing the 1's and 0's on your disk drives. I use it for various things, mostly when trying to reconstruct files that have been deleted or for doing research (I'm working on a case for a lawyer attempting to reconstruct data that was deleted from two computers, and has bearing on whether or not a guy sits in jail for several years to come).

It's easy to use, and quite reliable, works fine with DOS, Win98SE and Win2K, but I can't answer for other versions of Windows.

There are other programs that Stefan Fleischmann has written on the website, but I have not tried them.

http://www.winhex.com

Tracy Walters

I agree completely, have used it for years. Caution: the "licensing" sucks dead bunnies. You can use the program but you cannot save your work if you did not register. I tried it, liked it, used it, found I couldn't save, found I can't register it with unsaved work in it, and had to dump about an hour's work. That is unconscionable. But once registered it works. Just don't try it before you buy it because the trial is a scam. But see below. I am please to say the problem is fixed.


I am looking at a story in the Washington Post (http://washingtonpost.com/wp-dyn/articles/A15159-2000Sep25.html) that reminds me of your experience with AT&;T and their policy of gouging long-term customers who don't squawk for the lowest rates.

Amazon was (is?) experimenting with something called "dynamic pricing" which basically means consulting all of the data they've accumulated on a customer before they quote a price. The price will be whatever they think the traffick will bear. For example:

One man recounted how he ordered the DVD of Julie Taymor's "Titus," paying $24.49. The next week he went back to Amazon and saw that the price had jumped to $26.24. As an experiment, he stripped his computer of the electronic tags that identified him to Amazon as a regular customer. Then the price fell to $22.74.

Also:

... Don Harter, an assistant professor at the University of Michigan, said he saw variable prices on Amazon at least a month before that.

Harter was conducting a study on the difference in DVD prices between an environment with variable pricing--such as the auction house eBay--and a presumably stable one, such as Amazon.

"But my assumption of stable prices on Amazon was wrong," Harter said. Using two computers to check DVD prices--one through the University of Michigan using his Amazon account, one through Carnegie Mellon University with a computer that was unknown to the retailer--he found that items such as "The X-Files: The Complete Second Season" could vary more than $10 in price.

Wade L. Scholine

I have mixed emotions here. I would pay the higher price for the convenience. On the other hand, is this fair?  Is it fair if you would have agreed to the price not knowing others paid less? See Matthew 20 for inputs.


Dr. Pournelle,

In Tuesday's mail, Ken Paul makes some mention of responsibility. I agree, mostly, but I feel one must also remember this: vicarious liability. As I was becoming a marksmanship instructor long ago, our primary instructor first taught us that we are responsible for what we teach, vicarious liability, and continued to hammer in the point throughout the course of instruction. I firmly believe it applies even here. One may reasonably assume that if I taught a class on how to crack safes, one of my students might try it. So, part of my instruction must center on the ethical use of such instruction. Same goes for cracking encryption. If I taught someone how to crack a book's code, but did not stress at some point that this should not be used for illegal purposes, I bear some responsibility. We live in a society which now has a trend of choosing to place blame of wrongdoing in others instead of ourselves. Makes money for lawyers and psychiatrists, but does little to cure our social ills.

Just my 2 cents.

George Laiacona III <george@eisainc.com> ICQ 37042478/ 28885038 Human activity is soley responsible for global warming, and the sun has no impact whatsoever.

Well, when we need this many lawyers to enforce human decency then things have come to an interesting pass. In BIRTH OF FIRE I tried to describe how a pioneer society might work without all that. 


Mr. Holsinger also sends:

Madeleine Albright and the Russian Foreign Minister:

They have a strange relationship. They sang a parody version of "Don't Cry For Me Argentina" at a foreign minister's conference last year.

He somehow hurt his leg or foot this year and had trouble getting around in the cavernous Russian Foreign Ministry building so she gave him a push scooter (the two-wheel kind you stand up on with a handlebar) with bell and bike helmet. His staffers told her they hate it because he uses it all the time and loves to ring the bell. 

Ah, the dignitas, always dignitas...


> I tried it, liked it, used it, found I couldn't save, found I can't register it > with unsaved work in it, and had to dump about an hour's work. > That is unconscionable.

I believe you are commenting on an outdated version of WinHex.

When you had that problem, you described it in "view106.html" on June 21st. I told you then that even in the unregistered state of the software, you could have saved all your work as a WinHex backup. Unfortunately, the version from January 2000 (when you registered) did not automatically give that hint, but later versions do.

After June 21st, I changed the registration procedure and finally even allowed saving of large files immediately after entering the registration codes.

Your comments and criticism are gratefully accepted, but please don't ignore my corrections. Updating your WinHex copy is still free for you.

I would appreciate it if you considered revising your statement in your current mail page. Thank you.

Kind regards,

Stefan Fleischmann


 

 

 

TOP

 

 

 

This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

read book now

TOP

Thursday,

I was under the weather a bit.

 

 

 

TOP

 

 

 

This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

TOP

Friday, September 29, 2000

Tons of mail. So short shrift I fear.

Greetings, Doc.

Please relay this to all your correspondants from nations where English is not the primary language: Stop apologizing! Your English, no matter how bad, is infinitely better than the <your language here> of most Americans. And "infinitely" is used here in a mathematical sense; most Americans speak _no_ language other than English.

Feel free to print my TrueName and/or email address; I don't keep either of them under lock and key.

Regards, SRF

-- Steve Furlong, Computer Condottiere Have GNU, will travel 518-374-4720 sfurlong@acmenet.net

Agreed.


Hello Jerry,

I have (at last) found your web site again (via the DC-X references!) ... I spent some time browsing the articles.

SDI doesn't have to work to be effective.

If half the missiles the USSR could launch would be destroyed by a weapon system costing a small proportion of the cost of those missiles?

Which economy collapses first: the one making the nuclear missiles, or the one destroying them?

I think the cold war can be quite succinctly described as economic warfare, which the USSR eventually lost. In the 50's and 60's, the balance seemed even, but as time went by, an 18th-Century economy and political autocracy lost ground to a much more diverse mixture. The announcement of SDI was the last of a long line of unsupportable economic challenges.

Bye for now, Paul Langford. FCG:WWIT ILS/ROUTER Development Hewlett-Packard, Pinewood, U.K. 

A point Possony and I made in STRATEGY OF TECHNOLOGY among other places. Imperfect defenses are still an effective deterrent because you can't do a proper war plan when you don't know which birds will get through. Even a 25% chance that a particular bird will be intercepted raises the number you must aim at a given target by a LOT if that target is important--such as the other guy's counterforce site. Thanks.


Dr Pournelle, guy at computer somewhere in LA, Jerry,

People have been spamming the 30000+ newsgroups with the key decryption sourcecode to DeCSS. I don't know how it can possibly be "protected" now (apart from protecting lawyers' incomes, of course).

In the UK, despite threats from the US lawyers, Demon (an ISP with a record) has refused to pull a site with the code on as the US ruling has no jurisdiction here.....

David J Burbage

Yep. Trying to stop a flood by building levees when the locals will not cooperate. Never works. Even when they do it usually won't work.


Dr. Pournelle:

I was searching the Web for information on the Qaz worm and found a link to your page, and I have also read many of your books, so I was interested in more than just the information provided about the worm. However, it is the reason for my missive.

Apparently once one machine is infected on a LAN certain of these worms (including Qaz) are capable of spreading to other systems with shared drives, so any box with these settings is vulnerable to remote alteration regardless of the initial transmission method.

I noticed that one of your respondents mentioned that he had been infected by the network.vbs virus (also known as Bubbleboy or VBS/Bubbleboy) as well as the Qaz worm. Two systems on my network were infected by both worms, the only two which allowed full read/write access in File Sharing. Both are Win98 boxes, so I can't comment on the effects under other operating systems.

These are the only two viruses I have ever found on my systems in 15 years of owning computers, probably because I am very much interested in defending them against said viruses. I have a couple of suggestions for you in order to prevent further penetration by these invasive programs.

First, you could go into Sharing for each shared drive you have on the network and click on the Sharing tab...and set Access to Read-only. This could possibly limit functionality to a small degree, but will also generally prevent worms like Qaz and Bubbleboy from replicating to other machines.

Also, as the mechanism for Bubbleboy's invasion is now known, it's possible that Qaz uses the same one. Bubbleboy can only infect systems where certain ActiveX controls are set incorrectly, an issue that Microsoft found with Win98 months before the advent of Bubbleboy. I find it odd that both appeared on systems which had never been infected before. While this assumption may be incorrect, it can't hurt to protect your system against Bubbleboy as well.

There is a Security Update you can download from this page on MS's website that will close the loophole that Bubbleboy exploits in Windows:

http://www.microsoft.com/technet/security/bulletin/ms99-032.asp 

Find the ms99-032 link to download the fix.

I try to keep Windows current (especially as regards Security Updates) and update it at least monthly, so I'm surprised that this issue hadn't been resolved by my previous updates. Nevertheless, I found Bubbleboy on a couple of my hard drives.

Anyway, I hope this helps in your quest to stamp out the worm...and I await Burning Tower impatiently. :)

Jim Hopkins johnny_ace@hotmail.com

One defense against QAZ is to copy NOTEPAD.EXE to NOTE.COM on every machine. That seems to be a  flu shot that works...

Good day, sir!

Thanks again for doing all those things so I won’t have to. I just wanted to mention that I just found an instance of the Notepad virus you mentioned a week or so ago, on the PC of a client whom I had just hooked up to Road Runner. It is the practice in her office to share the whole C: drive (!!!) via MS Networking, and that’s apparently not negotiable. Furthermore, since Road Runner was installed specifically to set up a VPN with a second office, some degree of sharing is mandatory. Ouch.

Fortunately a shareware firewall solved that problem (I hope…). On the recommendation of a more senior engineer than myself, I installed Sygate Technologies Sygate Personal Firewall, which is also offered free for personal use. After I told it to trust the appropriate IP addresses, and adjusted the “security slider” control (pretty handy), things seemed under control. I used both Sygate’s and Steve Gibson’s web sites to probe the ports. The “high” setting made the machine almost completely invisible, with everything “stealthed,” (is that military-speak?) but also useless for VPN purposes, given my limited expertise. The “medium” setting changed some ports from “stealth” to “closed,” and the “low” setting pretty much set everything to “closed,” meaning detectable but theoretically not vulnerable. Even at that setting, both Gibson’s and Sygate’s port-probing pages reported I was safe. Time will tell, of course.

 

What interested me about the installation was that between the time I installed Road Runner and the time I installed the VPN and firewall (maybe a week and a half), the virus I had just read about on your site had mysteriously appeared on the system. I have to assume that it got there through the promiscuous sharing of that C: drive. Thought-provoking. I’m starting to take security much more seriously.

On a separate note, I’m beginning to teach myself how to use Front Page. One thing that annoys me is the amount of “Office-specific” HTML code it generates for every page. I vaguely remember reading somewhere about getting rid of that. I figured that either you or one of your readers would know more about that. Any ideas? Thanks a million, and keep up the good work.

Peter A. Moore

IT Engineer — Precision IT

Email: PMoore@PrecisionIT.net 

You may not have to map drives. We got a reinfection of qaz here after I sent out the warning.


Jerry,

First of all, I love your articles and your books.

I have a tidbit concerning information you were writing about in your August 21st article about Windows ME ability to hide DOS features. I subscribe to an web site that sends out weekly tidbits about Windows 95/98/NT/2000/Millenium. The site is located at http://www.lockergnome.com . The September 2nd newsletter had a blurb about being able to access Real DOS mode from Windows ME.

The site that has the utility and registry information to alter in Windows ME is located at: http://www.geocities.com/mfd4life_2000/ .

Dennis W. Skiles dwskiles@micron.com 


Wash. Post article http://washingtonpost.com/wp-dyn/world/A31642-2000Sep27.html (A Four-Star Foreign Policy?) says in part: "The CINC offices were expanded 14 years ago to promote efficiency by giving them command of operations involving the Army, Air Force, Navy and Marines in assigned regions of the world. Since then, the CINCs (pronounced "sinks") have evolved into the modern-day equivalent of the Roman Empire's proconsuls--well-funded, semi-autonomous, unconventional centers of U.S. foreign policy."

Wade Scholine

Yep.


Dear Jerry:

In re: the DMCA -- I've looked at the Digital Millenium Copyright Act, and it's an interesting piece of legislation, from the viewpoint of someone with legal training.

It allows the normal exceptions to copyright -- "fair use", for instance.

OTOH, it also contains a number of "this act forbids rape, murder and breathing" provisions; for example, preemptive injunction against alleged behavior (shutting down your computer at the _beginning_ of an action, before a finding of fact); punitive confiscation/destruction of machinery ditto, etc.

The provisions for awards of costs and fees are the legal equivalent of painting a big red X on someone and a label saying SUE THIS PERSON, too. They're invitations to bankrupt the recipient of a suit right at the outset; and they include swinging punitive measures for 3rd parties whose equipment contains copyrighted material even without their knowledge.

Incidentally, they also allow for very serious criminal as well as civil penalties.

I'm of two minds. On the one hand, this is drastic stuff, and I understand more is in the pipeline.

On the other, "Freenet" pirates have recently been boasting that they are posting fiction to their system, with the intent of destroying copyright protection.

I'm a technical ignoramus myself, but I've been told by the more knowledgeable that it is in fact possible to "crack" the Freenet system and other distributed systems like it, and identify posters and downloaders.

Personally, I'd very much like to see anyone who violates the copyright on a book go to jail and suffer very unpleasant fates there. It would be a great pity if draconian measures were necessary for this, though.

Yours, Steve Stirling

I have letters from Mrs. Virginia Heinlein about piracy of Robert's works. It gets serious. Although just at the moment I'll trade you: give me some drastic legislation putting SPAMMERS in danger of life and limb, or at least limbs: amputations of hands and forbidding them voice access (next offense tongue comes out) seems -- well perhaps a LITTLE drastic, But not very, after I have 47 spams in the past 2 hours.


Jerry

In the new Tweakui there is a tab labeled "Open." That allows you to specify up to five places on the Places Bar that accompanies the Open dialog box. I find the Places Bar very useful. It's more useful now.

I keep my downloaded software in a folder in My Documents. Going into TweakUI I specified that folder - - - C:\My Documents\folder - - - in Places Bar. It now shows up. Note no quote marks are necessary. Cool.

Ed Hume

www.pshrink.com

 

 

TOP

 

 

This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

TOP

Saturday, September 30, 2000

Jerry,

Keep in mind that one of the traditional means of preventing undesirable legislation from being effective is to include obviously unconstitutional things in it. Even if it is enacted and signed by the executive branch, it ends up being immediately challenged in court, has its effectiveness stayed by court order pending resolution of the constitutional challenge, and ends up being dumped by an appellate court years later.

This is especially effective in fast-changing environments like the internet.

Don't be surprised if a rider is attached to the DMCA requiring that chips be imbedded in computers to detect violations of the DMCA, with an additional requirement that components of the chip be manufactured in a majority of the 435 congressional districts. 

Tom Holsinger


There is a program designed specifically to convert the "Office-specific HTML" at:

http://www.fourmilab.ch/webtools/demoroniser/ 

Holden Aust


 

 

 

 

 

TOP

 

 

This week:

Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday

read book now

TOP

Sunday,

 

 

 

  TOP

 

 

birdline.gif (1428 bytes)